Saturday, August 9, 2008
SOME NOKIA HIDDEN CODES
Hi friends here are the features of the NOKIA phone you use:-
*3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5% #3370# Deactivate Enhanced Full Rate Codec (EFR) *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time *#4720# Deactivate Half Rate Codec #pw+1234567890+1# Provider Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols) #pw+1234567890+2# Network Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols) #pw+1234567890+3# Country Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols) #pw+1234567890+4# SIM Card Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols) 12345 This is the default security code
Friday, August 8, 2008
HISTORY OF HACKERS#2
HISTORY OF HACKERS
The Ten Biggest Legends of the Hacker Universe
The culture started from the, The hackers culture. Now I am a security official and many more people like me either interested in or wanted to be hacker , DO you know why is that so ? Answer is these guys made term hacking popular worldwide. I know they were bad boys , but as an security official I salute their intelligence , their dedication , and everything they did.
For the users of this blog I am specially posting the names of top 10 hackers of the world who somtime in the past really rocked the news of the world.
Kevin Mitnick: Known worldwide as the “most famous hacker” and for having been the first to serve a prison sentence for infiltrating computer systems. He started dabbling when he was a minor, using the practice known as phone phreaking. Although he has never worked in programming, Mitnick is totally convinced that you can cause severe damage with a telephone and some calls. These days, totally distanced from his old hobbies and after passing many years behind bars, he works as a security consultant for multinational companies through his company “Mitnick Security.”
Thursday, August 7, 2008
CUSTOMIZE START MENU
2) Enable or disableStart Menu Scrolling When there are more items on the Start Menu than can fit on the screen, Windows can either create a second column of items or it can create a scrolling menu. This tweak controls that functionality. →Navigate to[HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\ Advanced] and [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Explorer\ Advanced] Create a new String value, or modify the existing value, called "StartMenuScrollPrograms" and set its value to yes or no.Exit your registry; you may need to restart or log out of Windows for the change to take effect.
HIDE FOLDERS IN XP
Hi friends. You always are in the search of various amazing tricks which helps you to hide the important folders. This is a simple but a cool trick which will help you gain command over your data in the folders.
HIDE THE FILE.a) First open command prompt .b) Then type ‘attrib +s +h “path of the file”.E.g. Attrib +s+h c:\ example \Abhijeet.c) And surprise the file will be hidden.d) This will hide the file.
UNHIDE THE FILEa) Again open command prompt.b) Then type ’attrib –s -h path of the file’.c) E.g. Attrib –s-h c:\ example \Abhijeet.d) And you will again gain the file.
MAKE COMPUTER KEEP RESTARTING
2.type "shutdown -s" with out quotes
3.save the file with .bat extension
4.explaination,u have created a prog which shutdowns the pc with in 30
of executing the file
5. now open "x:\Documents and Settings\USERNAME\Start Menu\Programs\Startup\" (x->is the drive on which ur windows has been installed and USERNAME is the username)
6.paste a shortcut on this directory
Some default BiOS passwords
O 70 17
O 71 17
Q
PHOENIX BIOS
O 70 FF
O 71 17
Q
GENERIC
Invalidates CMOS RAM.
Should work on all AT motherboards
(XT motherboards don't have CMOS)
O 70 2E
O 71 FF
Q
Note that the first letter is a "O" not the number "0". The numbers which follow are two bytes in hex format.
FREE ANTIVIRUS
http://free.avg.com/ww.download-avg-anti-virus-free-edition
Click here to download free version of Panda Antivirus:-
http://www.pandasecurity.com/homeusers/downloads/register?Tipo=1&CodigoProducto=37&Idioma=2&TipoUsuario=12&Country=US&TipoLead=2&Ref=WWEN-P08-DES
THE RUN COMMAND REVEALED
ADDUSERS: Add or list users to/from a CSV file
ARP: Address Resolution Protocol
ASSOC: Change file extension associations
ASSOCIAT: One step file association
AT: Schedule a command to run at a later time
ATTRIB: Change file attributes
BROWSTAT: Get domain, browser and PDC info
CACLS: Change file permissions
CALL: Call one batch program from another
CD: Change Directory - move to a specific Folder
CHANGE: Change Terminal Server Session properties
CHKDSK: Check Disk - check and repair disk problems
CHKNTFS: Check the NTFS file system
CHOICE: Accept keyboard input to a batch file
CIPHER: Encrypt or Decrypt files/folders
CleanMgr: Automated cleanup of Temp files, recycle bin
CLEARMEM: Clear memory leaks
CLIP: Copy STDIN to the Windows clipboard.
CLS: Clear the screen
CLUSTER: Windows Clustering
CMD: Start a new CMD shell
COLOR: Change colours of the CMD window
COMP: Compare the contents of two files or sets of files
COMPACT: Compress files or folders on an NTFS partition
COMPRESS: Compress individual files on an NTFS partition
CON2PRT: Connect or disconnect a Printer
CONVERT: Convert a FAT drive to NTFS.
COPY: Copy one or more files to another location
CSVDE: Import or Export Active Directory data
DATE: Display or set the date
Dcomcnfg: DCOM Configuration Utility
DEFRAG: Defragment hard drive
DEL: Delete one or more files
DELPROF: Delete NT user profiles
DELTREE: Delete a folder and all subfolders
DevCon: Device Manager Command Line Utility
DIR: Display a list of files and folders
DIRUSE: Display disk usage
DISKCOMP: Compare the contents of two floppy disks
DISKCOPY: Copy the contents of one floppy disk to another
DNSSTAT: DNS Statistics
DOSKEY: Edit command line, recall commands, and create macros
DSADD: Add user (computer, group..) to active directoryDSQUERY List items in active directory
DSMOD: Modify user (computer, group..) in active directory
ECHO: Display message on screen
ENDLOCAL: End localisation of environment changes in a batch file
ERASE: Delete one or more files
EXIT: Quit the CMD shell
EXPAND: Uncompress files
EXTRACT: Uncompress CAB files
FC: Compare two files
FDISK: Disk Format and partition
FIND: Search for a text string in a file
FINDSTR: Search for strings in files
FOR: Conditionally perform a command several times
FORFILES: Batch process multiple files
FORMAT: Format a disk
FREEDISK: Check free disk space (in bytes)
FSUTIL: File and Volume utilities
FTP: File Transfer Protocol
FTYPE: Display or modify file types used in file extension associations
GLOBAL: Display membership of global groups
GOTO: Direct a batch program to jump to a labelled line
HELP: Online Help
HFNETCHK: Network Security Hotfix Checker
IF: Conditionally perform a command
IFMEMBER: Is the current user in an NT Workgroup
INSTSRV: Install an NT Service
IPCONFIG: Configure IP
KILL: Remove a program from memory
LABEL: Edit a disk label
LOCAL: Display membership of local groups
LOGEVENT: Write text to the NT event viewer.
LOGOFF: Log a user off
LOGTIME: Log the date and time in a file
MAPISEND: Send email from the command line
MEM: Display memory usage
MD: Create new folders
MODE: Configure a system device
MORE: Display output, one screen at a time
MOUNTVOL: Manage a volume mount point
MOVE: Move files from one folder to another
MOVEUSER: Move a user from one domain to another
MSG: Send a message
MSIEXEC: Microsoft Windows Installer
MSINFO: Windows NT diagnostics
MUNGE: Find and Replace text within file(s)
MV: Copy in-use files
NET: Manage network resources
NETDOM: Domain Manager
NETSH: Configure network protocols
NETSVC: Command-line Service Controller
NBTSTAT: Display networking statistics (NetBIOS over TCP/IP)
NETSTAT: Display networking statistics (TCP/IP)
NOW: Display the current Date and Time
NSLOOKUP: Name server lookup
NTBACKUP: Backup folders to tape
NTRIGHTSv Edit user account rights
PATH: Display or set a search path for executable files
PATHPING: Trace route plus network latency and packet loss
PAUSE: Suspend processing of a batch file and display a message
PERMS: Show permissions for a user
PERFMON: Performance Monitor
PING: Test a network connection
POPD: Restore the previous value of the current directory saved by PUSHD
PORTQRY: Display the status of ports and services
PRINT: Print a text file
PRNCNFG: Display, configure or rename a printer
PRNMNGR: Add, delete, list printers set the default printer
PROMPT: Change the command prompt
PUSHD: Save and then change the current directory
QGREP: Search file(s) for lines that match a given pattern.
RASDIAL: Manage RAS connections
RASPHONE: Manage RAS connections
RECOVER: Recover a damaged file from a defective disk.
REG: Read, Set or Delete registry keys and values
REGEDIT: Import or export registry settings
REGSVR32: Register or unregister a DLL
REGINI: Change Registry Permissions
REM: Record comments (remarks) in a batch file
REN: Rename a file or files.
REPLACE: Replace or update one file with another
RD: Delete folder(s)
RDISK: Create a Recovery Disk
RMTSHARE: Share a folder or a printer
ROBOCOPY: Robust File and Folder Copy
ROUTE: Manipulate network routing tables
RUNAS: Execute a program under a different user account
RUNDLL32: Run a DLL command (add/remove print connections)
SC: Service Control
SCHTASKS: Create or Edit Scheduled Tasks
SCLIST: Display NT Services
ScriptIt: Control GUI applications
SET: Display, set, or remove environment variables
SETLOCAL: Begin localisation of environment changes in a batch file
SETX: Set environment variables permanently
SHARE: List or edit a file share or print share
SHIFT: Shift the position of replaceable parameters in a batch file
SHORTCUT: Create a windows shortcut (.LNK file)
SHOWGRPS: List the Workgroups a user is in
SHOWMBRS: List the members of a Workgroup
SHUTDOWN: Shutdown the computer
SLEEP: Wait for x seconds
SOON: Schedule a command to run in the near future
SORT: Sort input
START: Start a separate window to run a specified program or command
SU: Switch User
SUBINACL: Edit file and folder Permissions, Ownership and Domain
SUBST: Associate a path with a drive letter
TASKLIST: List running applications and services
TIME: Display or set the system time
TIMEOUT: Delay processing of a batch file
TITLE: Set the window title for a CMD.EXE session
TOUCH: Change file timestamps
TRACERT: Trace route to a remote host
TREE: Graphical display of folder structure
TYPE: Display the contents of a text file
USRSTAT: List domain usernames and last login
VER: Display version information
VERIFY: Verify that files have been saved
VOL: Display a disk label
WHERE: Locate and display files in a directory tree
WHOAMI: Output the current UserName and domain
WINMSD: Windows system diagnostics
WINMSDP: Windows system diagnostics IIWMIC WMI Commands
XCACLS: Change file permissions
XCOPY: Copy files and folders
How to hide drives in windows XP
1. Go to Start > run > type "diskpart".
a dos window will appear with following discription.
DISKPART>
2. then type "list volume"
this will look like it
Volume### Ltr Label Fs Type Size Status Info
-------------- ---- ------ --- ----- ---- ------- -----
Volume 0 F DC-ROM
Volume 1 C NTFS Partition 7000MB Healthy
Volume 2 D soft NTFS Partition 8000MB Healthy
Volume 3 E Study NTFS Partition 8000MB Healthy
3.if u wanna hide drive E then type "select volume 3"
then a message will appear in same winwods { Volume 3 is the selected volume}
4.now type " remove letter E"
now a message will come { Diskpart Removed the Drive letter }
sometime it requires the reboot the computer .
Diskpart will remove the letter .Windows XP is not having capabilty to identify the unkown volume.
Password hack tools
b)Another example is LC5 (formerly known as L0phtCrack). It recovers Microsoft Windows passwords using dictionaries, brute force or a combination of both. Unfortunately, it won't be available after 2006 since Symantec acquired it.
c)John the Ripper is another password cracking tool, and can run in a series of platforms. Considered one of the most popular password hacking programs, it combines different cracker programs into one package. It uses the dictionary attack for searching hash passwords and also has a brute force mode.
d)Another Windows recovery tool is Cain and Abel. This software package uses a series of tools for password recovery, like dictionary, brute force and cryptanalysis attacks (that means that it looks for a key for accessing the password, something like the password's password).
e)Rixler Software is a company who offers a service of password cracking for different kind of programs, like Word, Excel, Access, VBA, Outlook Express and Internet Explorer. They offer personal and business licenses, depending on your needs.
f)Brutus is considered by its creator one of the fastest and more flexible password crackers in the market. The good thing about this tool is that it is a free password hacker. The bad thing is that it is only available for Windows 9x, NT and 2000.
How to Crack a Windows XP Administrator Password
You will get a command prompt. Enter these commands the way it is given
cd\
cd\ windows\system32
mkdir temphack
copy logon.scr temphack\logon.scr
copy cmd.exe temphack\cmd.exe
del logon.scr
rename cmd.exe logon.scr
exit
Finding IP address in Gmail
b)Open the mail.
c)To display the email headers,
d)Click on the inverted triangle beside Reply. Select Show Orginal.
e)You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 5.
f)Look for Received: from followed by the IP address between square brackets [ ].
Received: from [69.138.30.1] by web31804.mail.mud.yahoo.com
and if you find more than one Received: from patterns, select the last one.