Hacking Tips & Tricks | Ever Eager | Amin Jariwala

Friday 8 April 2011

Cracking Wireless Networks: How to Crack WEP or WPA Secured Networks


http://www.youtube.com/watch?v=Ep3CRtzAM_E&feature=player_embedded 

The video shows to how crack WEP- or WPA-secured networks. It also shows how to prevent people from cracking your wireless network(s)

What do Ethical Hackers do?

  • "If you know the enemy and know yourself, you need not fear the result of a hundred battles." - Sun Tzu, Art of War
  • Ethical hackers tries to answer:

    • What can the intruder see on the target system? (Reconnaissance and Scanning phase of hacking)

    • What can an intruder do with that information? (Gaining Access and Maintaining Access phases)

    • Does anyone at the target notice the intruders attempts or success? (Reconnaissance and Covering Tracks phases)

  • If hired by any organization, an ethical hacker asks the organization what it is trying to protect, against whom and what resources it is willing to expend in order to gain protection.

Automatic Password Cracking Algorithm

  • Find a valid user
  • Find encryption algorithm used
  • Obtain encrypted passwords
  • Create list of possible passwords
  • Encrypt each word
  • See if there is a match for each user ID
  • Repeat steps 1 through 6
However, the vulnerability does not arise from the hashing process but from the storage. Most systems do not "decrypt" the stored password during authentication, but store the one-way hash. During the login process, the password entered is run through the algorithm generating a one-way hash and compared to the hash stored on the system. If they are the same, it is assumed the proper password was supplied. Therefore all that an attacker has to do in order to crack a password is to get a copy of the one-way hash stored on the server, and then use the algorithm to generate his own hash until he gets a match. Most systems - Microsoft, UNIX, and Netware have publicly announced their hashing algorithm.
Attackers can use a combination of attack methods to reduce the time involved in cracking a password. This is where automated password crackers come into action. There are freeware password crackers available on the Internet for NT, Netware, and UNIX. Not to be forgotten that there are password lists that can be fed to these crackers to carry out a dictionary attack.

What is Rainbow Crack and How to do it: The Time-Memory Tradeoff Hash Cracker : How to Crack Windows passwords


Before going ahead with the discussion let us first explain to you why it is so difficult to crack windows passwords.

Windows uses NTLM, LM or MD5 algorithm to encrypt the plain text passwords and saves it in system32/config folder. The encrypted passes that are saved in the SAM file under system32/config are called hashes. Now dont just browse the SAM file and attempt opening it. It's useless doing this under windows. Even if you get to open this file using another OS eg. a live linux distro, you need the keyhive, coz the SAM file is further encrypted with it's key in the 'system' under the same dir as SAM.

The algorithms NTLM, LM or MD5 are not proprietary. So the first thing you might think is, WOW!! then just get the hashes apply the reverse algorithm on them and recover the password. But it's not so easy smart ass. Read further.

Common features of NTLM, LM and MD5 algo:
  1. The hashes once formed it is computationally infeasible to recover the original string from the cipher. In layman's lang, the algorithm is irreversible.
  2. No two strings can ever have the same hashes.
  3. A minor change in the string causes a considerable change in the hash. This is known as avalanche effect.
So when you login to your box and enter the password, the password you entered gets encrypted in one of the forms above and then the so formed hashes are compared to the saved hashes and if they match you are allowed into the system. So from this you can know that even your computer is not aware of your real password.

The passes of your email accounts are also stored in the similar fashion. That's the reason when you say you forgot your password, the website resets your password and cant show you your original password coz even they dont know it. Click the link below to read the rest of the post.

So the only way to crack the hashes is using brute-force. This is where rainbow tables come into the scene. Rainbow tables sound fancy but are very simple to understand. Rainbow tables are a collection of strings and their relative pre-compiled hashes. Each of the hash in the rainbow table is checked with the original hash and one which matches has it's corresponding string as the password. Sounds complicated?? Don't worry script kiddies. Hacktivism has already binded all that you need to crack these hashes.

One of the most widely used tools for hash cracking is Rainbow Crack. You can download it from http://project-rainbowcrack.com or if you are using backtrack, it is already installed.

Well rainbow crack takes hashes as inputs. So first you have to extract those hashes from the SAM file. Now we assume that you are using BackTrack 4. If you are not, download it and then come back.

In backtrack to make things easy, go to the media where windows is installed, browse to the WINDOWS/System32/config folder and then copy the SAM and system file and place it on the desktop.

Open the terminal and type the following command:

samdump2 SAM system

This will give the following output
 
Now copy the part which shows all the accounts and their respective hashes and save them in a file, say, hashes.txt

Now you can either use rainbowcrack, john the ripper or ophcrack.

To use rainbowcrack you need the appropriate raindow tables. These rainbow tables are very huge, sometimes ranging in GBs. So they are bulky to download. Alternately, you can make your own Rainbow Tables using RTGen (more on this in the next post) but you can consider downloading some light-weight RT until then.

Download RT from

To start cracking place the downloaded RT in /pentest/passwords/rcrack

Syntax for cracking hashes using rcrack. Go to the BackTrack Menu>Privilege Escalation>Password Attacks>Offline Attacks>Rainbow Crack

Now type

./rcrack rainbow-table-name -f hashes.txt

It may take a long time before finding the correct hash and the corresponding pass. So take a nap and come back...

If you want an easier but less effective way of cracking windows passes refer this post

This post may not be up to the mark, but this is how things are. The methodology can get better. You have to figure out ways to allay the steps. If you want to be a hacker, there is no spoon feeding. So research is the only way to successful hacking.

Happy Hacking!!!

Top 10 Password Crackers: Download Free Password Hacking Tools

1. Cain and Abel : The top password recovery tool for Windows
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols



2. John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes

 

3. THC Hydra : A Fast network authentication cracker which support many different services
When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more


4. Aircrack : The fastest available WEP/WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files)


5. L0phtcrack : Windows password auditing and recovery application
L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, but you can still find the LC5 installer floating around. The free trial only lasts 15 days, and Symantec won't sell you a key, so you'll either have to cease using it or find a key generator. Since it is no longer maintained, you are probably better off trying Cain and Abel, John the Ripper, or Ophcrack instead.




6. Airsnort : 802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. You may also be interested in the similar Aircrack.

 

7. SolarWinds : A plethora of network discovery/monitoring/attack tools
SolarWinds has created and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force cracker, router password decryption, a TCP connection reset program, one of the fastest and easiest router config download/upload applications available and more.


8. Pwdump : A window password recovery tool

Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file.


9. RainbowCrack : An Innovative Password Hash Cracker
The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.


10 Brutus : A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more. No source code is available. UNIX users should take a look at THC Hydra.

Shutdown another PC from your PC

Woow, so you have to shutdown you friends PC from your network so here it is...

You must have to perform following steps..

1) Go to RUN -> cmd

2) in cmd prompt type "shutdown -i" (hit ENTER)

3) you see one window in which you have to add IP address of your friend.

4) you are also able to perform shutdown or restart or log off option from which you have to perform..

5) Press OK..

So, your target is successfully accomplish..
Enjoy..

Hacking ebooks

Well i just figured out a easy way to read books on the net..and that too on google...
here read this on hacking..
Directly from your browser......

hacking
Read that book.,.
and also u cud find more of them on that too......
The best book i ever read oh hacking was this one......
An Unofficial Guide to Ethical Hacking .. by Ankit fadia




Here are other books from ankit fadia...
U might not be able to read it full but it sure shows a lot of content


Network Security

Hacking Mobile Phones

Watch and download free movies

I wanted to see a few of the movies whose Cd's weren't available in the market...
And i am having mu Unlimited connection next month so i thought to see a few movies online.........
and i assure you a great deal of sites are offering free movies to watch for free or download........
here is list of few..........
These include a list for english and a list of hindi movie follows it........


Watch-Movies-Net

Great site actually i saw few of IRON MAN on it.....its great....

link.net
Great site actualy i saw Indiana Jones....... It was great... U cud also downlaod the movies......for free......

SkyfoxTV
Good site.. loads of new stuff.. and easy to use......

Campusist

This is te most wasesome site.. i got to find a lot of great movies..
It gives links to a lot of ways to see a movie, watch it live or download it...
must see

Videoblog
Great site.. good placing of information.. new movies available...

FreeMoviesCinema
Good site but i couldn't find too recent flicks... good for oldies......

MoviesFoundOnline

Much of the same as freemoviescinema...
It too is gr8 for free movies..

Here are a few of indian movies sites..


Muft.tv
Did best in all the sites for indian movies...i did had to hassle a bit...but at last shows u the free movie...

Pakistani.pk

Great site.. well i managed to somehow find fairably good movies....
You cud easily find movies.......

Apnaview

Its great as it has lots of new movies... but i hate to see in such a small screnn. i suggest u to see this on Internet Explorer , otherwise a great site to see aweosme movies......

Bollyclips

Great site ... good content management.. and has lots of new movies.......
must try for all.......

I searched the whole of internet and found out all of this stuff....for free videos and movies......

  • Free Movies and Documentaries in the Public Domain: These are all free movies that have fallen out of copyright - download away.
  • OVGuide: a meta search guide to online movies.
  • Movies: This enterprising website has taken the time to find and upload clips of hundreds of movies.
  • Veoh Cult Classics: Night of the Living Dead, Metropolis, Eraserhead are all included here.
  • Watch Free Movies Online. This site is full of classic movies, all free movie downloads.
  • The Internet Movie Database. Movie reviews, information about upcoming movie premieres, movie clips, and more.
  • AltaVista - Video Search. Search for movies and videos on the Web in virtually any format. Find free movie downloads easily and fast.
  • Yahoo Search-Video.. Search for videos and movies on the Web. Also includes a link to submitting your own video to Yahoo to be indexed.
  • Singingfish, an audio and video search engine. Search for movies, free movie downloads, short movie clips, and always check "Staff Favorites."
  • Google Video Search. Find videos, movies, and TV programs online.
  • Netbroadcaster.com: Features trailers, shorts, independent films, and more. Most of the films on this site are free, but some do require subscription access.
  • Turner Classic Movies: Lots of trailers, movie clips, and background information on all your favorite classic films. A very cool site.
  • Hollywood.com: Trailers, movie clips, and more.
  • All Movie Guide:Comprehensive database of film synopses and reviews as well as concise actor biographies.
  • Apple Movie Trailers:An extensive collection of brank spankin' new movie trailers.
  • JoBlo.com:Reviews, trailers, scripts, interviews, clips, and a lot more.
  • YouTube: you can upload, watch, and search free videos here.
  • YouTube, GoogleVideo, and IFilm: Nice mashup of all three services; looks like you'll need to know exactly what video you want, however.
  • Google Video of the Day: Another day, another Google Video of the Day. Varies from funny to interesting to extremely weird.
  • LearnOutLoud: free streaming lectures, audio, and video.
  • VideoBomb: "Video Bomb filters up the hottest videos on the internet: people submit links to the 'Incoming!' page and you bomb the best ones. If a video gets a lot of bombs quickly, it makes it to the front page."
  • Truveo:a video search engine that delivers pretty good results.
  • Mefeedia: "Find thousands of videoblogs (video podcasts), and watch them on your computer, video iPod or PSP."
  • The Open Video Project:a shared digital video collection
  • Free Documentaries: "Welcome to the Internet’s top resource for finding free documentaries."
  • SearchforVideo: SearchforVideo is a fantastic video search engine with over 6000 sources available for searching at the time of this writing. News, entertainment, viral videos - all searchable here.

Videos, Indie Films, Documentaries

  • Recommended Online Films: About.com's Independent Film Guide has a great list of free indie films on the Web.
  • Documentaries Online: "Whenever I find interesting documentaries that can be watched online I will post the links here." And he does.
  • Atom Films: Be sure to check out the Star Wars parodies.
  • RatherGood.com: Quite a few movies including a rodent of some kind..singing...you'll have to watch them to really get it.
  • National Lampoon.com: Short films and animations. Some of this stuff is not kid-friendly.
  • Subservient Chicken:This is more of a site where YOU are making the movie. Trust me. You'll enjoy it.
  • Ebaumsworld.com: Definitely funny, but also definitely (mostly) not safe for work.
  • OddTodd.com:Flash animations, games, and Mep the Squirrel. How could you not love OddTodd?
  • Milk and Cookies: A wildly eclectic assortment of mostly animated funny shorts.
  • Vmix.com: A wide variety of user-submitted videos here, anything from funny to strange to crazy.
  • The 3-Second Bunny Theatre: The bunnies do classic films in thirty seconds or less.
  • Flurl: Good source for a variety of videos.

Movie Scripts, Movie Posters, and More

  • TypeNow.net: a wide variety of movie-related fonts and typography.
  • LivePlasma.com:Share your favorite movies with friends and find more movies that you like.
  • PublicDomainTorrents:Classic movies and B-movies, all totally free.
  • The Internet Movie Script Database: You can read entire scripts of movies here; what a great site.
  • TuneFind.com: "Welcome to TuneFind.com where we are working to become the Internet's comprehensive list of music and songs appearing in television and movies."
  • MovieMistakes: Ever wonder if you've seen something that is supposed to be there in the movie? Check MovieMistakes to see if you're right.
  • ComingSoon.net: Be the first to see upcoming movie trailers on your block.
  • JumpCut: Make your own movies using your own music, slides, or video clips.
  • EyeSpot: "Use the Mixer to edit and combine your videos, photos and music online. Share mixes by email, blog, download or cell phone for free!"
  • Drive-In Theater: When you want to find a drive-in theater, use this site.
  • Cinema Treasures Theater Guide: Lists of all theaters worldwide that are currently showing classic films.
  • Double Feature Finder: "Find local showtimes scheduled back-to-back and spend the entire day at the movies!"
  • 80s Movies Rewind: Your best bet to find information about some of the best movies ever made...in the 80's.
  • Flixster: Get movie ratings of current movies from community members; great way to preview movies.
Want even more free movie downloads? Try Free Movie Downloads Part Two: The Sequel!

Enable Right Click on websites

Lots of web sites have disabled the right click function of the mouse button... it's really, really annoying. This is done so that you don't steal (via right-click->save picture) their photos or images or any other goodies. Unfortunately, it disables ALL right-click functionality: copy, paste, open in new window.

It's easy to change, assuming your using IE 6:
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok" a couple of times.

You'll probably want to turn this back to "enable" when your done because generally the
javascript enhances a website.

Learn how to hack

The following are the links to hack websites, to become hacker, hackr and some tips and tricks to improve your computer

Multiple Logins of Orkut and Gmail in Firefox
How to make Cookies and Hack orkut Account
Send Free SMS (List of Websites)
Watch Online Television For Free
Google Search Tips for Hacking
Firefox Recommended Add-Ons
Tabs in Yahoo messenger
Trick Your Webpage
Kill Yahoo Chatroom ads
SoliCall - Improvement in VoIP
Showing Super Hidden Files in Windows Vista
Edit any website you want
Enable Right Click on websites
Introducing Snap Shot addon for Firefox
Website Extractor (Makes Complete website offline)
Offline Browsers
Pidgin An Powerful Universal Messenger
Re-Install Internet Explorer
Use Google for serial numbers of softwares
Hack Passwords in FirefoxCMD, the basics and a few scripts
Modify your CD-ROM to watch DVD Movies
Download Torrent using Google
How To download Torrents If you cant install or run BitTorrent Client?
Restore Task Manager, Regedit, Folder Options disabled by administrator
Hack Rapidshare and all other file hosting websites
Google Advanced Search:MP3 Search
Some Important Tips about Gmail
Simply Google:All about Google
Policy Setting for Start Menu in Windows XP
Command Prompt Disabled
Hiding Notification Area
Right Clicking Disabled
Change Win XP Password
Hide files using Winrar and an JPG image
Make Windows XP Shutdown faster than ever
Device Manager in Right Click of My Computer
Rapidshare help to download files
Setup and use PROXY with Firefox
Download Unlimited from rapidshare without paying
Bypass Megaupload country slot without toolbar or extension
Hack Rapidshare and Megaupload
Create a Logon Banner
Add a Program in Startup in Windows
Improve Broadband Speed
Install Internet Explorer 7
Use System Restore when Windows fail to start
Chat with your friends through MS-DOS
Reset or Change Windows XP Administrator Password
Change Win XP Password without knowing it
Tips To create a strong Password easily
Add Safe Mode To Start Menu
Remove Startup Entries from Windows XP
Windows Password Cracker 2.1.9.0
Find Hidden Utilities in Windows XP
Hack Yahoo ID
No Folder Options Or Hidden Files Cannot be seen
Want To know full details of your computer
Want To repair your XP crashes?
Format a HDD with a notepad file
Want to speed your PC-Do it with PC Boost
Free Utilities
Useful Resources

hack it .. The easy method

Evered wanted to know how to hack? well you can learn on how to hack, but you’ll be known as Script Kiddie

First off you will need to download ProRat SE 1.9 (Clean)
http://www.sendspace.com/file/7tlt98 [Pass: pro]
YOU WILL NEED WINRAR
and follow the steps below:

1) Extract the file onto your desktop and place them into a folder
2) Open ProRat.exe , you will get a message, press OK
3) once you see the program, click the button CREATE
4) You will get another window, enter your email into the E-MAIL section ( you will need a real email)
5) Go to GENERAL SETTINGS, and check PROTECTION FROM….
and press CREATE SERVER.

Now that you’ve finished the hardest part, follow these steps below and you can get hacking.

6) Send the program to a friend, and make sure he/she opens it.
7) Check your email, (junk in needed), and find the “Your victim is online”
8) Copy and paste the IP address onto ProRat where it says “IP:[127.0.0.1]“
9) Press CONNECT, DO NOT CHANGE THE PORT, if u did change it back to 5110
10) Type in the password (default is usually 123456, it is in the email).
11) Your done, now you can mess with the buttons on the program. Especially the GIVE DAMAGE button. It will damage their pc by format, and will make the computer useless.
I will not be responsible for your action, this article is for only education on how it works, and how to prevent it. Still need help? Go to Contacts Page.

How To Hack Orkut ???

Google uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack.

Second Level - Google account checks for cookie in the sytem of user
Third Level - Google provides a redirection to the entered User information
Fourth Level - Google doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut using input validation attack!!!
It is not an easy task to hack Orkut by breaking this security! But still some people manages to get access to other’s Orkut accounts. The question concerned is How they do it? Many of them just use simple tricks that fool users and then they themself leak out their password. Here are some points you need to take care of, to protect your Orkut account being hacked.

Common Ways to Hack Orkut


1. Using Keyloggers is one of the Easiest Way to Hack an Orkut (or any other email) password. Keylogger programs can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden.
A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an Orkut account.
A keylogger program is widely available on the internet. Some of the best ones are listed below
Win-Spy Monitor
Realtime Spy
A detailed information on Keylogger Hack can be found in my post Hacking an Email Account.
2. Phishing Attack is the most popular way of hacking/stealing other’s password. By using fake login pages it is possible to hack Orkut. Here the users land on a page where they are asked for their login information and they enter their Orkut username and password thinking it to be a real page but actually it is other way round. It submits all the entered details to the creator of the fake login page.
3. Orkut New Features: I have come across a page(fake page) that looks like they are giving the user a choice of selecting new features for orkut with your ID and password, of course!! When the user submit’s his/her Orkut login information through this page, there goes his ID and password mailed to the coder.
4. Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not ORKUT. This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page and there you loose up your password.
5. Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it. So be careful, javascripts can even be used to hack Orkut!
6. Primary mail address: If by some means a hacker came to know the password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’. This way Google will send link to the already hacked primary email ID to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your, Orkut account is hacked too.
So a better thing would be to keep a very unknown or useless email ID of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker. Hence your Orkut account saved.
So, I hope that this post not only teaches you to hack Orkut but also to hack protect your Orkut account.
If you would like to share something, comment here and I will add up here with a credit to your name

Wednesday 6 April 2011

Increase your internet speed

This is not just one trick but a series of simple trick that lets you significantly increase you internet speed and i guarantee you an increase in your internet speed. This trick works on all windows machine including XP, Vista and windows 7.

1] go to desktop->My computer-(right click on)->properties->then go HARDWARE tab-> Devicemanager-> now u see a window of Device manager
then go to Ports->Communication Port(double click on it and Open).
after open u can see a Communication Port properties.
go the Port Setting:----
and now increase ur "Bits per second" to 128000.
and "Flow control" change 2 Hardware

2]type this coding in notepad and save as .reg and then execute this file....this will increase ur surfing n downloading speed.....

REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters]
"SackOpts"=dword:00000001
"TcpWindowSize"=dword:0005ae4c
"Tcp1323Opts"=dword:00000003
"DefaultTTL"=dword:00000040
"EnablePMTUBHDetect"=dword:00000000
"EnablePMTUDiscovery"=dword:00000001
"GlobalMaxTcpWindowSize"=dword:0005ae4c


3]Xp reserves 20% bandwith,
to unreserve it,follow following steps:

a)Click Start

b)Run:"gpedit.msc"

c)Goto:>Local Computer Policy
–>Computer Configuration
–>Administrative Templates
–>Network–>QOS Packet Scheduler
–>Limit Reservable Bandwidth


d) Double click on Limit Reservable bandwidth


e)Select Enable


f) Change 20% to 0%


g)Click Apply

Enjoy!

How to Create A Shutodown Icon On Desktop

Right click on your desktop and select new > shortcut.
In dialog box type “shutdown –s”, click next to continue and then type a name for shortcut and click finish.
You can add below parameters:
shutdown [{-l|-s|-r|-a}] [-f] [-m [\\ComputerName]]
-l >> Logs off the current user
-s >> Shut Down the local computer
-r >> Reboots after shutdown
-a >> Aborts shutdown. Ignores other parameters, except -l and Computer Name
-f >> Forces running applications to close.
-m [\\ComputerName] >> computer name

To create a suspend icon, type “rundll32.exe PowrProf.dll, SetSuspendState”

Tuesday 5 April 2011

Trick To Make Your Firefox Fast

This Firefox tricks will improve the speed & load time of firefox. And you will be able to surf faster.
 

Type about:config in the address bar, Then look for the following entries, and make the corresponding changes.
network.http.max-connections-per-server =32
network.http.max-persistent-connections-per-proxy =16
network.http.max-connections = 64
network.http.max-persistent-connections-per-server = 10
network.http.pipelining = true
network.http.pipelining.maxrequests = 200
network.http.request.max-start-delay = 0
network.http.proxy.pipelining = true
network.http.proxy.version = 1.0


Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it receives. Enjoy!!

Multiple login in yahoo Without Using any Software

You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps :
 
1.   Go to Start --> Run . Type regedit, then enter .

2.  Navigate to HKEY_CURRENT_USER -> Software -> yahoo -> pager --> Test

3.  On the right page , right-click and choose new Dword value .

4.  Rename it as Plural.

5.  Double click and assign a decimal value of 1.

Its done!!
Now close registry and restart yahoo messenger and try Multiple Login

Trace Mobile Number or IP Address

Recently I came accross a website in which we can easily trace a Mobile number. For example , when we enter the 10 digit mobile number, then we get the Mobile Service provider, Location, City along with area. Thats really awesome.
This tool will be really helpful specially for business persons to verify the location etc...
 
Features of this site is
 
Trace Mobile Number

Trace Vehical Number

Trace Pin Code
 
Trace IP Address
 
WHOIS Trace

Change Text on XP Start Button

Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


Step 2 – Modify the Registry

!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.[/b]

How to format an USB flash drive (pen drive) that contains virus?

Suppose your flash drive (pen drive) contains virus and you are not able to format it by right-clicking on its icon in My Computer and you don't have an antivirus. How to clean-up the flash drive in this case. By this way:
1. Go to START > CONTROL PANEL.
2. Click on ADMINISTRATIVE TOOLS.
3. Go to COMPUTER MANAGEMENT.
4. Here select the option DISK MANAGEMENT.
5. Right click on your virus containg flash drive's icon and click FORMAT. All Done!
NOTE: You can format other drives also from here with ease but do so after thinking properly.
You can also make disk partitions here.

5 Rules: How To Make Strong Passwords

1. Be seven or fourteen characters long, due to the way in which encryption works. For obvious reasons, fourteen characters are preferable.
2. Contain both uppercase and lowercase letters. ('A' and 'a' are different)
3. Contain numbers. (like 1,2,3....)
4. Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | \ < , > . ? /
5. Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption works).
Other things to remember are:
6. Not resemble any of your previous passwords.
7. Not be your name, your friend's or family member's name, or your login.
8. Not be a dictionary word or common name.

How to protect facebook account from facebook hacker software?

Facebook hacker software requires the email id of the victim to hack its account. So the simple way to protect your account from facebook hacker software is hiding your email address.
To do so follow these steps:
1. Click on the ACCOUNT tab on the upper-right hand side.
2. Click on the option PRIVACY.
3. Click on CUSTOMIZE SETTINGS.
4. Under contact information, your email id will be displayed. Click on the button next to your email id.
5. Select the option ONLY ME and save the settings. All Done!!!
Now no one can hack your facebook account through Facebook Hacker Software.

But this did not mean that you are safe from other ways of hacking.

1. You must not click any suspicious or unknown link send by your friend if you want to be safe.
2. For obvious reasons keep an up-to-date antivirus.
3. Don't link your facebook account with any other website, unless necessary.
4. NEVER EVER SIGN IN TO YOUR FACEBOOK ACCOUNT FROM AN INTERNET CAFE, UNLESS IT IS SO IMPORTANT THAT YOU ARE READY TO GET HACKED. ANYONE CAN HACK VERY EASILY YOUR ACCOUNT FROM INTERNET CAFE AND IT IS FOR ANY ACCOUNT WHETHER GMAIL OR FACEBOOK OR YAHOO.