This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Rapidshare Premium acc. Generator

Find ip address of any site


step 1:
open your dos it is done by pressing window key and r at a time


step2
type cmd

step3
type ping domain.com
domain.com is the site for which u want to know the ip address

it look like this





C:\Documents and Settings\admin>ping youtube.com

Pinging youtube.com [208.65.153.251] with 32 bytes of data

Reply from 208.65.153.251: bytes=32 time=1234ms TTL=244
Reply from 208.65.153.251: bytes=32 time=1424ms TTL=244
Reply from 208.65.153.251: bytes=32 time=1649ms TTL=244
Request timed out.

Ping statistics for 208.65.153.251:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 1234ms, Maximum = 1649ms, Average = 1435ms



here 208.65.153.251 is the ip address of youtube

u can to this for any site
i hope u get it
regards
blackshadow



AddThis Social Bookmark Button


Basic BIOS password crack


This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:
Get DOS prompt and type:
DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter
Restart the computer. It works on most versions of the AWARD BIOS.



AddThis Social Bookmark Button


How to hack into the cola maschine


-How to hack into the cola maschine:

http://www.i-hacked.com/content/view/12/48/

-how you get free cokes:
http://www.youtube.com/watch?v=AWS-7nIuXus
that works with nearly all newer cola machines, not only with this one in the video,when you have a "closed" one without a window, just step with the foot in the "coce-outcomming-door" and presss money return..=) free coke and money back!

-how to get money from coke maschine:

http://www.youtube.com/watch?v=KZB3AO2dkAs&NR

Press 432112311 + press change= money comes out^^

ok you must press the buttons like that:

cola light (x) <-----first button is nummber 1
cola (x) <-------second nummer 2
fanta (x) <---------- third nr 3

or:

cola light (x) <----1 cola (x) <----2 fanta (x) <---3



AddThis Social Bookmark Button


The Firefox Extensions thread


all know how good is firefox with it is extensions

making it handy , useful and productive all the more

This thread is to post what extensions you have in your firefox browsers or think are useful
the ones i think really useful are

Ad and edit cookies - Cookie Editor

DOM inspector - Document Object Model Inspector (Default)

FireBug - Web development tool

FireFTP - FTP client for firefox

Grease Monkey - To add javascript features to website

IE tab - Use Internet Explorer in Firefox

Live HTTP Header - HTTP Header analyser

Ref Control - To spoof referrer

Sage - RSS feed reader

Tamper Data - Modify POST and GET varibles with ease

Tor Button - Anonymity with the click of a button

User Agent Switcher - Spoofing User Agents easily

Switch Proxy - To stay anonymous with proxies



AddThis Social Bookmark Button


Email Viruses


The latest thing in the world of computer viruses is the e-mail virus, and the Melissa virus in March 1999 was spectacular. Melissa spread in Mcft Word documents sent via e-mail, and it worked like this:

Someone created the virus as a Word document uploaded to an Internet newsgroup. Anyone who downloaded the document and opened it would trigger the virus. The virus would then send the document (and therefore itself) in an e-mail message to the first 50 people in the person's address book. The e-mail message contained a friendly note that included the person's name, so the recipient would open the document thinking it was harmless. The virus would then create 50 new messages from the recipient's machine. As a result, the Melissa virus was the fastest-spreading virus ever seen! As mentioned earlier, it forced a number of large companies to shut down their e-mail systems.

The I LOVE YOU VIRUS, which appeared on May 4, 2000, was even simpler. It contained a piece of code as an attachment. People who double clicked on the attachment allowed the code to execute. The code sent copies of itself to everyone in the victim's address book and then started corrupting files on the victim's machine. This is as simple as a virus can get. It is really more of a Trojan horse distributed by e-mail than it is a virus.

The Melissa virus took advantage of the programming language built into Mcft Word called VBA, or Visual Basic for Applications. It is a complete programming language and it can be programmed to do things like modify files and send e-mail messages. It also has a useful but dangerous auto-execute feature. A programmer can insert a program into a document that runs instantly whenever the document is opened. This is how the Melissa virus was programmed. Anyone who opened a document infected with Melissa would immediately activate the virus. It would send the 50 e-mails, and then infect a central file called NORMAL.DOT so that any file saved later would also contain the virus! It created a huge mess.

Mcft applications have a feature called Macro Virus Protection built into them to prevent this sort of thing. With Macro Virus Protection turned on (the default option is ON), the auto-execute feature is disabled. So when a document tries to auto-execute viral code, a dialog pops up warning the user. Unfortunately, many people don't know what macros or macro viruses are, and when they see the dialog they ignore it, so the virus runs anyway. Many other people turn off the protection mechanism. So the Melissa virus spread despite the safeguards in place to prevent it.

In the case of the ILOVEYOU virus, the whole thing was human-powered. If a person double-clicked on the program that came as an attachment, then the program ran and did its thing. What fueled this virus was the human willingness to double-click on the executable.



AddThis Social Bookmark Button


Virtualization - Multiple OSs


Virtualisation - your alternative OS

Well most of the people are reluctant in installing another OS on their hard drive as it consumes a lot of space . needs a new partition and has got problems like filesystem incompatibility (ntfs write partially supported in linux and no support of ext3 on windows)

Now here comes virtualisation - the option for you to run multiple OSs in one host operating system. Now to understand virtualisation consider this picture .
I am not good at making pictures but anyways





Now Your host os is the one that currently runs on your computer. You install a virtualisation software like vmware , virtual pc in the software layer of you operating system. in the software layer the the virtualisation software creates guest operating system which furthur have software layer..

Now since there is no direct interaction between guest os in host os so you can install anything like a mac osx , a linux , or other windows install your current operating system

Uses of making a Virtual Machine
No hassles of disk partitioning , boot manager configuring etc.
Multiple OSs can be run at a same time . making your computer a mini LAN . Very suitable for making a pentest lab
There is no interaction between host and the guest os so you can test your virii ,trojan ,other malware without damaging the host

Now how to create a Virtual machine :-
Tools needed :-
vmware player - www.vmware.com/download/player/
vmx wizard - http://rhysgoodwin.orcon.net.nz/vmxwizard

IF you can buy/download vmware workstation i'd recommend that

Now creating virtual machines :- Use vmx wizard - to create VMX files

Choose the operating system type (windows ,linux,other)



Allocate the disk space


Specify the installation drive or cd image




Choose networking options



Save your virtual machine made




Running virtual machine :- use vmware player
Open .vmx file in vmware player



Now you are running a linux inside windows :- Click inside the machine to get inside virtual machine and work in there
Press Ctrl+Alt to get out of it


Well thats how you can run different OS within one OS
There are other feature in Vmware like :-

Snapshot :- just like system restore (but better and complete)
Suspend :- saves current configuration and stops vm (like hibernate ,but again lot better)
Poweroff :- no need to shut down . just cross the vmware player (faster shutdown)
Installing Vmware tools makes your Virtual machine really good :- better graphics support. File transfer between guest and host OS is simplifies (drag and drop) , and mouse change between guest and host OS is dramatically improved



AddThis Social Bookmark Button