Tuesday, 14 April 2015

How to Create an Administrator account in the school:1. Click start and Open"Run"

2. Type"cmd"in Run
3. Now type following or copy and paste in"CMD (Command Promt)":
"net user /add newuser mypass"and hit enter. (it will say"the command completed successfully")
4. Type:"net localgroup administrators newuser /add"
now you have created an account!!! Enjoy...YOU MUST
Check ur Antivirus is fake or working



1.First of all press WINDOWS KEY +
R to open run command and write
NOTEPAD here to open notepad.
2.Now copy and paste the below
codeinto your notepad.
X5O!P%@AP[4\PZX 54(P^)7CC)7}$EI
CAR-STANDARD-AN TIVIRUS-TEST-FI
LE!$H+H*
3.After that press CTRL + S to save
this file, here save this file as
W2H.vbs on your DESKTOP
4.If your antivirus is real then it can
allow you to save this file on your
desktop i.e. It will detect as virus
and delete it and if your antivirus is
fake then it will allow you to save
this file.
                           How 2 delete viruses from pen drive with out any soft--
it's very cool tricks.i think it will be helpful tricks for everyone.so you want do it,follow this steps.
Steps are here :
1). Connect your pendrive and do not open it by using autorun.
2). Open Run and type cmd and press enter.
3). In the Command Prompt, Type the drive letter of your pendrive(you can check it from my computer) and then press enter.
4). Type dir/w/o/a/p and press Enter.
It will display list of files.
5). Now in that list search for virus files like:
Autorun.inf
New Folder.exe
Bha.vbs
Iexplore.vbs
Info.exe
New_Folder.exe
Ravmon.exe
RVHost.exe
any other files with .exe Extension . *
6). If it contains any of the files above file then type attrib -h -r -s -a *.* and press Enter.
7). Delete each of that file using delete Command
del filename (For exaple: del New_Folder.exe)
that's all.now you can hunting the viruses without any tool.so is it cool?
Increase speed of ur Hard Disk to Speed up ur Computers Performance.

Click Start menu and select run.
Now type (sysedit.exe) in run and
press enter.
System configuration editor will
appear.
Here you can see some multiple
windows but you will select
(system.ini).
This window contains a line
(386enh)
Now after this line type
(irq14=4096)
Now close this window and save it.Any mistake in this step may cause harm..
Reboot your computer now.
You will surely feel better
performance of your computer.
Enjoy.
How to Watch Youtube Videos in VLC Media Player
Now let us Get Started With Steps to Watch Youtube Videos In VLC, Follow the Below Simple Steps.
Step 1: Open VLC media player, Click on File>Open Network Or Simply Use CTRL+N Keys to Open up Network URL Dialog box.
Step 2: Open Youtube, Navigate to Whatever Video you want to Play in VLC, Copy the Url of that video and Paste it in the Dialogue Box. and Click on Play.
Step 3: Enjoy Your Video
10 Facts You Didn't Know About Computer Hacking :-
1. Hacker originally meant “one who makes furniture with an
ax.” 
Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.
2 Computer hacking was born in the late 1950s, when members of MIT’s Tech Model Railroad Club, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe.
3. One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. VoilĂ : computer Ping-Pong!
4. By the early 1970s, hacker “Cap’n Crunch” (a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&T’s long-distance switching system. This gave him access to call routing (and brief access to jail).
5. Before they struck it rich, Apple founders Steve Wozniak and Steve Jobs made and sold “blue boxes,” electronic versions of Draper’s whistle.
6. Using a blue box, Wozniak crank- called the Pope’s residence in Vatican City and pretended to be Henry Kissinger.
7. Hacking went Hollywood in the 1983 movie War Games, about a whiz kid who breaks into a Defense Department computer and, at one point, hijacks a pay phone by hot-wiring it with a soda can pull-ring.
8. That same year, six Milwaukee teens hacked into Los Alamos National Lab, which develops nuclear weapons.
9. In 1988 Robert T. Morris created a worm, or self-replicating program, purported to evaluate Internet security.
10. The worm reproduced too well, however. The multi-million dollar havoc that ensued led to Morris’s felony conviction, one of the first under the Computer Fraud and Abuse Act.

                                   How to Increase RAM Using Pendrive 2015

First of all connect your USB/pendrive into your PC/Laptop’s USB port.
Now in the desktop just right click on the My Computer icon and then click on the Properties.
After this you will have to click on Advanced Tab then click on Performance.
Now click on Advanced and then click on Virtual Memory.
Now select you pendrive/USB icon and then click on Custom size.
After that you have to view the memory available in your Pendrive/USB and note it down and click on OK.
Restart you Laptop/PC and Enjoy the fast speed of your system smile emoticon
First of all download the 3D analyze.
Now install and run the 3D analyze.
Now click on select option as below and then a window opens where you have to select the exe file of the game which you wants to run.
Now you can see names, vendorID and deviceID of different graphics cards. Select any one of them and enter the VendorID and DeviceID in the column at the left side.
Just click on Run button and Enjoy
#2 Method – Using SwiftShader
SwiftShader’s modular architecture is capable of supporting multiple application programming interfaces, such as DirectX® 9.0, and OpenGL® ES 2.0, the same APIs that developers are already using for existing games and applications. SwiftShader can therefore be directly integrated into applications without any changes to source code.It is also similar to 3D analyze.
First of all download the SwiftShader.
* Download Swiftshader 3.0 for x86bits
* Download Swiftshader 3.0 for x64bits
Now extract the zip file of SwiftShader.
Now copy d3d9.dll file from the extracted folder.
Paste the d3d9.dll file to the game’s directory.
Just click on exe file of your game where you placed the d3d9.dll file and Enjoy !!

                                                Tips to Run Android Apps On Pc 2015 :-


#1 Download and Install BlueStacks
BlueStacks App Player is available for Windows and Mac OSs. BlueStacks App Player is a quick, compact install to your system easily. The only choice you make during the install is whether to allow the program to make notifications, as well as the option to opt in to BlueStacks Spotlight, which holds daily app giveaways.
Download BlueStacks for Windows
Download BlueStacks for Mac OSX
#2 Home Screen
After installed, BlueStacks app player will boot up to its Home Screen, where you can access your installed apps, look up apps in the “Top Charts,” search for apps, and access settings. You can use the mouse for basic touch controls here, with clicking and holding to simulate basic tap and swipe controls. From here, we’ll need to do a bit more setup before you can get around to installing apps. You’ll need to set up access to the Google Play store and associate a Google Account with BlueStacks App Player.
#3 Setting up the Google Play Store
After installed, the first thing you will want to do is associate our Google Account so that you can get onto the Google Play Store and download apps. Go to “My Apps” and click on “1-Click Sync Setup,” which will bring up a wizard interface that will guide you through the process. Basically, you’ll need to either create a Google account, or sign in with your existing one.
#4 Installing & Running Apps
BlueStacks won’t let you get to its three built-in app markets directly. You can just use the built in App Search to search for and install apps from Google Play Store, 1Mobile and Amazon. You’ll need to go through the App Search button. Type in the name of the app you’re looking for, and it will search 1Mobile, Amazon, and Google Play Store for matches, and give you the option to install apps from any of the above three stores.
Once you’ve accessed one of the three app stores, you can then navigate that store. Within Google Play, for instance, you can take advantage of the store’s search and other features.
Once you return to the Home Screen, your newly installed app should be ready to run. BlueStacks can run an impressive variety of apps from social networking tools and multimedia apps to games. However, BlueStacks won’t run everything, so expect a little trial and error for compatibility.
#5 Controls & Settings
You should now have everything you need to install and run apps from BlueStacks, so we’ll finish up with some extra notes on in-app controls, as well as settings. Unless you happen to be running a touchscreen rig or a Windows 8 tablet, you’re going to need some way to approximate pinch to zoom, as well as tilt controls.
Pinch to Zoom: Control +, or Control –
Tilt Controls: ‘Z’ or ‘X’ can be used to simulate tilting a device left or right.
BlueStacks supports the use of gamepad controls for many apps, which will be a godsend for users looking to play Android games on a PC. Plug in your controller, and Bluestacks should inform you if a particular app supports a controller.
         HIII GUYS! THIS IS MY FIRST POST ON MY BLOG.HOPE YOU ALL LIKE IT!!



                                                           How to Become a ‪#‎Hacker‬
                                                           -----------------------------------
1. Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH.
2. Learn Linux, Unix, Windows - You can do this using vmware or any virtual desktop utility.
3. Learn a programming language that's compatible with all OS - Perl, Python, C .
4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI
5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games.
6. Code a fuzzer for common protocols - ftp, pop3, 80, 8080 - Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble.
7. Code a tool that uses grep to sort out unique code in source codes.
8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use.
9. Pick a kernel in linux or unix, also pick a Microsoft OS version lets say Winxp pro sp2 put them on the virtual desktops (vmware) and find and code a new local exploit in those versions, then install a Apache webserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse_tcp_shell exploit.
10. Learn Cisco Router and Switch configuration and setup.
11. Learn Checkpoint Setup and Config
12. Learn Wifi scanning, cracking, sniffing.
13. Pick a person in you phonebook for the area code you live in or city then ring the person on a anonymous line like skype or a payphone or a carded sim and attempt to social engineer the person for his name, address, data of birth, city born, country born, ISP connected with, Phone company connected with, What bank he/she uses and anything else you can get. Then Attempt to ring using a spoof caller ID software with the person's phone number - call the ISP and try reset the password to his/her internet connection/ webmail, get access to bank account or ask them to send out a new *** to a new address (drop) with a new pin, reset of phone company passwords.
14. Use your information gathering skills to get all the information off a website like a shop then use the spoof callerID software or hack your phone to show a new number of the Webserver's Tech Support number then ring the shop owner and try get the shop site password.
15. Do the same thing but attempt to use a web attack against a site or shop to gain admin access.
16. Once got access upload a shell and attempt to exploit the server to gain root using a exploit you coded not someone else s exploit.
17. Make your own Linux Distro
18. Use your own Linux Distro or use a vanilla Linux gnome (not kde) keep it with not much graphics so you can learn how to depend on the terminal and start from scratch install applications that you will only need for a blackbox (Security test box), make folders for fuzzers, exploits, scanners..etc Then load them up with your own scripts and other tools ( By this stage you shouldn't need to depend on other peoples scripts).
19. Learn macosx and attempt to gain access to a Macosx box whether it be your own or someones else
20. Create a secure home network and secure your own systems with your own Security policies and firewall settings.
All this isn't a over night learning it will take a nice 3 - 4 years to learn a bit of this 5+ years to learn most of it and even then you may need time to keep learn as IT keeps changing everyday