Thursday, 23 January 2014

Increase RAM speed using notepad.

 
Hi friends, In this post I'm gonna tell you a trick to speed up ram by using Notepad. You might have lot of problems sometimes that your computer not responding. You can use this trick and avoid that.  And it's an easy task to do.
Lets start,
  • At first open notepad.
  • Then type the code bellow.
FreeMem=Space(64000000)
  • Now save the file as cleanRam.vbs
  • That's it. Open the file (double click) and you are done.
 If any questions feel free to comment.

Wednesday, 22 January 2014

Virii.exe Virus

One more virus but bit dangerous..... ;)

Virii.exe

  • This is a deadly virus that modifies registry so much that the user can't run any exe, bat, ini, inf, reg files anymore.
  • Disables ALL .exe files on computer including regedit, cmd, task-mgr etc.
  • Deletes restore settings.
  • Modifies files of LastKnownGood Configuration, changes System Folder & Windows folder so it will be much worse to start with LastKnownGood configurations to repair virii.
  • Modifies usb mass storage drivers and usb driver to make sure that the user can't backup his data, disables access to new usb drivers. In-fact USB absolutely don't work in Win 7.
  • Windows can't be reinstalled because it gives error "rundll32.exe" can't be opened. HDD should be formatted first to install windows.
  • 4KB and almost undetectable because it just modifies the registry badly and leave no other traces on the computer. (Antivirus detects absolutely nothing after the virus execution)
  • BUT.... every blocked file can be opened with some trick. (Hint : The user can not directly access them but the files can!
  • In simple words it makes the windows unusable but has no effect on one's data.

Tested in Win XP, win 7 (Comparitively less effective in Windows 7)
EXE's not working after the infection
Note : The virus is compressed and password protected, so safe to download
The password for the VIRII Virus is "9M6#K?oct9LQvMZ"
 
try GOOGLING

Remotely Shutdown Ur Computer vid a Cell Phone

While Searchin YouTube I have found dis Video 

Try it Guys


Link : http://www.youtube.com/v/KUw_9qbNj_E

Hacking any PC using IP Address !!!

Literally, hacking is to get something or someone on the internet without their consent or interest. While speaking of a short, hacking is a very easy job, it is as if instead of the using front door, finding a hidden door of a house and the seizure of valuables(hijacking the precious things). Among the main hacking, hacking through the IP address is one of the most common yet with a powerful beginning.

You may want to hack the website and put your advertisement there or grab some database information.
In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer.
Because for eg. www.website.com is in a separate Web server instead of the personal computer.

Another might be to access the computer of your friend from your home. Again, based on IP, and it is only possible when your friend’s computer is online. If it is off or not connected to the Internet, allowing external IP hacking(remote IP Hacking) is quite impossible.

Well, both have the same process. So Let's summarize what we should do.

First Of All Confirm the site or the computer you wanna hack.

1. Discover or trace their IP addresses.

2. Verify that the IP address is online

3. Scan open ports

4. Check the doors Venerability(for venerable ports)

5. Access through the door(probably the port).

6. Brute force username and password

Now let me just briefly describe the basic steps that a child can also understand if you didnt get.

First, get the IP address of the victim.

To get the IP address of the victim's website, ping for it in command prompt.

For example,

ping www.google.com
=>
To retrieve the IP address of google.com

That's how we can get the IP address of the victim's website.

What about your friend's PC? You can't do www.yourfriendname.com, huh?
Finding the IP address of your friend's PC is a bit complicated and most difficult, if it has a dynamic IP address, which changes constantly.

A common method to detect the IP address of your friend is talking to him.

Go Here From your Friend's Computer:
http://www.tracemyip.org/
From Here You Can Check Out His IP-Address & Note It Down somewhere.

Now, did you have the IP address?
If yes then do check it out if he/she's online? ITo know the online status just ping the IP address, if it is online it will reply.

If the IP address is online, scan for the open ports. Open ports are like closed doors, without locks, you can get in and out easily.

Use the Advanced Port Scanner to scan all open and venerable ports/doors.
Now that you have the IP address and open port of the victim, now you can use telnet to try to access it. 

Make sure you have telnet enabled on your computer or install it from:
Control Panel > Add or Remove Programs > Add Windows Components
Then open command prompt and use the telnet command to access the IP address.
Use the following syntax for the connection.


 If you can easily guess the information then it's okay. Or you can use some brute force tools below.
Brutus is one of the fastest, most flexible remote password crackers you can get your hands on - is also free. It 'available for Windows 9x, NT and 2000, there is no UN * X version available although it is possible at some point in the future. This Windows-only cracker bangs against network services of remote systems trying to guess passwords using a dictionary and its permutations. It supports HTTP, POP3, FTP, SMB, Telnet, IMAP, NTP, and more.
Platform: Windows


This tool enables the rapid dictionary attacks against systems connecting to the network, including FTP, POP3, IMAP, Net-bios, Telnet, HTTP authentication, LDAP NNTP, VNC, ICQ, SOCKS5, PCNFS, and more. Includes SSL support and is apparently now part of Nessus.

Platform: UNIX , Windows

TSGrinder terminal server is the first gross instrument of force. The main idea is that the administrator account, since it cannot be locked out for local logons, can be brute forced. And having an encrypted channel for the process of TS Logon that helps to keep IDS from catching the attempts. This is a "dictionary" based attack tool, but has some interesting features like "1337" conversion and supports multiple attack windows from a single dictionary file. It supports multiple password attempts in the same way, and lets you specify how often you try a combination of username / password on a particular connection.

Platform: Windows 

In this way, you will be able to hack remote computer using just the IP address. !!
Enjoy With Us

Please Share :)