RSS
Showing posts with label Cool Tricks. Show all posts
Showing posts with label Cool Tricks. Show all posts

Simple method to make your folder password protected.

Follow these instruction.

1. Open Notepad and copy the code below
2. Change your password in the code it's shown the place where to "type your password here".
3. Save file as locker.bat
4. Now double click on locker.bat
5. I t will create folder with locker automatically for you. After creation of the locker folder, place the contents you want to lock inside the locker folder and run locker.bat again .
6.It will prompt for password.Put password as ravi123
(You can edit the password by right clicking bat file)

<---The code, copy the whole thing---->


@echo off
title No Hanna Montana Allowed
IF EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" GOTO UNLOCK
IF NOT EXIST Locker GOTO MDLOCKER
echo Folder Created.
:CONFIRM
echo Are you sure you want to lock the folder? (Y/N)
set/p "cho=>"
IF %cho%==Y GOTO LOCK
IF %cho%==y GOTO LOCK
IF %cho%==N GOTO END
IF %cho%==n GOTO END
echo Invalid Choice.
GOTO CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder Locked.
GOTO END
:UNLOCK
echo Enter password to unlock the Folder :
set/p "pass=>"
IF NOT %pass% == ravi123 GOTO FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked Successfully.
GOTO END
:FAIL
echo Invalid Password!
GOTO END
:MDLOCKER
md Locker
echo Folder created.
GOTO END
:END
PAUSE

Yeah, you can save you private data for free but here the catch, you can edit your password by right clicking the bat file and select "edit". In order to prevent someone changing your password, try change the file name and extension such as "system.dat".

Share

toolbar powered by Conduit

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to get unlimited time in Internet

    20 oct 2010:
    Have you ever been pissed by cybercafe internet timer? ok, here is the deal!
    In this tutorial I will show you how to disable the timer on the computers in Internet Cafe.

First of all create a new Text Document. Then write "CMD" in it, without the quotes and then save it as "anything.bat". (Make sure you're file is .bat)

Now go to the location where you saved the batch, and run it. If you've done it correctly, you'll see that CMD (Command Prompt) will open.

Now, write in the CMD: "cd\windows" without the quotes. (This will change the directory to WINDOWS). Then type "regedit" without the quotes and regedit editor should open.

Now navigate to:
HKEY_CURRENT_USER>Appevents>software>classes>microsoft>windows>current version>internet settings>policies>system

Then on the right pane where it says "Disable Taskmanager", right click on it and scroll down to modify, then change the value of it to "0". 
Then open Task Manager (CTRL+ALT+DELETE or CTRL+SHIFT+ESCAPE) and disable the Internet Cafe's timer.


If you did this right, you're done.
Well done and good luck doing this

Share



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to Access Blocked Websites at Work using UltraSurf

Download UltraSurf

UltraSurf is a free software which enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely. Users in countries without internet censorship also use it to protect their internet privacy and security.


Installation:

It's a small, green software. No installation needed. You need to unzip the file if you download the zip version. Double-click the UltraSurf executable file to start UltraSurf program.

Settings:

All best settings has been shown above to use this software. Follow the same.
  1. Unzip the downloaded file.
  2. Click on .exe
  3. Click on option at top
  4. In new windows, click on proxy settings in the bottom
  5. Click on Auto-Detect Proxy Option as shown above
  6. Click OK and close all windows.
  7. Reopen the software by clicking in the .exe
  8. Wait for few seconds to connecting the server.
  9. Once the ultrasurf connected to server, it will show- Successfully connected to server
  10. The right side speed bar will auto generated after connected to server.
  11. IE will open automatically. Close this IE.
  12. Download GOOGLE CHROME INTERNET BROWSER. This is my recommendation because this software is best compatible with google chrome.
  13. PLS DNT TRY ULTRASURF WITH MOZILLA FIREFOX.
   
Once you successfully connected check the above settings in your IE. The Address will show 127.0.0.1 and port 9666. It means you are ready to open blocked websites.

Install Google chrome and open it. NOW OPEN ANY WEBSITE AND ENJOY.
Hope this helped!
:-)

Share



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Hide your track with Cyberghost VPN

*NOTE* I am not responsible for what you do when your IP address is masked.


Firstly, IP addresses can be masked a number of ways. I will not only go into depth about IP addresses, I will also dip into Mac Address spoofing.


IP Masking


1) Download a VPN client -- in these screen shots I will be using Cyber Ghost virtual private networking services, the link can be found at: http://cyberghostvpn.com/


2) Navigate to the site, you'll see a page like this. Click what's high lighted below:



3) Navigate to this page: http://cyberghostvpn.com/en/product/download.html and click the download from cNet button. You'll be redirected to download.com.


4) Click the button as shown below:






5) Download the installer. Once downloaded, do as shown below:






  Let the installer download the necessary files.










6) Accept the terms of use, either let the installer auto-select the install directory, or choose your own, click the install button.


7) Make sure you let the installer install the driver, TAP32. Restart your PC.


8) Follow the steps below:








Click the button below, create your account and remember your information:











Masking your IP VIA proxy:

This is the easiest way to get around web blockers, banned accounts, etc.

An example site would be:
http://hidemyass.com/.



You could, and may also view the proxy mega thread.


Spoofing your MAC Address:


When you're wireless cracking, hacking or wanting to circumvent an active ban that has to do with MAC Address, you can easily use this tool:
Visit here for more  Click


Conclusion

I hope this helped. If you're banned from any java-based game, you should re-install JAVA on a new IP address. MAC Address spoofing is also relevant on Pandora to by-pass hours. [tested].



Share



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to protect yourself against phishing

1. What is phishing?

  • Phishing is the method of stealing login info(usernames and passwords) by directing the victim to a clone(fake) login page, that logs the login info without the knowledge of the victim.
  • Such clone website is known as a phisher.
2. How to protect yourself against phishing?
  • Use your login info in the correct places only.
    Don't ever put your login info anywhere else than the page you registered to, unless it's a trusted service you know(such as youtube or blogger asking for your google account's info).
  • Make sure the website you're logging in isn't fake.
    Whenever you login to a website, if you didn't type the URL(address) of the website yourself, i.e. if you clicked a link that led you to the login page(from message, website, search engine results), always check the url(address) to see if you're in the right place.
    For instance, if you're logging in your facebook account, make sure the url appears as http://www.facebook.com/...
    Where a phisher page would look like http://www.facebook.freewebs.com/... or http://www.facebook.spam.com/... or any url whose part before the .com isn't exactly the same as the page you want to login to.
  • Make sure the links you're clicking aren't fake.
    Whenever you're clicking a link, check where the link goes before clicking it. Links can be masked to appear as something else than the page they're leading to. For example, www.google.com leads to yahoo instead of google. Fortunately, in most browsers, whenever you point your mouse cursor over the link, the true location of the link is displayed on the bottom left part of the screen. Try it with the above link.
    This is particularly important because it can protect you from another, rarer but more dangerous method called cookie stealing, which is basically automatically stealing your account if you're previously logged in the website.
  • Know that links to phishing pages are usually spread via email, and often represent impersonating trusted services and persons, such as making the email appear as it's sent from the website you've registered to, or a friend of yours whose account has been compromised.
3. What to do if you have spotted a phisher?
4. Videos




Share


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to encrypt your folder in 2 mins!

How to secure a ZIP archive
WinZip (www.winzip.com) offers the ability to protect a zip archive with a password. The result is an encrypted zip archive that can only be opened if the correct password is entered. An encrypted zip archive provides confidentiality, it cannot be viewed by persons who don't have the password.

It is possible to encrypt files when they are added to the archive, but it's also possible to encrypt the whole archive at once. That's done by clicking 'Actions' in the menu and then choose 'Encrypt'.



winzip encrypt option

Encryption options in WinZip
Now a dialogue asks you to enter a password and choose a proper encryption algorithm.

winzip encrypt option



* The Zip 2.0 encryption format is known to be relatively weak, and cannot be expected to provide protection from individuals with access to specialized password recovery tools.
* AES is the Advanced Encryption Standard. This encryption method, also known as Rijndael, has been adopted by the U.S. Government's National Institute of Standards (NIST) as a Federal Information Processing Standard. WinZip supports AES encryption in two different strengths: 128 bit AES and 256 bit AES. These numbers refer to the size of the encryption keys that are used to encrypt the data. 256 bit AES is stronger than 128 bit AES, but both provide significantly greater security than the standard Zip 2.0 method. An advantage of 128 bit AES is that it is slightly faster than 256 bit AES, that is, it takes less time to encrypt or decrypt a file. Both 128- and 256-bits encryption are considered strong encryption by the security community.

Now click 'OK' and it's done.

Availability of zip AES decryption software is not standard
Not every zip program is able to decrypt an AES encrypted zip archive. The receiver needs to have a recent version of Winzip (or a compatible zip program) installed to open the document. However, WinZip is not standard software at the office and there are many free alternatives to create and open zip archives.
Encrypted zip files are blocked by e-mail scanners
Anti-virus scanners at e-mail gateways cannot scan the content of an encrypted file. Virus builders have abused this fact and distributed malware via password protected zip archives. This is the reason why many companies block e-mails containing encrypted zip files. As a result, it is unlikely that one can use encrypted zip files in order to exchange sensitive information between companies.



  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Gain Access to a school/College wireless network through human manipulation

DISCLAIMER:I am not responsible for anything you do with this simple Social Engineering trick. However, this is intended for enjoyment.

Introduction: Many schools have computer-illiterate teachers and wireless networks with either specially designed network certificates designed by the school board or direct interaction login pages. These systems require a username and password, given to only teachers and other faculty. Students find this unfair, especially if they can't use our jailbroken iPod Touch's out of it... 


The Steps

Step 1. Victim: You first need a victim. In this case, a teacher with access to the wifi network. Either choose one who you know well or randomly. It pays to get a teacher or IT that has school-wide user management on their computer account. That way, you can possibly log on to the school computers with their computer and manage accounts.

Step 2. Familiarity: Once you chose a rather, computer illiterate teacher you need to; if not already, get familiar with them. I know it sounds horrid, but become a teacher's pet. (Of course, trying your hardest to maintain social ranking. They need to be able to remotely trust you.

Step 3. The Hit: Wait until a project or study, that requires either a school netbook or your own laptop. Follow the steps according to which you choose. Before doing so, make sure the browser is set to prompt you to save passwords.

School Notebook: While maintaining your current image in the teacher's eyes, kindly inform the teacher that you can't connect to the preconfigured network on the netbook. Ask the teacher if he/she could enter his/her credentials to the wireless certificate page. When prompted by the browser to save the password, click "save". Bingo!

Your own laptop: Since students aren't given wifi credentials, simply ask your teacher to enter her information. When prompted by the browser to save the password, click "save". Easy!

Step 4. Extraction: If the host computer runs Firefox, simply go to Tools >> Options >> Passwords. If not, pick up a PE password extraction tool for the according browser @ nirsoft.com.

Step 5. Enjoy!: After this you are presented with a number of options. You can sell the password to close, close friends or possibly try to use that password with the teachers account on the school computers. With that, you can control other students accounts, manage existing accounts on the network, and in some cases, admin priviledges! Pow!



Share


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How To Hide Your MAC-ID

Credits: Ankit Fadia

Note :- This Tutorial is for Learning and/or Educational Purposes only . Illegal use of the tutorials posted is not subjected to me

Every one in this world wants to be anonymous . Hackers or Cyber Criminals needs to be anonymous mostly  Mac id is an identity like an IP to an Computer . So if we want to be anonyous we need to change the MAC id too and be atleast 85% anonymous .

Follow the Screenshots and be anonymous .





Share

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

The ultimate way to not get caught hacking websites

Credits: Red-Pill

 •Go to a public WiFi spot, eg. use the library.
•Spoof your MAC address
•Rename your computer to "Guest" or "--" etc.
•Purchase an offshore VPN (and connect dufus).
•Configure Firefox to run on a proxy server (anonymous, not transparent) that's in Egypt or Turkey or China or some other country not so hot on cyber laws.
•Once you've gained access to the admin/root area, find the password of the most frequent and recently logged in admin (unless you're outright r**ing the site and not fu**ing with it like I do) and log in as that user.
•Delete only your logged IP(s). If you were the only user for a long time, duplicate a previous logged IP and modify the appropriate dates/directories.
•Run all of this on a Virtual copy of Linux (if drive space is an issue, get Damn Small Linux, it's 50 MB's). This is great for destroying evidence if you fuck up or get investigated.
•Never EVER send money from illegal accounts to any account that is linked with any transactions involving you or any of your information. If you need to withdraw illegally acquired money, you're going to have to find somebody (and not use PayPal).
•Do not post your username or any shout outs on a website. If you fu**ed with the wrong webmaster, he'll track you down and send you an email. You send him one back and BAM! He's got your real IP and all it takes is a phone call to the police and a warrant and your asshole gets torn loose for the next few years in jail.

If you have anything to add, please post! Even this is not the most secure method I've seen. I've just forgotten other steps.

Also, If you get caught (I'm on a Mac so you might not be able to follow):

•Delete your sensitive files (or hide them on a flash drive, whatever, but make sure you delete logs and that kind of stuff, and .DS_store files on Mac).
•Backup your hard drive, re-partition it and erase and rewrite the old partition(s) with 17 rounds of zero overwrites (this takes a couple days if you do it to all of them or your whole drive, on my Mac I can just write over where my files used to be). This is the US government standard.
•Encrypt anything you need to save with at least 128 bit encryption. If you have time, and you're a pro, the US government standard is 256 bit, but I've seen up to 1024 before. You'll be charged for obstruction of justice most likely, so only do this if you've been REALLY bad.
•Delete the logs on your router if you did it from home. Also, if you used your home router, make sure that it is NOT password protected and has no port forwards on it. One, if you spoofed your MAC, there's almost no way that they can say it was you. Two, you have to have the access password to port forward which links you with your "hacker" lifestyle if you used RAT's.
•If you downloaded 1,500,000 credit card numbers and PIN's from Microsoft's website (or something quite bad), take out the ol' .45 and feed your hard drive a lead sandwich. Then put the actual magnetized discs in the blender and throw the remains in the microwave. The FBI has been known to spend up to a DECADE trying to decrypt sensitive information on drives.
•If you get caught, invest in a great lawyer, cyber crimes bear HEAVY fines in the US. If you do something really big, or find some new exploit, they'll make an example out of you. Back in the day , a guy who burned 10 DVD's got 5 years and a nasty fine.
•If you get caught for something big and you're a kid, you are going to tell them EVERYTHING. You won't be able to get a good job (legally) or possibly even go to your college of choice if you get convicted of a felony. SQL injection in a lot of cases is a federal offense and a felony (if you pull sensitive info out), but almost all of them can be lowered to a misdemeanor, or lowered to reduce jail time/fines with a guilty plea and cooperation. You will also save a hell of a lot of time in a Juvenile Detention center for this.
•Don't let your guard down on foreign sites. While corporations may not be able to do jack shit, these mother fu****s http://www.justice.gov/criminal/cybercrime/ccips.html
will nail your a** if the US is contacted.


Share

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS