Monday, 30 July 2012

How to enable right click on Any Site.

((•)) Hear this post


Hello friends after long time i make new post. Today’ Our topic is how to enable right click on Site..
We can see in many Site and blog the Right Click is disable by Site administrator.. but how this possible.. ok… to do this admin use simple javascript in coding. And when we Surf the Site and try to right Click  it Shown message like this.
Now.. u very quarius to know  how to enable this.. ok let’s start..
Internet Explorer Browser
ok.. for internet explorer follow this step…
- Goto Tools>Internet options>Security
- Now Click on Custom Level
- Now find Scripting Section it will be around the end.
- Now disable Active Scripting.
- This will disable JavaScript and vbscript in your browser.
- Click on OK.
- Now restart your browser
Mozilla Firefox Browser
- Goto Tools>Options>Content
 - Uncheck the box Enable JavaScript
- Click Ok
- Open the website that have blocked your right click.
Google Chrome Browser
- Click on the Wrench Icon on the top right side on your browser.
- Click on OptionsNow goto Under the Hood tab
- Click on Content Setings and then on JavaScript
- Disable java script and open the website.
We have many trick to bypass this but here we discuss basic trick.. that you  can use anywhere without any special software.

Sunday, 29 July 2012

KGB Archiver: Compress 1GB File to 10MB

((•)) Hear this post



KGB Archiver is free and open source software which compresses 1GB file to 10MB file.
Data compression utility of this software is based on PAQ6 algorithm which has AES-256 powerful encryption. KGB archiver works on both Windows and Linux operating system. Compression ratio of this software is very high. Due to high compression levels, time to compress a file goes high as the size of the file increases and compression ratio may vary depending on the format of the file.When a file is compressed with KGB Archiver it saves it with own extension and at the time of decompression it automatically recognizes the file format. The only limitation of KGB archiver is, decompressed file cannot be open or extract with other compression softwares. You can also choose any compression level (high, maximum, normal, low, very weak) to compress a file but the compression time  will vary according to your selected compression level.
Note: If you are compressing any file with KGB archiver and sending the comprssed file to your friends then he must have KBG archiver installed on his computer to decompress the file.

System Requirements:

Due to high compression ratio of KGB archiver, you need to have a decent system hardware configuration
  • 256 MB RAM
  • 1.5 GHz Processor

Features of KGB Archiver

  • Supports native .kgb files and .zip files
  • AES-256 Encryption
  • Able to create self-extracting archives.
  • Multilanguage supports like Arabic, German, Greek, Japanese, Spanish many more.
  • Unicode is supported in both User Interface and File Systems.
  • An Explorer shell extension is available for the windows version.
  • Make Password protected compressed file.



Note: This KBG Archiver software cannot compress video format files.


for more Tips CLICK HERE .

i hope u like this.... for any questions or help or to say thanx feel free to comment or contact me on FACEBOOK.

Saturday, 21 July 2012

Convert a Trial into Fullversion

((•)) Hear this post


I am always searching the net for good softwares and when I find them, they all are Trial Versions.
So a Trial? Means 30 Days or less. I started thinking….I found out that a trial software records its date of installation in a file in its folder and counts days.
So if after the trial is over, and when you delete its folder in which the date was recorded, the software would probably think that you have installed just now and then it creates a new date-recording-file.
And your trial starts over again…And if you want the Again..and Again!
Enough of writing, let’s come to the point.
Follow these 8 simple steps below:

1.
Get a trial and wait for it to be over, come back to this post after it is over :P LOL

2.Uninstall the trial and restart your computer (if it is required).
3.
Then…The software’s settings folder is located in? C:\Documents and Settings\(Username)\Application Data (in Windows XP), in Windows Vista, it will be in C:\Users\(Username)\Application Data (doesn’t work in Vista if UAC is on)

4.Look for your trial software’s name or company name in that folder. If you are having difficulty in getting that then check each of the folders content.Or search it.
After you get that folder, just delete it.

5.Now its time for some Registry work.Open Run (Windows Logo Key+R) and type ‘regedit’ in the registry editor, browse to My Computer\HKEY_CURRENT_USER\Software and then search for your software’s folder and delete it. Do the same in?My Computer\HKEY_LOCAL_MACHINE\SOFTWARE ,leave it if you don’t find the software there.

6.Install the trial again and then it works from the starting.
Repeat the same directions when your trial is over again!
Enjoy Fullversions!

Note: This is the legal way of doing it. Otherwise a crack or keygen can be used to convert it to full version forever, but illegally :D
For More Click Here


i hope you like this article.. for any queries and help feel free to comment or CONTACT ME

How to make Folders Inaccessible by everyone ?

((•)) Hear this post



1. Open cmd.

2. Change to the directory where your folder is located.       cd <dir_name>

3. cacls <directory name> /e /p everyone:n

4. Now noone, including you can not open or delete that folder/directory.

5. To remove the restrictions, again follow from step 1 and 2.

6. cacls <directory name> /e /p everyone:f

7. Thats it. Now you can protect your folders from unauthorised access.



1. Open cmd.


2. Change to the directory where your folder is located.       cd <dir_name>

3. cacls <directory name> /e /p everyone:n

4. Now noone, including you can not open or delete that folder/directory.

5. To remove the restrictions, again follow from step 1 and 2.

6. cacls <directory name> /e /p everyone:f

7. Thats it. Now you can protect your folders from unauthorised access.


For More Click Here

i hope you like this article.. for any queries and help feel free to comment or CONTACT ME

Friday, 20 July 2012

HOW TO WRITE COLOURFUL TEXT IN FACEBOOK CHAT

((•)) Hear this post

                                 


                                     
                                      How To write Coloured text in facebook chat...



[[244961858909298]] = A

[[344113652270150]] = B

[[344991278847613]] = C

[[164461493653696]] = D

[[196752423751220]] = E

[[301630573215430]] = F

[[251496118250464]] = G

[[266394220086654]] = H

[[164866556948132]] = I

[[180599335371968]] = J

[[209067005843651]] = K

[[238594039545396]] = L

[[147702285338528]] = M

[[309221402452022]] = N

[[180901405340714]] = O

[[246506925416551]] = P

[[333343613344059]] = Q

[[123128367803569]] = R

[[316143388416019]] = S

[[334073456605673]] = T

[[199626093460643]] = U

[[224202614323263]] = V

[[336032459740792]] = W

[[205228226232732]] = X

[[142420399202282]] = Y

[[157919817645224]] = Z



For more FAcebook Stuffs CLICK HERE

For any queries and comment feel free to comment or join me on FACEBOOK.

Be aware of A missed call ...

((•)) Hear this post


Be aware of A missed call ... it can clone your Sim Card...





for detail Visit  Hacks And Security Tips

Wednesday, 18 July 2012

Different types of Email Account Hacking

((•)) Hear this post



The Basic level Hacking is Email Account Hacking.  Everyone like to do first email account hacking only.  So here is the tutorial for budding hackers about email Hacking.

There are different types of Email Account Hacking .  Here is some of them :

  1. Social Engineering 
    • Phishing
  2. Brute Force Attack
  3.  Keylogger
  4.  Guessing the Answer for the Security Question

Social Engineering:

Social engineering takes advantage of the weakest link in any organization’s
information security defenses: people. Social engineering is
“people hacking” and involves maliciously exploiting the trusting nature of
human beings to obtain information that can be used for personal gain.

Social engineering is one of the toughest hacks to perpetrate because it takes
great skill to come across as trustworthy to a stranger. It’s also by far the
toughest hack to protect against because people are involved.

Social Engineering is different from Physical Security exploits . In social engineering hackers will analyze about
victim.  Hackers will send mail to victim.  The contents will be related to the victim.

Eg:

✓ False support personnel claim that they need to install a patch or new
version of software on a user’s computer, talk the user into downloading
the software, and obtain remote control of the system.
✓ False vendors claim to need to update the organization’s accounting
package or phone system, ask for the administrator password, and
obtain full access.
✓ Phishing e-mails sent by external attackers gather user IDs and passwords
of unsuspecting recipients. Hackers then use those passwords to
gain access to bank accounts and more. A related attack exploits crosssite
scripting on Web forms.
✓ False employees notify the security desk that they have lost their keys
to the computer room, receive a set of keys from security, and obtain
unauthorized access to physical and electronic information.

 Phishing WebPage:

     It is a fake webpage which looks similar to the original page of the website.  Using this WebPage we can easily get the Password of victims.  The process involved in creating Phishing webpage are,
✓ First Visit the Website which is associated with the email id. Copy the Source code.
✓ Edit the the Source code such that it will store the password for you.
✓ Upload the Webpage to any free webhosting sites.  (don't select a famous hosting site,they will find that
    your page is fake). Try uploading through the proxy server.

Guessing the Answer for Security Question:
    Do you remember that the mail sites will ask for the security questions to retrieve the mail account?  You can hack the mail account simply guessing the answer.  If the victim is your friend ,then it may very easy to hack.

Brute Force Attack:



A famous and traditional attacking method .  In this method ,the password will be found by trying all possible passwords with any program or software.




Keyloggers:

  It is one of the spyware which will capture what you type in the keyboard.  so whenever you type the username and password ,it will simply capture.

   It is software program which will be attached with any softwares and send to victim.  While victim install the software ,the keylogger also start to work.  Keyloggers are exe files.


Note:
This Email Account Hacking Tutorial is truly for educational purpose only. 
For any help or queries.. feel free to comment or contact me on facebook immidiately..

How to send Anonymous Mail to anyone|Set up your own server

((•)) Hear this post


Everyone Like to send Anonymous Mail to your enemy or friend or teacher.  Here is the Hacking tutorial for you to implement that.  So i hope This will be best hack for you.

What is the Use?
   I explained you in my older post how to get ip address.  To get the ip address you need to send the mail with link.  So You can send mail to your victim with that link such that you are contacting from an organization.

For Eg:
You can say we are from Facbook,we have new feature to enable the feature visit this page.

How to do? 

Step 1:
First of all you need to register in free web hosting service which has PHP feature.  So my choice is



Step 2:
Now Download this zip file:

             Mail.php
Inside the file you can find the mail.php file. Extract the file

Step 3:
Now Go to x10hosting.com and login with your username and password.
Upload the "mail.php" file to "public_html" folder.

Step 4:
That's all you finished. 
Now go to this page
         yourhosturl/mail.php
Change the yourhosturl with your website url which you gave it when you register in x10hosting.com
For eg:
yourfavorites.x10.mx/mail.php

Usually the default will be "name.x10.mx"

When you visit you will see the form just like this:


Fill the form with your victim mail address and message subject and send
     Don't give your details in the sender field.
Just fill with any organization name.
For Eg:
BestSurveyProviders




         If you have any doubts or want to say thanks,please comment me

Extend Windows 7 Trial Period

((•)) Hear this post

Extending the trial by 30 Days

  Now to actually perform the hack that will extend the trial mode,


You’ll want to find Command Prompt in the start menu (or search for it),
And then right-click on it and choose Run as administrator. (very important)


 
Next you’ll simply type in this command:

slmgr -rearm


Within a few seconds you’ll normally see this dialog show up, saying that the command has completed successfully, at which point you’ll want to reboot.









i hope u will like it.. for any queries and help feel free to comment or contact me on facebook instantly..

Monday, 16 July 2012

How to crack and hack Wi-fi key using Backtrack 5

((•)) Hear this post


This post will also show you how one can easily crack WEP keys in no time.

Security Issues With WEP
WEP (Wired Equivalent Privacy) was proved full of flaws back in 2001, WEP protocol itself has some weakness which allows the attackers to crack them in no time. The biggest flaw probably in a WEP key is that it supports only 40bit encryption which means that there are 16million possibilities only.

For more information on WEP flaws, kindly read the WEP flaws section here.

Requirements :-

Here is what you would require to crack a WEP key:

1. Backtrack or any other Linux distro with aircrack-ng installed 

2. A Wifi adapter capable of injecting packets , For this tutorial I will use Atheros which is a very popular card and it performs well with Backtrack

You can find compatible wifi card lists here.

Procedure :-

First Login to your Backtrack / Linux distro and plug in your Wifi adpter , Open a new konsole and type in the following commands 
ifconfig wlan0 up



where wlan0 is the name of the wireless card, it can be different for different devices.To see all wireless cards connected to your system simply type in " iwconfig ".

Putting your WiFi Adapter on Monitor Mode
To begin, you’ll need to first put your wireless adapter into monitor mode, Monitor mode is the mode whereby your card can listen to every packet in the air, You can put your card into monitor mode by typing in the following commands

airmon-ng start (your interface)

Example :- airmon-ng start wlan0



Now a new interface mon0 will be created , You can see the new interface is in monitor mode by entering "iwconfig mon0" as shown


Finding a suitable Target

After putting your card into monitor mode, we need to find a network that is protected by WEP. You can discover the surrounding networks by entering the following command
airodump-ng mon0



Bssid shows the mac address of the AP, CH shows the channel in which AP is broadcasted and Essid shows the name broadcasted by the AP, Cipher shows the encryption type.

Now look out for a wep protected network In my case i’ll take “linksys “ as my target for rest of the tutorial

Attacking The Target

Now to crack the WEP key you'll have to capture the targets data into a file, To do this we use airodump tool again, but with some additional switches to target a specific AP and channel. Most importantly, you should restrict monitoring to a single channel to speed up data collection, otherwise the wireless card has to alternate between all channels .You can restrict the capture by giving in the following commands

airodump-ng mon0 --bssid -c (channel ) -w (file name to save )


As my target is broadcasted in channel 6 and has a bssid "98:fc:11:c9:14:22" ,I give in the following commands and save the captured data as "RHAWEP"

airodump-ng mon0 --bssid 98:fc:11:c9:14:22 -c 6 -w RHAWEP

Using Aireplay to Speed up the cracking

Now you’ll have to capture at least 20,000 data packets to crack WEP .This can be done in two ways, The first one would be a (passive attack ) wait for a client to connect to the AP and then start capturing the data packets but this method is very slow, it can take days or even weeks to capture that many data packets

The second method would be an (active attack )this method is fast and only takes minutes to generate and inject that many packets .

In an active attack you'll have do a Fake authentication (connect) with the AP ,then you'll have to generate and inject packets. This can be done very easily by entering the following commands
aireplay-ng - 1 3 -a (bssid of the target ) (interface)


In my case i enter the following commands 
aireplay-ng -1 3 -a 98:fc:11:c9:14:22 mon0

After doing a fake authentication ,now its time to generate and inject Arp packets . To this you'll have to open a new Konsole simultaneously and type in the following commands
aireplay-ng 3 -b (bssid of target) -h ( Mac address of mon0) (interface)


In my case i enter
aireplay-ng 3 -b 98:fc:11:c9:14:22 -h 00:c0:ca:50:f8:32 mon0

If this step was successful you'll see Lot of data packets in the airodump capture as shown

Wait till it reaches 20000 packets , best would be to wait till it reaches around 80,000 to 90,000 packets. Its simple more the packets less the time to crack .Once you’ve captured enough number of packets, close all the process's by clicking the into mark which is there on the terminal.

Cracking WEP key using Aircrack

Now its time crack the WEP key from the captured data, Enter the following commands in a new konsole to crack the WEP key

aircrack-ng (name of the file )

In my case i enter 
aircrack-ng RHAWEP-0.1-cap

With in a few minutes Aircrak will crack the WEP key as shown



Once the crack is successful you will be left with the KEY! Remove the colons from the output and you’ll have your WEP Key.

Hope You Enjoyed this tutorial ,For further Doubts and clarifications please pass your comments.

Banner Ad