This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

telnet hacking part--1

******************************************************
In this Article you will learn how to:
* Use telnet from Windows
* Download web pages via telnet
* Get finger information via telnet
* Telnet from the DOS command-line
* Use netcat
* Break into Windows Computers from the Internet
Protecting Yourself
What can they do
The command-line approach
The GUI approach
Final Words (Rahul)
************************************************************

How to Use Telnet on a Windows Computer


Telnet is great little program for doing a couple of interesting things. In fact, if you want to call yourself a hacker, you absolutely MUST be able to telnet! In this lesson you will find out a few of the cool things a hacker can do with telnet.
If you are using Win95, you can find telnet in the c:\windows directory, and on NT, in the c:\winnt\system32 directory. There isn't a lot of online help concerning the usage of the program, so my goal is to provide some information for new users.
First off, telnet isn't so much an application as it is a protocol. Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine. The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine.
Now, telnet runs on your Win95 box as a GUI application...that is to say that you can type "telnet" at the command prompt (in Windows 95 this is the MS-DOS prompt), and assuming that your PATH is set correctly, a window titled "telnet" will open. This differs from your ftp program in that all commands are entered in the DOS window.
Let's begin by opening telnet. Simply open a DOS window by clicking "start", then "programs", then "MS-DOS", and at the command prompt, type:
c:\telnet
The window for telnet will open, and you can browse the features of the program from the menu bar.


***************************************************
NEWBIE NOTE: In this text file, I am referring only to the telnet
program that ships with Win95/NT. If you type "telnet" at the
command prompt and you don't get the telnet window, make sure
that the program is on your hard drive using the Start -> Find ->
Files or Folders command. Also make sure that your path statement includes the Windows directory. There are many other programs available that provide similar functionality, with a lot of other bells and whistles, from any number of software sites.
*************************************************


To learn a bit more about telnet, choose Help -> Contents, or
Help -> Search for help on... from the menu bar. Read through
the files in order to find more detailed explanations of things
you may wish to do. For example, in this explanation, I will
primarily be covering how to use the application and what it can
be used for, but now how to customize the colors for the application.
Now, if you choose Connect -> Remote System, you will be presented with a dialog window that will ask you for the remote host, the port and the terminal type.
****************************************************
NEWBIE NOTE: For most purposes, you can leave the terminal type on
VT100.
****************************************************
In the Connect dialog box, you can enter in the host to which
you wish to connect, and there is a list box of several ports
you can connect to:
daytime: May give you the current time on the server.
echo: May echo back whatever you type in, and will tell you that the computer you have connected to is alive nd running on the Internet. qotd: May provide you with a quote of the day.
chargen: May display a continuous stream of characters, useful for spotting network problems, but may crash your telnet program.
telnet: May present you with a login screen.
These will only work if the server to which you are trying to connect is running these services. However, you are not limited to just those ports...you can type in any port number you wish. (For more on fun ports, see the GTMHH, "Port Surf's Up.") You will only successfully connect to the port if the service in question is available. What occurs after you connect depends upon the protocol for that particular service.
When you are using telnet to connect to the telnet service on a server, you will (in most cases) be presented with a banner and a login prompt.
[Note from Carolyn Meinel: Many people have written saying their telnet program fails to connect no matter what host they try to reach. Here's a way to fix your problem. First -- make sure you are already connected to the Internet. If your telnet program still cannot connect to anything, here's how to fix your problem. Click "start" then "settings" then "control panel." Then click "Internet" then "connection." This screen will have two boxes that may or may not be checked. The top one says "connect to the Internet as needed." If that box is checked, uncheck it -- but only uncheck it if you already have been having problems connecting. The bottom box says "connect through a proxy server." If that box is checked, you probably are on a local area network and your systems administrator doesn't allow you to use telnet.]
*********************************************

NEWBIE NOTE: It's not a good idea to connect to a host on which you don't have a valid account. In your attempts to guess a username and password, all you will do is fill the log files on that host. From there, you can very easily be traced, and your online service provider will probably cancel your account.
**********************************************
Now, you can also use telnet to connect to other ports, such as
ftp (21), smtp (25), pop3 (110), and even http (80). When you
connect to ftp, smtp, and pop3, you will be presented with a
banner, or a line of text that displays some information about the
service. This will give you a clue as to the operating system
running on the host computer, or it may come right out and tell
you what the operating system is...for instance, AIX, Linux,
Solaris, or NT. If you successfully connect to port 80, you will
see a blank screen. This indicates, again, that you have successfully completed the TCP negotiation and you have a connection.
Now, what you do from there is up to you. You can simply disconnect with the knowledge that, yes, there is a service running on port 80, or you can use your knowledge of the HTTP protocol to retrieve the HTML source for web pages on the server.
How to Download Web Pages Via Telnet
To retrieve a web page for a server using telnet, you need to connect to that server on port 80, generally. Some servers may use a different port number, such as 8080, but most web servers run on port 80. The first thing you need to do is click on Terminal -> Preferences and make sure that there is a check in the Local Echo box. Then, since most web pages will generally take up more than a single screen, enable logging by clicking Terminal -> Start Logging... and select a location and filename. Keep in mind that as long as logging is on, and the same file is being logged to, all new information will be appended to the file, rather than overwriting the
original file. This is useful if you want to record several sessions, and edit out the extraneous information using Notepad.
Now, connect the remote host, and if your connection is successful, type in:
GET / HTTP/1.0
and hit enter twice.
**************************************************
NEWBIE NOTE: Make sure that you hit enter twice...this is part
of the HTTP protocol. The single / after GET tells the server
to return the default index file, which is generally "index.html".
However, you can enter other filenames, as well.
*************************************************

telnet hacking part ---2

The blank screen indicates that the finger daemon is waiting for input. If you have a particular user that you are interested in, type in the username and hit enter. A response will be provided, and the daemon will disconnect the client. If you don't know a particular username, you can start by simply hitting enter. In some cases, you may get a response such as "No one logged on." Or you may get information of all currently logged on users. It all depends on whether or not the sysadmin has chosen to enable certain features of the daemon. You can also try other names, such as "root", "daemon", "ftp", "bin", etc.
Another neat trick to try out is something that I have seen referred to as "finger forwarding". To try this out, you need two hosts that run finger. Connect to the first host, host1.com, and enter the username that you are interested in. Then go to the second host, and enter:
user@host1.com
Now, if you want to show your friends that you a "real man" because "real men don't need no stinkin' GUIs", well just open up a DOS window and type:
c:\>telnet
and the program will automatically attempt to connect to the host
on the designated port for you.
Using Netcat
Let me start by giving a mighty big thanks to Weld Pond from L0pht for producing the netcat program for Windows NT. To get a copy of this program, which comes with source code, simply go to:
http://www.l0pht.com/~weld
NOTE: The first character of "l0pht: is the letter "l". The second character is a zero, not an "o".
I know that the program is supposed to run on NT, but I have
seen it run on Win95. It's a great little program that can be used
to do some of the same things as telnet. However, there are
advantages to using netcat...for one, it's a command-line program,
and it can be included in a batch file. In fact, you can automate
multiple calls to netcat in a batch file, saving the results to
a text file.
**************************************************
Before using netcat, take a look at the readme.txt file provided in
the zipped archive you downloaded. It goes over the instructions
on how to download web pages using netcat, similar to what I
described earlier using telnet.
There are two ways to go about getting finger information using
netcat. The first is in interactive mode. Simply type:
c:\>nc 79
If the daemon is running, you won't get a command prompt back. If this is the case, type in the username and hit enter. Or use the automatic mode by first creating a text file containing the username of interest. For example, I typed:
c:\>edit root
and entered the username "root", without the quotes. Then from
the command prompt, type:
c:\>nc 79 < root
and the response will appear on your screen. You can save the
output to a file by adding the appropriate redirection operator
to the end of the file:
c:\>nc 79 <> nc.log
to create the file nc.log, or:
c:\>nc 79 <>> nc.log
to append the response to the end of nc.log. NOTE: Make sure
that you use spaces between the redirection operators.

How to Break into a Windows machine Connected to the Internet

Protecting Yourself
First, the method of protecting yourself needs to be made perfectly clear. DON'T SHARE FILES!! I can't stress that enough. If you are a home user, and you are connecting a Win computer to the Internet via some dial-up method, disable sharing. If you must share, use a strong password...8 characters minimum, a mix of upper and lower case letters and numbers, change the password every now and again. If you need to transmit the
password to someone, do so over the phone or by written letter. To disable sharing, click on My Computer -> Control Panel -> Network -> File and Print Sharing. In the dialog box that appears, uncheck both boxes. It's that easy.

** The command-line approach **
Okay, now for the part that should probably be titled "How they do it". All that is needed is the IP address of the remote machine. Now open up a DOS window, and at the command prompt, type:
c:\>nbtstat -A [ip_addr]
If the remote machine is connected to the Internet and the ports used for sharing are not blocked, you should see something like:
NetBIOS Remote Machine Name Table
Name Type Status
---------------------------------------------
NAME <00> UNIQUE Registered
DOMAIN <00> GROUP Registered
NAME <03> UNIQUE Registered
USERNAME <03> UNIQUE Registered
MAC Address = 00-00-00-00-00-00
This machine name table shows the machine and domain names, a logged-on username, and the address of the Ethernet adapter (the information has been obfuscated for instructional purposes).
**Note: This machine, if unpatched and not protected with a firewall or packet-filter router, may be vulnerable to a range of denial of service attacks, which seem to be fairly popular, largely because they require no skill or knowledge to perpetrate.
The key piece of information that you are looking for is in the Type column. A machine that has sharing enabled will have a hex code of "<20>".
If you find a machine with sharing enabled, the next thing to do is type the following command:
c:\>net view \\[ip_addr]
Now, your response may be varied. You may find that there are no shares on the list, or that there are several shares available. Choose which share you would like to connect to, and type the command:
c:\>net use g: \\[ip_addr]\[share_name]
You will likely get a response that the command was completed successfully. If that is the case, type:
c:\>cd g:
or which ever device name you decided to use. You can now view what exists on that share using the dir commands, etc.
Now, you may be presented with a password prompt when you ssue the above command. If that is the case, typical "hacker" (I shudder at that term) methods may be used.
c:\windows\lmhosts.sam
Read over the file, and then open create another file in Notepad, called simply "Lmhosts", without an extension. The file should contain the IP address of the host, the NetBIOS name of the host (from the nbtstat command), and #PRE, separated by tabs. Once you have added this information, save it, and minimize the window. In the DOS command window, type:
c:\>nbtstat -R
This command reloads the cache from the Lmhosts file you just created.
Now, click on Start -> Find -> Computer, and type in the NetBIOS name of the computer...the same one you added to the lmhosts file. If your attempt to connect to the machine is successful, you should be presented with a window containing the available shares. You may be presented with a password prompt window, but again, typical "hacker" (again, that term grates on me like fingernails on a chalk board, but today, it seems that it's all folks understand) techniques may be used to break the password.
************************************************
You friend can learn his or her IP address by going to the DOS prompt while online and giving the command "netstat -r". Something like this should show up:
C:\WINDOWS>netstat -r
Route Table
Active Routes:
Network Address Netmask Gateway Address Interface Metric
0.0.0.0 0.0.0.0 198.999.176.84 198.999.176.84 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
198.999.176.0 255.255.255.0 198.999.176.84 198.999.176.84 1
198.999.176.84 255.255.255.255 127.0.0.1 127.0.0.1 1
198.999.176.255 255.255.255.255 198.999.176.84 198.999.176.84 1
224.0.0.0 224.0.0.0 198.999.176.84 198.999.176.84 1
255.255.255.255 255.255.255.255 198.999.176.84 0.0.0.0 1
Your friend's IP address should be under "Gateway Address." Ignore the 127.0.0.1 as this will show up for everyone and simply means "locahost" or "my own computer." If in doubt, break the Internet connection and then get online again. The number that changes is the IP address of your friend's computer.

Send Free SMS InternationaL

First of all i wannna tell you i am not joking , this is true by a simple trick or you can say hack or anything else you can send all sms free Abroad also....
I try it myself and sends more than 1000 Sms free International like Africa, Australia , Usa , France ........
The trick is the following:-
1. Must have Airtel connection or you should have the connection in which your Balance doesnot go into negative like in Hutch if we have have balance like 2 or 3 Rs then if you make a call or use GPRS there balance goes into negative , these days In Airtel also balance goes into negative but in some case the don't.
2. This Hack or you can say the trick you can use only on Nokia 2600 , well i use on that phone only try it on 1110 but no use on that phone.
3. The Advantage of this phone is that you can send 2 or 3 or more sms Simontaniously , this all happens like this , in Nokia 2600 when you send sms there will be a bar on your phone that message is sending so at that time if you click any button that nag screen disappears and if you have speed you can send one more sms while sending the previous one.
4. In Airtel , when i was very addicted to send sms to ma friends i find that when you have balance less than Rs 5 then you can send one free sms anywhere in the world but just only one , by this i came to knwo about the Airtel weak security and servers.
5. Now we do like this first of all go to any Airtel dealer and have free sms pack. And then save the international no. on your phone by which you can find it easily (i tried using it blank or .123.... goes on) now save your no. or any friend no you want and left the name blank or simple digits , now write a text message and send it to you or your friend , and when you can see the nag screen saying the message is sending , at that time click the main menu button and again send the message to your Abroad friend at any country , you must have speed or else the second msg will not go... NOTE You can send 1 message, if in your mobile if you see the upper right corner if it says message sending into two parts then it will not go only one message can go . After doing this the message to your friend who is in abroad will recieve the message like you receive the message of your friend but the best thing is its all free , the Airtel will think that you have send both the message in India only because you was too fast that you send 2 message at a time one to India and one to Abroad whihc they cannot detect...
So enjoy sending free Sms!!!!!!!

Send anonymous msg to victim via Bluetooth with out his permission.

Utility Name: Freejack
Features: Bluejacking tool written in JAVA
Download URL: http://www.software13.co.uk/freejack/

Reinstalling + Formating Operating system

Ever since Microsoft came with their tightened up firewall in the present Microsoft OS VISTA...things have become a bit time consuming and fadish[yeah!! i am talking about the screen turning fade with every second firewall yes/no or allow /disallow and the most frequent of them all 'NOT Responding'
Ok, by mistake will playing with Task Manager[Cntrl + Shift + Esc ] and some arbit game i was playing stopped responding. And there i saw a change in Processes tab in Task Manager "WinFault" down in the list. So, if somthing like this happens next time with you, A Not Responding message comes up and your close the application followed by End Now crap...You just open your Task Manager,click on Processes ,scroll down to WinFault and Select it and click on end process....Thats it!!! YOUR PROBLEM SOLVED !!!


Yippeeee...Keep visiting for more!!

Enter your email address:

Reinstalling + Formating Operating system

#1 Backing up files

If you have a habit of saving all the files in My Documents, This is your first step. Check out all possible folders like My Pictures, My Music and copy whichever is required to some other folder. You will loose data as they are in same drive where you will install the OS.

#2 Saving your configuration and profile files

In most of the software’s the facility to backup profiles or software configuration is present. Now in case you are going to install the software after re installation, You ,must do it so that you don’t loose your optimized settings and save time.

#3 Saving all your download folders and files

By default all softwares and settings are made to save files somewhere in C directory. Now lets say you downloaded a complete setup of itunes which is around 50 MB and saved in C:\download, If you don’t back it up you will have to re download that which will be ultimate waste of time.

So in case you have any thing like this save it.

#4 Re think on Partition Size.

Now lets say You have re installed as you don’t have much space left and You decided to reinstall everything and install only the required once to save space. Since you are going to re install its a better idea to increase the size of you partition . You might need some professional help or somebody who knows how to do this, but it will help you in long run.

#5 Note down things you need to install after this

Now since we have backed up everything and its ready to go . This one step you must follow.

Make a list of things you will be installing after reinstallation is over. Here is QUICK LIST

  • DRIVERS
  • Antivirus and Spywares
  • Browsers and addons.
  • Office Suites
  • Media Players and updates.
  • Rest of the things.

It gives you an idea of general things, You can change the list according to your need

Steps after reinstallation

Photoshop Cs2

Is Photoshop CS2 worth the upgrade? You bet it is! Here are just 10 things you can do with this fantastic new version of Photoshop that were impossible (or difficult) to do with previous versions:

Manipulate objects in the Adobe Bridge

This new generation of file browser enables you to look at photographs and artwork in detail before you open the file, process multiple Camera Raw images, flip through pages in PDF documents, size, rate and organize your work in a convenient and highly user-friendly way. Goes way beyond the capabilities of the File Browser introduced in Photoshop 7.

Get rid of imperfections with the Spot Healing Bush

The Spot Healing brush enables you to get rid of slight imperfections - like dust or scratches at the click of a mouse. Unlike the Healing Brush or Patch tools, you don't have to find a source point first.

Remove "red-eye" in an instant. With older versions of Photoshop, removing red-eye and pet-eye was possible, but it wasn't easy. Now, one click of the Red Eye removal tool can remove pet-eye and red-eye from your photographs, in less time than it takes your subject to say "cheese!".

Perform non-destructive scaling with Smart Objects. You know how it is: You try to make an imported object larger, and it goes all blurry and pixelated. With Smart Objects, that's a thing of the past, because you can scale, warp and rotate vector graphics in a non-destructive way.

Do neat things in perspective with the new Vanishing Point feature. With Vanishing point you can cut and paste in perspective. Now you're able to turn a photograph of a wall into a "virtual art gallery" with all the pictures correctly skewed, or move a window from one side of a building to another and, because the perspective is correct, have it look like it's always been there. You can also draw lines that taper off into the distance - wide nearest the camera, narrow further away - just like in "real life".

Get more accurate printing. With Photoshop CS2, the people at Adobe have improved the printing workflow. Now it's even easier to configure your inkjet printer to get more accurate color printing.

Customize menus and workspaces. Photoshop CS2 lets you highlight commonly used menu items, and set up custom menus and workspaces. Now all the power of Photoshop is (literally) at your command, and can be tailored to your requirements.

See what each font looks like before you use it. Finally! Photoshop gets a WYSIWYG font drop-down menu. Now you don't have to keep text highlighted while you cycle through all the fonts until you get to the right one!

Manipulate images with Image Warp. Image Warp allows you to bend, peel, and stretch images the same way as type. Now you can put an image on a mug or soda can with ease.

See what video graphics will look like, while you're doing them. If you're a video professional , you'll know how frustrating it can be: You make a graphic that looks fantastic on a flat computer monitor, but when you import the .psd file into your Avid timeline, and look at it on the TV screen, it's not quite what you had in mind. You then have to go back into Photoshop and make your artwork look "wrong", so it will look right on a video monitor. With Photoshop CS2 you can preview your images on a video monitor directly from the software, and see exactly how they're going to look in your video, even if your editing software is on a different computer. Neat eh?

Outlook Tips: One of the coolest and most useful Outlook tip

Did Forget to mention subject while writing an official email?
Sometimes YES, and that too when we send some important mails.
It happens accidentally. Don't worry...
Just follow the below steps & see the result.
1. Open your outlook and press Alt+F11 (this opens the Visual Basic editor)
2. On the Left Pane you'll see "Microsoft Outlook Objects", expand this. Now one can see the "ThisOutLookSession".
3. Click on "ThisOutLookSession" then copy and Paste the code below in the right pane. (Code Pane)
*****************************************************************************************************************
Private Sub Application_ItemSend(ByVal Item As Object, Cancel As Boolean)
If Len(Item.Subject) = 0 Then
Prompt$ = "Subject is Empty. Are you sure you want to send the Mail?"
If MsgBox(Prompt$, vbYesNo + vbQuestion + vbMsgBoxSetForeground, "Check for Subject") = vbNo Then
Cancel = True
End If
End If
End Sub
*****************************************************************************************************************
You are Done..
Next time You will not send a mail without a Subject in it..
Whenever you start outlook it will prompt you for enabling Macros where you select Yes.

Posted by jai at 1:15 AM 1 comments

Outlook Tips: Remove all items from Calendar

Follow the steps given below to remove all items from calendar..
Note: This method removes all items without asking for a confirmation. So use with caution.
1. Go to Calendar view using Shortcut Ctrl+2.
2. Go to View -> Arrange By -> Current View -> By Category.
3. Click on any one of the small calendar icons on the left-most row.
4. Select all items using Shortcut Ctrl+A.
5. Press 'Delete' or right-click and select delete in it.
You may go back to the usual Calendar 'View' mode by going to View -> Arrange By -> Current View -> Day/Week/Month.
You may go back to 'Mail' mode by clicking on the 'Mail' and then 'Folder List' buttons or using Shortcuts Ctrl+1 and then Ctrl+6.

Outlook Tips: Recovering Shift+Deleted mails

Follow the steps given below to Retrieve the mails deleted using Shift+Delete option..
MS Outlook 2000 and 2003 soft deletes the mails.
That is all copies of deleted mails including Shift+deleted are stored in PST file and can be recovered manually using the Recover Deleted Items option from the Tools menu

To Enable these Options:
By default this option is disabled in MS Outlook.
Use the following steps to enable this option..
1.Close Outlook
2.Open Windows registry editor (Run -> regedit)
3.Browse to My Computer\HKEY_LOCAL_MACHINE\Software\Microsoft\Exchange\Client\Options registry key
4.On the Edit menu, point to New, and then click DWORD Value.
Type the name DumpsterAlwaysOn (Note: Case sensitive Do not type any spaces in the name).
5.Set the DWORD value to 1 to turn the Recover Deleted Items menu choice on for all folders or enter 0 to turn it off.
6.Restart Outlook.

Note:This procedure can recover mails which were deleted by pressing shift+del in the past 4 days only.
All the Windows registry changes if incorrectly done may damage your system.

Outlook Tips: Recalling Mails Sent

Follow the given steps below to Recall the sent mails..
1.Go to the Sent Items folder.
2.Open the message to be recalled.
3.Actions -> 'Recall This Message'.
4.To recall the message -> 'Delete unread copies of this message'
5.To replace the message -> 'Delete unread copies and replace with a new message'
6.To be notified about the success of the recall or replacement, select 'Tell me if recall succeeds or fails for each recipient' check box.

If there are multiple recipients, you can request notification of whether the recall succeeded or failed for each one (so that you can take necessary steps).

Note: Even after successfull recalling of the message, the recipient still knows that you sent a message and then recalled it. Further more this will work only for mails sent within the a company or a Domain, others will get a plain text mail stating that you attempted to recall.