Friday, September 3, 2010

Create shortcut for any file

In this hack you will create any file shortcut. This hack works in Windows XP. Let start, 1st create one shortcut named folder in any drive where you want to put your shortcut files which are being too made .Let me make file in F drive .
Ok just go to Control panel then system > advanced tab after then go to Environment variables. Now create one new path by clicking New then on “variable name” put Path after in “Variable value” put the location where you have created that shortcut folder, For me its F:\Shortcut . See below screenshots





Now time to create shortcut. finally put any file shortcut or folder or programs shortcut for which you want to create shortcut. I am taking an example of nero smart essential shortcut. For making this shortcut just right click then NEW > shortcut then browse it. Now, finally you setup the file in that shortcut folder.

Now this file will be accessed by pressing windows +r then type the keyword of that shortcut name.
TRICK : Rename that shortcut program with any small name like in , or , y, c etc .This make you to type less by the time of accessing that program.

Shortcut making procedure



program renamed


One thing more, you may put as many file in that folder for which you want to create shortcut.


That’s all.
Thanks

Speed up Your computer while starting

Yesterday when I was starting my cousin computer I realize that there are many things which load initially while starting so I decided to stop all such loading during Starting. So I like to share this hack with you so that you will also throw out such startup like gtalk, yahoo messengers which prompt out, divert our focus and make us to wait. So now .. let go and make all such application to turn off during startup .

1st way:
Go to C:\Documents and Settings\\Start Menu\Programs\Startup or you can also access this path by going Start > All program > starup . Now delete all items which are not required . Btw, I have deleted all items from that list, so it depends on you.
2nd way:
Go to Run (windows + r ) then type MSCONFIG ( MicroSoft CONGIFguration ) then go up Startup tab Now you are seeing opaque word, Don’t stuck into them just see the location of that file that determine which application you want to Disable during running time . Remember, Disabling all apps makes highly changes so I suggest disable only that program which are not required during starting time.


Wednesday, August 18, 2010

[ +911166034500 ] Beware of fake call

Hi guys ,
Recently many people are getting fool by a fake call ( No: +911166034500 , +911130240600 ) in which a speaker told you a newly launched resume service in timesjob.com ( job search site ) and force you to purchase his service . His ultimate motive is to get money from you , so he may try to trap you accordingly .

Al through i am not sure to say but this may likely be similar that there is some guy in Timesjob which is leaking customer number .

So , Before you make hook in such case i thought it will be better to inform you . Ok please beware .


Thanks .


Saturday, August 14, 2010

BlackBerry assures India on access to services


Yes, guys blackberry is now allowing India on access to service .
you may check here

Although we may consider this thing as sign of growing technology but the fact is that India may also suffer from security . We all know Pakistani-based militants used mobile and satellite phones in the 2008 attacks that killed 166 people in Mumbai. The militants were suspected of using Internet telephony. So, India is Restricted many rules.

Forever if india may suffer this time na .. we will not going to leave them ...

Common terms you must know when you deal with computer security

Below are some terms which you must know when you deal with computer security ( hacking ).

  1. MalwareThe generic term used for all forms of software designed with malicious intent. Viruses, worms, spyware etc. are all forms of malware. The term virus is often used when malware should really be used as it describes all forms of malicious software.
  2. VirusA computer virus acts very much like a human virus. Human viruses are spread, via thumb drives, floppy discs, network connections etc., to other PCs. Viruses need a host (like a free screensaver program) to spread. By pure definition: a virus has the ability to spread itself, via a host, to other computers.
  3. WormA worm is much like a virus. The key difference is worms can spread between PCs without a host (free screensaver program, downloaded game etc.) These programs rely on computer networks and usually damage files and slow down networks in their path.
  4. Trojan horse (Trojan) – A Trojan horse is a seemingly harmless program that looks to provide value. However, just as in Greek mythology, a Trojan horse has a secret agenda and acts as a backdoor to your computer. This backdoor can be accessed by a hacker to compromise your PC. Trojan horses are not self-replicating and spread due to users installing them manually on their PC.
  5. Privacy-invasive softwareA formal term used to describe software that invades your privacy. This software comes in different forms including spyware and adware.
  6. SpywareSpyware tracks a user’s activity by monitoring browsing habits and keyboard activity and can even take screenshots while you use your PC. This information is sent back to the creator or beneficiary of the spyware. Signs of spyware include: modified browser homepages, slow internet, and suspicious looking sites in place of legitimate sites (for example: banking sites.)
  7. Adware Like spyware, adware is software that may track visited websites and act as a key logger. Adware tracks this information to automatically display downloaded or installed adverts to a user. You may wonder why you are being offered “PC Super Anti Spyware 2011” when using your PC; this is adware at work. AIM, FlashGet, Deamon Tools, and RealPlayer are all examples of adware.
  8. Backdoor - A backdoor is a point of access to a computer that does not require authentication. An unlocked house back door gives access to an otherwise secure home; a computer backdoor allows access to your PC without your knowledge or permission.
  9. Key loggerKey loggers are used to monitor keyboard activity on a PC. These can be software-based (bundled with Trojan horses, adware, and spyware) or hardware-based (between the keyboard cable and the PC, acoustic etc.) Usually this information is retrieved across a local network, the internet, or from the physical device connected to the keyboard.
  10. Firewall A firewall both permits and blocks access to a network or PC. Firewalls are included with popular security software (e.g. AVG Internet Security and ESET Smart Security) and limit communication between your PC and devices that are not authorized to communicate with you.
  11. Windows FirewallComes bundled with Windows XP, Vista, and 7. This is a great solution; however, due to a lack of comprehensive definition updates, Windows Firewall is not completely effective in blocking threats and allowing safe connections.
  12. Antimalware / Antivirus / Antispyware - Software designed to remove or block malware (e.g. AVG Internet Security and ESET Smart Security.)
  13. Real-time ScanningGood antimalware programs scan files in real time; as you download, copy, and install files on to your computer, your antimalware program will scan these files for infections and malicious code. You should only have one real-time scanner installed at any time—otherwise they will conflict as they compete to scan the same files.

Credit : PC security handbook

crack right click disable option or suppression

hi guys,

What’s Going On! Today I am telling you How to crack right click disable option or suppression. One thing more, this article is only for an educational purpose. Ok let’s move to the hack. This crack is so simple and easy to use. Moreover it is so annoying when some website disable the right click suppression. Professional website doesn’t do this thing. Ok , first open that website fully till it loads completely . Now go to the File > save as; then save it on your disk, for an instant we save that file with a name Playtrickz . Now open playtrickz folder . Now go to the playtrickz.html and open it by notepad. Now you will see some codes , Press ctrl + F and search it “ “ . Now there is some code which looks like this

Remove that code . now press ctrl+S . Now reopen that file . now you will see that there is no right click suppression .

Lol..

That’s all . Even you have some more problem , comment it , I am always there to help you .

Bye .

Getting password from Internet Explorer ( WINDOWS)

Today I am going to tell you how to get the saved ( sometimes even unsaved) password from windows.Windows stores user information in all sorts of places. Some of them you know i.e. cookies , temporary internet files , configuration files but there are some other locations where information is stored that can be much more interesting . I’ll show you how to gather information about users and settings they keep.

Please note, I will be describing utilities found inside of windows and from a software developed name Nir sofer. Although the programs created by Nir sofer are free today, they may not be tomorrow. This article discusses details about the “protected storage manager” in Windows . One caveat however : you will need to be logged in as the user you intend to gather this information from. If you do not have access to the user account , you may need to go though the process of getting into Administrator account .( By resetting the password ). Also , on windows XP home computer, the administrator account has an Empty password when booting into safe account and there you can change the user’s password .

Getting password from Internet Explorer.

The protected storage manager is a simply a location in the windows registry. The protected storage is a feature of windows that stores most, if not all , of the user’s information in an empty encrypted location. By default the “protected storage” service in windows XP is required to save any password the user uses in Email , messenger , Internet Explorer . It is on the default in windows XP. In the registry, you can find the protected storage location by running “regedit” and locating the following key and subkey : HKEY_CURRNT_USER\Software\Microsoft\Protected storage system provider .

Often this location in the registry is either hidden or encrypted or both – so you won’t likely find much if you go snooping around. There are utilities to get access to this information on the local computer. Below the screenshot of the PassView .


( you can download passview by Clicking here )

Some other utilities are Protected storage Explorer , cain & abel, and secret Explorer . If you get the username of password of any one website for instant Facebook then you will find user/password pairs for other sites. You were thinking how? Ok , Often people don’t vary user names and password enough to keep you from guessing them. The function of saving usernames and password is ( for the most part) seamless to the user. So what are you waiting for, Go hack the world . let world me also understand your importance .

Same thing I use to say you again and again that if you need any assistance then comment it up . We will always there to help you .