Friday, September 3, 2010

Create shortcut for any file

In this hack you will create any file shortcut. This hack works in Windows XP. Let start, 1st create one shortcut named folder in any drive where you want to put your shortcut files which are being too made .Let me make file in F drive .
Ok just go to Control panel then system > advanced tab after then go to Environment variables. Now create one new path by clicking New then on “variable name” put Path after in “Variable value” put the location where you have created that shortcut folder, For me its F:\Shortcut . See below screenshots





Now time to create shortcut. finally put any file shortcut or folder or programs shortcut for which you want to create shortcut. I am taking an example of nero smart essential shortcut. For making this shortcut just right click then NEW > shortcut then browse it. Now, finally you setup the file in that shortcut folder.

Now this file will be accessed by pressing windows +r then type the keyword of that shortcut name.
TRICK : Rename that shortcut program with any small name like in , or , y, c etc .This make you to type less by the time of accessing that program.

Shortcut making procedure



program renamed


One thing more, you may put as many file in that folder for which you want to create shortcut.


That’s all.
Thanks

Speed up Your computer while starting

Yesterday when I was starting my cousin computer I realize that there are many things which load initially while starting so I decided to stop all such loading during Starting. So I like to share this hack with you so that you will also throw out such startup like gtalk, yahoo messengers which prompt out, divert our focus and make us to wait. So now .. let go and make all such application to turn off during startup .

1st way:
Go to C:\Documents and Settings\\Start Menu\Programs\Startup or you can also access this path by going Start > All program > starup . Now delete all items which are not required . Btw, I have deleted all items from that list, so it depends on you.
2nd way:
Go to Run (windows + r ) then type MSCONFIG ( MicroSoft CONGIFguration ) then go up Startup tab Now you are seeing opaque word, Don’t stuck into them just see the location of that file that determine which application you want to Disable during running time . Remember, Disabling all apps makes highly changes so I suggest disable only that program which are not required during starting time.


Wednesday, August 18, 2010

[ +911166034500 ] Beware of fake call

Hi guys ,
Recently many people are getting fool by a fake call ( No: +911166034500 , +911130240600 ) in which a speaker told you a newly launched resume service in timesjob.com ( job search site ) and force you to purchase his service . His ultimate motive is to get money from you , so he may try to trap you accordingly .

Al through i am not sure to say but this may likely be similar that there is some guy in Timesjob which is leaking customer number .

So , Before you make hook in such case i thought it will be better to inform you . Ok please beware .


Thanks .


Saturday, August 14, 2010

BlackBerry assures India on access to services


Yes, guys blackberry is now allowing India on access to service .
you may check here

Although we may consider this thing as sign of growing technology but the fact is that India may also suffer from security . We all know Pakistani-based militants used mobile and satellite phones in the 2008 attacks that killed 166 people in Mumbai. The militants were suspected of using Internet telephony. So, India is Restricted many rules.

Forever if india may suffer this time na .. we will not going to leave them ...

Common terms you must know when you deal with computer security

Below are some terms which you must know when you deal with computer security ( hacking ).

  1. MalwareThe generic term used for all forms of software designed with malicious intent. Viruses, worms, spyware etc. are all forms of malware. The term virus is often used when malware should really be used as it describes all forms of malicious software.
  2. VirusA computer virus acts very much like a human virus. Human viruses are spread, via thumb drives, floppy discs, network connections etc., to other PCs. Viruses need a host (like a free screensaver program) to spread. By pure definition: a virus has the ability to spread itself, via a host, to other computers.
  3. WormA worm is much like a virus. The key difference is worms can spread between PCs without a host (free screensaver program, downloaded game etc.) These programs rely on computer networks and usually damage files and slow down networks in their path.
  4. Trojan horse (Trojan) – A Trojan horse is a seemingly harmless program that looks to provide value. However, just as in Greek mythology, a Trojan horse has a secret agenda and acts as a backdoor to your computer. This backdoor can be accessed by a hacker to compromise your PC. Trojan horses are not self-replicating and spread due to users installing them manually on their PC.
  5. Privacy-invasive softwareA formal term used to describe software that invades your privacy. This software comes in different forms including spyware and adware.
  6. SpywareSpyware tracks a user’s activity by monitoring browsing habits and keyboard activity and can even take screenshots while you use your PC. This information is sent back to the creator or beneficiary of the spyware. Signs of spyware include: modified browser homepages, slow internet, and suspicious looking sites in place of legitimate sites (for example: banking sites.)
  7. Adware Like spyware, adware is software that may track visited websites and act as a key logger. Adware tracks this information to automatically display downloaded or installed adverts to a user. You may wonder why you are being offered “PC Super Anti Spyware 2011” when using your PC; this is adware at work. AIM, FlashGet, Deamon Tools, and RealPlayer are all examples of adware.
  8. Backdoor - A backdoor is a point of access to a computer that does not require authentication. An unlocked house back door gives access to an otherwise secure home; a computer backdoor allows access to your PC without your knowledge or permission.
  9. Key loggerKey loggers are used to monitor keyboard activity on a PC. These can be software-based (bundled with Trojan horses, adware, and spyware) or hardware-based (between the keyboard cable and the PC, acoustic etc.) Usually this information is retrieved across a local network, the internet, or from the physical device connected to the keyboard.
  10. Firewall A firewall both permits and blocks access to a network or PC. Firewalls are included with popular security software (e.g. AVG Internet Security and ESET Smart Security) and limit communication between your PC and devices that are not authorized to communicate with you.
  11. Windows FirewallComes bundled with Windows XP, Vista, and 7. This is a great solution; however, due to a lack of comprehensive definition updates, Windows Firewall is not completely effective in blocking threats and allowing safe connections.
  12. Antimalware / Antivirus / Antispyware - Software designed to remove or block malware (e.g. AVG Internet Security and ESET Smart Security.)
  13. Real-time ScanningGood antimalware programs scan files in real time; as you download, copy, and install files on to your computer, your antimalware program will scan these files for infections and malicious code. You should only have one real-time scanner installed at any time—otherwise they will conflict as they compete to scan the same files.

Credit : PC security handbook

crack right click disable option or suppression

hi guys,

What’s Going On! Today I am telling you How to crack right click disable option or suppression. One thing more, this article is only for an educational purpose. Ok let’s move to the hack. This crack is so simple and easy to use. Moreover it is so annoying when some website disable the right click suppression. Professional website doesn’t do this thing. Ok , first open that website fully till it loads completely . Now go to the File > save as; then save it on your disk, for an instant we save that file with a name Playtrickz . Now open playtrickz folder . Now go to the playtrickz.html and open it by notepad. Now you will see some codes , Press ctrl + F and search it “ “ . Now there is some code which looks like this

Remove that code . now press ctrl+S . Now reopen that file . now you will see that there is no right click suppression .

Lol..

That’s all . Even you have some more problem , comment it , I am always there to help you .

Bye .

Getting password from Internet Explorer ( WINDOWS)

Today I am going to tell you how to get the saved ( sometimes even unsaved) password from windows.Windows stores user information in all sorts of places. Some of them you know i.e. cookies , temporary internet files , configuration files but there are some other locations where information is stored that can be much more interesting . I’ll show you how to gather information about users and settings they keep.

Please note, I will be describing utilities found inside of windows and from a software developed name Nir sofer. Although the programs created by Nir sofer are free today, they may not be tomorrow. This article discusses details about the “protected storage manager” in Windows . One caveat however : you will need to be logged in as the user you intend to gather this information from. If you do not have access to the user account , you may need to go though the process of getting into Administrator account .( By resetting the password ). Also , on windows XP home computer, the administrator account has an Empty password when booting into safe account and there you can change the user’s password .

Getting password from Internet Explorer.

The protected storage manager is a simply a location in the windows registry. The protected storage is a feature of windows that stores most, if not all , of the user’s information in an empty encrypted location. By default the “protected storage” service in windows XP is required to save any password the user uses in Email , messenger , Internet Explorer . It is on the default in windows XP. In the registry, you can find the protected storage location by running “regedit” and locating the following key and subkey : HKEY_CURRNT_USER\Software\Microsoft\Protected storage system provider .

Often this location in the registry is either hidden or encrypted or both – so you won’t likely find much if you go snooping around. There are utilities to get access to this information on the local computer. Below the screenshot of the PassView .


( you can download passview by Clicking here )

Some other utilities are Protected storage Explorer , cain & abel, and secret Explorer . If you get the username of password of any one website for instant Facebook then you will find user/password pairs for other sites. You were thinking how? Ok , Often people don’t vary user names and password enough to keep you from guessing them. The function of saving usernames and password is ( for the most part) seamless to the user. So what are you waiting for, Go hack the world . let world me also understand your importance .

Same thing I use to say you again and again that if you need any assistance then comment it up . We will always there to help you .

Automatically Turn On Num Lock, Scroll Lock, and Caps Lock

Turn On Num Lock, Scroll Lock, and Caps Lock


When you start your PC, Num Lock, Scroll Lock, and Caps Lock don’t automatically toggle on. You can automatically turn each of them on or off whenever your PC starts, for all accounts on the PC. As a practical matter, most people probably want to have only Num Lock automatically turned on, but this Registry hack allows you to force any combination of keys on or off.

Ok first go to Start > Run > regedit . Now go to the go to HKEY_USERS\.Default\Control Panel\Keyboard. Find the String value InitialKeyboardIndicators. By default, it is set to 0, which means that Num Lock, Scroll Lock, and Caps Lock are all turned off. Set it to any of the following values, depending on the combination of keys you want turned on or off:

0

Turns off Num Lock, Caps Lock, and Scroll Lock

1

Turns on Caps Lock

2

Turns on Num Lock

3

Turns on Caps Lock and Num Lock

4

Turns on Scroll Lock

5

Turns on Caps Lock and Scroll Lock

6

Turns on Num Lock and Scroll Lock

7

Turns on Caps Lock, Num Lock, and Scroll Lock

Exit the Registry. When you restart, the new setting will take effect.

Stop Error Messages from Displaying on Startup

Stop Error Messages from Displaying on Startup


If you constantly see an error message that you can’t get rid for example, from a piece of software that didn’t uninstall properly and continues to give errors on startup you can disable it from displaying on startup. Just go to start > run > regedit and find HKEY_LOCAL MACHINE\SYSTEM\CurrentControlSet\Control\Windows. (This key holds a variety of Windows system settings, such as the location of your system directory.)


Create a new DWORD called NoPopupsOnBoot and give it a value of 1. Exit the Registry and reboot for the setting to take effect. To disable it, either delete the DWORD value or give it a value of 0.

Create One-Click Shutdown and Reboot Shortcuts

Create One-Click Shutdown and Reboot Shortcuts

Turning off or rebooting XP involves a several-step process: click the Start menu, choose Shut Down, and then select Shut Down or Restart. If you want, however, you can exit or reboot much more quickly, by creating a shortcut that enables one-click shutdowns. You can also use the shortcut to customize the shutdown or reboot for example, by displaying a specific message or automatically shutting down any programs that are running.

First, create a shortcut on your desktop by right-clicking the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking it will shut down your PC. ( you can also chose some crazy or funny icons ; just go to the properties > change icon > then select it )

But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:

shutdown -r -t 01 -c "Rebooting your PC ( By paritosh.in ) "


Double-clicking that shortcut will reboot your PC after a one-second delay and display the message “Rebooting your PC.” The shutdown command includes a variety of switches you can use to customize it.

Switch What it does
-s Shutdown the pc
-l Logs off the current user.
-t ns Indicates the duration of delay, in seconds, before performing the action.
-c message text Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.
-f Forces any running applications to shut down.
-r Reboots the PC.

So , you can use this technique as your desire requirement . I am creating some examples for needs .

1) For shutdown shutdown –s –t 01 –c “Bye bye “
2) For restart shutdown –r –t 01 –c “see you “
3) For switching off the current user shutdown –r –t 01 –c “created by www.paritosh.in

Control User Logins by Hacking the Registry

Make better use of the XP login screen


If your system contains more than one user account, or if you’ve set up XP to require logins, you’ll have to log in to XP before you can begin to use it. But you needn’t stay with the default XP login rules; you can use a single Registry key to customize how you log in. For example, you can display custom text before login, and you can remind anyone with an account on the PC to change their password a certain number of days prior to the password’s expiration.

Go to the start > run > regedit ; then find HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion Winlogon subkey, which contains a variety of logon settings (as well as some settings not having to do directly with logons). Following are the most important values you can edit to customize logons.

DontDisplayLastUserName

This setting lets you control how the system logon dialog box is used. If this String value is present and set to 1, all users will have to enter both their username and password to log on. If the value is 0, the name of the last user to log on will be displayed in the system logon dialog box.

DefaultUserName

This String value contains the name of the last user who logged on. It will be displayed only if the DontDisplayLastUserName value is not present or is set to 0.

LegalNoticeCaption

This String value, used in concert with the LegalNoticeText value, displays a dialog box prior to logon that contains any text you want to display. (The text doesn’t have to be a legal notice, but this value is often used for that purpose.) The box has a title and text. The LegalNoticeCaption value will be the dialog box’s title.

LegalNoticeText

This String value, used in concert with LegalNoticeCaption, contains the text that you want to be displayed inside a dialog box displayed prior to logon.

PasswordExpiryWarning

This DWORD value lets you display a warning message to users a certain number of days before their passwords are set to expire. It lets you determine how many days ahead of time the warning should be issued. To edit the value, click the decimal button and enter the number of days.

ShutdownWithoutLogon

This String value enables or disables a button on the XP logon dialog box that lets the system shut down. A value of 1 enables the button (so that it is shown); a value of 0 disables the button (so that it is not shown).

Shell

This String value really doesn’t have to do with logons, but it’s one you should know about. It determines the shellthe user interfacethat will be used by XP. The default is Explorer.exe, but it can be another shell as wellfor example, the Program Manager from older Windows versions. Type in the name of the program; for example, Progman.exe for the Program Manager, or Taskman.exe for the Task Manager.

AutoRestartShell

This DWORD value doesn’t have to do with logons either, but it’s another good one to know. It sets whether to automatically restart the Windows shell if the shell crashes. A value of 1 automatically restarts the shell. A value of 0 tells XP not to restart the shell, forcing you to log off and then back on again to restart it.

Now that your system’s startup and shutdown are under control .

Get the Ip of your past Login

Today i found one tab which allow gmail user to get the past login ip address . Ok , just follow the below steps to knows the past IP .

  1. Login into gmail
  2. click into details tab which will be found at the bottom of yours gmail account where you see all your last login into your gmail.
  3. Thats all . :)

Verifying webmaster tool for wordpress

As a title suggest , This is show you the detail working for verifying webmaster tool for wordpress . Okay when you will login at googlewebmaster you will see the below page . 1st add your site , then follow below steps

  1. copy that meta code
  2. now go to the themes editor .
  3. open header.php and paste that code below that head .
  4. now update that file and then visit it into your website
  5. now right click ( mouse ) > view source
  6. now check that code into the source . It must be there
  7. Now go top the webmaster tool site , and verify your site .

Even through , your site is not verified , then post the comment , i will handle your problem .

Get the statistics of your past google search

Hi guys ,

With Google web history , you will find you past google search history , your search activity graph and many more .

This features can be used when you hacked somebody account and You want to know more about his/ her interest , so just check all his history , bookmark , images etc and figure out what he/she searched more . so higher the percentage of search, higher his/ her interest on that topic .

If you knows other use of this web history please comment it up .

Thanks :)

Download Anyfile from anysite

Hi guys ,

Today i found one cool website , yes File2hd . With File2hd , you will get any most of the files from many sites . With this site you may download embedded music , application etc . This site doesn’t support the Premium (which charged money for downloading) .

Have your own opinion , comment it up

that’s all . :)

Friday, August 13, 2010

Twitter flaw forcing user to follow

Today I noticed one new thing on Twitter status Updater. And you can even exploit this flaw. In this flaw, if one user write in some specific format and tweet it then twitter automatically add that person to your following list.

The twitter status updater almost acts as mobile text messenger.

Okay, see how you can exploit this flaw.

1) Open your twitter Home page.

2) Now write in this format

follow @

example : follow @playtrickz

3) Now copy the above string and paste that string at the end of this link

http://twitter.com/home?status=

4) Now make this link short by notlong.com

5) Now tweet that link and tell your follower that click that link and tweet them ( Retweet them ) . Retweeting make a new user to follow you.

If you need certain tips for tweeting this exploit, I may write but I hope you already know this.