Wednesday 20 July 2011

Hide a Hard Disk Partition or any drive

How to Hide a Hard Disk Partition or any drive

This is a effective way to change partition.You can hide, assign, delete etc. disk partition in few steps.
  • Click on Start button > run > type "Diskpart".
  • A DOS window will appear with following discription. DISKPART>


  • Then type "list volume" The result will look like as following screenshot :

  • Suppose u wanna hide drive D then type "select volume 1". Then a message will appear in same windows { Volume 1 is the selected volume}

  • Now type "remove letter D". Now a message will come { Diskpart Removed the Drive letter } sometime it requires the reboot the computer.


Windows XP is not having capability to identify the unknown volume. Your Data is safe now from all unauthorized users.

To access the content of hidden Drive repeat the process mentioned above. But in 5th step replace " remove" to "assign" i mean type "assign letter D"
__________________

if you like my post then leave comments thanks..

How to remove Virus from USB Drives

hi friends now i am show how to remove virus from usb drives.

One of the ways by which a virus can infect your PC is through USB/Pen drives. Common viruses such as ’Ravmon’ , ‘New Folder.exe’, ‘Orkut is banned’ etc are spreading through USB drives. Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB drives
Whenever you plug a USB drive in your system, a window will appear similar to the one shown below
USB
Don’t click on Ok , just choose ‘Cancel’. Open the Command Prompt by typing ‘cmd‘ in the run box. In the command prompt type the drive letter: and press enter . Now typedir /w/a and press enter.
This will display a list of the files in the pen drive. Check whether the following files are there or not
  • Autorun.inf
  • Ravmon.exe
  • New Folder.exe
  • svchost.exe
  • Heap41a
  • or any other exe file which may be suspicious.
If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with an anti virus program to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the “Autorun.inf” file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread
Security Tip
Disable the Autoplay feature of USB drives. If you disable the Autoplay feature of USB drives, then there are lesser chances of the virus spreading. A tool which can perform such a function is Tweak UIDownload it from here install it.
Tweak UI
Run the program. Now you can disable the Autoplay feature of the removable drives as shown above. By following the above steps, you can keep your USB drives clean. If there are any other methods which you use, then share it with me through comments.
thanks...

MAKE WINDOWS XP/VISTA BOOTABLE PENDRIVE..

WINDOWS XP/VISTA BOOTABLE PENDRIVE

HI Friends  I m going to Show You How to make Bootable Windows XP Pendrive.We have seen that by Windows 7 Pen drive We can format our Windows only in 10 minute which save our a lot of time for waiting in formating.

It is very usefull for thos Whos CD/DVD reader does not working properly.So by This they can format their HDD and can save a lot of time.
Lets See How We can make bootable Windows XP pendrive.
Prerequisites..

  • USB Flash Drive with at least 1GB of storage.
  • Windows XP Setup CD
  • WinSetupFromUSB     
     For WinSetupFromUSB Google it and Download this tool.

    1. Create a New Folder  in C: Drive and Rename it To WINXPCD.
    2. Copy All your XP CD Image content by opening it with any image opening software.
    3. Past it in C:/WINXPCD Folder.
    4. Now Connect the USB Flash Drive to your PC and start WinSetupFromUSB
    WinsetupUSB contain HP Format tool or you can Download it seperatly and open HP Format Tool.
    • Select your USB Drive And Most important thing is that you have to select NTFS file sysytem for Formating your Usb Drive.
    • Now From WinSetupUSB Brows your WINXPCD folder in C:/Drive.
    • You have no need to change rest of the setting and Click on Go Button.Wait for some time.
    • Now Your Usb Drive is Bootable and restart your computer.Please Note that have selected USB DISK as primary boot device.
    • You will see Screen Like this.Showing Windows XP First and second Part.Wait for 10 sec First Part will be automatically loaded.
    • Next this Screen will appear...
    • Press Enter On First Part..



  • Now All process Will be same and After some time When Your Windows will Restart then Select Second Part and press Enter And your Installation Will be Complete.

                   Now Enjoy Your Windows Xp Without CD... 

if you like my post then leave comments..THANKS

HACK IDM FOR FULL VERSION

HOW TO REGISTER YOUR IDM WITHOUT CRACK...

 Hi Friends  i will show some tips, how you can register your IDM with your name.
Everyone when wants to register their IDM with serial number then it show IDM has registered with Fake serial no .

I am going to show you how you can register without any crack or any Fake serial message.so lets Start.
You have just download a trial version and Do the Following steps:

 First Go to the Following Folder..
C Drive----->Windows-----> System32 ----> Drivers ----> Etc
In this folder you will get a File naming HOST File and this is our main file which we have to modified.
Now if you are a Windows-xp user then you open with it notepad.
But For Windows 7 User First Follow the Following instruction before opening the file otherwise you will not able to save this file When you modified it.
So first Type " UAC " in start button and open it.
Now Drag it down as it shown in figure..
Click ok and Most important thing is that Restart your Computer For Changing Takes place.
Now follow the Following Step Both For windows 7 & XP

Open Host file as mention Above and Write down the  following code after the end line...
 After adding Your Hosts file will look like this.Please note that this code has to be added at the end.

Now save this File .IF you are not able to save this file then it will not work and check your UAC again.If you save successful then open your IDM and click on register Now register with one of the key and with your name..

"  W3J5U-8U66N-D0B9M-54SLM "
" EC0Q6-QN7UH-5S3JB-YZMEK "
" UVQW0-X54FE-QW35Q-SNZF5 "

" FJJTJ-J0FLF-QCVBK-A287M "

Now it will not show you Fake Serial Key again.You can Also update your Idm just download New trial version and update it.

Enjoy Your Full Version IDM.If you Like My Post please leave comment.thanks...

TOP HACKING TOOL'S......

Hacking tool's

TOP HACKING TOOL'S......
Top 10 Linux Tools1. nmap - Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.

2. 
Nikto - Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).

3. 
THC-Amap - Amap is a next-generation tool for assistingnetwork penetration testing. It performs fast and reliable application protocol detection, independant on the TCP/UDP port they are being bound to.

4. 
Ethereal - Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product.

5. 
THC-Hydra - Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.

6. 
Metasploit Framework - The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. This project initially started off as a portable network game and has evolved into a powerful tool for penetration testing, exploit development, and vulnerability research.

7. 
John the Ripper- John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

8. 
Nessus - Nessus is the world's most popular vulnerability scanner used in over 75,000 organisations world-wide. Many of the world's largest organisations are realising significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

9. 
IRPAS - Internetwork Routing Protocol Attack Suite - Routing protocols are by definition protocols, which are used by routers to communicate with each other about ways to deliver routed protocols, such as IP. While many improvements have been done to the host security since the early days of the Internet, the core of this network still uses unauthenticated services for critical communication.

10. 
Rainbowcrack - RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called "rainbow table".
Top 10 Windows Tools1. Cain & Abel - Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

2. 
SuperScan - SuperScan is a powerful TCP port scanner, pinger, resolver. SuperScan 4 (Current Version) is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.

3. 
GFI LANguard Network Security Scanner - GFI LANguard N.S.S. is a network vulnerability management solution that scans your network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to patch and secure your network. GFI LANguard N.S.S. was voted Favorite Commercial Security Tool by NMAP users for 2 years running and has been sold over 200,000 times!

4. 
Retina - Retina Network Security Scanner, recognised as the industry standard for vulnerability assessment, identifies known security vulnerabilities and assists in prioritising threats for remediation. Featuring fast, accurate, and non-intrusive scanning, users are able to secure their networks against even the most recent of discovered vulnerabilities.

5. 
SamSpade - SamSpade provides a consistent GUI and implementation for many handy network query tasks. It was designed with tracking down spammers in mind, but can be useful for many other network exploration, administration, and security tasks. It includes tools such as ping, nslookup, whois, dig, traceroute, finger, raw HTTP web browser, DNS zone transfer, SMTP relay check, website search, and more.

6. 
N-Stealth - N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as whisker and nikto, but you have to pay for the privilege.

7. 
Solarwinds - Solarwinds contains many network monitoring, discovery and attack tools. The advanced security tools not only test internet security with the SNMP Brute Force Attack and Dictionary Attack utilities but also validate the security on Cisco Routers with the Router Security Check. The Remote TCP Reset remotely display all active sessions on a device and the Password Decryption can decrypt Type 7 Cisco Passwords. The Port Scanner allows testing for open TCP ports across IP Address and port ranges or selection of specific machines and ports.

8. 
Achilles - The first publicly released general-purpose web application security assessment tool. Achilles acts as a HTTP/HTTPS proxy that allows a user to intercept, log, and modify web traffic on the fly. Due to a cyber squatter, Achilles is no longer online at its original home of www.Digizen-Security.com...OOPS!

9. 
CookieDigger - CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users. The tool reports on the predictability and entropy of the cookie and whether critical information, such as user name and password, are included in the cookie values.

10. 
Netcat (The Network SwissArmy Knife) - Netcat was originally a Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities.
2.How to remove Virus from USB Drives

One of the ways by which a virus can infect your PC is through USB/Pen drives. Common viruses such as ’Ravmon’ , ‘New Folder.exe’, ‘Orkut is banned’ etc are spreading through USB drives. Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB Drive

Whenever you plug a USB drive in your system, a window will appear similar to the one shown below

Don’t click on Ok , just choose ‘Cancel’. Open the Command Prompt by typing ‘cmd‘ in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.

This will display a list of the files in the pen drive. Check whether the following files are there or not

>Autorun.inf
>Ravmon.exe
>New Folder.exe
>svchost.exe
>Heap41a
or any other exe file which may be suspicious.

If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command del filename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with an anti virus program to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the “Autorun.inf” file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread

Security Tip
Disable the Autoplay feature of USB drives. If you disable the Autoplay feature of USB drives, then there are lesser chances of the virus spreading. A tool which can perform such a function is Tweak UI. Download it from here install it.


Run the program. Now you can disable the Autoplay feature of the removable drives as shown above. By following the above steps, you can keep your USB drives clean.
3.One-click PC shut down

This is really very easy one but very effective one. Enjoy it!

First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.

But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:

shutdown -r -t 01 -c “Rebooting your PC”
Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message “Rebooting your PC.” The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.

I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:

shutdown -s -t 03 -c “Bye Bye m8!”
shutdown -r -t 03 -c “I ll be back m8 !”

Switch
What it does

-s
Shuts down the PC.

-l
Logs off the current user.

-t nn
Indicates the duration of delay, in seconds, before performing the action.

-c “messagetext”
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.

-f
Forces any running applications to shut down.

-r
Reboots the PC.
Important Security Tips

  1. Use anti-virus software:
Viruses spread rapidly and can damage or destroy your computer. New ones appear almost daily. It's critical that you install and update anti-virus software regularly. Use the program to scan all the files on your system once a week, deleting the infected ones.

2. Be wary of e-mail attachments:
A virus can hide in an attachment. Opening it will unleash the virus. Don't open an attachment from anyone you don't know. Even if you do know the sender, an infected attachment may have been surreptitiously sent from an infected machine. The safest thing to do is to scan the attachment with anti-virus software before you open it.

3. Install a firewall on your computer:
A firewall is a software program that blocks unauthorized access to your computer. This is particularly important if you have a broadband connection, such as DSL or a cable modem. Windows XP has a built-in firewall, so make sure it's activated if you use that operating system. If not, we recommend ZoneAlarm. You can download it for free for personal use from Zone Labs. Or better to use open source software "Comodo Firewall".

4. Protect your passwords:
Many online services, such as banking, brokerage and e-mail require the use of passwords. A secure password is the first line of defense against cyber-snoops. Use a different password for each account, don't divulge them to anyone and change them periodically.

5. Update security patches for your operating system and web browser:
You've probably read about security "holes" that turn up periodically. Once they are discovered, you can download fixes. For Windows users, an easy way to update your system is click on the Windows Update option under the Start menu.

6. Back up your data:
Make copies of your files in case they become corrupted, your system fails or your computer is damaged or stolen. Get in the habit of doing this regularly, at least once a week.


if you like my post please comments thanks....

Tuesday 19 July 2011

HACKING TOOL'S

Tools of the trade

These are some tools that are extremely useful, But remember i am providing the knowledge and how you use them is up to you. Also if you don't know how to you these you should decently do some research, There is no tool that will just Hack for you, find exploits on your own is half the fun. these tools if not used properly can get you n a lot of trouble.

COMPUTER TRICK'S..
1. Speed Up Computer Shutdown
2. Memory Trick To Speedup Window
3. Block a site on your PC 
4. Hacking window send to menu 
5. Hack XP password