Friday, August 28, 2009

BITLOCKER TO GO ENCRYPTS PORTABLE FLASH DRIVES IN WINDOWS7

The BitLocker feature was introduced in Windows Vista and
allowed you to encrypt the content of your hard drive.Now in
Windows 7 they offer BitLocker To Go which allows you to
encrypt portable USB flash drives.First open up My Computer
and Right-click on the flash drive you want to encrypt and select
Turn on BitLocker.

1
After BitLocker initialized the flash drive you will need to enter
in a password to unlock the drive.  You can also set up a
Smartcard which are usually used in a work environment so
talk to you IT staff.
2 pw
Next you will be prompted to store the recovery key which is used
in the event you lose your password or smartcard.  If you store it
as a file make sure that it is not on the same drive that you’re encrypting.  
3 key
After the key has been saved as a file or printed you will see a
confirmation message.
4 save confirm
Finally you will be ready to start encrypting the drive so just click
the Start Encrypting button.
5 confirm
While it is encrypting there will be a progress screen displayed.
6 progress
A successful encryption of the USB flash drive. notice that the
drive icon will change to show its encrypted with BitLocker.
7 complete
Notice that the drive icon will change to show its encrypted with
BitLocker where the gold lock indicates it is locked up and the
gray lock is displayed after you have unlocked it.
 8 iconunlock
Right-click on that icon to bring up options to manage BitLocker encryption.
9 options
The next time you plug in the drive to a Windows 7 machine you will
be prompted to enter the password to gain access to the drive.  You
can also always have it unlocked on specific machines in the future.
enter
You can also use the encrypted drive in Vista and XP.  Here we will
look at how it looks in XP, when you plug it in you will be prompted
for the password to launch BitLocker To Go Reader (the utility is
installed automatically on the drive by Windows 7).
bitlocker XP
BitLocker To Go Reader is a Windows Explorer type navigation
utility for showing the content of the drive.
bitlocker reading
With a BitLocker encrypted drive you will only be able to read and
copy files.  If you need to add files or change them you will need to
use a Windows 7 machine.
error
This is a great way to easily make sure sensitive data on your USB flash
drive is safe.  Right now anyone who has Windows 7 RC1 Ultimate can use this feature.

ACCESS HIDDEN REGIONAL THEMES IN WINDOWS 7

Windows 7 offers you location specific Aero themes based on the language and location you pick during installation.  Here we will take a look at accessing other hidden themes from different countries.
When you first start the Windows 7 installation the first thing you will do is select a language, time and currency format.  This is where Windows determines what themes you’re presented with by default.
2Inst
I am just giving a example for u....
1-us
To access the other international themes copy and paste the following path into the search box and hit Enter.
C:\Windows\Globalization\MCT
3-run
In the MCT folder you will find additional themes for Canada, Australia, South Africa, and Great Britain.
4-mct
You can go in and grab just the Wallpapers…
5-wallpaper
Or go into the Theme folder double click on the the thumbnail to add it. 
6-thm
Here you can see I added all of them and now they will be available under the My Themes section for when you want to change them around.
my
This is a neat little trick that will let you customize Windows 7 with hidden themes already available.  Also if you want to get more themes head over to the Microsoft site.

Monday, August 24, 2009

FREE DOMAIN FOR WEBSITE AND BLOG

http://www.freedomain.co.nr/
http://www.dot.co.sr/
http://www.uni.cc/
http://www.cjb.net/
http://www.dot.tk/
http://www.da.ru/
http://www.nic.de.vu/
http://www.joynic.com/
http://www.unonic.com/
http://www.free-url-redirection.com.ru/
http://je.ro/en/
http://www.active.ws/domains/
http://www.smartdots.com/register/?LANG=US
http://moo.no
http://www.no-ip.com
http://www.4-all.org
http://www.pt.vu
http://www.rd5.net/
http://www.rg3.net
http://www.vai.la/
http://www.1br.net/
http://en.mylivepage.com/
http://freewebs.com
http://bravehost.com
http://dostweb.com
http://de.vu
http://us.tt
http://uk.tt
http://ca.tt
http://eu.tt
http://es.tt
http://fr.tt
http://it.tt
http://se.tt
http://dk.tt
http://be.tt
http://de.tt
http://at.tt
http://cx.la
http://de.gg
http://de.pn
http://de.tp
http://de.be
http://de.hm
http://de.nr
http://de.md
http://de.tt
http://de.ms
http://de.tc
http://de.tf
http://ch.tp
http://ch.pn
http://ch.gg
http://at.tp
http://at.pn
http://at.md
http://at.gg
http://elite.to
http://warez.by
http://warez.to
http://t3.to
http://hitz.to
http://redir.to
http://war3z.to
http://quality.by
http://appz.by
http://stuff.by
http://upload.by
http://gfx.by
http://user.by
http://crackz.by
http://dl.am
http://us.pn
http://us.mn
http://us.ms
http://us.tt
http://us.tf
http://us.tc
http://fr.mn
http://fr.pn
http://fr.ms
http://fr.tt
http://uk.pn
http://uk.mn
http://uk.tt
http://uk.md
http://ru.tf
http://ru.tc
http://ru.md
http://pl.tf
http://pl.tc
http://es.tc
http://es.tt
http://es.md
http://it.tc
http://it.mn
http://it.pn
http://cn.ms
http://cn.mn
http://cn.pn
http://jp.md
http://jp.pn
http://net.tf
http://net.tc
http://net.ms
http://info.ms
http://biz.md
http://eu.pn
http://eu.tp
http://eu.tf
http://eu.tc
http://edu.tf
http://u.tco.nr
http://box.ag
http://all.at
http://back.to
http://beam.at
http://been.at
http://bite.to
http://board.to
http://bounce.to
http://bowl.to
http://break.at
http://browse.to
http://change.to
http://chip.ms
http://connect.to
http://crash.to
http://cut.by
http://direct.at
http://dive.to
http://drink.to
http://drive.to
http://drop.to
http://easy.to
http://everything.at
http://fade.to
http://fanclub.ms
http://firstpage.de
http://fly.toflying.to
http://forward.to
http://fullspeed.to
http://fun.ms
http://gameday.de
http://germany.ms
http:// get.to
http://getit.at
http://hard-ware.de
http://hello.to
http://hey.to
http://hop.to
http://how.to
http://hp.ms
http://jump.to
http://kiss.to
http://listen.to
http://mediasite.de
http://megapage.de
http://messages.to
http://mine.at
http://more.at
http://more.by
http://move.to
http://musicpage.de
http://mypage.org
http://mysite.de
http://nav.to
http://notrix.at
http://notrix.ch
http://notrix.de
http://notrix.net
http://on.to
http://page.to
http://pagina.de
http://played.by
http://playsite.de
http://privat.ms
http://quickly.to
http://redirect.to
http://rulestheweb.com
http://run.to
http://scroll.to
http://seite.ms
http://shortcut.to
http://skip.to snap.to
http://soft-ware.de
http://start.at
http://stick.by
http://surf.to
http://switch.to
http://talk.to
http://tip.nu
http://top.ms
http://transfer.to
http://travel.to
http://turn.to
http:// vacations.to
http:// videopage.de
http://virtualpage.de
http://w3.to
http://walk.to
http://warp9.to
http://window.to
http://yours.at
http://zap.to
http://zip.to
http://meine-erste-homepage.com/subdomain.php
http://gratisdinge.de/kostenlos/kostenlose-domain.php
http://kostenlose-domain.de.cx/webspace.shtml
http://r-ene.de/kostenloses/domain.php
http://mailde.de
http://subdomain.tv
http://dx.am
http://orgfree.com
http://ueuo.com
http://altervista.org
http://funpic.org
http://host.sk

Sunday, August 23, 2009

HOW TO MAKE TROJANHORSE

Most of you may be curious to know about how to make Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you  how to make Trojan on your own  using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run.  Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The Trojan is available for download along with the source code at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan along with it’s source code HERE.

How to compile, test and remove the damage?

Compilation:
You can use Borland C++ compiler (or equivalent) to compile the Trojan.
Testing:
To test the Trojan,  just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.

CONVERTING .EXE FILE TO .JPG FILE

1. Firstly, create a new folder and make sure that the options 'show hidden files' is checked and ‘hide extensions for known file types’ is unchecked. Basically what u need is to see hidden files and see the extension of all your files on your pc.
2. Paste a copy of your server on the new created folder. let's say it's called server.exe
(that's why you need the extension of files showing, cause you need to see it to change it)
3. Now you’re going to rename this server.exe to whatever you want, let’s say for example picture.jpeg
4. Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.
5. Now create a shortcut of this picture.jpeg in the same folder.
6. Now that you have a shortcut, rename it to whatever you want, for example, me.jpeg.
7. Go to properties (on file me.jpeg) and now you need to do some changes there.
8. First of all delete all the text on field START IN and leave it empty.
9. Then on field TARGET you need to write the path to open the other file (the server renamed picture.jpeg) so u have to write this: C:\WINDOWS\system32\cmd.exe /c picture.jpeg)
10. The last field, c picture.jpeg is always the name of the first file. If you called the first file soccer.avi you
gotta write C:\WINDOWS\system32\cmd.exe /c soccer.avi got it?
11. So what you’re doing is when someone clicks on me.jpeg, a cmd will execute the other file picture.jpeg and the server will run.
12. On that file me.jpeg (shortcut), go to properties and you have an option to change the icon. click that and a new window will pop up and u have to write this: %SystemRoot%\system32\SHELL32.dll . Then press OK.
13. You can set the properties HIDDEN for the first file (picture.jpeg) if you think it’s better to get a connection from someone.
14. But don’t forget one thing, these 2 files must always be together in the same folder and to get connected
to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.
15. For me for example I always want the shortcut showing first so can be the first file to be opened.
So I rename the server to picture2.jpeg and the shortcut to picture 1.jpeg. This way the shortcut will show up first. If you set hidden properties to the server (picture.jpeg) then u don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a zip file or rar.
16. So the best way to send these files together to someone is compress them into zip or rar.
17.Inside the RAR or ZIP file you can see the files properties and even after all this work you can see that the
shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.