This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

30 October 2013

The Concept of Cracking



The scene of cracking has exploded, mostly due to the availability of cracking programs and popularity of websites that cost money. The Internet is filled with predictable and Internet dumb users. With these users comes an opportunity for you to take what is not yours by brute force.

This article is meant to guide you to successfully cracking accounts. So let's get on with it.

The Main Principle of Cracking

 One difficult to grasp fact new crackers come to find out is that cracking a particular account is usually difficult. Understanding this fact is a key step in becoming a successful cracker. There's great success in numbers. The more user accounts you have to try and crack, the more likely you'll have success. The reason behind this is simple and logical. If you have a pair of dice, and need to roll snake eyes(two ones), the more tries you have, the better the chance of success.

The main principle of cracking is trying as many valid users(will be covered later) as possible. Despite what others may think, have 10,000 user accounts to try and crack is a much better scenario than having 3 user accounts and 10,000 passwords.

Internet Dumb Users

  Most people on the Internet do not take security seriously. There is a misconceived notion about the Internet that it's secure and anonymous. This lack of concern leads to guessable and common passwords. Patterns, common words, and common names are usually likely passwords. These are usually chosen by these users because they're easy to remember. Another common lapse in judgment is the fact that these users usually use the same password for all things they have a password for; bank or credit card accounts, E-Mail accounts, and pretty much anything else you can imagine.

All About Passwords

 Choosing passwords to crack with is a critical of your success. Using "tert34g" as a password to crack with is not a good idea. Yeah, there's some small chance that you may achieve one successful attempt with it, but it's a waste of time.

Think about it. What do most people have in common? Names, favorite foods, favorite animals, favorite sports teams, favorite colors, etc. Instead of relying on preexisting password lists, try creating your own. Why? Things change. What was popular last year is no longer popular. MySpace as a password was logical two years ago. Now, most people haven't logged into their MySpace in months. Your unique ideas may provide you great success. Think about what's popular now... Justin Bieber, Obama, or the Miami heat. I bet you never thought of "heat" as a password.

Selective passwords are what I call passwords that are applicable only to a single website. If you're attempting to crack Facebook accounts, passwords like facebook, Facebook, or FACEBOOK are likely to be successful. If you'd like to go further, go into why people use Facebook. You can logically come to the conclusion that people use it for friends, buddies, etc. Those are logical passwords. The web site's name is one of the most common passwords used by users because it's easy to remember, and that same logic applies to every site they have an account with.

Passwords are usually lazy. Most people are too lazy to put any effort into a password, so people will rarely capitalize a password. Any part of the password. Usually, passwords cased like Michelle are rarely successful. The extra motion needed to reach the shift key is usually not a desirable motion for most users. Lowercase passwords are by far the most popular. Uppercase passwords like PASSWORD follow in second, and "properly" cased passwords like "Password" are third.

Name as password = success. One of the most successful method for cracking is using the user name as a password. Bobby's password is possibly bobby, and Janet's is likely to be janet. You can go further, and remove numbers with some programs. Bobby1945's password is possibly bobby, or even boby1945. Again, laziness. Most programs support the use of user name as password, and can remove the letters or numbers from the password for added control.


Research the Website You're Cracking

 A lot of sites are becoming critical of their users' passwords. Now, most require a minimum password length, and even have particular rules like they must contain a number. To help with this, I'll explain the most common passwords should these kinds of rule apply.

If a website requires a number, try common passwords, and add a "1", or any other number, on the end. password1, adam1, facebook1 are all quite plausible and lazy(which is what you're going for).

If a website requires a capital letter, try capitalizing the first letter, or all letters: Facebook, Password, PASSWORD, LOVE.

If a website requires a capital letter and a number, try capitalizing the first letter and adding a "1", or any other number, at the end: Password1, Michelle1, Rachel1.

If a website requires a symbol, try an exclamation mark(!) or a period(.) at the end of common passwords: password!, iloveyou., etc.

Research will prevent you from wasting time. If you don't do proper research, and you're cracking a site that requires passwords with a length of more than 4, and you're using "1234" as a password, you're not doing a bit of good other than wasting bits and bytes of bandwidth.

Trying Other Sites with Cracked Accounts
 9 times out of 10, a user has at least two accounts with the same password. An ideal situation is when you crack an account, and look in the account information, then find the user's E-Mail address. It's not even 50% likely, but there's a better chance than usual that you know that E-Mail address's password. If and when you access the E-Mail account, it's probable that all other sites the user has registered on has sent him or her an E-Mail. Not many people clean their E-Mail box.


Don't Crack Air; Use Valid Users
 
 
If a user account doesn't exist, why would you try to crack it other than to waste time? Understand that like passwords, a lot of user names are common words, phrases, or patterns. bobby1 is more likely to exist than bobby10382.

As of this moment, there are a few program available for validating whether or not accounts exist. I will not discuss or list these programs, but do the research; it's well worth it.

Combos(Password Databases)

 Combos, as they are called by most crackers, are lists of user names and passwords that have already been cracked for other sites. These are highly successful, but the success can be short lived if other users have access to the same combo. Programs that search for combos are useful, but as I just stated, the success they give can be short lived. These programs are predictable, by that I mean that they use the same, repetitive collecting mechanism.

Combos are a great asset to cracking, but it can be a gold rush which other users can "steal" your hard work.

Sample List
 
 
Here's a small sample password list off the top of my head that will likely be successful:

123456
123456789
abc123
asdf
asdfghjkl
54321
password
password1
lakers
bieber
michael
chris
jesus
money
green
yellow
blue
tiger
puppy
kitten
kitty
james
brandon
michelle
elizabeth
stacy

As you can see, all passwords are common words, or easy to remember patterns.

In Summary

 
 
Cracking accounts can be easy; and it can be hard. This all depends on your research and effort before cracking. Success is paved with research.

Speed Up Your Internet Connection With A Simple Tweak: Replace your ISP DNS Server with OpenDNS

When we type a web address in our browser [like www.google.com] and hit go, the request goes to our local ISP servers who translate that domain name into a hard-to-remember IP address [like 66.102.7.104]

While this address resolution mechanism is transparent to the average internet user, it can sometimes be the main reason for slow internet access if the DNS servers of your ISP are acting choppy or not working at all.


To overcome these problems, you can consider changing your DNS server name to a more reliable but free service called OpenDNS. There's no software to install, just a small tweak in your internet connection settings. 



We just replaced the default DSN server address of our ISP with the OpenDNS servers which are :

     208.67.222.222
     208.67.220.220




The DNS server can be changed from the TCP/IP Properties section. [Control Panel -> Network Connections -> Local Network Connection -> TCP IP Properties]

Why OpenDNS is good ? Your domain resolution request to OpenDNS is executed from the nearest physical location and the address are also cached at their end. Therefore you notice faster internet browsing. 
Second OpenDNS would auto-correct misspelled domain names [or typos]. For instance, if you type www.gooogle.com by mistake, you'll be redirected to www.google.com without any interventation. The other advantage is that you have a much safer browsing experience since OpenDNS would prevent you from visiting a scam website by error.

Some precautions before using OpenDNS

1. In the extreme situation when OpenDNS servers go down, you should keep the address of your ISP DNS servers handy.

2. You can turn off the phishing protection or auto typo correction by visiting the OpenDNS preferences page.

3. Some users might have privacy concerns with OpenDNS while some dislike seeing ads when they mis-spell domain names. The choice is completely your's here.

OEM Information & Logo - Windows XP

You can import your customized OEM Information and Logo unattended, we'll show you how in this guide.

To do this, you need to create 2 files - oeminfo.ini and oemlogo.bmp
» oeminfo.ini

Open Notepad and Copy and Paste the following example, then edit it accordingly:
[General]
Manufacturer=MSFN Unattended XP CD
Model=
[OEMSpecific]
SubModel=
SerialNo=
OEM1=
OEM2=
[Support Information]
Line1=Support Contact: chandrapalsharma95@gmail.com

Save it as oeminfo.ini
» oemlogo.bmp

Create a new image with a pixel size of 182 x 115 (width x height), customize your logo to how you would want it to look. Name the image file oemlogo.bmp.
NOTE: The MSFN Forums has a lot of discussion about the recommended image size for oemlogo.bmp. This guide used to recommend an image size of 180 x 114 (width x height). The following is quoted directly from the Setup Manager dialog of the Windows XP SP2 OEM Preinstallation Kit (OPK):
Your logo graphic (Oemlogo.bmp) must be no larger than 172 by 100 pixels. Larger graphics will be cropped, and smaller ones will be centered.
One color of the oemlogo.bmp image will be transparent, which means instead of displaying that color, the current System Properties dialog color is used. To designate the transparency color, edit all four corner pixels of oemlogo.bmp to be the exact RGB index (e.g. 0:0:0 for black, 255:255:255 for white, etc) for the desired color. Older Microsoft documentation states that only one pixel: x=0,y=0 (located on the upper left corner) needs to be so colored, some MSFN members (perhaps using different language versions of Windows XP ) have reported that coloring different corner pixels worked for them. To be sure, color all four corner pixels the same RGB index that should be transparent and all bases will be covered—it only costs 4 pixels that most likely do not contain any meaningful part of the image. If image transparency is undesirable, just edit these 4 pixels to use a color that is not used anywhere else in the image, or create a 1-pixel wide border of that color around the image.
NOTE: In order for image transparency to work, the image must be saved as either an 8-bit (256 color) or a 4-bit (128 color) indexed bitmap file. Many digital image editing software applications default to saving bitmap images as 48-bit (also called True Color). While these images will display in the System Properties dialog, the transparency feature will not work with them.
NOTE: The oemlogo.bmp will not work at all without the presence of an oeminfo.ini file.
» Testing your OEM Information & Logo

Copy both files into your Windows System32 Folder (usually C:\Windows\System32\) and open up your System Properties box to see the changes. Edit your files again until you are happy with it.
» Importing your OEM Information & Logo Automatically


We can use the $OEM$ Distribution folders to do this. Create a sub-folder called $$ if one doesn't exist already, then create another sub-folder within $$ called System32. For example:

C:\XPCD\$OEM$\$$\System32\

Copy both oeminfo.ini and oemlogo.bmp to the System32 folder explained above. When Windows XP Setup is run, both of these files will be automatically copied to Windows' System32 directory, no matter what the Windows folder is called.

» Conclusion

If you done everything correctly, your System Properties box should look something like this:

[General]
Manufacturer=MSFN Unattended XP CD
Model=
[OEMSpecific]
SubModel=
SerialNo=
OEM1=
OEM2=
[Support Information]
Line1=Support Contact: chandrapalsharma95@gmail.com

Matrix Falling Code Effect - Notepad CMD (.BAT) Tricks

Inspired by the movie Matrix, this falling code trick is extremely popular on social networking websites. Copy and paste the code given below in Notepad and save the file as "Matrix.bat" or *.bat.

@echo off
color 02
:tricks
echo %random%%random%%random%%random%%random%%random%%random%%random%
echo %random%%random%%random%%random%%random%%random%%random%%random%
echo %random%%random%%random%%random%%random%%random%%random%%random%
goto tricks




Matrix Falling Code Effect - Notepad Trick

Upon running the bat file, you will see the "Matrix falling code" effect.

Make Your Keyboard Type (Any) Message Continuously - VBS Trick

This VBS trick can make any of your friend's keyboard type any message continuously. Open Notepad, copy the code given below and save the file as Tricks.vbs or *.vbs.


Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "This is a Virus. You have been infected."
loop






Send this file to your friends as an email attachment to see the fun

Make your Computer Welcome You

Do you watch movies? Have you always loved the way how Computers in movies welcome their users by calling out their names? I bet that you too would want to know how you can achieve similar results on your PC and have a computer said welcome.

Then you are at the right place, this article describes exactly how you can make your computer welcome you like this.

With this trick, you can make your Computer welcome you in its computerized voice instead of having a human said Welcome. You can make your Windows based computer say "Welcome to your PC, Username."

Make Windows Greet you with a Custom Voice Message at Startup

To use this trick, follow the instructions given below:-
  1. Click on Start. Navigate to All Programs, Accessories and Notepad.
  2. Copy and paste the exact code given below.
Dim speaks, speech
speaks="Welcome to your PC, Username"
Set speech=CreateObject("sapi.spvoice")
speech.Speak speaks

     3.  Replace Username with your own name.
     4.  Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Welcome.vbs or "*.vbs".
     5.  Copy the saved file.
     6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) or to C:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 7 and Windows Vista) if C: is your System drive.
     7.  Paste the file.

Now when the next time you start your computer, Windows will welcome you in its own computerized voice.

Note: For best results, it is recommended to change sound scheme to No Sounds.
You can change the sound scheme to No Sounds by following the steps given below:-
  1. Go to Control Panel.
  2. Then click on Switch to Classic View.
  3. Then Click on Sounds and Audio Devices.
  4. Then Click on the Sounds Tab.
  5. Select No Sounds from the Sound Scheme option.
  6. If you wish to save your Previous Sound Scheme, you can save it by clicking Yes in the popup menu.
  7. Click on OK.


Try it yourself to see how it works. In my personal opinion, this is an excellent trick. Whenever I start my PC in front of anybody and the PC welcomes me, the fellow is left wondering how brilliant a computer do I have.

Make your Computer Talk

Have you ever wondered how can you make your computer speak whatever you input to it like in the movies. Would it not be fun? If only it was possible! Rejoice, because now it is possible. Well, if you wish to know how to do this, then you have come to the right place. With this trick, you can create a script in Windows which will make your computer speak whatever you input to it.


To create one such talk script, follow the steps given below:-


Steps
  1. Open Notepad.
  2. Copy and paste the exact code given below.
          Dim Message, Speak
          Message=InputBox("Enter text","Speak")
          Set Speak=CreateObject("sapi.spvoice")
          Speak.Speak Message

    3. Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Speak.vbs or "*.vbs".
    4.  Double click on the saved file, a window will open like the one in the image. Enter some text in enter text column and click OK.


Now your Computer will speak / talk what you typed in Step 4. Try it yourself.

Windows Compatibility: This VBS file can be executed on all versions of Windows including Windows XP, Windows Vista and Windows 7.

Personal Experience: I personally showed this trick to many of my friends and they were literally left awestruck. You too can impress your friends by making your PC talk and be the Computer Wiz.

29 October 2013

Make Undeletable, Unrenamable Folders

Have you ever wondered how you can make a folder which neither can be deleted nor be renamed. Well, if you have, then you have come to the right place. With this trick, you will be able to create folders in Windows which cannot be renamed or deleted.

Basic Concept
The basic concept behind this trick is the use of Keywords. Keywords are reserved words in any programming language which cannot be used as names of variables. Windows also uses certain keywords in its programming. Some of them are con, aux, lpt1, lpt2, lpt3, lpt4, lpt5, lpt6, lpt7, lpt8 and lpt9.



A Test
To test this concept, make a new folder in Windows and try to give it a name same as any keyword suggested above.

Result
Windows will  not rename your folder to any of the keyword given above.

Trick
So the question arises, how can we make a folder with a keyword as its name? The solution to this problem is included in Windows itself. As we know that Windows has evolved from D.O.S.(Disk Operating System), its commands can be used in Windows. You can use D.O.S. Programming in Windows to create a folder with a keyword as its name using the steps given below:-

  1.  Click on Start.
  2. Click on Run. Type in "cmd" without quotes.
  3. In the Command Prompt Window that opens, type the name of the drive you wish to create your folder in the format <drive-name>: and press Enter. e.g. If you wish to create the undeletable folder in D drive, type "D:" without the quotes. Note that the folder cannot be created in the root of C:/ drive.
  4. Type this command- "md con\" or "md lpt1\" without the quotes and press Enter. You can choose any of the keywords given above as the name of your folder.

Now Windows will create an undeletable, unrenamable folder in the drive you entered in Step 3. However the folder can be renamed to another keyword using Windows Explorer.


Deleting the Folder

Although it is not possible to manually delete the folder, you can delete the folder by typing "rd con\" or "rd lpt1\" in Step 4 instead of "md con\" or "md lpt1\".


Try it yourself to create one such folder which can neither be deleted nor be renamed.

How to Speed Up Taskbar Thumbnails Preview in Windows 7

Windows 7 has provided a cool feature with ability to preview taskbar thumbnails whenever the mouse is hovered on the program icon. However, you may notice that it does have some latency to display the preview after mouse over the icon. To speed up the thumbnails preview, you can change the delay time with simple steps.

The delay time can be change via registry key. Please follow below steps to change it:
1. Go to Start -> Run, then type regedit.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Mouse.




3. On the right panel, look for MouseHoverTime and double click on it. Change the value to 0 (in millisecond) then click OK button to save the changes.



4. Close the registry editor and restart your computer in order to take the effect of the changes.


Once you have completed above steps, you can verify the delay time taken to display the thumbnail preview if it is faster than the previous.

Hide Drives from Your Computer in Windows 7 or Vista

If you’ve got drives in My Computer that you never access, such as a USB Flash drive that you are using solely for ReadyBoost, a floppy drive, or a network drive only used for a particular piece of software, then you might want to simply hide the drive from your computer.
This tip will only hide the drive from being displayed, applications and the command prompt will still have access to it, and you can still manually browse to the folder if you type in the path.
Now what’s that floppy drive doing there?
Configure the Hidden Drives
Open up regedit.exe by using the start menu search box, and then browse down to the following key.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

If the Explorer key does not exist, you can right-click on Policies, select New Key and name it Explorer.
The NoDrives key most likely does not exist by default, so you’ll need to create it with right-click \ new 32-bit DWORD and name it NoDrives.
This value is a 32 bit number, and the bits are arranged in reverse order with a value of 1 hiding that drive. For example, if we wanted to hide drives A: and F: we would arrange it like this:
Z
Y
X
W
V
U
T
S
R
Q
P
O
N
M
L
K
J
I
H
G
F
E
D
C
B
A
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
1
Converting 100001 to decimal we end up with a decimal value of 33 or a hex value of 0×21, so if you double-click on the key in the registry editor, choose Decimal and then enter 33 into the value field.
In order to see these changes, you’ll need to restart explorer.exe, which you can do easily from Task Manager or the longer way by just logging off and back on.
Uninstall Tweak
To disable this tweak, simply remove the NoDrives registry key entirely.
Reference Info
Here’s a list of the values you’ll want to enter for a few different drive letters.
Drive Letter
Decimal
Hex
A
1
1
B
2
2
C
4
4
D
8
8
E
16
10
F
32
20
G
64
40
H
128
80
I
256

J
512

K
1024

L
2048

M
4096

N
8192

O
16384

P
32768

Q
65536

R
131072

S
262144

T
524288

U
1048576

V
2097152

W
4194304

X
8388608

Y
16777216

Z
33554432

If you want to hide multiple drives, you’ll need to use the table of all the drive letters to figure out the correct binary code, and then convert that to decimal or hex. (hint: you can use the calculator in scientific mode)
Look, now that worthless floppy drive is gone!

Naturally it would be better to disable the floppy drive in your BIOS, but this tip is still valid for other types of drives.
Note that this also works on Windows XP.