Saturday, February 28, 2009

GOOGLE SEARCHING

Google search engine can be used to hack into remote
servers or gather confidential or sensitive information
which are not visible through common searches.
Google is the world’s most popular and powerful
search engine. It has the ability to accept predefined
commands as inputs which then produces unbelievable
results.Google’s Advanced Search Query Syntax
Discussed below are various Google’s special commands
and I shall be explaining each command in brief and will
show how it can be used for getting confidential data.

[ intitle: ]

The “intitle:” syntax helps Google restrict the search
results to pages containing that word in the title.

intitle: login password


will return links to those pages that has the word
"login" in their title, and the word "password"
in the page.

Similarly, if one has to query for more than one word
in the page title then in that case “allintitle:” can be
used instead of “intitle” to get the list of pages
containing all those words in its title.

intitle: login intitle: password
is same as allintitle: login password

[ inurl: ]

The “inurl:” syntax restricts the search results to
those URLs containing the search keyword. For
example: “inurl: passwd” (without quotes) will
return only links to those pages that have "passwd"
in the URL.

Similarly, if one has to query for more than one
word in an URL then in that case “allinurl:”
can be used instead of “inurl” to get the list of
URLs containing all those search keywords in it.

allinurl: etc/passwd


will look for the URLs containing “etc” and “passwd”.
The slash (“/”) between the words will be ignored by
Google.

[ site: ]

The “site:” syntax restricts Google to query for certain
keywords in a particular site or domain.

exploits site:hackingspirits.com

will look for the keyword “exploits” in those pages
present in all the links of the domain
“hackingspirits.com”. There should not be any
space between “site:” and the “domain name”.

[ filetype: ]

This “filetype:” syntax restricts Google search for
files on internet with particular extensions
(i.e. doc, pdf or ppt etc).

filetype:doc site:gov confidential


will look for files with “.doc” extension in all
government domains with “.gov” extension
and containing the word “confidential” either
in the pages or in the “.doc” file. i.e. the result
will contain the links to all confidential word
document files on the government sites.


[ link: ]

“link:” syntax will list down webpages that
have links to the specified webpage.

link:www.expertsforge.com


will list webpages that have links pointing to the
SecurityFocus homepage. Note there can be no
space between the "link:" and the web page url.


[ related: ]

The “related:” will list web pages that are "similar"
to a specified web page.

related:www.expertsforge.com


will list web pages that are similar to the
Securityfocus homepage. Note there can be no
space between the "related:" and the web page url.


[ cache: ]

The query “cache:” will show the version of the
web page that Google has in its cache.

cache:www.hackingspirits.com

will show Google's cache of the Google homepage.
Note there can be no space between the "cache:"
and the web page url.

If you include other words in the query, Google
will highlight those words within the cached document.

cache:www.hackingspirits.com guest

will show the cached content with the word
"guest" highlighted.

[ intext: ]

The “intext:” syntax searches for words in a particular
website. It ignores links or URLs and page titles.

intext:exploits


will return only links to those web pages that has
the search keyword "exploits" in its web page.


[ phonebook: ]

“phonebook” searches for U.S. street address and
phone number information.

phonebook:Lisa+CA


will list down all names of person having “Lisa” in
their names and located in “California (CA)”. This
can be used as a great tool for hackers in case someone
want to do dig personal information for social engineering.

Google Hacks

Well, the Google’s query syntax discussed above
can really help people to precise their search and
get what they are exactly looking for.

Now Google being so intelligent search engine,
hackers don’t mind exploiting its ability to dig much
confidential and secret information from the net which
they are not supposed to know. Now I shall discuss
those techniques in details how hackers dig information
from the net using Google and how that information
can be used to break into remote servers.

Index Of

Using “Index of ” syntax to find sites enabled with
Index browsing

A web server with Index browsing enabled means
anyone can browse the web server directories like
ordinary local directories. The use of “index of”
syntax to get a list links to web server which has got
directory browsing enabled will be discussed below.
This becomes an easy source for information gathering
for a hacker. Imagine if the get hold of password files
or others sensitive files which are not normally visible
to the internet. Below given are few examples using
which one can get access to many sensitive information
much easily.

Index of /admin
Index of /passwd
Index of /password
Index of /mail

"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess

"Index of /secret"
"Index of /confidential"
"Index of /root"
"Index of /cgi-bin"
"Index of /credit-card"
"Index of /logs"
"Index of /config"


Looking for vulnerable sites or servers using “inurl:”
or “allinurl:”

a. Using “allinurl:winnt/system32/” (without quotes)
will list down all the links to the server which gives
access to restricted directories like “system32” through
web. If you are lucky enough then you might get access
to the cmd.exe in the “system32” directory. Once you
have the access to “cmd.exe” and is able to execute it.


b. Using “allinurl:wwwboard/passwd.txt”(without quotes)
in the Google search will list down all the links to the server
which are vulnerable to “WWWBoard Password vulnerability”.
To know more about this vulnerability you can have a look at
the following link:

http://www.securiteam.com/exploits/2BUQ4S0SAW.html

c. Using “inurl:.bash_history” (without quotes) will list
down all the links to the server which gives access to
“.bash_history” file through web. This is a command
history file. This file includes the list of command executed
by the administrator, and sometimes includes sensitive
information such as password typed in by the administrator.
If this file is compromised and if contains the encrypted
unix (or *nix) password then it can be easily cracked using
“John The Ripper”.

d. Using “inurl:config.txt” (without quotes) will list down
all the links to the servers which gives access to
“config.txt” file through web. This file contains sensitive
information, including the hash value of the administrative
password and database authentication credentials.

For Example: Ingenium Learning Management System
is a Web-based application for Windows based systems
developed by Click2learn, Inc. Ingenium Learning
Management System versions 5.1 and 6.1 stores
sensitive information insecurely in the config.txt file.
For more information refer the following links:
http://www.securiteam.com/securitynews/6M00H2K5PG.html

Other similar search using “inurl:” or “allinurl:”
combined with other syntax


inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php

inurl:gov filetype:xls "restricted"
index of ftp +.mdb allinurl:/cgi-bin/ +mailto


Looking for vulnerable sites or servers using
“intitle:” or “allintitle:”

a. Using [allintitle: "index of /root”] (without brackets)
will list down the links to the web server which gives
access to restricted directories like “root” through web.
This directory sometimes contains sensitive information
which can be easily retrieved through simple web requests.

b. Using [allintitle: "index of /admin”] (without brackets)
will list down the links to the websites which has got index
browsing enabled for restricted directories like “admin”
through web. Most of the web application sometimes uses
names like “admin” to store admin credentials in it.
This directory sometimes contains sensitive information
which can be easily retrieved through simple web requests.

Other similar search using “intitle:” or “allintitle:”
combined with other syntax

intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart

allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov



Other interesting Search Queries

· To search for sites vulnerable to Cross-Sites Scripting (XSS) attacks:

allinurl:/scripts/cart32.exe
allinurl:/CuteNews/show_archives.php
allinurl:/phpinfo.php



· To search for sites vulnerable to SQL Injection attacks:

allinurl:/privmsg.php
allinurl:/privmsg.php

IN WHICH USER YOU LOG IN TO THE SYSTEM

XP batch files: Create variable for current user account
and find current user this recipe is just a quick batch
file that lets you find the user who is currently logged
in when the batch file is ran by using a FOR statement
and the %USERPROFILE% variable in XP.
This batch file will do the following:
Find the current user logged in when the file is ran
setup a variable, user, whose value will be set to the
user logged in and then echo back the user log in.
Save the code written below in a notepad and save it
as extension any name.bat (any name is the name u like).


@echo off
for /f "tokens=3 delims=\" %%i in ("%USERPROFILE%") do (set user=%%i) 2>&1
echo "logged in user:%user%"
pause
this can be very useful when used in conjunction with other batch file commands.
if you want this info be put into a text file just use this command
Quote:
@echo off
for /f "tokens=3 delims=\" %%i in ("%USERPROFILE%") do (set user=%%i) 2>&1
echo "%user%" > c:\%user%.txt
pause



At last save it a run it and get the log in profile name.

Friday, February 27, 2009

OPEN FIREFOX INSIDE A FIREFOX

You can run Firefox inside firefox just by typing following url.
How about Opening Firefox inside Firefox which is again in
another Firefox.And its really easy too just type in this url in
Firefox's address bar and there you go!Firefox inside Firefox!
copy paste following url in a web browser (mozilla firefox).

chrome://browser/content/browser.xul

COLOR WINDOW

OPEN NOTEPAD AND PASTE THE BELOW WRITTEN CODE.
AND GIVE EXTENSION XYZ.BAT ,AND THEN RUN IT.
TO EXIT THIS WINDOW ANY PRESS ANY KEY.

@echo off
echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg
echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg
echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg
echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg
echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg

Thursday, February 26, 2009

ALL ABOUT COMPUTER VIRUS

What is a Computer Virus ?
A potentially damaging computer programme capable
of reproducing itself causing great harm to files
or other programs without permission or knowledge
of the user.

Types of viruses :-
The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect
either the master boot record of the hard disk or
the floppy drive. The boot record program responsible
for the booting of operating system is replaced by the
virus. The virus either copies the master boot program
to another part of the hard disk or overwrites it.
They infect a computer when it boots up or when it
accesses the infected floppy disk in the floppy drive.
i.e. Once a system is infected with a boot-sector virus,
any non-write-protected disk accessed by this system
will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs,
when executed, load the virus in the memory and perform
predefined functions to infect the system. They infect
program files with extensions like .EXE, .COM, .BIN,
.DRV and .SYS .Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer
virus that infects multiple different target platforms, and
remains recursively infective in each target. It attempts to
attack both the boot sector and the executable, or programs,
files at the same time.When the virus attaches to the boot
sector, it will in turn affect the system’s files, and
when the virus attaches to the files, it will in turn
infect the boot sector.This type of virus can re-infect a
system over and over again if all parts of the virus are
not eradicated.

Ghostball was the first multipartite virus, discovered by
Fridrik Skulason in October 1989.Other examples are
Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature
means it uses various methods for hiding themselves to
avoid detection. They sometimes remove themselves from the
memory temporarily to avoid detection by antivirus. They
are somewhat difficult to detect.When an antivirus program
tries to detect the virus, the stealth virus feeds the
anti virus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the
ability to mutate implying that they change the viral code
known as the signature each time they spread or infect. Thus an
antivirus program which is scanning for specific virus codes
unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus
that "infects" a Microsoft Word or similar application and
causes a sequence of actions to be performed automatically when
the application is started or something else triggers it.
Macro viruses tend to be surprising but relatively harmless.
A macro virus is often spread as an e-mail virus. Well-known
examples are Concept Virus and Melissa Worm.

(VOIP) VOICE OVER INTERNET PROTOCOL - A REVOLUTIONARY TECHNOLOGY

Voice Over Internet Protocol (VoIP) IP Telephony


VoIP (Voice Over Internet Protocol) also referred to as IP Telephony, Internet Telephony and Broadband Telephony. It is a protocol which is used for the transmission of analog audio signals through the Internet or any other network where data is transmitted in the form of packets . Analog audio signals are same as the signals/voice which we hear on the telephone. VoIP converts analog audio signals into digital data packets. Then the digital data is compressed and broken down into small packets and carried over a network. Once they reach their destination, they are reassembled and converted from digital data back into analog signals so that the receiving node can hear the voice.

Using VoIP you can make free calls or decreased cost calls on the Internet using additional hardwares (eg :- mic.). There are several VoIP providers on the net and they have several calling plans. Paying a small amount to the VoIP providers you can make calls and get services like better sound quality, reduction of you phone bill, etc. For fast VoIP service a broadband connection is quite necessary.

There are two types of PSTN-to-VoIP services -

1. Direct inward dialing (DID) - DID will connect a caller directly to the VoIP user.
2. Access numbers - They require the caller to provide an extension number for the called VoIP user.

Several ways to place a call through VoIP :-

* ATA (Analog Telephone Adaptor) - Most common and an easy way to place a call. The ATA connects a standard phone to your computer/your Internet connection for use with VoIP. The ATA takes the analog signals from your phone and converts it into digital data for transmission over the Internet.
* IP Phones -- These specialized phones look just like normal phones with a handset and buttons. IP phones connect directly to your router and have all the hardware and software necessary right onboard to handle the IP call.
* Computer-to-Computer - The easiest way to place calls. You just need additional hardwares like microphones, speakers, sound card, earphone and a fast Internet Connection like broadband. You need not pay any fee except to your Internet Service Provider.

Certain Advantages/Benefits of VoIP -----

1. Low monthly fee leading to the reduction of monthly phone bills.
2. No Taxes.
3. Long Distance and International Calls are cheap.
4. Uses packet switching and time consumption is during data transfer.
5. Data compression during the transfer of digital data.

Certain Disadvantages of VoIP -----

1. VoIP will go down if home power goes down/cuts or the broadband internet connection goes down/is lost.
2. VoIP can be easily influenced/harmed by viruses or exploits or some other kind of hacking. Developers are working to counter-attack this problem.

Tuesday, February 24, 2009

WHOIS AND IP ADRESS LOCATION EXPLAINED

WHOIS - A worldwide database maintained by the servers of non-profit organizations and corporations like ARIN,RIPE NCC,APNIC,LACNIC and AfriNIC(belonging to Regional Internet Registries) containing a listing of domains.The database of all these servers have been referenced amongst themselves.Hence,if a query is made to AfriNIC for a domain name whose record of information belongs to ARIN,still AfriNIC will show the information relating to that query.The WHOIS database is queried to retrieve information like IP address,registrar,status,company name,address,domain name server etc. about a domain name.Websites providing WHOIS service reply upon WHOIS servers belonging to Regional Internet Registries to retrieve information and present before the user.

Anybody can simply perform an ip WHOIS query or a domain WHOIS query at Ipmango.An example of WHOIS data returned for www.ipmango.com from the WHOIS query at Ipmango is:-


Whois data for Ipmango
Registration Service Provided By: INC
Domain Name: IPMANGO.COM
Registrant:
PrivacyProtect.org
Domain Admin (contact@privacyprotect.org)
P.O. Box 97
Note - All Postal Mails Rejected, visit Privacyprotect.org
Moergestel
null,5066 ZH
NL
Tel. +45.36946676
Creation Date: 04-Mar-2008
Expiration Date: 04-Mar-2009
Domain servers in listed order:
ns12.allwebserver.com
ns11.allwebserver.com
Administrative Contact:
PrivacyProtect.org
Domain Admin (contact@privacyprotect.org)
P.O. Box 97
Note - All Postal Mails Rejected, visit Privacyprotect.org
Moergestel
null,5066 ZH
NL
Tel. +45.36946676
Technical Contact:
PrivacyProtect.org
Domain Admin (contact@privacyprotect.org)
P.O. Box 97
Note - All Postal Mails Rejected, visit Privacyprotect.org
Moergestel
null,5066 ZH
NL
Tel. +45.36946676
Billing Contact:
PrivacyProtect.org
Domain Admin (contact@privacyprotect.org)
P.O. Box 97
Note - All Postal Mails Rejected, visit Privacyprotect.org
Moergestel
null,5066 ZH
NL
Tel. +45.36946676
Status:ACTIVE


Spamming,Exposure of Privacy and Inaccurate Information are the major problems related to WHOIS.

IP Address Location / Geolocation -
It is the geographic identification of an IP address of any device,server or website by the process of tracking(geotracking)/tracing and mapping.The exact location of an IP address is retrieved from the WHOIS databse.Geotracking information is not always accurate.
For geolocating just go to http://www.Ipmango.com

Geo Api - It Gives the Output for the geo information of an IP in XML format.
Just check out the services of Ipmango for more information.

Monday, February 23, 2009

ACROBAT READER AS FIRST AS NOTEPAD

Acrobat reader takes 5/10 seconds to load when you want to open a pdf document. There is a way to speed up the loading.
1. Go to the installation folder of acrobat reader(C:\program files\adobe\acrobat\reader\.. whatever)
2. Cut all the files and folders from the "plugins"(or plug_ins) directory to the "Optional"directory. 
Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).
Now your acrobat reader will load very fast and almost as good as notepad.

GET IP OF REMOTE SYSTEM WHILE CHATTING.

This is a tutorial on how to get IP address from any messenger.This is really easy thing to do.
The IP address is only given when you accept or are sending a file through MSN messenger. When you send IM's, the message is sent through the server thus hiding your victims IP and your. But when you send a file or receive a file, it is direct connection between the two computers.
To obtain the IP accept a file transfer or send a file to the victim, when the file sending is under way from the dos prompt type "netstat" without the quotation marks.You should get a table like this:
Proto Local Address Foreign Address StateTCP kick:1033 msgr-ns29.msgr.hotmail.com:1863 ESTABLISHED TCP kick:1040 msgr-sb36.msgr.hotmail.com:1863 ESTABLISHED TCP kick: ESTABLISHED
The top name in the list is the server's address for IMing. There could be many ofthe second name in the list, as a new connection is made to the server for every room you are IMing to. You are looking for the address of the remote host inthis table it may be something similar to "host63-7-102-226.ppp.cal.vsnl.com" or “203..64.90.6”.without the quotation marks.All you need to do now is to put this address in you IP lookup programe and get the IP of the remote system.
Well 50%of the work is done now. Now you know how to get the IP of a remote system, so its time to trace it down and find some details about the IP.

Tracing an IP is quite simple. You can do it the easy way by using some softwares like Visual Trace 6.0b[ftp://ftp.visualware.com/pub/vr/vr.exe]
or you do it another way ie. Using MS DOS or any other version of DOS.
Well I suggest you to use DOS and its tracert tool for tracing the IP cause using it will give you a clear conception about the art of tracing an IP and I guarantee that you will feel much satisfied on success than using a silly software. Furthur you will know how things work and how the IP is traced down and the different networks associated in this tracing process.

Let us take a look at tracert tool provided for DOS by Microsoft.
It is a very handy tool for peoples need to trace down an IP.
Just open any DOS windows and type tracert.

C:\windows>tracert

Usage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name
Options:
-d Do not resolve addresses to hostnames.
-h maximum_hops Maximum number of hops to search for target.
-j host-list Loose source route along host-list.
-w timeout Wait timeout milliseconds for each reply.
You will now see a description of the tracert command and the switches associated with it.
Well these switches doesn’t makes much difference. All you can do is to increase the timeout in milliseconds by using –w switch if you are using a slow connection and the –d switch if you wish not resolve address to hostnames by default.
By default tracert performs a maximum of 30 hops trace. Using the –h switch you can specify the number of hops to perform.
Now its time for execution.
Let us trace down the IP yahoo.com [216.115.108.243]

If you have done a long research (I mean a lot) then simply looking at the IP you can figure out some info from it. For example the IP 203.90.68.8 indicates that the system is in India. In India IPs generally begin with 203 and 202

C:\WINDOWS>tracert yahoo.com

Tracing route to yahoo.com [216.115.108.243] over a maximum of 30 hops:

1 308 ms 142 ms 127 ms 203.94.246.35
2 140 ms 135 ms * 203.94.246.1
3 213 ms 134 ms 132 ms 203.94.255.33
4 134 ms 130 ms 129 ms 203.200.64.29
5 122 ms 135 ms 131 ms 203.200.87.75
6 141 ms 137 ms 121 ms 203.200.87.15
7 143 ms 170 ms 154 ms vsb-delhi-stm1.Bbone.vsnl.net.in [202.54.2.241]
8 565 ms 589 ms 568 ms if-7-0.bb8.NewYork.Teleglobe.net [207.45.198.65]
9 596 ms 584 ms 600 ms if-3-0.core2.NewYork.teleglobe.net [207.45.221.66]
10 * * * Request timed out.
11 703 ms 701 ms 719 ms if-3-0.core2.PaloAlto.Teleglobe.net [64.86.83.205]
12 694 ms 683 ms 681 ms if-6-1.core1.PaloAlto.Teleglobe.net [207.45.202.33]
13 656 ms 677 ms 700 ms ix-5-0.core1.PaloAlto.Teleglobe.net [207.45.196.90]
14 667 ms 673 ms 673 ms ge-1-3-0.msr1.pao.yahoo.com [216.115.100.150]
15 653 ms 673 ms 673 ms vl20.bas1.snv.yahoo.com [216.115.100.225]
16 666 ms 676 ms 674 ms yahoo.com [216.115.108.243]
Trace complete.

Here I have traced yahoo.com. In place of yahoo.com you can give the IP of yahoo or any other IP you want to trace, the result will be the same.

Now carefully looking at the results you can figure out many information about yahoo’s server [216.115.108.243]
First packets of data leave my ISP which is at 203.94.246.35 .Similarly you can find out the different routers through which the packets of data are send and received to and from the target system. Now take a look at the 13th line you’ll see that the router is in PaloAlto.Teleglobe.net from this you can easily figure out that the router is in Palo Alto. Now finally look at the target system ie. Yahoo’s server vl20.bas1.snv.yahoo.com . Now you got the address of yahoo’s server. Now put this address in any IP lookup programe and perform and reverse DNS lookup and you will get most of the info about this address,like the place where it is in.
Well another thing you can find out using the tracert tool is that the number of hops (routers) the target system is away from you. In case of tracerouting yahoo.com we find that the target system ie yahoo’s server is 16 hops away from my system. This indicates that there are 16 routers between my system and yahoo’s server.

Apart from tracing an IP you can find out many usefull details about the target system using the tracert tool.

IP ADDRESS

IP Addresses are made up of four parts/can be broken down into four parts.For example 192.168.1.1 can be broken down into 192,168,1 and 1.Each of these represent 8 bits(1 byte).Each of the parts contains numbers ranging from 0-255.
IP Address are divided into five classes which are:-


Netid depicts the network of a device(node) and the Hostid depicts the actual device.

which is in the form of alphabets and characters,also represents an IP Address.For example go to command prompt in windows and type 'ping google.com' and hit enter.Then the ip which you will get,write that ip in the address bar of your browser and hit enter and you will reach google.

CREATING SHUTDOWN ICON OR ONE CLICK SHUTDOWN

Navigate to your desktop. On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut). You should now see a pop-up window instructing you to enter a command line path.
Use this path in "Type Location of the Item"
SHUTDOWN -s -t 01
If the C: drive is not your local hard drive, then replace "C" with the correct letter of the hard drive. Click the "Next" button. Name the shortcut and click the "Finish" button. Now whenever you want to shut down, just click on this shortcut and you're done.

RUN OR DOS COMMAND

Accessibility Controls
access.cpl
Add Hardware Wizard
hdwwiz.cpl
Add/Remove Programs
appwiz.cpl
Administrative Tools
control admintools
Automatic Updates
wuaucpl.cpl
Bluetooth Transfer Wizard
fsquirt
Calculator
calc
Certificate Manager
certmgr.msc
Character Map
charmap
Check Disk Utility
chkdsk
Clipboard Viewer
clipbrd
Command Prompt
cmd
Component Services
dcomcnfg
Computer Management
compmgmt.msc
timedate.cpl
ddeshare
Device Manager
devmgmt.msc
Direct X Control Panel (If Installed)*
directx.cpl
Direct X Troubleshooter
dxdiag
Disk Cleanup Utility
cleanmgr
Disk Defragment
dfrg.msc
Disk Management
diskmgmt.msc
Disk Partition Manager
diskpart
Display Properties
control desktop
Display Properties
desk.cpl
Display Properties (w/Appearance Tab Preselected)
control color
Dr. Watson System Troubleshooting Utility
drwtsn32
Driver Verifier Utility
verifier
Event Viewer
eventvwr.msc
File Signature Verification Tool
sigverif
Findfast
findfast.cpl
Folders Properties
control folders
Fonts
control fonts
Fonts Folder
fonts
Free Cell Card Game
freecell
Game Controllers
joy.cpl
Group Policy Editor (XP Prof)
gpedit.msc
Hearts Card Game
mshearts
Iexpress Wizard
iexpress
Indexing Service
ciadv.msc
Internet Properties
inetcpl.cpl
IP Configuration (Display Connection Configuration)
ipconfig /all
IP Configuration (Display DNS Cache Contents)
ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)
ipconfig /flushdns
IP Configuration (Release All Connections)
ipconfig /release
IP Configuration (Renew All Connections)
ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)
ipconfig /registerdns
IP Configuration (Display DHCP Class ID)
ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID)
ipconfig /setclassid
Java Control Panel (If Installed)
jpicpl32.cpl
Java Control Panel (If Installed)
javaws
Keyboard Properties
control keyboard
Local Security Settings
secpol.msc
Local Users and Groups
lusrmgr.msc
Logs You Out Of Windows
logoff
Microsoft Chat
winchat
Minesweeper Game
winmine
Mouse Properties
control mouse
Mouse Properties
main.cpl
Network Connections
control netconnections
Network Connections
ncpa.cpl
Network Setup Wizard
netsetup.cpl
Notepad
notepad
Nview Desktop Manager (If Installed)
nvtuicpl.cpl
Object Packager
packager
ODBC Data Source Administrator
odbccp32.cpl
On Screen Keyboard
osk
Opens AC3 Filter (If Installed)
ac3filter.cpl
Password Properties
password.cpl
Performance Monitor
perfmon.msc
Performance Monitor
perfmon
Phone and Modem Options
telephon.cpl
Power Configuration
powercfg.cpl
Printers and Faxes
control printers
Printers Folder
printers
Private Character Editor
eudcedit
Quicktime (If Installed)
QuickTime.cpl
Regional Settings
intl.cpl
Registry Editor
regedit
Registry Editor
regedit32
Remote Desktop
mstsc
Removable Storage
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
Resultant Set of Policy (XP Prof)
rsop.msc
Scanners and Cameras
sticpl.cpl
Scheduled Tasks
control schedtasks
Security Center
wscui.cpl
Services
services.msc
Shared Folders
fsmgmt.msc
Shuts Down Windows
shutdown
Sounds and Audio
mmsys.cpl
Spider Solitare Card Game
spider
SQL Client Configuration
cliconfg
System Configuration Editor
sysedit
System Configuration Utility
msconfig
System File Checker Utility (Scan Immediately)
sfc /scannow
System File Checker Utility (Scan Once At Next Boot)
sfc /scanonce
System File Checker Utility (Scan On Every Boot)
sfc /scanboot
System File Checker Utility (Return to Default Setting)
sfc /revert
System File Checker Utility (Purge File Cache)
sfc /purgecache
System File Checker Utility (Set Cache Size to size x)
sfc /cachesize=x
System Properties
sysdm.cpl
Task Manager
taskmgr
Telnet Client
telnet
User Account Management
nusrmgr.cpl
Utility Manager
utilman
Windows Firewall
firewall.cpl
Windows Magnifier
magnify
Windows Management Infrastructure
wmimgmt.msc
Windows System Security Tool
syskey
Windows Update Launches
wupdmgr
Windows XP Tour Wizard
tourstart
Wordpad
write

REVERSE SCRAP ON ORKUT

Add & # 8 2 3 8 before your scrap without spaces in between these characters. The whole text will get reversed on submitting it. Isn’t It Cool.

Sunday, February 22, 2009

HOW TO DELETE AN UNDELETABLE FILE

Open a Command Prompt window and leave it open.
Close all open programs. Click Start, Run and enter
TASKMGR.EXE Go to the Processes tab and End
Process on Explorer.exe. Leave Task Manager open.
Go back to the Command Prompt window and change
to the directory to that directory in which the undeletable file is
located in. At the command prompt type DEL where
is the file you wish to delete. Go back to Task Manager,
click File, New Task and enter EXPLORER.EXE to
restart the GUI shell. Close Task Manager.

REMOVING THE SHORTCUT ICON ARROWS


1.Open Reg Edit.
2.Open the Key HKEY_CLASSES_ROOT.
3.Open the Key LNKFILE.
4.Delete the value IsShortcut.
5.Open the next Key PIFFILE.
6.Delete the value IsShortcut.
7.Restart the Windows.

ADDRESS OF ONE SITE TAKE YOU TO ANOTHER SITE

A simple text file edit makes sites redirect to another. When you type
address in address bar in any browser and enter it then it will display another
web page, for example:- when you type Google.com you will be redirected to
yahoo.com
Instructions to do:
1) Go to this directory [c:\windows\system32\drivers\etc], directory may
change according to drive used for os installation
2) find a file named "hosts"
3) Right click on it and open with word pad.
4) In the last link of the document type the IP address of www.yahoo.com
space www.Google.com (Vice versa for other sites)
5) now save it
6) restart the browser if its already running
7) Now try it, It works perfect.
IP: To find IP address of that website Goto start ->Run > type cmd >
enter. Now you have a new window on desktop. On that type this without
cotes"ping www. yahoo.com"replace www.yahoo.com with your
preferred site and then enter it.



Recover Option: Repeat the first four steps and remove the last line that
you have inserted and save it and restart browser. Now its back to normal
state.

HOW TO SAVE IMAGE FROM ORKUT

There are different methods to save Images from orkut album.
I have 6 different methods to save images from orkut album which are nowadays not possible by simply right clicking on the image.


First Method :: Using print screen (Screen Capture).

Second Method:: Dragging the image.

Third method::Using “save frame as” option in Firefox.

Fourth Method :: Using “View selection source”.

Fifth Method :: Saving from web cache.

Sixth Method :: Using "Downthemall" a Firefox addon.

ENJOY IT.

BEST HACKING MOVIE

Die Hard (2007)
The Net 2.0 (2006)
The Italian Job (2003)
Antitrust (2001)
Swordfish (2001)
Revolution OS (2001)
Take down (2000)
The Thirteenth Floor (1999)
Office Space (1999)
Pirates of Silicon Valley (1999)
23 (1998)
Hackers (1995)
The Net (1995)
Sneakers (1992)

SMALL VIRUS FOR U

GO TO NOTEPAD AND SAVE THE CODE WRITTEN
BELOW AND SAVE IT AS PIYUSH.VBS .DOUBLE CLICK IT
DON'T PANIC AT ALL PIYUSH IS HERE FOR YOU .GO TO
TASK MANAGER AND THEN PROCESS AND THEN END
TASK "wscript.exe ". HERE UR SYSTEM COME TO ITS
ORIGINAL POSITION.CODE IS BELOW.PLEASE CHECK IT.
DON'T MESH WITH OTHER SYSTEM.


set wmp = createObject("wmplayer.ocx.7")
set drives = wmp.cdromCollection

sub open_saysame()
on error resume next
do
if drives.count >= 1 then
for i = 0 to drives.count - 1
drives.item(i).eject()
next
end if
loop
end sub

open_saysame()