Posts

Showing posts from 2012

Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press  Enter. 6) Now, type the IP Address of the computer you want to contact and press enter 7) Now all you need to do is type your message and press Enter. Start Chatting.......! Share for anyone........................ ..

Repairing Windows XP in Eight Commands

Windows could not start because the following file is missing or corrupt: \\WINDOWS\\SYSTEM32\\CONFIG\\S YSTEM You can attempt to repair this file by starting Windows Setup using the original Setup CD-ROM. Select ‘R’ at the first screen to start repair. Which renders your PC inaccessible from the standard boot procedures of Windows XP. You try safe mode, to no avail. You’re particularly savvy and try issuing the FIXBOOT and FIXMBR commands in the Windows recovery console, but after each reboot, you’re merely greeted with the same obnoxious and terrifying blue screen of death that’s preventing you from accessing your precious data. Perhaps you’ve also seen these error screens: Windows NT could not start because the below file is missing or corrupt: X:\\WINNT\\System32\\Ntoskrnl. exe _________________ Windows NT could not start because the below file is missing or corrupt: X:\\WINNT\\System32\\HAL.dll _________________ NTLDR is Missing Press any key to restart _________________

Create Ghost image of Hard Disk

How to create ghost image of hard disk for free? If yes then you are the person who want to backup complete disk  along with OS. So lets see how we can create hard disk image or  ghost image or disk clone without using those highly priced ghost  creating software. Requirements: Ubuntu Live CD/DVD, A hard disk with more capacity than the one  you want to clone and some basic knowledge of Linux. Procedure: Linux provides disk dumping feature, this feature can be used for  creating complete backup of any possible storage media. And we  will use this feature of Linux command shell to create ghost  images. While writing this tutorial I am assuming that you want  to backup a hard disk which already have an OS installed in it. Boot from Ubuntu Live CD/DVD Now mount the hard disk you want to take backup on /mnt folder Now take backup using following commands, [root@localhost~]dd if=/dev/sda1 of=/mnt/image.img this will

Delete administrator Password without any software?

Want to know How to "Delete administrator Password" without any software? Here's how.. Boot up with DOS and delete the sam.exe and sam.log files from  Windows\system32\config in your hard drive. Now when you boot up  in NT the password on your built-in administrator account which  will be blank (i.e No password). This solution works only if your  hard drive is FAT kind. Email This

Use any Sim in any Modem without unlocking it

Image
We all know that, we cannot use any sim in any modem without unlocking the modem. But its now possible by using Nokia PC suite. Follow the Steps : 1) Insert the sim inside the modem and connect it to the PC. 2) It will display the message as invalid sim, ignore that message and Open the Nokia PC suite. 3) Click on Connect to Internet option in PC suite. 4) Goto Configure. Select your data card modem,and make all operator apn setting as like when we use nokia mobile connection. 5) Finish the set up and connect to internet through PC suite. 6) Now your net is connected without any unlocking.

What is Steganography?

What is Steganography? Before coming to the point let me tell you its history. You might have seen in old chinese movies that the monks used to safeguard secrets by hiding those secrets on their body parts so that no one else can see them but them. This concept was developed further and it was implemented in computers as well. This is called Steganography. Now coming to its implementation in Computers. By the use of Steganography you can Hide one type of file behind other keeping the format of file same. I personally find it very useful because it helps me hide my important information easily. So do you want to try Steganography on your machine ? Lets get started. NOTE:-  The files and folder names I am going to use are just for reference. You may use different if you want to. But for beginning I would suggest to follow along. Later on you can try it with different file names. Setup:- 1) Create a new folder named test in any drive (say  C : Drive) 2

What is IIS Exploit

Image
This tutorial is about website hacking that are working on older versions of IIS server. We will be discussing about what is a IIS server and how hackers can upload deface pages on it. Note:-  This tutorial is for information purpose only. Hacking tips won’t be responsible for any harm caused due to the information. We aim to create awareness so that you can protect yourself from getting hacked. Q)   What is an IIS Server  ? A) IIS [Internet Information Service] is a web server developed by Microsoft to use with Mircosoft Operating systems. How to Use IIS exploit :- For Windows XP : 1)Go to start the click on run. 2)Copy the folowing code and paste it in run command:- %WINDIR%EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}::     {BDEADF00-C265-11d0-BCED-00A0C90AB50F} 3)Click on ok. 4)A folder named “Web Folders” will open. 5)Right click in the folder and click on “New” and then click on “Web folder”. 6)A dialogue box will open. 7)Enter the ur

Hack the Administrator Password in Windows

In this post I will tell you guyz how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password. All of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called   Offline NT Password & Registry Editor . This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features. You do not need to know the old password to set a new one Will dete

Add 2-Step Verification Method in Google Account To Increase The Security

Image
Hello readers today i am going to show you the " 2-Step Verification " method in Google accounts to add more security . Trust me this is very nice method to increase the security in your Google account .  In this method you cant login into your account if you don't have a verification code . If you have your password and your verification code ( Receive on your mobile via SMS or Call ) then only you can login into Google account . How To Add " 2-Step Verification "  . Login your Google Account . Go to this link :   https://www.google.com/accounts/SmsAuthConfig Click on  " Start Setup " On the Next Step  " Choose Mobile number and Click on Send Codes "  You will get codes via sms , Enter those codes and click on Verify .  On the next step it will ask you for " Trust this Computer "  ( If you lose your phone, you might be able to access your account from a trusted computer without needing a