Showing posts with label windows Tricks. Show all posts
Showing posts with label windows Tricks. Show all posts

Sunday, 14 October 2012

Hack Facebook, Gmail, orkut, Youtube, Windows Password


Phishing is the most popular and widely used method for hacking email accounts. Phishing is not as easy as it’s name. Creating a phishing page is an easy task and any one can download it from various hacking forums for free. The main step of phishing comes after creation of fake login page.
If you Haven’t Read about Phishing previously Please Click here

How to send this fake page to the victim?

Here comes the Tab Napping which can make your second step easy than before. No need to send fake page via email to victim.

Tab Napping use the modern browser’s multi tabbed environment. Now a days all people use multiple tabs for accessing Gmail, facebook, orkut and other websites simultaneously. The trick is to confuse user in his/her multiple tabs and redirect any of idle tab of his browser to your phishing silently. Tab Napping works on the user’s assumption that a tabbed web page stays the same when other Internet services are being accessed.

How does tab napping work?
It is done by checking whether your page is idle or not, if it is idle or not used for some particular time period then it gets redirected:
Things to be done:

 1.check for mouse movement
2.check for scroll bar movement
3.check for keystrokes

If any of the above event is not triggered till few seconds , this means user is not using that tab, either is off from system or using
 other tab, so if these coditions are met, then we redirect it to our phished page, which user thinks it to be genuine page.
The idea behind this is very simple and is done by javascript. Tab napping is all about the relation of 2 pages. suppose Page A and Page B. Victim was viewing page A in a tab of a browser and then left this idle and and now using some other website in another tab of browser. If the user will not return to page A for some pre-specified time, page A will automatically redirect to Page B. This Page B is your phishing page. This redirection and cheking for user actions is done by Javascript.

Tab napping in action:

Get the Java script for tabbed napping here
(Its just a text file which includes the script…so no need to worry about scanning it!)



Make a web page and use the tab napping script in that page say it page A. This script will not affect the layout or content of the page. This script will check for user actions. If the page is idle for some time, this script will redirect this page to a pre-specified page which may be your phishing page. You have to specify this page in the script. Be sure to change this in script.
check script for this line…

timerRedirect = setInterval(“location.href=’http://www.gmail.com’”,10000);

this line will redirect to Gmail after 10 sec. Change this location to the address of your phishing page. This line is used 2 times in the script so change is both lines.

so, page A with tab napping script will redirect to phishing page B.

Now send the link of the page A to your victim. This is a normal page. If the page is idle for some time it will be changed to page B otherwise no effect.

Remove Write Protection on USB Drive & Memory Cards


Many times using your portable devices you get errors like the disk is write protected like in the image on the right hand side. So this can happen anytime due to virus attacks or anything can be the cause. So recently I got main from one of my reader namedsoundararajan so he was asking that his 2GB card has become write protected so what he can do, well there are two ways you can try to remove its write protection so check them below.

Firstly I will recommend checking for any physical lock on that card or USB, because many times company’s provide a lock write attached to the card for making it write protected, so check that up make sure its off and than also if you are not able to copy stuff to your card than follow below methods.
Removing Write Protection Using Registry Editor :
Well this is most preferred way of removing write protection as it does not include any formatting of disk or memory card. So you just have to manipulate a .reg key and that’s it.

1. Open Registry Editor by navigating to Star Menu > Run ( on windows 7 search for Run in start Menu ) now type “regedit” and you will see your Registry Editor opened.

2. Now Navigate to the following path :
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
Now if you are not able to see the StorageDevicePolicies than no problem just download this.Reg File and double click on it, now restart your computer and you will have Storage DevicePolicies.

3. Now double click on the WriteProtect and make its value 0 and than click OK.

4. Now just close registry editor and restart your computer for changes to take effect, now plug your memory card or USB in and enjoy non write protected memory card.

Removing Write Protection Using Apacer Formatting Utility :
Now if you are not able to remove write protection from your Memory Cards or USB Drives using the above method than you can go for Apacer Formatting method which simply works quit good.

Now this method needs your card or USB Drive to be formatted so make sure that you have copied all the data from your USB Drive to your computer, now follow steps from below and have fun.

1. Download Apacer Formatting Utility to your computer, make sure its not kept inside the USB Drive just keep it anywhere outside where you can remember.

2. Now extract it and than plug your pen drive or memory card in to your computer and than double click on the Start.bat file present inside the folder you just downloaded. Now this step will start formatting your drive or card so let it do its work till you figure out that formatting is done.

3. Now try checking out if your card has been free from the write protection, well this will surely do its job and you can enjoy copying any files or folders to your drive.

So now these two methods will help you in fixing your USB Drive or Memory Card easily, but still if you are unable to remove write protection from your drive than their might be some hardware problem or something, make sure to contact your retailer and get it replaced.

How to make Bootable PENDRIVE from Command


1. Plug-in your USB flash drive to USB port and move all the contents from USB drive to a safe location on your system.
2. Open Command Prompt with admin rights. Use any of the below methods to open Command Prompt with admin rights.
*Type cmd in Start menu search box and hit Ctrl+ Shift+ Enter.
Or
*Go to Start menu > All programs > Accessories, right click on Command Prompt and select Run as administrator.
3. You need to know about the USB drive a little bit. Type in the following commands in the command prompt:
First type DISKPART and hit enter to see the below message.

Next type LIST DISK command and note down the Disk number (ex: Disk 1) of your USB flash drive. In the below screenshot my Flash Drive Disk no is Disk 1.
4. Next type all the below commands one by one. Here I assume that your disk drive no is “Disk 1”.If you have Disk 2 as your USB flash drive then use Disk 2.Refer the above step to confirm it.
So below are the commands you need to type and execute one by one:
SELECT DISK 1
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS
(Format process may take few seconds)
ASSIGN
EXIT
Don’t close the command prompt as we need to execute one more command at the next step. Just minimize it.

5. Next insert your Windows7/Vista DVD into the optical drive and check the drive letter of the DVD drive. In this guide I will assume that your DVD drive letter is “D” and USB drive letter is “H” (open my computer to know about it).
6. Maximize the minimized Command Prompt in the 4th step.Type  the following command now:
D: CD BOOT and hit enter.Where “D” is your DVD drive letter.
CD BOOT and hit enter to see the below message.
7. Type another command given below to update the USB drive with BOOTMGR compatible code.
BOOTSECT.EXE /NT60 H:

Where “H” is your USB drive letter. Once you enter the above command you will see the below message.
8. Copy your Windows 7/Vista DVD contents to the USB flash drive.
9. Your USB drive is ready to boot and install Windows 7/Vista. Only thing you need to change the boot priority at the BIOS to USB from the HDD or CD ROM drive. I won’t explain it as it’s just the matter the changing the boot priority or enabling the USB boot option in the BIOS.

Spy Others PC To Secretly Record Their Passwords Which Are Automatically Sent to Your Email


A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, . A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard.


" REMEMBER TO DISABLE THE ANTIVIRUS WHILE FOLLOWING THE STEPS"
* YOU NEED PHYSICAL ACCESS TO THE VICTIMS PC IF YOU WANT TO SPY HIM.
* OR YOU CAN USE IT IN YOUR PC TO SECRETLY RECORD EVERY PASSWORD YOUR FRIENDS TYPE WHILE USING YOUR PC.

Step 1 Getting the Software


We're going to be using the FREE Keylogger made by Smithy.

1. Download Steel Keylogger by Smithy ( gOTO GOOGLE AND DOWNLOAD THE LATEST VERSION ) { Iam using  Steel Keylogger v 1.1.0.18}
2. Go to the directory that you downloaded Steel to, and extract the archive (right-click > extract here).
3. Put the Steel.exe in a private directory that a thief would not think to look under. Try to put it in a hidden folder, or obscure directory, for example:
    C:\WINDOWS
Then make a folder inside of that called "steel" and throw steel.exe inside of it. You'll end up with:
    C:\WINDOWS\steel\steel.exe

"REMEMBER TO PUT AN EXCEPTION TO STEEL.EXE IN YOUR ANTIVIRUS SO THAT THE ANTIVIRUS WON'T REMOVE IT IN THE FUTURE"


Step 2 Setup and Configuration
Now we're on to edit the preferences to optimize it for our needs. I recommend having a separate email JUST for steel, as it will be filled with logs and images.
1. Run steel.exe by double clicking on it.
2. Go to Options > Preferences.
3. Click Startup and Exit.
4. Click the check boxes for Start in Hidden Mode and Run at System Startup (All Users).
5. Check Hide for when Exit is pressed.


6. Click Security and check Password Protect Unhide, and set your choice of password
7. Click Email and edit the credentials to fit yours. Make sure SSL is enabled. This will ensure that the logs are sent to your email, and your password can't be packet-sniffed.


8. If you want Images sent—I recommend this—check the box and in the drop down, select Every Hour.
9. Go to the Logging tab, and choose if you want a key combo to unhide Steel, or to type a password and cut it to reveal Steel. The choice is all yours.
10. Check Enable Screen Capturing.
11. Set the image quality and interval to what you desire.
12. Click the Save Settings button.

THERE ARE MANY COMMERCIAL kEYLOGGERS AVAILABLE. IF YOU FIND THEM COMFORTABLE TRY TO GET  THEIR FREE FULL VERSION.
EG. (http://monitoring-software-review.toptenreviews.com/)
1. SpyAgent
2. WebWatcher
3. PC Pandora
4. Spector Pro
5. eBlaster
6. Elite Keylogger
7. IamBigBrother
8. Refog Personal Monitor
9. XPCSpy Pro
10. SniperSpy

How to Unlock/Crack Winrar/Winzip Password


Have you ever ended up with a RAR file that was password protected? Maybe you set the password yourself and forgot it! Whatever the case, there are a couple of ways to crack the password on a RAR file if you get lucky.
Basically, there are two standard methods to cracking a password for any program: dictionary attack and brute-force attack. The first generates passwords using word lists from a dictionary and the latter simply searches all possible character combinations.
Obviously, the latter is harder and will take more time. If the password is very complex and doesn’t have any recognizable dictionary word in it, it might simply be impossible ( AS IT MAY TAKE DAYS OR EVEN MONTHS). However, it’s always worth a try.

By using cRACK (for Windows, Win32/Win64 ) . [ http://www.crark.net/ ]:
1. Download latesT version of cRACk


2. Then download Crark GUI wrapper for Windows. (http://www.crark.net/download/crark_gui.zip)



3. Then extract both tools ( cRACk  & Crark GUI wrapper) into the same folder.
( if while extracting the archive ask for password then click cancle because only some files are password protected which are not needed in the process . )


4. Run cRackGUI.exe


5. Choose the required options.
6 . Then click start.



7. Password is cracked ( remember the process takes time)




 There are some more software available but they cost about $20 - 30$. But if you search YOU can get the full versions ( YOu know what i want to say ).
Atomic RAR Password Recovery
The free trial will allow you to recover passwords up to 3 characters in length. If you have a longer password and the program is able to determine the entire password, you will see the 1st three characters followed by asterisks (*).
In this case, you can buy the program and it will unmask all the characters. If it never shows the asterisks, that means it can’t figure out the password and you don’t have to buy it! Nice.
RAR Password Cracker
This is another program that uses both the brute force attack method and the dictionary attack. It’s shareware also, so the free trial has some limitations.
Elcomsoft Advanced Archive Password Recovery

Sunday, 17 June 2012

Hack an Ethernet ADSL Router

Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.
Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in theDefault username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.
Before you proceed, you need the following tool in the process
Angry IP Scanner
Here is a detailed information on how to exploit the vulnerability of an ADSL router.
Step-1: Go to www.whatismyipaddress.com. Once the page is loaded you will find your IP address. Note it down.
Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
Suppose your IP is 117.192.195.101, you can set the range something as117.192.194.0 to 117.192.200.255 so that there exists atleast 200-300 IP addresses in the range.
Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selectionenter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.
I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Options instead of Tools
Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.


Step-5: Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.
Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below
If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.
What can an Attacker do by Gaining Access to the Router Settings?
By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.
The Verdict:
If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.
Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model
Warning!
All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

How Hackers Changed the World | History of Hacking

Hey Hackers! in this post of Learn Hacking, I am not bringing any new tutorial or trick for you but I am bringing out the truth of Hackers. How the Hackers changed the world and What is their actual contribution to the society.
When the term Hacker comes into Picture, many people get scared as the evil picture comes into their mind. They think that a hacker is going to hack their email or bank account or they are going to face severe loss of information and data, but this is not so. A few black hat hackers who misused their knowledge have made people think so however this is not the reality of Hackers, this is not what a Hacker really is.
People often come and say – “I am a hacker, I can hack any email account” and stuff like that, sounds really kiddish to me. They don’t know who a hacker really is and they call themselves a hacker. For a moment lets just forget about Blackhat and Whitehat or any other categorization of hackers.
Lets start from the beginning, How Hacking started?
What led to the birth of Hackers?
Any idea?
Well you are about to know.
It all started with video games, the early beginning of computers when people used computers just to perform calculations or play very small games, this new machine and its working generated curiosity in the minds of people and they wanted to learn more about it, when learnt they wanted to make it better. Then people like Bill Gates and many others mastered the concept and started improving them and the result is infront of  us, yes your computer. Its the curiosity to Learn New things that led to the birth of Hackers (No harm in this I guess). Proved to be a boon for all of us.
The main aim of Hackers at that time was to gain respect of other Hackers, to prove that they have superior knowledge than others. A hacker is actually someone who has mastered in his/ her field and can develop its hack ie.. make it better. Even if you find an exploit in a software or break into it, its also going to benefit the software as that Exploit is going to get removed from it in the next update.
Now the Next generation came when after the hardware improvement it was the time for softwares and websites. Hackers had machines in their hands but wanted to make the best use of it, as a result they made many softwares and made many new innovations. Most of us have hear about one coding language or the other but have you ever wondered who thought about having a standardized Coding language or platform to perform a particular task? Well now you got the answer.
We all also use Linux and even Backtrack, Ever wondered how Linux was developed? It was developed as an opensource on Hacking forums. That’s why is still free and is so secure that many companies and even the biggest web servers use it.
Ah.. This is just the beginning. Lets come to the websites thing, people designed websites and developed them on various platforms but who would have taken care of website’s security. People gained immense knowledge about web servers. Internet was the next big thing. It was the age of static websites, trust me, static websites are much more hard to hack than dynamic websites. And only people with immense knowledge of web servers could hack them. So if someone was able to break into any website at that time, he was actually a web server expert.
Things don’t end here, as the process of learning never ends, the hackers have become smarter with time.
So what separates a Good Hacker from a Bad Hacker or What differentiated between a blackhat hacker and a Whitehat Hacker, well its their deeds.
Obviously when you have immense knowledge of anything you can both use and misuse it. If you use it wisely, you become a hacker else you become a cracker.
Then came several more categorizations depending upon the level you can hack, but they don’t matter much.
The main reason of me writing this post was to tell you Who a Hacker actually is.
In the present era when people consider Hacking Facebook account or email account as hacking, never forget the roots, How Hacking Started. Hacking will always lead to progress and development if used wisely, but in the end its you who is to decide how you want to use your knowledge.

How to Hack windows password.

In this article we are exactly going to tell you the same.
Hacking / Bypassing windows passwords is not a difficult task actually. If you have the required tools you can easily get into anyone’s computer by Hacking / Bypassing the password.
However Learn Hacking highly discourages the use of blackhat hacking techniques and use this knowledge only for a good reason. Say you forgot your computer’s password and want to recover it, you may use this method.
Now coming back to the main topic again:-
We are going to use a tool called Hirens Boot CD to crack windows passwords.
Download Hirens boot cd from
http://www.hirensbootcd.org/files/Hirens.BootCD.15.1.zip
Q) Where are windows password saved?
A) Windows first encrypts the password using some algorithm and then saves it to a Sam file.This sam file is locked and no user account including the administrator can use this file.This file is located in windows/system32/config.
Q) What is the above link ?
A) The link given above is the download link for “hirens boot cd “.
It is a special type of **live cd** bunched with popular and useful freeware tools .The link is to hirens boot cd 15.1 ,but you can download any earlier version.
The main reason for choosing this cd is that it contains number of useful softwares.There are many other Live cds too ,you can even try them.
Q) what is a **live cd**?
A) Live cd is a cd/dvd or any other portable media containing bootable Operating system.These media have the unique ability to run operating system without altering the files and operating system installed on the hard disk of the pc.
It generally places it files in the Ram[random access memory ,volatile memory],so when a pc is rebooted all it files are deleted automatically.
Q) How does this cd helps us?
A) Since this live cd doesnt use the pre installed operating system ,we can edit/delete files [even the locked ones ie sam file].You can also use utilities present in this cd to change the windows password.
Steps to use Hirens Boot CD to Hack Windows Password:-
1 ) Download the zip file from the above link.
2 ) Extract it.
3 ) There will be a .iso file . Burn that file to cd using nero/poweriso or anyother software you have.
4 ) Boot using this cd ie insert this cd in CD-Rom and restart [Make sure that cd-rom has the highest boot priority]
5 ) After booting ,It will show a menu , Choose “Mini windows xp”.It will take some time to launch.
6 ) After it is finished ,You will be having a windows classic style desktop.
7 ) Click on start>>Hiren boot cd menu [HBCD menu]
8 ) It will open a dialogue box,click on “Menu” >>click on “password and keys”, there you will be having a list of softwares,click on “”Password renew”".
9 ) Now click on select target ,Browse to your windows ie “c:windows” and press ok.
10 ) Click on “Renew exisiting user password” and then choose the Your user account .
11 ) Enter the desired password and hit install.
12 ) You are now done just restart Your pc and login using your new password.
Prevention :
In the Bios settings set the minimum boot priority for removable devices . In this way the CD?DVD/USB wont boot and the method specified above wont work . Also set the password at the BIOS  so no one will be able to change the Boot settings .

How to hack a wi-fi network

Doesn’t it suck when you see your laptop’s catching so many wi-fi signals but none of them is accessible.. don’t you feel like “I wish I could some how break the password and dive into the deep oceans of the information” I beleive everyone should be able to have free internet. If someday I make it big enough and I’ll be having ample money.. I promise I’ll provide free wifi hotspots all over the places.. “Let there be INTERNET”.. even If I don’t get rich.. I’ll become a politician and would make Internet a Fundemental right to every citizen.. Now that would be something..
That’s enough with the Castles in the air.. now lets get back to reality..
What I can do for you right now is that I can tell you how to hack a wifi network to access Internet.. Some would call it stealing.. some like me won’t..
I’ll call it Sharing.. Sharing is what on which the whole Internet is build upon…
So.. Here’s how we do it..
1) First we need to scan for available wireless networks.
Theres this great tool for windows to do this.. called “NetStumbler” or Kismet for Windows and Linux and KisMac for Mac
Below is a screenshot of NetStumbler.. It will show you a list of all the wireless access points in your range.
It’ll also show how the Wi-fi network is secured..
The two most common encryption types are:
1) WEP
2) WAP
WEP i.e Wire Equivalent Privacy is not consideres as safe as WAP i.e Wireless Application Protocol.
WEP have many flaws that allows a hacker to crack a WEP key easily.. whereas
WAP is currently the most secure and best option to secure a wi-fi network..
It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary atack.
Here I’ll tell you how to Crack WEP
To crack WEP we will be using Live Linux distribution called BackTrack to crack WEP.
BackTrack have lots of preinstalled softwares for this very purpose..
The tools we will be using on Backtrack are:
Kismet – a wireless network detector
airodump – captures packets from a wireless router
aireplay – forges ARP requests
aircrack – decrypts the WEP keys
1) First of all we have to find a wireless access point along with its bssid, essid and channel number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing in the command iwconfig.

2) To be able to do some of the later things, your wireless adapter must be put into monitor mode. Kismet automatically does this and as long as you keep it open, your wireless adapter will stay in monitor mode.
3) In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN 0=OTHER(usually WAP).
4) Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to select an access point and hit <ENTER> to get more information about it.

5) The next step is to start collecting data from the access point with airodump. Open up a new terminal and start airodump by typing in the command:
airodump-ng -c [channel#] -w [filename] –bssid [bssid] [device]
In the above command airodump-ng starts the program, the channel of your access point goes after -c , the file you wish to output the data goes after -w , and the MAC address of the access point goes after –bssid. The command ends with the device name. Make sure to leave out the brackets.
6) Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following command:
aireplay-ng -1 0 -a [bssid] -h 00:11:22:33:44:55:66 -e [essid] [device]
In the above command we are using the airplay-ng program. The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends with the your wireless adapters device name.
7) Now, we will force the target access point to send out a huge amount of packets that we will be able to take advantage of by using them to attempt to crack the WEP key. Once the following command is executed, check your airodump-ng terminal and you should see the ARP packet count to start to increase. The command is:
aireplay-ng -3 -b [bssid] -h 00:11:22:33:44:5:66 [device]
In this command, the -3 tells the program the specific type of attack which in this case is packet injection, -b is the MAC address of the target access point, -h is your wireless adapters MAC address, and the wireless adapter device name goes at the end.
 Once you have collected around 50k-500k packets, you may begin the attempt to break the WEP key. The command to begin the cracking process is:
aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs
In this command the -a 1 forces the program into the WEP attack mode, the -b is the targets MAC address, and the -n 128 tells the program the WEP key length. If you don’t know the -n , then leave it out. This should crack the WEP key within seconds. The more packets you capture, the bigger chance you have of cracking the WEP key.

I am sure it might have helped.:)

Wednesday, 21 March 2012

How to Crate PDF files Online

Somebody just told you that you need to have Adobe Acrobat (Writer) to create a PDF file? Guess what, you can get away from that pricey piece of software if you just need to convert some documents to pdf, without a need of fancy editing the pdf document.
Here's how. Thanks to the BullZip, who provides a Free Pdf printer. With this free tool, you can simply "print out" your document or webpage to a pdf file, just about the same way as you print it out to a printer.
You can visit BullZip.com for more information about the software.
Here the direct link to BullZip downloads page: Downloads
  1. To get started, first follow the link above and download Free Pdf Printer from BullZip, then install it to your computer.
  2. Once you're done, you might need to close the program (or the web browser) which you're currently viewing the document. This helps refreshing the list of available printers on your computer.
  3. Once you get back to the document you want to convert, perform the same steps are you print out the document, i.e. File > Print ...
  4. When you see the Print window pop-up, select "Bullzip PDF Printer" under "Printers", then click "OK".
  5. BullZip PDF Printer will then start to analyze your document and display a new pop-up window, where you can direct it to the location you want to save the pdf file.
  6. Follow the pop-up windows and.. hola! The PDF document is created

Wednesday, 8 February 2012

Megaupload Premium Link Generator

Your download is in the queue… - Sounds familiar?
Well! That’s a story of the past now especially with the MegaUpload premium link generator. What more now you can download 200mb using just the MU link or file ID. Isn’t that neat?
The icing on the cake is that you also have the option of using the unlimited service, which means no restrictions on file size. Faster access – faster downloads!
Here are top 10 sites for MegaUpload premium link generator.

Site#1: Rapid 8

Free or Paid: Basic login (200mb download) is free | Premium Login for unlimited download: $5.99
Rapid 8
Website URL: http://www.rapid8.com/

Site#2: Hluesoe

Free or Paid: 100% free download.
Hluesoe
Website URL: http://www.hlusoe.info/

Site#3: ATayALay

Free or Paid: Free with restrictions. Maximum download of 3x150mb and a limit of 12 downloads.
AtayAlay
Website URL: http://www.atayalay.info/?ref=hlusoe.info

Site#4: Plgdown

Free or Paid: Free. Registration and completion of survey must to get free account.
plgdown
Website URL: http://plgdown.com/mu

Site#5: Leech King

Free or Paid: Demo version is free with file size limit of 100mb. Premium version is priced at $6.99 per month with unlimited file size.
LeechKing
Website URL: http://www.leechking.com/vip/register.php?id=new

Site#6: Tiger Leech

Free or Paid: Trial version is free with file size limit. Premium version is priced at $10 per month with maximum file size of 2GB.
Tiger Leech
Website URL: http://tigerleech.com/

Site#7: Mega Upload

Free or Paid: Trial version is free with a maximum file size of 150MB and 1 download per day.

Website URL: http://www.megauploadlinkgenerator.com/

Site#8: Zevera

Free or Paid: Trial version is free with restricted file size. Premium version with unlimited file size and costs $14 per month.

Website URL: http://www.zevera.com/USDefault2.aspx

Site#9: Mega Leech

Free or Paid: Free download.

Website URL: http://www.megaleech.us/

Site#10: Kikisso

Free or Paid: Free download of unlimited file size. Offer two MegaUpload premium link generator options: Megapid and Megafast.

Website URL: http://www.kikisso.com/en/file-sharing/premium-link-generator/megaupload/
Go ahead and start downloading your favorite movies, presentations, much more at the click of the mouse!

Convert Any Document or Web Page to PDF

Somebody just told you that you need to have Adobe Acrobat (Writer) to create a PDF file? Guess what, you can get away from that pricey piece of software if you just need to convert some documents to pdf, without a need of fancy editing the pdf document.
Here's how. Thanks to the BullZip, who provides a Free Pdf printer. With this free tool, you can simply "print out" your document or webpage to a pdf file, just about the same way as you print it out to a printer.
You can visit BullZip.com for more information about the software.
Here the direct link to BullZip downloads page: Downloads
  1. To get started, first follow the link above and download Free Pdf Printer from BullZip, then install it to your computer.
  2. Once you're done, you might need to close the program (or the web browser) which you're currently viewing the document. This helps refreshing the list of available printers on your computer.
  3. Once you get back to the document you want to convert, perform the same steps are you print out the document, i.e. File > Print ...
  4. When you see the Print window pop-up, select "Bullzip PDF Printer" under "Printers", then click "OK".
  5. BullZip PDF Printer will then start to analyze your document and display a new pop-up window, where you can direct it to the location you want to save the pdf file.
  6. Follow the pop-up windows and.. hola! The PDF document is created

How to Access Hidden Themes in Windows 7?

Windows 7 offers a good assortment of themes to customize the feel as well as the look of your computer. Windows 7 features particular themes which are based on the location and the language you select while you install the Windows 7. You can look for the location-specific theme in the Personalize menu. You just have to right-click at any place upon your computer desktop. You will be able to get the couple of themes according to your location.

Other than the location specific themes which you get by default, you can access hidden themes in Windows 7 which are offered to other regions. So the default themes which you get according to your region are not the only themes you can use. It is possible to access hidden themes in Windows 7 very easily in your system. This is what you have to do:
Click Start.


In the search box of the Start menu, type C:\Windows\Globalization\MCT.

Your Windows Explorer will show you a window with additional themes. These will be from Great Britain, South Africa, Australia and Canada.

You have the option to select the wallpaper only or you can install the whole theme if you want.

You will be able to install the entire brand-new theme by double clicking on the required file.

The new theme you add will show under “My Themes” within the “Personalization” pane.

You can also download many themes for Windows 7 from different website including the Microsoft official website. But you should first try to customize and access hidden themes in Windows 7 as you might not feel the need to download additional themes from elsewhere after that..

Saturday, 31 December 2011

Hack Administrator Password In Windows 7,Xp And Vista


Most of us might have experienced a situation when we forget our Windows administrator password.And we are not able to login into windows and access our all necessary data and programs.At that time the only solution that comes into or mind is the installation of fresh copy of windows but this will lead to loss of all data and files that are in the windows drive.There is also another way around using which you don’t need to install a fresh copy of windows and without losing any data.We are providing here the method to reset windows administrator password.This tutorial is only for the purpose of recovering your windows 7,xp or vista password.This should be used only when you forgot or lost your password and not for hacking into somebody else’s system.Using this hack you can reset your administrator password or leave it blank.
By using this tutorial
1.You donot need to know anything about your old password.
2.You can unlock locked or disabled accounts.
3.Also edit the registry.
The requirements for using this method are:-
1.Blank CD/floppy disk.
2.Access to Internet.
3.Cd or floppy writer
These requirements can be easily fulfilled by spending 15 minutes in cybercafe or at friends computer
Now here is the step by step tutorial with screenshots on how to hack administrator password in windows 7,vista or xp.

1.Download this small utility.
Click Here To Download
2.You will get an zipped file with ISO image in it.Extract his image using winrar or inbuilt windows software.
3.Put your blank cd in CD-ROM and burn this using Nero or any other image burner software.this is most important step and make sure you burn the ISO image properly.
4.Now put this CD in the system whose password is to be reset.
5.Restart your system and when prompted press enter to boot from the CD.
offlinentpassword05upd Hack Administrator Password In Windows 7,Xp And Vista

Note:If you do not get prompt of boot from CD.Then restart you system and press f2 or f6 or f8 or Esc key(anyone of them should work for your system) before the booting of the windows start.Now you will enter into bios and you should change the boot order from here with the first preference as CD-ROM.And again restart your system
6.Now the software will load automatically.It will ask you to select the windows drive and after that provide you with the option of resetting password.
If you have any queries or suggestion do not hesitate to ask.

How To Find the Administrator Password in Windows 7


An administrator password in Windows 7 is the password to any account that's setup to access administrator level functions in Windows 7.
There is also an account called "Administrator" but it's disabled in Windows 7 by default. What you really need in most cases is the password to any account that can act as an administrator.
There are a few times when you will need this password. You may need an administrator password in Windows 7 if you're trying to run certain types of programs or access certain Windows 7 recovery tools.
Follow the steps below to quickly find an administrator password in Windows 7:
Difficulty: Average
Time Required: Finding the password to an admin account may take minutes up to hours depending on the situation

Here's How:

  1. Try leaving the password blank if you're trying to log on to the actual "Administrator" account. Just press Enter without typing anything when asked for it.
    This trick doesn't work nearly as often in Windows 7 as it did in Windows XP but it's still worth a shot.
  2. Enter the password to your account. Often times, depending on how Windows 7 was setup on your computer, the primary user account will be configured with administrator privileges.
  3. Try to remember your administrator password. As I mentioned in the last step, your account might be configured as an administrator, especially if you installed Windows 7 on your computer yourself.
    If that's true, but you've forgotten your password, you might be able to make really good guesses at what the administrator password might be.
  4. Have another user enter his or her credentials. If there are other users that have accounts on your Windows 7 computer, one of them may be setup with administrator access.
    If this is true, have the other user designate you as an administrator as well.
  5. Recover an administrator password using a Windows password recovery tool. You may be able to recover or reset an administrator password with one of these free tools.
    Note: Some password recovery tools in the list I linked to above also have the ability to add administrator privileges to regular Windows 7 user accounts which could be valuable if you know your account's password but it's not an administrator account. Some can also enable accounts like the "Administrator" account.
  6. Perform a clean install of Windows 7. This type of installation will completely remove Windows 7 from your PC and install it again from scratch.
    Obviously don't attempt this extreme solution unless you absolutely have to. For example, if you're needing an admin password to access operating system diagnostic tools and this is your last effort to save your PC, performing a clean install will work because you'll have an opportunity to setup a new account from scratch during Windows 7 setup.