Friday, 15 November 2013

How to make you computer fresh and fast

((•)) Hear this post




In this Article We will explain some simple methods to make your computer cleaner and run faster for long period of time. It’s so frustrating to see our computer slowed down after a period of time. So in this article you will get some methods or you can say ways to make your computer run faster.
Follow the methods listed below:-
Remove Useless software and apps : We often install many unnecessary application and later forget to uninstall them These application becomes burden in our computer and eventually slow down our computers So at first you need to delete all this unnecessary application and software To uninstall the software you should go to Control Panel->Add or remove->find and select the software you would like to uninstall.
Utilize your RAM performance : A lot of you may have these setting already set. But If you don’t have then don’t worry. You just have to follow the process. Right click on My computer->Properties->Advanced system settings->Setting(Under Performance)->Advanced->Change(Under Virtual Memory). Now double the number in Maximum size then the number initial size. It will surely help your PC to utilize the most of RAM.
Check for errors : Our computers face errors very oftenly in daily use and some errors stuck to our computer hard disk which makes our computer slow. So its very important to kill those errors to make our computer work better. Go to My computer and press enter .Our main hard disk is usually C: and we need this drive to be free from error So right click on Hard disk C and then click tools Then from the Error-Checking option click You may need to restart the computer to do so It will make your computer Faster.
Desktop-cleaning : We often keep unnecessary file in our desktop but it actually affects the performance of our computer. Delete the useless files or another choice is to move them to Local disk if necessary. You should only keep shortcuts in your Desktop only if you needed. If we keep Wallpapers on our desktop it also effect slightly to slow down our computer a blank screen is always better remove temporary internet files and cache from your web browser Browsing internet slow down our computer You need to clean these temporary files and cookies to make your computer stay clean and faster. There are a no. of software available today in the market which can do the task for you. You can use Ccleaner for this purpose which is a very trusted software. To proceed to the official website to download Click here
Disk Defragmentation : We should defragment our disk to make our PC faster. For deframentation process, just follow the same steps given below. Locate Hard disk C then click properties then click tools and then click defragment Now from the option Disk defragmentation.
Use a Trusted antivirus : he last but not the least tip is to use a reliable trusted antivirus which will protect your PC from harmful antivirus. Kaspersky and AVG are some of the trusted antivirus but you have to pay to use them. If you don’t wish to pay some money then you can also download free Microsoft security essential to save your computer from harmful Malware and spywares. Check the link here




Catch me on Facebook. Click Here

For regular updates and problem solving or sharing knowledge, you can join our group Hacks and Security Tips


You Can like Our page Here.


Twitter-

Follow me.

Google +

Add me Here

You can also see our Google + page  Here

Saturday, 28 September 2013

HOW TO CRACK ANY TYPE OF CD PROTECTION

((•)) Hear this post

Using W32Dasm, and HIEW. 

OK, let’s start:
First of all, you have to run the damn game you want to crack, without the CD.
The game, doesn’t work of course, (Please, don’t panic) BUT a window pops up, telling you an error message. 
This error message will help you to crack the game so, you’ve got to remember it.
For example: Please insert the - CD, or: You need the CD to play the - . 
( -, is the game you want to crack). Anyway, if you are so idiot and you can’t remember it, write it, in a little piece of paper.
Now, run Win32Dasm, and on the toolbar, press the first little button on the left, OR, go to Disassembler ->Open file to Disassemble. A menu will pop up. Select the exe which you want to crack. The disassemble, will take few minutes so, I suggest you, to go for shitting.

OK, it finished its process.
Now, in your screen, there is a strange text, and we can’t understand anything of course. Don’t worry, the only thing we have to do, ( If you want, you can change the font), is to click on the String Data References, the button next to the print button (Strn.REF).
You can see a window which is called String Data Items. Scroll down, and try to find the game’s error message. When you’ll find it, double click on it, and then, close the window, to go back to the Win32Dasm text.
As you can see you are somewhere in the CD check routine. This is the message’s place. Now comes the interesting and difficult part, so, be careful.
We don’t know what all these shits mean, BUT we must know the @ offset of every call and jump command.
Write down, every call and jump @ offset number. (You have to be sure, that the OPBAR change its used color to green). You need the number behind the @offset without the h. Let’s go to HIEW, now.

HIEW:
To move up and down, use the cursor keys. Start HIEW. exe.
In the HIEW directory, there is a list of exes and programs. Go to the directory, which you saved the game’s exe, we want to crack, and click on the exe. Click F4, and then, a menu will pop up, with 3 words. Text, Hex, and Decode. Click on Decode, and now, we can understand the list of numbers.
Click F5, and you can now enter the number, we wrote down, in Win32Dasm. Type it, and you will be placed at the number’s place. The cursor is placed on a command.

Before I’ll continue, I want to explain you something. For example, if the command where our cursor is placed on, is E92BF9BF74, means that it is 5 bytes.
Every 2 numbers, are one byte: E9-2B-F9-BF-74 = 90-90-90-90-90. 10 letters, mean, 5 bytes.
OK, if you understood it, you can continue.

Press F3, which means edit, and now you can edit these ten numbers.
Type five times, the number 90. For every byte, 90. Now click on F10 to exit.
We cracked the CD protection



subscribe me to on facebook get my latest updates and tricks..



Catch me on Facebook. Click Here

For regular updates and problem solving or sharing knowledge, you can join our group Hacks and Security Tips


You Can like Our page Here.


Twitter-

Follow me.

Google +

Add me Here

You can also see our Google + page  Here

Sunday, 22 September 2013

How To Crack Memory Card Password

((•)) Hear this post

Sometimes there is need to crack memory card password when it is forgotton by us.Below is the step by step procedure to crack memory card password.
Trick Number 1:-
  • First of all you will need a Software FExplorer Software.To download it Click here
  • Now insert your memory card into your phone but don’t access it through phone.
  • Run FExplorer and Open the path C:\system.
  • There will be a file called mmcstore ,rename the file mmcstore.txt
  • Copy that mmcstore.txt file to your pc and open it in notepad.
  • You will find your password in that file.
Trick Number 2:-
  • Go to file manager of your mobile
  • In the "Settings" option, Choose system folders
  • In the "System" folder, there is a file called "mmcstore"
  • Send that to your PC using bluetooth
  • Now open it in notepad
  • The password you need for your memory card is in that file


subscribe me to on facebook get my latest updates and tricks..



Catch me on Facebook. Click Here

For regular updates and problem solving or sharing knowledge, you can join our group Hacks and Security Tips


You Can like Our page Here.


Twitter-

Follow me.

Google +

Add me Here

You can also see our Google + page  Here

Wednesday, 29 May 2013 Tags: , ,

Turn Mobile Phone Camera As usb web Camera

((•)) Hear this post

Now A days Facebook Introduces a New Facility For Video Chatting.That Facility Is Really Good For Those People Who Miss Their Dear Ones When They Are Far Away From Them...

All The Major Social Networking Sites Uses Video Chatting After all This Is A Primary Need Of their Users.. :)



http://techwarlock.blogspot.in/2012/07/turn-mobile-phone-as-usb-web-camera.html

But In A Online survey it Is Cleared That About 70% Of  Internet users didn't using A Webcam...May Be The Reason Behind That Cost factor..Webcam Is Somehow Costly For Many Of us..

But I have A Easy Solution For This Problem.. :)
No..No..You Got Me Wrong..I am Not Going To Organize A Web Cam Prize Competition On This Blog.... :-D

Instead That I will Tell You A Trick By Which You Can Use Your Mobile Phone Camera As Web Camera For Facebook,Yahoo,Skype Or Any other Video Chatting Supported Sites.. :)
Yeah..This Time You Heard Right...Now We Can Able To Use Our Cell Phone As A Web Cam by Following A Small Trick Given Below..
The All You need Is That..A Cell Phone Who have A camera..And A Data Cable Or Bluetooth Dongle To Create Connectivity Between Computer And Your Cell Phone.

You Can Use This Trick With Any Of the Mobile Phone Like Nokia,I phone,Blackberry,windows Mobile Phones,Symbian S60,Android e.t.c...


First Of All Trick For Nokia Java,Nokia Symbian S60,I phone,Blackberry,windows Mobile Phones.

STEP 1:Go To This Link http://mobiola.com/mobiola-web-cameraAnd Click On Download And Select Your Mobile Phone To Start Downloading The App.
           Those Who Are Using Java Phones Like Samsung,Sony Ericsson, Nokia 5300,3500 e.t.c  Download That Application From This Link http://mobiola-webcam.en.softonic.com/java

STEP 2:Mobiola Consists Two parts..One Is Client Part And Other One Is Server Part
Install Server Part On Your PC (.exe File) And Install Client Part On Your Mobile Phone (ie. .jar,.sis e.t.c).

STEP 3:Run Mobiola Webcam On Your Computer.

STEP 4:Run Mobiola Webcam On Your Phone.

STEP 5:Connect Your Mobile Phone With Your Pc By Using USB data Cable Or Bluetooth Dongle.

STEP 6:Now In Your Cell Phone Go To Mobiole Then Go To Options Then Connect.

STEP 7:After That Select Bluetooth Or USB (Whatever Is Connected Between Your Phone And PC) To Create A Connection..

After Authentication You Are Done.. enjoy.. :)

If You Are Using An Android Phone Then Follow These Steps To Turn Your Mobile Phone As A Web Cam..


STEP 1
:Go To Android Market Or Google Play By Your Android Phone And Search For A Application Named "Usb Webcam".

STEP 2: Download And Install That Application On Your Android Phone and Turn on USB debugging By Going (Settings->Application->Development->USB Debugging)..

STEP 3: If You Are Using Windows On Your Computer Then Download Server For USB webcam From Herehttp://www.placaware.com/?page_id=6
        If You Are Using Linux On Your Computer Then Download Server From Here http://www.placaware.com/?page_id=116

STEP 4: Install Server On Your Computer.

STEP 5:Connect Your Cell Phone Via USB cable To Your Computer.

STEP 6:After That Double Click To Open Server From Your PC..And Open Client app From Your Cell Phone And Create A Connection. And You Are Done.. :)


Enjoy.. :)

Saturday, 11 May 2013

HOW TO HIDE FILES(STEGANOGRAPHY) IN THE PHOTO | MP3 | VIDEO AND EMAIL FREE

((•)) Hear this post


 How to Hide (Steganography) Files in the Photo | MP3 | Video and Email Free with free latest software

 What is the steganography?

The Steganography is defined as the art of science that the hiding information and data or the messages in any new image. There are lot of advantage of the steganography is that. Those who are outside a party and even do not realize that the some sort of a communication is being to be done.
Steganography have some function that comes in the different forms which is used the many people to hiding the information that show is below
  1. Hidden information in the Text Files
  2. Hidden information in the Image Files
  3. Hidden information in the Document Files
  4. Hidden information in the Video Files
  5. Hidden information in the Audio Files
  6. Hidden information in the E-Mails 

How to Hide the File behind an Images:

This s-tool is the steganography tool that hides the files in GIF, WAV and BMP files behind the picture. just take your any file and put on the image then give your password then send to any where . no your hidden file ready to send to any person.


Steganography to download the software




The Document Steganography hide you file in the document:

Merge Streams shows you that how to the merge MS Word streams and the MS Excel Workbook stream. It can hide a MS Excel document inside the MS Word document or the vice a versa. If you wish to the transparently hide some documents inside the old financial reports and this is just for you. And it does not the implement any crypto and is not to secure enough, but is very smart trick.

CLICK HERE to download the software


How to Hide the File behind Audio [Audio Steganography]

Mp3stegz is the application that applies the stenographic (steganography) algorithm that in mp3 files and this software Mp3stegz will maintain the original mp3 files size and a sound quality. Then The hidden message is compressed and then encrypted easily.


CLICK HERE to download the software


How to Hide the File’s behind the Video (Video Steganography)

This software name is Our Secret (formerly Steganography) and lets you hide your text files or files that such as video, image, audio and others in the file. It is designed to all the files hide and send your sensitive message or files.


Our secret Download to download the software



How to Send the Hidden Text in the Mail (Email Steganography)


The Spam Mimic

The Spam Mimic to visit the website .

thanks for reading . if you like so comment below.






subscribe me to on facebook get my latest updates and tricks..



Catch me on Facebook. Click Here

For regular updates and problem solving or sharing knowledge, you can join our group Hacks and Security Tips


You Can like Our page Here.


Twitter-

Follow me.

Google +

Add me Here

You can also see our Google + page  Here

Friday, 26 April 2013

How To Crack A WPA Key With Aircrack-ng

((•)) Hear this post





With the increase in popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home users and IT professionals alike. This article is aimed at illustrating current security flaws in WPA/WPA2. Successfully cracking a wireless network assumes some basic familiarity with networking principles and terminology. To successfully crack WPA/WPA2, you first need to be able to set your wireless network card in "monitor" mode to passively capture packets without being associated with a network. One of the best free utilities for monitoring wireless traffic and cracking WPA-PSK/WPA2 keys is the aircrack-ng suite, which we will use throughout this article. It has both Linux and Windows versions (provided your network card is supported under Windows).

Network Adapter I am going to use for WPA/WPA2 cracking is Alfa AWUS036H , OS# Backtrack 5R2 

Step 1 : Setting up your network device 

To capture network traffic wihtout being associated with an access point, we need to set the wireless network card in monitor mode. To do that, type:
Command # iwconfig (to find all wireless network interfaces and their status)


Command # airmon-ng start wlan0 (to set in monitor mode, you may have to substitute wlan0 for your own interface name)


 Step 2 : Reconnaissance 

This step assumes you've already set your wireless network interface in monitor mode. It can be checked by executing the iwconfig command. Next step is finding available wireless networks, and choosing your target:

Command # airodump-ng mon0 (Monitors all channels, listing available access points and associated clients within range.


 Step 3 : Capturing Packets 

To capture data into a file, we use the airodump-ng tool again, with some additional switches to target a specific AP and channel. Assuming our wireless card is mon0, and we want to capture packets on channel 1 into a text file called data:

Command # airodump-ng -c 1 bssid AP_MAC -w data mon0 


Step 4 : De-Authentication Technique 

To successfully crack a WPA-PSK network, you first need a capture file containing handshake data. You may also try to deauthenticate an associated client to speed up this process of capturing a handshake, using:

Command # aireplay-ng --deauth 3 -a MAC_AP -c MAC_Client mon0 (where MAC_AP is theMAC address of the access point, MAC_Client is the MAC address of an associated client.


 So, now we have successfully acquired a WPA Handshake.


 Step 5 : Cracking WPA/WAP2 

Once you have captured a four-way handshake, you also need a large/relevant dictinary file (commonly known as wordlists) with common passphrases.

Command # aircrack-ng -w wordlist ‘capture_file’.cap (where wordlist is your dictionary file, and capture_file is a .cap file with a valid WPA handshake) 



Cracking WPA-PSK and WPA2-PSK only needs (a handshake). After that, an offline dictionary attack on that handshake takes much longer, and will only succeed with weak passphrases and good dictionary files.
Cracking WPA/WPA2 usually takes many hours, testing tens of millions of possible keys for the chance to stumble on a combination of common numerals or dictionary words. Still, a Weak/short/common/human-readable passphrase can be broken within a few minutes using an offline dictionary attack.


subscribe me to on facebook get my latest updates and tricks..



Catch me on Facebook. Click Here

For regular updates and problem solving or sharing knowledge, you can join our group Hacks and Security Tips


You Can like Our page Here.


Twitter-

Follow me.

Google +

Add me Here

You can also see our Google + page  Here

Wednesday, 10 April 2013

Kaspersky All version Keys & Activator

((•)) Hear this post

Kaspersky Activator 1.0

Kaspersky Activator 1.0 activates Kaspersky Anti-virus, Kaspersky Internet Security & Kaspersky PURE using 'KEY' files that can be download from this site. Manual process of Kaspersky product activation via KEY files is a very cumbersome task. Kaspersky Activator 1.0 automates this manual process and saves your precious time. 
Features:
  • Supports all major Kaspersky products.
    • Kaspersky Anti-virus (All Versions)
    • Kaspersky Internet Security (All Versions)
    • Kaspersky PURE (All Versions)
  • Activates Kaspersky via KEY files offline.
  • No need to search for KEYs on the internet.
  • Valid KEYs are available from within Activator itself.
 
System Requirements:
  • Operating Systems:
    • Microsoft Windows XP (Service Pack 2 or higher)
    • Microsoft Windows Vista (32/64 Bit)
    • Microsoft Windows 7 (32/64 Bit)
  • Hardware Requirements:
    • Processor 1 GHz 32-bit (x86)/64-bit (x64) or higher
    • 256 MB of available RAM (32-bit)
    • 512 MB of available RAM (64-bit)
  • Software Requirements:
    • Microsoft .Net Framework 2.0

Monday, 8 April 2013

How to Make Keylogger/Trojan Undetectable

((•)) Hear this post


Welcome back readers, In this tutorial we are going to show you how to make an undetectable keylogger to most antivirus programs (AVG,AVAST,KASPERSKY).Already we had showed you how to make an key logger in our previous tutorial, if you do not know about it first read that here


Tools required:

*Xenocode post build 2009 for .NET beta Download OR Download OR Downlod
*Hex workshop HEX editor Download

Step 1: Initially disable your antivirus protection (Here I am using AVG antivirus Right click on AVG and click “Temporarily disable AVG protection” and select ” Until I restart next time”
Step 2: Install  Xenocode post build 2009 for .NET beta & Hex workshop HEX editor.Also don’t forget to use the crack
Step 3: Open Xenocode post build 2009 for .NET beta from program files and go to Application tab and click  “ADD” option from that and add your keylogger file (ie, already prepared through rapzo keylogger or any other.Here)

Step 4: Now go to “VIRTUALIZE” tab and click “ENABLE” check box at left side. Then go to “GENERAL” tab there. Uncheck the “INHERIT PROPERTIES” tick box at right corner. Then change the product title, publisher, description, website, version to your desired (Here I use AVG v11.3.4, AVG corporation, AVG , www.avg.com ,AVG.(Optional:If you want to change the icon click “BROWSE “ option and select the required application and automatically it will change to that app icon.)


Step 5:Now click “XENOCODE APPLICATION “and save it.


Step 6: Now your keylogger file will appear as shown(With avg icon making it undetectable to victim)


Step 7: Now go to “Hex workshop HEX editor (32 bit)” from “All programs”

Step 8: click “File->open->your keylogger file

Step 9:  Press “Ctrl+F” which opens Find dialog box change type to “TEXT STRING” and search for “COPYRIGHT”

Step 10: It will show the result as follows

Step 11: Now select these codes as shown in fig(....... inflate 1.2.3 copyright)



Step 12: Now right click on the selected area and click “FILL” option from that,then click OK.


Step 13: Result will change all binary codes to 00 as shown


Step 14: Then manually search for  “X.e.n.o.c.o.d.e. .V.i.r.t.u.a.l. .A.p.p.l.i.a.n.c.e. .R.u.n.t.i.m.e”(Ctrl+F feature cannot be used here, if required use Ctrl+F and search for letter X and find X.e.n.o.c.o.d.e)

Step 15: again as step 12 right click on the selected area and click “FILL” option from that, and then click OK.

Then it will look as


Step 16: click save option from File->save.


On that dialog box click Yes. Then it will be automatically saved to your key logger file.

Step 17:Turn back the antivirus and scan that key logger file.

Hurrah!!!!  Yes you made it ,an undetectable key logger J !!!This file is not detected by most antivirus (AVG,AVST,KASPERSKY)which is used by most of our friends. You cancheck it through online scanners as shown

Now send that keylogger file to your victim which would not be detected by his antivirus.
If you have any clarifications comment on these post and we will try to solve it at best
Please Share it! :)

Banner Ad