This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Bypassing Vista SP1 Windows Genuine Advantage


The fact that Microsoft has relaxed its antipiracy mechanism built into Windows Vista concomitantly with the release of Service Pack 1 failed to stop hackers from providing a crack for the latest version of Windows Genuine Advantage Validation.


Various reports point out that Genuine Advantage Validation and Notifications versions 1.7.69.1 (1.7.0069.1) and 1.7.69.2 released in March 2008, following the March 18 availability of Windows Vista SP1 through Windows Update and the Microsoft Download Center, have been cracked.


The workaround is designed to be integrated with pirated copies of Windows XP and Windows Vista in order to render useless the WGA Validation mechanism. According to the reports, applying the WGA crack will permit users of counterfeit versions of Windows to access and download items from Windows Update, Microsoft Download Center and Microsoft Update. The pirated operating systems with the cracked WGA will pass all validations on Microsoft’s websites and offer anything from updates to applications that are restricted to users of genuine operating systems only.


With the release of Windows Vista SP1, Microsoft has scrapped the Reduced Functionality Mode kill switch in its latest operating system. Users of pirated Vista, just as those of XP and Windows Server 2008 will only be informed of the fact that their operating system is no longer genuine. However, pirated versions of Windows are automatically blocked from downloading certain free applications as well as all updates except those labeled Critical. The WGA crack is designed to fix that.


“After the activation grace period has been exceeded the next logon will present the user with a message that directs the customer to activate that copy of Windows. That dialog includes a fifteen second delay before it can be dismissed. If they want to skip activation at that time they can wait for the fifteen seconds and choose “Activate Later” .

But the new story is different.That is Vista SP1 has been cracked successfully and it’s possible to bypass the Windows Genuine Advantage to fool the OS to beleive it as genuine.The release of Service Pack 1 for Vista seems to put no combat against piracy.This crack is available for download on this site.


MORE INFORMATION ON THE CRACK(ACTIVATOR)


VistaSP1_1-Click Activator

Unlike other cracks eg: Vista Loader 3.0.0.1(which has some known issues with the dual boot systems) this crack has been designed to work on dual boot systems.

This crack has incorporated an automated installation process which makes it easy to install.You can select from 4 OEM Logos and licenses during the installation process and within a few seconds your copy will be activated.You can see the system activated upon restart.



This crack also features an uninstallation process which most of the cracks lack the same.Using this, it is not necessary to carry out the manual uninstallation process.You can just uninstall the crack with a single click.


PLEASE FOLLOW THESE INSTRUCTIONS BEFORE APPLYING THIS CRACK.


1.YOU MUST HAVE FULL ADMINISTRATOR RIGHTS TO INSTALL THIS CRACK.


2.TURN OFF USER ACCOUNT CONTROL(UAC) BEFORE INSTALLING THIS CRACK.


3.THIS CRACK CURRENTLY HAS BEEN TESTED ONLY ON 32-BIT ULTIMATE EDITION OF WINDOWS VISTA.


4.EASY ONE CLICK ACTIVATOR.


5.YOU CAN ALSO USE THIS CRACK TO UNINSTALL THE ACTIVATOR.

ENJOY!!!


Here is the download link for the crack

DOWNLOAD


Please post your feedback through comments.

File Embedder Project in C

Some times it is necessary for our compiled project to have it’s supporting files embedded within the EXE module itself so that the supporting files may not be put into a seperate folder and carried along with the project.So here i am presenting you with the source code of the FILE EMBEDDER UTILITY project.

This utility can be used to embed one file with in the other.ie:Suppose we need to embed a .bat file(or any other file *.exe,*bmp,.txt…..) into our final project so that the batch file is present with in the compiled module and is hidden from the users avoiding tthe need to carry the .bat file every time with the project.

Both the Embedding and extraction process has been presented in seperate functions for your convenience.here’s the code…..

#include
#include
#include
#include
#include
#include
#include

void embed(void);
void extract(void);

char buff[1],sname[128],tname[128],dname[128],choice;
unsigned long int size=0;long int psize=0;int outh,bytes=0;
FILE *source,*target,*data;

void main()
{
while(1)
{
clrscr();
puts(”\n\n\t\t\tFILE EMBEDDING UTILITY BY SRIKANTH\n\n\n”);
puts(”1.Embed A File 2. Extract A File 3.Exit\n”);
choice=getch();
switch(choice)
{
case ‘1′:embed();
getch();
break;
case ‘2′:
extract();
getch();
break;
default:
exit(0);
}
}
}

void embed()
{
puts(”\nEnter The Source Filename\n”);
scanf(”%s”,sname);
source=fopen(sname,”rb+”);
if(source==NULL)
{
puts(”\nCannot Open The Source File\n”);
return;
}
puts(”\nEnter The Target Filename\n”);
scanf(”%s”,tname);
outh=open(tname,O_RDONLYO_BINARY);
if(outh==-1)
{
puts(”\nCannot Open The Target File\n”);
return;
}
printf(”\nReading The Source File Please Wait…\n”);
while((bytes=read(outh,buff,1))>0)
size+=bytes;
data=fopen(”Data.cfg”,”w”);
if(data==NULL)
{
puts(”\nCannot Create Configuration The File\n”);
return;
}
fprintf(data,”%lu”,size);
close(outh);
fclose(data);
target=fopen(tname,”rb”);
if(target==NULL)
{
puts(”Cannot Open Target File\n”);
return;
}
printf(”\nEmbedding Please Wait…\n”);
fseek(source,0,SEEK_END);
while(fread(buff,1,1,target)>0)
fwrite(buff,1,1,source);
fcloseall();
printf(”\nEmbedding Completed Successfully\n”);
}

void extract()
{
printf(”\nEnter The Source Filename\n”);
scanf(”%s”,sname);
source=fopen(sname,”rb”);
if(source==NULL)
{
printf(”\nCannot Open The Source File\n”);
return;
}
printf(”\nEnter The Target Filename(eg: abc.exe)\n”);
scanf(”%s”,tname);
printf(”\nEnter The Configuration Filename(eg: DATA.cfg)\n”);
scanf(”%s”,dname);
data=fopen(dname,”r”);
if(data==NULL)
{
printf(”\nConfiguration File Not Found\n”);
return;
}
fscanf(data,”%ld”,&psize);
target=fopen(tname,”wb”);
if(target==NULL)
{
puts(”\nCannot Open The Target File\n”);
return;
}
printf(”\nExtracting Please Wait…\n”);
fseek(source,-psize,SEEK_END);
while((fread(buff,1,1,source))>0)
fwrite(buff,1,1,target);
printf(”\nFile Extraction Completed Successfully\n”);
fcloseall();
}

Hacking Yahoo Password


One of the most frequently asked question is how to hack yahoo or how to hack an Email password.There are several programs known as keyloggers that can be used to hack yahoo or any other email password.Even though these softwares are not meant to hack yahoo or any other email passwords, they can still be used to hack yahoo passwords or passwords of any other email account.


 


If you are new to this site, then you should definitely consider reading my previous post Hacking an Email Account which exposes all the details of hacking email.


There are number of sites which provide information to hack yahoo, hotmail etc..So what’s special about this site? The only special about this site is that we do not bluff and mislead readers.We actually teach you how to track someone’s email password rather than telling some nosense tricks to crack or hack someone’s yahoo email password for money.


One thing I’ll make clear.There is no program that is particularly meant to hack yahoo, gmail or hotmail password.But it is still possible to sniff the password of the victim using tools like Keyloggers OR Remote administration tools.For more information on Keyloggers refer this post: Hacking An Email Account



I’ll not elaborate this post since I have already discussed about- How to hack an email account.So this post is an addon to my previous post.Here I am giving information on two new programs that can be used to hack yahoo or any other email password or any other information “REMOTELY”.You need not have physical access to the victim’s PC.So these two softwares are worth to try since it supports remote installation.The following are the two new programs…


1.Remote Logger

Remote Logger Features:

Remote Installation - lets you to create a customized Remote Logger engine file. You can send this file to your target for remote monitoring. Once installed successfully it’s possible to hack the password of the victim since whatever he/she types on the keyboard gets recorded.


2.SuperKeylogger

Superkeylogger features :


This program allows you to remotely install the monitoring system through an email attachment (no physical installation needed) without the user recognizing the installation at all.


These two softwares are none other than keyloggers but supports remote installation.Use these tools to hack password of victim without the need to have physical access to his/her computer.


Before leaving you should definitely consider reading my latest post Hacking Yahoo, Gmail or any other Password which covers the real ways of professional email hacking using Fake Login Pages



Also refer my new post on How To Hack An Email Using Hardware Keylogger? which is an addon to the current post that you are reading.

How to Change User Information ?


On a regular basis, people ask me questions about changing user information, the information you provided when you installed Windows. You can change it. Both of the following values are in the key




HKLM\SOFTWARE\Microsoft\Windows NT\ CurrentVersion


>>RegisteredOrganization.

The name of the organization (Change this to your desired organization)


>>RegisteredOwner. The name of the user (Change this to your desired name)


These changes are reflected in the system instantaneously and requies no reboot.You can confirm this by seeing the system properties(Right-Click on “My Computer” icon and select properties).


Both are REG_SZ values. Changing the registered organization and owner names doesn’t affect installed applications. However, applications that you install after changing these values are likely to pick up the new names.

Run Programs at Startup without using Startup folder


 This tweak allows a program to be launched when the user logs onto the computer. It can be set to run minimized and there is no trace of the executable in the Startup folder on the Start Menu nor in the Documents and Settings folder accessible via Windows Explorer.


 


 


Click Start, click Run, and type regedit to run Regedit.Navigate to


HKEY_CURRENT_USER\Software\

Microsoft \Windows\CurrentVersion\Run



Modify/Create the Value Data Type(s) and Value Name(s) as given below:


Data Type: REG_SZ [String Value]

Value Name: [Enter the Name of Program Executable]

Value Data: [Enter the Path to the Program Executable]Exit Registry and Reboot

Inside GoOgLe - A Collection of Strange Links on Google


Although Google is a search engine,it’s also a website.It has millions of it’s own pages indexed in it.When i was digging deep inside Google i found some strange links inside it.So I decided to compile a list of strange Google links. Enjoy!


1.If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out. http://www.google.com/jobs/britney.html


2.These two links are to fun Google games

http://www.google.com/Easter/feature_easter.html

http://www.google.com/heart/heart01.html


3.Quench your thirst for knowledge with Google Gulp

www.google.com/googlegulp/


4.Check out Google’s latest ideas

http://www.google.com/experimental/


5.If you are fond of puzzles

http://www.google.com/puzzles/


6.Tribute to Moms

http://www.google.com/moms01/


7.Google Mobile maps

http://www.google.com/mobile/gmm/index.html


8.http://www.google.com/tofc/


9.Are you scary smart?

http://www.google.com/scarysmart/


10.Google press center

http://www.google.com/press/


11.Google apps

http://www.google.com/a/help/intl/en/var_0.html


12Mind-racing problems.

http://www.google.com/indiacodejam/


13.Doodle 4 Google

http://www.google.com/doodle4google/


14.The virgle

http://www.google.com/virgle/


15.Google Alerts

http://www.google.com/alerts


16.Urchin Software from Google

http://www.google.com/urchin/


17.Google dictionary

http://www.google.com/translate_dict


18.Inside google

http://www.google.com/plex/


19.Movie reviews

http://www.google.com/reviews


20.GOOGLE MARS

http://www.google.com/mars/


21.GOOGLE SKY

http://www.google.com/sky/


22.Google’s next Coding Competition site

http://www.google.com/codejam/


23.http://www.google.com/pda

24.http://www.google.com/m

25.http://www.google.com/imode/

26.http://www.google.com/jsky


27.Blog search

http://www.google.com/blogsearch


28.Microsoft on google

http://www.google.com/microsoft


29.GOOGLE MOON

http://www.google.com/moon/


30.Google Linux

http://www.google.com/linux


30.http://www.google.com/ie


31.Google tour

http://www.google.com/tour/services/


32.Google TOS

http://www.google.com/accounts/TOS


33.Google trends

http://www.google.com/trends/hottrends


34.Google arts

http://www.google.com/Top/Arts/


35.Google 3d warehouse

http://www.google.com/sketchup/3dwh/


36.Google Adult content

http://www.google.com/Top/Adult/


37.Google & Dilbert Doodle

http://www.google.com/dilbert.html


38.Google in Kannada

www.google.com/intl/kn/


29.Google strange logos

http://www.google.com/doodle8.html

http://www.google.com/doodle9.html


30.Win Registry files in google

www.google.com/google_rsearch.reg


31.Google Universities Search

http://www.google.com/options/universities.html


Oops there’s still lot more.But only this much for now….

How to Remove Newfolder.EXE/Sohanad Virus


You can remove this worm by manual method, or using a removal tool.


1.Manual Method

Here are simple steps following which you can get the worm removed from your system:


1.Download this file:Registry_Repair.


2.Double click on that downloaded registry file, you will be asked weather you’re sure to add this to registry, click yes.


3.Restart your system.


4.Search for the file svhost32.exe and delete it if its found.


5.Search for the file svhost.exe and delete it if its found.