Pages

Friday, 11 October 2013

How to Hack Your Broadband Connection?

71 comments
MANY PEOPLE ASKED ME ABOUT THE  HACKING BROADBAND!!!
There are many PC tricks to hack the other broadband connection but at this time I am giving all my reader new one PC trick. This one broadband hack method is 100% working. So give a try for this PC trick. To perform this broadband hack follows the following steps of this PC trick.

STEP 1: For this PC trick first of all you have to download any port Scanner. (for example: i prefer Super Scan,  Advance Port Scanner).

STEP 2:  Now you have to get your ip address for this broadband hack as given: Go to Command prompt type "ipconfig /all" without quotes Then hit enter. You will see your ip as a clients ip. suppose your broadband default gateway and I.P. are 172.27.103.1 & 172.27.103.190, see in below picture
    

STEP 3: Write your IP in IP scanner Software and scan for alive IPs in the below range start: 172.27.103.1 to End:172.27.103.255. see in picture below
   

STEP 4: Then check in your scanner which alive IPs has the port 80 open or 23 for telnet.
 
STEP 5: If port 80 is open then Enter that IP in your web browser (in my case http://172.27.103.1 will be enter), if 23 port is open then u should know how to telnet it from command prompt.
 
   
    

STEP 6: Then this broadband hack asks for USER ID and PASSWORD type
                 username =admin
                 password =admin or password

There is a high chance but not 100% that you will be able to login with that username and password. admin-admin is the default username and password that is set while manufacturing the adsl modem devices. If denied then use on another alive IP.
    
      
   

STEP 7: If you get success in this PC trick then  it will show router settings of the IP user There go to Home -> Wan Setting and the username and password of his account will appear there.

STEP 8: Use Show Password tools to view the password in asterisks ********.
Now you have username and password ready for use. That’s all about this PC trick to hack your broadband connection.

  that's it... Enjoy!!!!
 
If you have any queries or suggestions related to this post on 'How to Hack Your Broadband Connection?', you're most welcome in comments..! :)

Thursday, 10 October 2013

How to Compresses 1GB file to 10MB file?

13 comments
When you want to send some large file to your friends its a big problem to sending large file like 1 GB. But Now you can send any large file in seconds.  First you compress large file in small size then you can send this into seconds.
Compress large file into small by Using KGB Archiver:

KGB Archiver is free and open source software released under the terms of the GNU General Public License. Version 2 beta 2 is available for Microsoft Windows and a command line version of KGB Archiver 1.0 is available for Unix-like operating systems. KGB Archiver is one of the few applications that works with the PAQ algorithm for making its KGB files. It has ten levels of compression, from very weak to maximum, a greater variety than that found in most other compression software. However, at higher compression levels, the time required to compress a file increases significantly.


Download From Here


Note: If you are compressing any file with KGB archiver and sending the comprssed file to your friends then he must have KBG archiver installed on his computer to decompress the file.

System requirements:
The minimum requirements for running KGB Archiver are:

  • 256 MB RAM 
  • 1.5 GHz processor
 Features:
  • Supports native .kgb files and .zip files 
  • AES-256 encryption
  • It is able to create self-extracting archives
  • Unicode is supported in both the user interface and filesystems
  • Multi-Language support (including Arabic, German, Greek, Japanese, Polish, Portuguese, Serbian, Spanish, and Ukrainian) 
  • An Explorer shell extension is available for the windows versions.
  • Make Password protected compressed file.
Strength:
 
Very high compression power with very accurate result and no loss of data.

Weakness:

Due to high compression rate, the time requires to compress and decompress the file is high.

      
Watch Full Video Tutorial:
        
        
Download From Here
     
If you have any queries or suggestions related to this post on 'How to Compresses 1GB file to 10MB file?', you're most welcome in comments..! :)

Tuesday, 8 October 2013

Hacking Firefox: More Than 150 Hacks, Mods, and Customizations (Extreme Tech)

28 comments
         
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux, windows etc. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control.

Step-by-step instructions for these hacks and dozens more

Settings, content, and extension hacks
Hacking the interface and themes
Performance boosters
Anti-phishing and security hacks
Toolbar and status bar tweaks
Navigation, download, and search hacks
Hacks for common plugins
Extension and theme creation

Download Link: http://goo.gl/AUov7y

Saturday, 5 October 2013

How To Shutdown A Computer By Using Cell Phone?

10 comments
The Requirements or Tools for this Tutorial
1.  One cell phone with GPRS enabled.
2.  One Email ID
3.  Microsoft Outlook on the PC to be put to shut down.
4.  Must have internet connection on your PC.

Using this method the user can shutdown, restart, hibernate the Computer just
by sending an email from their cell phone. All you need to have is Microsoft
outlook which comes with Microsoft word. The Microsoft outlook should be
installed on the PC you wish to shut down. First you need to create a batch file
to perform shutdown, restart etc. you can write them down yourself.

Note: you can complete this trick in every operating system but, here I’m representing this tutorial in “Windows 8 Pro”.
1.  Open your notepad and type the following:
         c:\windows\system32\shutdown -s - f -t 00
     And save it as shutdown.bat (Executable file)






2.  Open your Microsoft outlook. Make sure that it is already configured for
    your email id, otherwise configured it here step by step for your email id.
    Note: you can complete this trick on Microsoft Office Outlook (any
    version like 2003, 2007, 2010). Here, I’m doing on MS Office Outlook
    2010.
(1) After opening Outlook 2010, click on File in upper side left hand corner
 


(2) Now, click on “Add Account” and Set up your account detail



(3) Now, click on “Next”. This auto account setup will configure your email server settings automatically. You can do this manually by selecting manually configure option in last step.

  

After this setup, finally click on Finish.

3. Now we will need to set Microsoft outlook in such a way that outlook checks
   you email every one minute. This can be set by going to “Send/Receive” tab->
   “Send/Receive Group” -> “Define Send/Receive Groups”. After setting this
   click on close button.




4. Now, This step is to manipulate our computer (MS-Outlook) with Email
    message as for this, we have to set up of rules and alerts on outlook. So,
    again go to-> Tools – Rules and Alerts. Click on E-mail Rules tab. In new
    window select Check messages when they arrive and click Next



5. Now in next page, check on, on this machine only and with specific words in
    the subject. After checking these two values, click on specific words
    underlined.


          


6. Search Text window will open, in the input field type the command that shuts
   down the PC. You can use any commands. For prevention of accidental
   execution I kept %shutdown% as a command. Click on Add button after you
   are done and click on OK.

7. Now click on Next. In the next window check mark on start application. In the
    lower screen, click on application link.

8. Now you’ll be welcomed to your familiar file open window. Load all files. And
    select the batch file that you’ve created to shut down your PC.
                   


9. Click on Next, again click on next (don’t choose any things in this step). And
    finally click on Finish button.

10. You’ll have %shutdown% alert shown in the E-mail Rules tab.
                         


11. Now, when you send a message from your phone to your e-mail address
     with the Subject %shutdown% your computer will trigger shutdown.bat file
     and instantly executes the command in that batch file finally leading to shut
     down the PC.
If you have any queries or suggestions related to this post, you're most welcome in comments..! :)                        

Monday, 30 September 2013

What Is The Difference Between a Computer Virus, Worm and Trojan Horse?

5 comments

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.


One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.


What Is a Virus?
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
 

Internet Security Threat Report: 2013 Download Now

What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.


What Is a Trojan horse?
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.


What Are Blended Threats?
Added into the mix, we also have what is called a blended threat. A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.
To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a backdoor and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks.
Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your .exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.
Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate.


Tips to Combat Viruses, Worms and Trojan Horses on Your Computer:

 
1. Keep The Operating System Updated:
The first step in protecting your computer from any malicious there is to ensure that your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you need to have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer.


2. Use a Firewall:
You should also install a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic.
For individual home users, the most popular firewall choice is a software firewall.  A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.
It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network. 


Did You Know... CodeRed, a blended threat, launched DoS attacks, defaced Web servers, and its variant, CodeRed II, left Trojan horses behind for later execution. CodeRed was processed in memory — not on a hard disk — allowing it to slip past some anti-virus products. Computer Economics has estimated the worldwide cost of CodeRed at $2.62 billion dollars. [Source: Symantec Web site]

Key Terms To Understanding Computer Viruses:

 
Virus: A program or piece of code that is loaded onto your computer without

   your knowledge and runs against your wishes.

Worm: A program or algorithm that replicates itself over a computer network
   and usually performs malicious actions

Trojan Horse: A destructive program that masquerades as a benign
   application. Unlike viruses, Trojan horses do not replicate themselves.

Blended Threat: Blended threats combine the characteristics of viruses,

   worms, Trojan Horses, and malicious code with server and Internet
   vulnerabilities .

Antivirus Program: A utility that searches a hard disk for viruses and

  removes any that are found.

Saturday, 28 September 2013

How to Use Your Full Internet Bandwidth Speed?

2 comments
We have already discussed "How to Increase Your Browser internet Speed" and "How to make your computer fresh and fast" ,in this article we will see "How to Use Your Full Internet Bandwidth Speed?"
By Default, Microsoft Windows reserves 20% of bandwidth for it’s own use like Updates etc. This should be undone immediately to optimize or increase your internet speed. To do so you don’t need to install any extra program; you can do this with a simple setting given below step by step.
1. Press "Windows key + R" (shortcut key for RUN).
2. Now type gpedit.msc in Run Box and hit Enter. This will give access to Group
    Policy Editor.
     


3. Then Navigate to Computer Configuration -> Administrative Templates -> Network -> QOS Packet Scheduler using the pane on the left side.




4. Now in the right panel you will notice an option called 

   "Limit Reservable Bandwidth". Double click on it or Right click on it and
    choose "Edit" option.

5. A new window will pop out where you will find Bandwidth Limit is not
   configured by default. 

6. Now click enabled then you will find Bandwidth Limit is set to 80% by
    default (in Windows 8), so now change Bandwidth Limit to 0 then apply the
    changes.



7. Hit OK and close the group policy editor. And Restart Your PC.

Friday, 27 September 2013

How to Hide a Particular or Specific Drive by Using Command Prompt?

0 comments
In my last post I show you that how to hide all the drives together by using registry editing. Now, I will show you that how to hide a Particular or specified drive by using Command Prompt. Now hide any Hard Drive partition without any software. Just follow the simple steps below to hide your particular or specified drive.

This is the best security tip to be employed against unauthorized users.
1. Go to Start >> Run >> type "diskpart" (without quotes). A DOS  window will

    appear like this one.


2. Then type "list volume" (without quotes). The result will look something like
    this one as shown in the picture:
         


3. Suppose you want to hide drive D then type "select volume 3" (without quotes). Then a message will appear in same window {Volume 3 is the selected volume}
    


4. Now type "remove letter D" (without quotes). Now a message will come
{DiskPart successfully removed the drive letter or mount point}
    


5. All done. Sometime it requires rebooting or just sing out the computer.

Your Data is now safe from unauthorized users. To access the content of hidden Drive repeat the process mentioned above. But in 4th step replace "remove" by "assign". It means type "assign letter D" in 4th step to unhide drive D.                     


Enjoy..!
 
© 2013 Hacker'S Den | Designed by Making Different | Provided by Hacker'S Den | Powered by Hacker'S Den