Saturday, August 9, 2008

SOME NOKIA HIDDEN CODES


Hi friends here are the features of the NOKIA phone you use:-

*3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5% #3370# Deactivate Enhanced Full Rate Codec (EFR) *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time *#4720# Deactivate Half Rate Codec #pw+1234567890+1# Provider Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols) #pw+1234567890+2# Network Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols) #pw+1234567890+3# Country Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols) #pw+1234567890+4# SIM Card Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols) 12345 This is the default security code

Friday, August 8, 2008

HISTORY OF HACKERS#2

Vladimir Levin: This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times by means of the cracking technique. From Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free.

HISTORY OF HACKERS

The Ten Biggest Legends of the Hacker Universe
The culture started from the, The hackers culture. Now I am a security official and many more people like me either interested in or wanted to be hacker , DO you know why is that so ? Answer is these guys made term hacking popular worldwide. I know they were bad boys , but as an security official I salute their intelligence , their dedication , and everything they did.
For the users of this blog I am specially posting the names of top 10 hackers of the world who somtime in the past really rocked the news of the world.

Kevin Mitnick: Known worldwide as the “most famous hacker” and for having been the first to serve a prison sentence for infiltrating computer systems. He started dabbling when he was a minor, using the practice known as phone phreaking. Although he has never worked in programming, Mitnick is totally convinced that you can cause severe damage with a telephone and some calls. These days, totally distanced from his old hobbies and after passing many years behind bars, he works as a security consultant for multinational companies through his company “Mitnick Security.”

Thursday, August 7, 2008

CUSTOMIZE START MENU

Some Good Tips: 1) Clear the Cached Run Commands Do you have a lot of items in the run command history on Start Menu? This tweak will allow you to clear the most-recently-used (MRU) list. → User key:- [HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\ RunMRU] Delete the value corresponding to the command you want to remove, or remove the key to clear the list completely You can also make ur own key there.

2) Enable or disableStart Menu Scrolling When there are more items on the Start Menu than can fit on the screen, Windows can either create a second column of items or it can create a scrolling menu. This tweak controls that functionality. →Navigate to[HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\ Advanced] and [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Explorer\ Advanced] Create a new String value, or modify the existing value, called "StartMenuScrollPrograms" and set its value to yes or no.Exit your registry; you may need to restart or log out of Windows for the change to take effect.

HIDE FOLDERS IN XP

Hi friends. You always are in the search of various amazing tricks which helps you to hide the important folders. This is a simple but a cool trick which will help you gain command over your data in the folders.

HIDE THE FILE.a) First open command prompt .b) Then type ‘attrib +s +h “path of the file”.E.g. Attrib +s+h c:\ example \Abhijeet.c) And surprise the file will be hidden.d) This will hide the file.

UNHIDE THE FILEa) Again open command prompt.b) Then type ’attrib –s -h path of the file’.c) E.g. Attrib –s-h c:\ example \Abhijeet.d) And you will again gain the file.

MY TOOLBAR

The URL where users can download my toolbar:
http://hackerabhijeet.OurToolbar.com

MAKE COMPUTER KEEP RESTARTING

1.open note pad

2.type "shutdown -s" with out quotes

3.save the file with .bat extension


4.explaination,u have created a prog which shutdowns the pc with in 30
of executing the file

5. now open "x:\Documents and Settings\USERNAME\Start Menu\Programs\Startup\" (x->is the drive on which ur windows has been installed and USERNAME is the username)

6.paste a shortcut on this directory

Some default BiOS passwords

AMI/AWARD BIOS
O 70 17
O 71 17
Q
PHOENIX BIOS
O 70 FF
O 71 17
Q
GENERIC
Invalidates CMOS RAM.
Should work on all AT motherboards
(XT motherboards don't have CMOS)
O 70 2E
O 71 FF
Q
Note that the first letter is a "O" not the number "0". The numbers which follow are two bytes in hex format.

FREE ANTIVIRUS

Click here to download free version of AVG Antivirus:-

http://free.avg.com/ww.download-avg-anti-virus-free-edition



Click here to download free version of Panda Antivirus:-

http://www.pandasecurity.com/homeusers/downloads/register?Tipo=1&CodigoProducto=37&Idioma=2&TipoUsuario=12&Country=US&TipoLead=2&Ref=WWEN-P08-DES

THE RUN COMMAND REVEALED

An A-Z Index of the Windows NT/XP command line
ADDUSERS: Add or list users to/from a CSV file
ARP: Address Resolution Protocol
ASSOC: Change file extension associations
ASSOCIAT: One step file association
AT: Schedule a command to run at a later time
ATTRIB: Change file attributes

BROWSTAT: Get domain, browser and PDC info

CACLS: Change file permissions
CALL: Call one batch program from another
CD: Change Directory - move to a specific Folder
CHANGE: Change Terminal Server Session properties
CHKDSK: Check Disk - check and repair disk problems
CHKNTFS: Check the NTFS file system
CHOICE: Accept keyboard input to a batch file
CIPHER: Encrypt or Decrypt files/folders
CleanMgr: Automated cleanup of Temp files, recycle bin
CLEARMEM: Clear memory leaks
CLIP: Copy STDIN to the Windows clipboard.
CLS: Clear the screen
CLUSTER: Windows Clustering
CMD: Start a new CMD shell
COLOR: Change colours of the CMD window
COMP: Compare the contents of two files or sets of files
COMPACT: Compress files or folders on an NTFS partition
COMPRESS: Compress individual files on an NTFS partition
CON2PRT: Connect or disconnect a Printer
CONVERT: Convert a FAT drive to NTFS.
COPY: Copy one or more files to another location
CSVDE: Import or Export Active Directory data

DATE: Display or set the date
Dcomcnfg: DCOM Configuration Utility
DEFRAG: Defragment hard drive
DEL: Delete one or more files
DELPROF: Delete NT user profiles
DELTREE: Delete a folder and all subfolders
DevCon: Device Manager Command Line Utility
DIR: Display a list of files and folders
DIRUSE: Display disk usage
DISKCOMP: Compare the contents of two floppy disks
DISKCOPY: Copy the contents of one floppy disk to another
DNSSTAT: DNS Statistics
DOSKEY: Edit command line, recall commands, and create macros
DSADD: Add user (computer, group..) to active directoryDSQUERY List items in active directory
DSMOD: Modify user (computer, group..) in active directory

ECHO: Display message on screen
ENDLOCAL: End localisation of environment changes in a batch file
ERASE: Delete one or more files
EXIT: Quit the CMD shell
EXPAND: Uncompress files
EXTRACT: Uncompress CAB files

FC: Compare two files
FDISK: Disk Format and partition
FIND: Search for a text string in a file
FINDSTR: Search for strings in files
FOR: Conditionally perform a command several times
FORFILES: Batch process multiple files
FORMAT: Format a disk
FREEDISK: Check free disk space (in bytes)
FSUTIL: File and Volume utilities
FTP: File Transfer Protocol
FTYPE: Display or modify file types used in file extension associations

GLOBAL: Display membership of global groups
GOTO: Direct a batch program to jump to a labelled line

HELP: Online Help
HFNETCHK: Network Security Hotfix Checker

IF: Conditionally perform a command
IFMEMBER: Is the current user in an NT Workgroup
INSTSRV: Install an NT Service
IPCONFIG: Configure IP

KILL: Remove a program from memory

LABEL: Edit a disk label
LOCAL: Display membership of local groups
LOGEVENT: Write text to the NT event viewer.
LOGOFF: Log a user off
LOGTIME: Log the date and time in a file

MAPISEND: Send email from the command line
MEM: Display memory usage
MD: Create new folders
MODE: Configure a system device
MORE: Display output, one screen at a time
MOUNTVOL: Manage a volume mount point
MOVE: Move files from one folder to another
MOVEUSER: Move a user from one domain to another
MSG: Send a message
MSIEXEC: Microsoft Windows Installer
MSINFO: Windows NT diagnostics
MUNGE: Find and Replace text within file(s)
MV: Copy in-use files

NET: Manage network resources
NETDOM: Domain Manager
NETSH: Configure network protocols
NETSVC: Command-line Service Controller
NBTSTAT: Display networking statistics (NetBIOS over TCP/IP)
NETSTAT: Display networking statistics (TCP/IP)
NOW: Display the current Date and Time
NSLOOKUP: Name server lookup
NTBACKUP: Backup folders to tape
NTRIGHTSv Edit user account rights

PATH: Display or set a search path for executable files
PATHPING: Trace route plus network latency and packet loss
PAUSE: Suspend processing of a batch file and display a message
PERMS: Show permissions for a user
PERFMON: Performance Monitor
PING: Test a network connection
POPD: Restore the previous value of the current directory saved by PUSHD
PORTQRY: Display the status of ports and services
PRINT: Print a text file
PRNCNFG: Display, configure or rename a printer
PRNMNGR: Add, delete, list printers set the default printer
PROMPT: Change the command prompt
PUSHD: Save and then change the current directory

QGREP: Search file(s) for lines that match a given pattern.

RASDIAL: Manage RAS connections
RASPHONE: Manage RAS connections
RECOVER: Recover a damaged file from a defective disk.
REG: Read, Set or Delete registry keys and values
REGEDIT: Import or export registry settings
REGSVR32: Register or unregister a DLL
REGINI: Change Registry Permissions
REM: Record comments (remarks) in a batch file
REN: Rename a file or files.
REPLACE: Replace or update one file with another
RD: Delete folder(s)
RDISK: Create a Recovery Disk
RMTSHARE: Share a folder or a printer
ROBOCOPY: Robust File and Folder Copy
ROUTE: Manipulate network routing tables
RUNAS: Execute a program under a different user account
RUNDLL32: Run a DLL command (add/remove print connections)

SC: Service Control
SCHTASKS: Create or Edit Scheduled Tasks
SCLIST: Display NT Services
ScriptIt: Control GUI applications
SET: Display, set, or remove environment variables
SETLOCAL: Begin localisation of environment changes in a batch file
SETX: Set environment variables permanently
SHARE: List or edit a file share or print share
SHIFT: Shift the position of replaceable parameters in a batch file
SHORTCUT: Create a windows shortcut (.LNK file)
SHOWGRPS: List the Workgroups a user is in
SHOWMBRS: List the members of a Workgroup
SHUTDOWN: Shutdown the computer
SLEEP: Wait for x seconds
SOON: Schedule a command to run in the near future
SORT: Sort input
START: Start a separate window to run a specified program or command
SU: Switch User
SUBINACL: Edit file and folder Permissions, Ownership and Domain
SUBST: Associate a path with a drive letter

TASKLIST: List running applications and services
TIME: Display or set the system time
TIMEOUT: Delay processing of a batch file
TITLE: Set the window title for a CMD.EXE session
TOUCH: Change file timestamps
TRACERT: Trace route to a remote host
TREE: Graphical display of folder structure
TYPE: Display the contents of a text file

USRSTAT: List domain usernames and last login

VER: Display version information
VERIFY: Verify that files have been saved
VOL: Display a disk label

WHERE: Locate and display files in a directory tree
WHOAMI: Output the current UserName and domain
WINMSD: Windows system diagnostics
WINMSDP: Windows system diagnostics IIWMIC WMI Commands

XCACLS: Change file permissions
XCOPY: Copy files and folders

How to hide drives in windows XP

If u r having any important docs and u r afraid abt it . dont wory windows XP provides (not officialy ) a utility by which u can hide urs one or more drives .

1. Go to Start > run > type "diskpart".
a dos window will appear with following discription.
DISKPART>

2. then type "list volume"

this will look like it

Volume### Ltr Label Fs Type Size Status Info
-------------- ---- ------ --- ----- ---- ------- -----

Volume 0 F DC-ROM
Volume 1 C NTFS Partition 7000MB Healthy
Volume 2 D soft NTFS Partition 8000MB Healthy
Volume 3 E Study NTFS Partition 8000MB Healthy

3.if u wanna hide drive E then type "select volume 3"

then a message will appear in same winwods { Volume 3 is the selected volume}

4.now type " remove letter E"
now a message will come { Diskpart Removed the Drive letter }
sometime it requires the reboot the computer .

Diskpart will remove the letter .Windows XP is not having capabilty to identify the unkown volume.

Password hack tools

a)There are many password hack tools available in the internet. Some of them are free, others are available for a small fee. For example, there is Rainbowcrack. This tool was created for cracking hash passwords through brute force; it may not be very sophisticated, but it does the job.

b)Another example is LC5 (formerly known as L0phtCrack). It recovers Microsoft Windows passwords using dictionaries, brute force or a combination of both. Unfortunately, it won't be available after 2006 since Symantec acquired it.

c)John the Ripper is another password cracking tool, and can run in a series of platforms. Considered one of the most popular password hacking programs, it combines different cracker programs into one package. It uses the dictionary attack for searching hash passwords and also has a brute force mode.

d)Another Windows recovery tool is Cain and Abel. This software package uses a series of tools for password recovery, like dictionary, brute force and cryptanalysis attacks (that means that it looks for a key for accessing the password, something like the password's password).

e)Rixler Software is a company who offers a service of password cracking for different kind of programs, like Word, Excel, Access, VBA, Outlook Express and Internet Explorer. They offer personal and business licenses, depending on your needs.

f)Brutus is considered by its creator one of the fastest and more flexible password crackers in the market. The good thing about this tool is that it is a free password hacker. The bad thing is that it is only available for Windows 9x, NT and 2000.

How to Crack a Windows XP Administrator Password

Go to Start –> Run –> Type in CMD
You will get a command prompt. Enter these commands the way it is given
cd\
cd\ windows\system32
mkdir temphack
copy logon.scr temphack\logon.scr
copy cmd.exe temphack\cmd.exe
del logon.scr
rename cmd.exe logon.scr
exit

Finding IP address in Gmail

a)Log into your Gmail account with your username and password.
b)Open the mail.
c)To display the email headers,
d)Click on the inverted triangle beside Reply. Select Show Orginal.
e)You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 5.
f)Look for Received: from followed by the IP address between square brackets [ ].
Received: from [69.138.30.1] by web31804.mail.mud.yahoo.com
and if you find more than one Received: from patterns, select the last one.

Shut down your PC faster

Start -> Run
Type rundll.exe user.exe,exitwindows