Total Pageviews

technical tips

Google+ Followers

How Hackers Work

Written By Akshay Prabhale on Sunday, July 6, 2008 | 8:12 AM

Introduction to How Hackers Work

Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there's no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.

Hackers from around the world gather at camps to
practice their hobby and trade tips.

The term computer hacker first showed up in the mid-1960s. A hacker was a programmer -- someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential.

A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug -- a section of bad code that prevented the program from working properly -- hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free.

As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.

In fact, that's still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious -- they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.

In this article, we'll explore common techniques hackers use to infiltrate systems. We'll examine hacker culture and the various kinds of hackers as well as learn about famous hackers, some of whom have run afoul of the law.

Hackers and Crackers
Many computer programmers insist that the word "hacker" applies only to law-abiding enthusiasts who help create programs and applications or improve computer security. Anyone using his or her skills maliciously isn't a hacker at all, but a cracker.
Crackers infiltrate systems and cause mischief, or worse. Unfortunately, most people outside the hacker community use the word as a negative term because they don't understand the distinction between hackers and crackers.



The Hacker Toolbox

The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations -- once a skilled hacker knows how a system works, he can design programs that exploit it.


The ILOVEYOU Computer Virus was a malicious program

that plagued computers worldwide and caused millions of dollars in damages.

Malicious hackers use programs to:

* Hack passwords:There are many ways to hack someone's password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack,meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, program that inserts common words into password fields.
*Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive. A hacker might install a virus by infiltrating a system, but it's much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks.
* Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim's computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone's identity.
Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.
*Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker's system. The hacker can secretly control the victim's computer, using it to commit crimes or spread spam.
*Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages -- the Internet's equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won't be able to read it.

Hacker Hierarchy
Psychologist Marc Rogers says there are several subgroups of hackers -- newbies, cyberpunks, coders and cyber terrorists. Newbies are hackers who have access to hacking tools but aren't really aware of how computers and programs work. Cyberpunks are savvier and are less likely to get caught than a newbie while hacking a system, but they have a tendency to boast about their accomplishments. Coders write the programs other hackers use to infiltrate and navigate computer systems. A cyber terrorist is a professional hacker who infiltrates systems for profit -- he might sabotage a company or raid a corporation's databases for proprietary information [source: Knittel and Soto]



Hackers Culture

Individually, many hackers are antisocial. Their intense interest in computers and programming can become a communication barrier. Left to his or her own devices, a hacker can spend hours working on a computer program while neglecting everything else.

Computer networks gave hackers a way to associate with other people with their same interests. Before the Internet became easily accessible, hackers would set up and visit bulletin board systems (BBS). A hacker could host a bulletin board system on his or her computer and let people dial into the system to send messages, share information, play games and download programs. As hackers found one another, information exchanges increased dramatically.

Some hackers posted their accomplishments on a BBS, boasting about infiltrating secure systems. Often they would upload a document from their victims' databases to prove their claims. By the early 1990s, law enforcement officials considered hackers an enormous security threat. There seemed to be hundreds of people who could hack into the world's most secure systems at will .

There are many Web sites dedicated to hacking. The hacker journal "2600: The Hacker Quarterly" has its own site, complete with a live broadcast section dedicated to hacker topics. The print version is still available on newsstands. Web sites like Hacker.org promote learning and include puzzles and competitions for hackers to test their skills.

Super Phreak
Before computer hackers, curious and clever individuals found ways to manipulate the phone system in a phenomenon called phreaking. Through phreaking, these individuals found ways to make long distance calls for free or sometimes just played pranks on other telephone users.



When caught -- either by law enforcement or corporations -- some hackers admit that they could have caused massive problems. Most hackers don't want to cause trouble; instead, they hack into systems just because they wanted to know how the systems work. To a hacker, a secure system is like Mt. Everest -- he or she infiltrates it for the sheer challenge. In the United States, a hacker can get into trouble for just entering a system. The Computer Fraud and Abuse Act outlaws unauthorized access to computer systems [source: Hacking Laws].

Not all hackers try to explore forbidden computer systems. Some use their talents and knowledge to create better software and security measures. In fact, many hackers who once used their skills to break into systems now put that knowledge and ingenuity to use by creating more comprehensive security measures. In a way, the Internet is a battleground between different kinds of hackers -- the bad guys, or black hats, who try to infiltrate systems or spread viruses, and the good guys, or white hats, who bolster security systems and develop powerful virus protection software.



Hackers work together to create "mashups" of
Yahoo applications at Yahoo Hack Day 2006.

Hackers on both sides overwhelmingly support open source software, programs in which the source code is available for anyone to study, copy, distribute and modify. With open source software, hackers can learn from other hackers' experiences and help make programs work better than they did before. Programs might range from simple applications to complex operating systems like Linux.

There are several annual hacker events, most of which promote responsible behavior. A yearly convention in Las Vegas called DEFCON sees thousands of attendees gather to exchange programs, compete in contests, participate in panel discussions about hacking and computer development and generally promote the pursuit of satisfying curiosity. A similar event called the Chaos Communication Camp combines low-tech living arrangements -- most attendees stay in tents -- and high-tech conversation and activities.

Hackers and the Law

In general, most governments aren't too crazy about hackers. Hackers' ability to slip in and out of computers undetected, stealing classified information when it amuses them, is enough to give a government official a nightmare. Secret information, or intelligence, is incredibly important. Many government agents won't take the time to differentiate between a curious hacker who wants to test his skills on an advanced security system and a spy.

Laws reflect this attitude. In the United States, there are several laws forbidding the practice of hacking. Some, like 18 U.S.C. § 1029, concentrate on the creation, distribution and use of codes and devices that give hackers unauthorized access to computer systems. The language of the law only specifies using or creating such a device with the intent to defraud, so an accused hacker could argue he just used the devices to learn how security systems worked.
Concern about hackers reaches up to the highest levels of
government. Here, former Attorney General
Janet Reno testifies about hacker activity.


Another important law is 18 U.S.C. § 1030, part of which forbids unauthorized access to government computers. Even if a hacker just wants to get into the system, he or she could be breaking the law and be punished for accessing a nonpublic government computer [Source: U.S. Department of Justice].

Punishments range from hefty fines to jail time. Minor offenses may earn a hacker as little as six months' probation, while other offenses can result in a maximum sentence of 20 years in jail. One formula on the Department of Justice's Web page factors in the financial damage a hacker causes, added to the number of his victims to determine an appropriate punishment [Source: U.S. Department of Justice].

Other countries have similar laws, some much more vague than legislation in the U.S. A recent German law forbids possession of "hacker tools." Critics say that the law is too broad and that many legitimate applications fall under its vague definition of hacker tools. Some point out that under this legislation, companies would be breaking the law if they hired hackers to look for flaws in their security systems [source: IDG News Service].

Hackers can commit crimes in one country while sitting comfortably in front of their computers on the other side of the world. Therefore, prosecuting a hacker is a complicated process. Law enforcement officials have to petition countries to extradite suspects in order to hold a trial, and this process can take years. One famous case is the United States' indictment of hacker Gary McKinnon. Since 2002, McKinnon fought extradition charges to the U.S. for hacking into the Department of Defense and NASA computer systems. McKinnon, who hacked from the United Kingdom, defended himself by claiming that he merely pointed out flaws in important security systems. In April 2007, his battle against extradition came to an end when the British courts denied his appeal [Source: BBC News].

Hacking a Living
Hackers who obey the law can make a good living. Several companies hire hackers to test their security systems for flaws. Hackers can also make their fortunes by creating useful programs and applications, like Stanford University students Larry Page and Sergey Brin. Page and Brin worked together to create a search engine they eventually named Google. Today, they are tied for 26th place on Forbes' list of the world's most wealthy billionaires




8:12 AM | 0 comments | Read More

Internet Explorer: Clear your drop down address bar

Written By Akshay Prabhale on Monday, June 23, 2008 | 10:12 AM

Is your drop down address bar full of old addresses that you will never use again? Mine isn't, because I have fixed that problem by getting rid of them. Want to know how? Then keep reading.

Warning: This tip involves entering the registry. If at any point you get confused or are not completely sure what I mean, STOP , and re-read the steps to make sure you are doing this exactly right. If followed correctly these procedures are completely safe. I would also not recommend messing around in the registry unless you know what you are doing.

First click the Start button. Then click on Run . Enter " regedit " (no quotes), and click OK . This will bring up the registry editor.


Under the My Computer directory open the HKEY_CURRENT-USER directory by double clicking it.

Next open the Software directory in the same way. Under the Software directory open the Microsoft directory. Under Microsoft open the Internet Explorer directory. Under the Internet Explorer directory, open the TypedURLs directory.
Now the section on the right will be filled with a bunch of text that at first may seem rather meaningless, and the address below will be displayed at the bottom of the Window:

" My Computer\HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs "
If this is the case you are in the right place. If not, go back and make sure you have followed the steps correctly.




All the entries in the right are actually just a list of all the address you have entered. You can now click on any entry and press delete to get rid of it. For each one you delete you must confirm that you want to delete it by clicking yes in the box that appears. If it is easier for you, you can delete multiple entries at once by selecting them using either a box or the control key.

When you are finished simply close the registry editor window. (Unless you want to see something else you can do in the registry which is explained below) All those useless URLs are gone! Whenever that address bar gets full again, just do the same thing.

Since we are here in the registry let's change the message in the title bar of Internet Explorer. Just go back to the Main directory under the Internet Explorer directory. Now there is some more stuff in that right window. Scroll to the bottom and look for an entry entitled " window title " double click it to change its value.

Enter the text you want to be displayed in the title bar, and click OK . Now you can close the registry editor. If there was no entry named " window title " you can make one. Click on Edit , go to new , and click on " String Value ." Name it window title and set the value as indicated above.



Now open Internet Explorer and you can see your text in the title bar, and all those old addresses are gone

:)

10:12 AM | 0 comments | Read More

Stopping automatic start-ups

You can stop them by editing MSConfig.
You can do that by
  • clicking Start
  • Run. Enter "msconfig" (without the quotes) in the box and
  • click OK.

On the Startup tab, clear boxes of programs you don't want to start.

Use care. You want to keep things like your anti-virus, firewall and anti-spyware programs starting when you start your computer.

Some programs may reinstate themselves. Often they have a setting that allows them to do that. Any such program is likely to be in the Notification Area, in the bottom right of the desktop.Right-click the icon and open the program. Hunt around for a suspect setting. It is probably a checked box. Clear the box.

That's it.

sleep,smiley

10:09 AM | 0 comments | Read More

Find missing .DLL files on the internet

A user complained that when he attempts to open a program, he gets an error message saying that a .dll file is missing. He wanted to know what could be done about that. Since I did not have time to take his call on the air, let me do it right here.

The letters dll stand for dynamic link library. These files contain code that might be used by several programs. Rather than include the code in each program, it is kept in a single file. The programs access the code when they need it.

If the .dll file is missing from an application, try reinstalling the program. That's usually a quick fix.In the caller's case, the missing file apparently is from Windows. If this suddenly happened, the file may have been accidentally deleted. Or, it could be corrupt.

Reinstalling Windows is a hassle. Before doing that, I'd go to the Web and track down another copy. There are many sites on the Web that offer .dll downloads.
Here are two:
http://www.dll-files.com/
http://www.dlldump.com/


IMDb smiley



10:07 AM | 0 comments | Read More

When Some Specific Websites Do Not Open On Your Computer

Your computer is connected to the Internet and you can reach most websites just fine but there’s a problem when you try to open some particular website(s).
Though that website is unreachable from your computer, it is definitely not down because you are able to access the same website from another computer at home.Facing a similar problem ? Here’s how to diagnose and fix the issue:

Fix 1:

  • Check your Windows HOSTS file -
  • Make sure there’s no entry in the hosts file that maps the website’s address to localhost or an incorrect IP address like 127.0.0.1
  • it is a possibility if you have imported some third party hosts file.
  • cmd /k notepad c:\WINDOWS\system32 \drivers\ etc\hosts

Fix 2:

  • Find Faults in the Pipeline
  • Paypal website may be up and running but it is possible that the real problem lies with a router that is between you and the computer hosting the Paypal website.
  • Do a traceroute and check for messages like “Request Timed Out”
  • they will help you find the location of the breakdown.
  • Type the following command in the Run Window:

cmd /k tracert www.paypal.com

  • remember to replace Paypal with address of the website that is unreachable.

Fix 3:

  • Clear DNS Cache
  • The DNS cache keeps a record of sites that you have recently visited on your computer.
  • If that gets corrupted, you may have issues opening sites that were previously accessible without problems.
  • Type
  • cmd /k ipconfig /displaydns in the Run window to see the cache entries.
  • If that unreachable website is listed in the cache, type
  • cmd /k ipconfig /flushdns to clear the cache.

Fix 4:

  • Website May Be Blocked
  • The chances are rare but it is possible that access to some particular website may be have been restricted by the Office firewall.
  • To test this, send an email to www@web2mail. com with the problematic website URL in the subject field.
  • If the website is up, you will get a text copy of the web page in an email message.

Fix 5:

  • Suspend the Anti-Virus and Firewall
  • If you are running an external software firewall or anti-virus program (like Norton, ZoneAlarm, etc), exit and restart the web browser.
  • Is the problem solved now ?When nothing works, open 192.168.1.1 and reboot the modem.
  • If that fails, restart your computer and as a final step, call your ISP support



Chopper Smiley

9:59 AM | 0 comments | Read More

How to make your Desktop Icons Transparent

Are you bothered with your desk top icon's background, is not clear?
No problem, solution here.
Go to
  • Control Panel
  • System

or right click on

  • My Computer
  • select "Properties"
  • Advanced
  • Performance area
  • Settings button Visual Effects tab
  • selet the check box "Use drop shadows for icon labels on the Desktop"

and click Apply, OK

DONE

9:56 AM | 0 comments | Read More

Remove or Rename the Recycle Bin from the Desktop

If you don't use the Recycle Bin to store deleted files , you can get rid of its desktop icon all together.
  • As a precaution, if you have fear about registry, just copy the registry file "regedit.exe" from "C:\Windows\" folder and past anywhere of your place.
  • Run Regedit and go to:
HKEY_LOCAL_MACHINE/SOFTWARE/ Microsoft/ Windows/CurrentVersion/explorer/ Desktop/NameSpace

  • Then search for the string value "Recyclebin".
  • Click on the "Recycle Bin" string in the right hand pane.
  • Hit Del, click OK.
If you want to restore, just copy the registry file from your folder where you saved before and past to "C:\Windows\". then restart the computer.

How to Rename the Recycle Bin
  • To change the name of the Recycle Bin desktop icon, open Regedit and go to:
  • HKEY_CLASSES_ROOT/CLSID/ {645FF040-5081-101B-9F08-00AA002F954E}
  • It is very difficult to find the code, right?

No problem, u just copy the code and click to select edit>find; from Menu bar and past to findand by right click on "Recycle Bin"and select modify option for change the name to whatever you want (don't type any quotes).

  • Eg:- find this code - 645FF040-5081-101B-9F08-00AA002F954E
At last restart the computer..


fri 13th smiley
9:48 AM | 0 comments | Read More

Disable CD Autorun

  • Click Start, Run and enter GPEDIT.MSC
  • Go to Computer Configuration, double click on Administrative Templates> System.
  • Locate the entry for Turn autoplay off and modify it as you desire.

U r done

9:46 AM | 0 comments | Read More

Speed up Firefox

Here's something for broadband people that will really speed Firefox up:


  • Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:

network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests

Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.

  • Alter the entries as follows:
    Set "network.http.pipelining" to "true"
    Set "network.http.proxy.pipelining" to "true"
    Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.
  • Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves.
    If you're using a broadband connection you'll load pages MUCH faster now..

Rock smiley

9:31 AM | 0 comments | Read More

Browse internet through Windows Xp's Calculator

You can try it out..
if some sites are blocked on your pc..
Go to
  • start
  • run
  • type in calc and hit enter

now windows calculator will open.

Goto Help

-> Help TopicsNow right click on the extreme left of the title bar of the calculatortype in the full address you wanna browse..

and you are done


9:27 AM | 0 comments | Read More

Speed up Acrobat reader like notepad

Simple
Firstly, close all the instances of Adobe Acrobat Reader
  • Go to the installation folder of acrobat reader(C:\program files\adobe\acrobat\reader\.. whatever)
  • Cut and paste all the files of "plugins" directory to the "Optional" directory.

Now your acrobat reader will load very fast and almost as good as notepad..The main logic behind this is ; that all the plugins loads everytime you open an acrobat reader which are not used everytime or used occasionally. Hence moving it to the optional directory will not load all the plugins hence making the acrobat reader faster.


9:25 AM | 0 comments | Read More

Safely turnOFF some windows services which are not used

Some of the windows services starts with the windows eating up the memory. and if they are not used by you then you can stp them from starting with windows. You can reenable them when you need it.

To check the services program...goto

start -> run ->type" services.msc " (without quotes) -> and hit enter.

There will be a list of services...Some common services you can check and stop them according to your need..
To stop a service..double click the desired service and click on stop button. To stop that service from startup..select "disabled" instead of Automatic from the startup type option


  • Error Reporting Service - stop the alert of send and dont send error
  • Help and Support - You can safely turn this feature off..as no one uses this
  • Indexing Service - keep it on of you use windows search..because..this makes the search faster
  • Messenger - Windows messenger. turn it OFF..if you dont use it.
  • Telnet - Turn this OFF..if you dont use it.
  • Uninterruptible Power Supply - Turn this OFF...if you don't have an UPS



9:20 AM | 0 comments | Read More

Black Hat Hackers

Written By Akshay Prabhale on Friday, April 11, 2008 | 5:20 AM

Thanks to Hollywood, black hat hackers have become the iconic image of all hackers around the world. For the majority of computer users, the word hacker has become a synonym for social misfits and criminals. Of course, that is an injustice created by our own interpretation of the mass media, so it is important for us to learn what a hacker is and what a black hacker (or cracker) does. So, let's learn about black hat techniques and how they make our lives a little more difficult. .What Is Black Hat Hacking?

A black hat hacker, also known as a cracker or a dark side hacker (this last definition is a direct reference to the Star Wars movies and the dark side of the force), is someone who uses his skills with a criminal intent. Some examples are: cracking bank accounts in order to make transferences to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money.

Some famous cases of black hat hacking include Kevin Mitnick, who used his black hat hackers skills to enter the computers of organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it must be mentioned that he is now a white hat hacker); Kevin Poulsen, who took control of all the phone lines in Los Angeles in order to win a radio contest (the prize was a Porsche 944 S2); and Vladimir Levin, which is the handle of the mastermind behind the stealing of $10'000,000 to Citigroup.
5:20 AM | 0 comments | Read More

How To Defeat The Attempts Of A Black Hat Hacker

In order to survive in the World Wide Web, there are certain things that we need to know in order to endure. The first one is that each computer user is responsible for his machine and the data that it contains. It doesn't matter if a transnational spends hundreds of millions of dollars in IT security if an absent-minded employee downloads and installs unauthorized software or falls into the email scheme of black hat hackers.

Basic Knowledge :

So, the first thing that we need to know is that computers, and networks, are like houses. If they don't have the windows and doors properly secured, anyone can enter. There are thousands of hackers in the internet looking for computers with unsecured entrances. Even worse, they have programs making the search for them. If you consider that there are hundreds of millions of computers in the world, then it is highly probable that an important percentage of them aren't properly secured.

Firewall :

In order to secure our "house", we need to have a firewall installed and properly configured. A firewall is like a lock that assures that all the entrances to your computer are properly closed, so no one from the outside can access it..

Anti Virus Software :

Another useful piece of software is the antivirus. Antivirus have been around since the first personal computers since viruses have always existed. Unfortunately, the internet has generated a demographic explosion and now they wander, freely, through the net. There are several software packages in the market, so test the ones with which you feel more comfortable and stay with the one that is more convenient for you.

Regular Updates :

The next step is to update your operating system, especially if it is Windows XP. Ninety percent of the worldwide operating system market is owned by Microsoft. For that reason, it is the preferred choice for crackers in the entire world. They are constantly looking for ways to bypass the security of this operating system, looking for weaknesses of all kind (even in something as innocent as the Media Player). In order to stop them, maintain your operating system updated.

Education in Security Techniques :

Finally, if you are inside a company, assure yourself that the users are trained. They must be able to detect if they are being victims of cracker scam. It can be through the internet messaging system, an email or even an innocent looking PowerPoint attachment sent by a friend. People are the last line of defense against black hat hacking.

Over time, black hat techniques have become more advanced and complex. Although there are computer software programs that can help a cracker in many ways, it is still a profession that requires a knack for computer software and hardware. So, as you may have noticed, black hat hackers will never disappear, which means that we need to have our computers, and our networks, prepared.
5:19 AM | 0 comments | Read More

Adrian Lamo:

Adrian Lamo (born 1981) is an infamous former Black hat hacker and journalist, principally known for breaking into a series of high-security computer networks, and his subsequent arrest. Best known among these were his intrusions into The New York Times and Microsoft. He is also known for attempting to identify security flaws in computer networks of Fortune 500 companies and then notifying them of any found; while still illegal in many places without permission, this can be seen as a form of unsolicited penetration testing.



Personal :
Lamo was born in Boston, Massachusetts to Mario Lamo and Mary Lamo-Atwood. He spent his early childhood in Arlington, VA, until moving to Bogot?, Colombia around the age of 10. When his family moved back to the United States two years later, they settled in San Francisco, where Adrian lived until he tested out of High School a year early.

Dubbed the "homeless hacker" for his transient lifestyle, Lamo spent most of his travels couch-surfing, squatting in abandoned buildings and travelling to Internet cafes, libraries and universities to investigate networks, and sometimes exploit security holes. Despite performing authorized and unauthorized vulnerability assessment for several large, high-profile entities, Lamo refused to accept payment for his services. In the past, his lifestyle allowed him to travel up and down the coasts of the United States, often by bus, carrying all necessary possessions in a backpack.


Professional :
Since Lamo's sentencing, he has entered the early stages of a career as an award-winning journalist, studying at American River College, with writing, photography, and editorial work / collaboration appearing in Network World, Mobile Magazine, 2600 Magazine, The American River Current, XY Magazine, and others.

Lamo has interviewed personalities ranging from John Ashcroft, to Oliver Stone to alleged members of the Earth Liberation Front. Lamo also has a history of public speaking - he was a keynote speaker at a government security conference in 2005 alongside Bruce Schneier, and a panelist at the Information Security In the Age of Terrorism conference.

Lamo has shown signs of increased cooperation with media since his release from federal custody, including a podcast interview with Patrick Gray in Australia, and an April 2007 segment on 88.1 WMBR out of Cambridge.


Activities and techniques :
Adrian Lamo is perhaps best known for breaking into The New York Times internal computer network in February 2002, adding his name to confidential databases of expert sources, and using the paper's LexisNexis account to conduct research on high-profile subjects, although his first published activities involved operating AOL watchdog site Inside-AOL.com. The Times filed a complaint and a warrant for Lamo's arrest was issued in August 2003 following a 15 month investigation by federal prosecutors in New York.

At 10:15 AM on September 9, after spending a few days in hiding, he surrendered to the US Marshals in Sacramento, California. He re-surrendered to the FBI in New York City on September 11, and pleaded guilty to one count of computer crimes against Microsoft, Lexis-Nexis and The New York Times on January 8, 2004.

Later in 2004, Lamo was sentenced to six months' detention at his parents' home plus two years probation, and was ordered to pay roughly $65,000 in restitution. He was convicted of compromising security at The New York Times and Microsoft, and is alleged to have admitted to exploiting security weaknesses at Excite@Home, Yahoo!, Microsoft, MCI WorldCom, Ameritech, Cingular and has allegedly violated network security at AOL Time Warner, Bank of America, Citigroup, McDonald's and Sun Microsystems.

Companies sometimes use proxies to allow their employees access to the internet, without giving the internet access to their internal network. However, when these proxies are improperly configured, they can allow access to the company's internal network. Lamo often exploited this, sometimes using a tool called ProxyHunter.
Critics have repeatedly labelled Lamo as a publicity seeker or common criminal, claims that he has refused to publicly refute. When challenged for a response to allegations that he was glamorizing crime for the sake of publicity, his response was "Anything I could say about my person or my actions would only cheapen what they have to say for themselves." When approached for comment during his criminal case, Lamo would frequently frustrate reporters with non sequiturs such as "Faith manages" and "It was a beautiful day."

At his sentencing, Lamo expressed remorse for harm he had caused through his intrusions, with the court record quoting him as adding "I want to answer for what I have done and do better with my life."
As of January 16, 2007, Lamo's probation was terminated, ending a three-year period during which the U.S. District Court's ruling prevented him from exercising certain freedoms, including the ability to employ any privacy protection software, travel outside certain established boundaries, or socialize with security researchers.

DNA controversy :
On May 9, 2006, while 18 months into a two year probation sentence, Adrian Lamo refused to give the United States government a blood sample they demanded so as to record his DNA in their CODIS system. According to his attorney, Adrian Lamo has a religious objection to giving blood, but is willing to give his DNA in another form. "He went in there with fingernail clippings and hair, and they refused to accept it, because they will only accept blood," said federal public defender Mary French.

On June 15, 2007, lawyers for Lamo filed another motion citing the Book of Genesis as one basis for Lamo's religious opposition to the frivolous spilling of blood: "The Book of Genesis leaves unambiguous this matter. Therein, those who would spill the blood of man are rebuked as follows: 'Whoever sheds the blood of man, by man shall his blood be shed; for in the image of God has God made man.' Genesis 9:6 (New International Version)."

Lamo continued: "Under this admonition, not only would I be blinding myself to the direct instructions of scripture by shedding blood, but I would similarly be casting whomever facilitated this act into sin, multiplying my culpability," setting the basis for defense counsel Mary French to urge US District Court Judge Frank Damrell to exempt Lamo from the sampling entirely, or to order his probation officer to accept some other biological product in lieu of blood, as previously offered by Lamo.

On June 21, 2007, it was reported that Lamo's legal counsel had reached a settlement agreement with the U.S. Department of Justice granting Lamo's original request. According to Kevin Poulsen's blog, "On Wednesday, the Justice Department formally settled the case, filing a joint stipulation along with Lamo's federal public defender dropping the demand for blood, and accepting cheek swabs instead." Reached for comment, Lamo reportedly affirmed to Poulsen his intention to "comply vigorously" with the order.

Can You Hack It?
Can You Hack It?, a documentary covering Lamo's life and times, is slated for release under the care of Trigger Street Productions. Directed by Sam Bozzo, it features Apple Computer co-founder Steve Wozniak, TechTV personality Leo Laporte, and narration by actor Kevin Spacey. The film explores the practical and ethical themes of modern computer hacking, intertwining Lamo's story with those of controversial figures throughout history.
5:07 AM | 0 comments | Read More

Jonathan James:

Jonathan James (born 11 May 1981), full name Jonathan Nicholas William James, raised in the university-town of Uppsala. Jonathan is an IT security professional, but is also a recognized music producer in the pop and hiphop genre (signed to Bonnier Music Group). His music production credits include music for San Quinn, Ya Boy, Shade Sheist, Redrum, D.N.A., The Jacka, Ron G and more.



In 1999 James released a software-package which guarded computers against backdoors and trojans like NetBus and Back Orifice. Later that same year he released Cassandra Gold, which could detect and remove the top 25 backdoors and trojans. Cassandra Gold was well received with a user-base of some 25 000 including the US Air Force, NASA, the U.K. Patents office.

In 1999 he collaborated with the FBI and Richard M. Smith (as well as Fredrik Bj?rck) in the hunt for the author of the Melissa worm, contributing to the conviction of worm-author David L. Smith.

Later, in 2000 Mr. James contested the findings of Fredrik Bj?rck (at that time, a computer-science researcher at Stockholm University). Bj?rck claimed that the ILOVEYOU worm was written and spread by a German exchange-student by the name of Michael living in Australia.
Bj?rck's accusation led to the confiscation of Michael's computers. James then began investigating the worm origins together with the FBI. The investigation concluded that the worm originated from the AMA Computer University and that Onel A. de Guzman was a contributing author of the worm. The findings later contributed to the arrests of Onel A. de Guzman and Michael Buen.

James founded an IT-security consultancy, which he later left due to dissent with the investors. He is currently finishing his degree in Education and political sciences as well as lecturing, developing strategies and tools for intelligence gathering purposes.
5:02 AM | 0 comments | Read More

KEVIN MITNICK:

KEVIN MITNICK:

Kevin David Mitnick (born October 6, 1963) is a controversial computer hacker and convicted criminal in the United States.
Mitnick was convicted in the late 1990s of illegally gaining access to computer networks and stealing intellectual property. Though Mitnick has been convicted of computer related crimes and possession of several forged identification documents, his supporters argue that his punishment was excessive.


Mitnick served five years in prison, of which four and a half years were pre-trial, and eight months were in solitary confinement. He was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was initially restricted from using any communications technology other than a landline telephone. Mitnick fought this decision in court, and the judge ruled in his favor, allowing him to access the Internet.
Mitnick now runs Mitnick Security Consulting, a computer security consultancy.




Early life :
Kevin Mitnick began social engineering or perhaps discovered his first engineerable situation at the age of 12. He realized he could bypass the punchcard system used for the Los Angeles bus system: by buying his own punch, he could get free bus rides anywhere in the greater LA area. Social engineering became his primary method of obtaining information, whether it be user names and passwords, modem phone numbers or any number of other pieces of data.

In high school, he was introduced to phone phreaking, the activity of manipulating telephones which was often used to evade long distance charges for his benefit..

Computer hacking :
Mitnick broke into his first computer network in 1979, when a friend gave him the phone number for the Ark, the computer system at Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied DEC's software, for which he was later convicted. This was the first of a series of run-ins with the law..

Acts by Kevin Mitnick :
Using the Los Angeles bus transfer system to get free rides
Evading the FBI
Hacking into DEC system(s) to view VMS source code (DEC reportedly spent $160,000 in cleanup costs)
Gaining full admin privileges to an IBM minicomputer at the Computer Learning Center in LA
Hacking Motorola, NEC, Nokia, Sun Microsystems and Fujitsu Siemens systems

Alleged :
Stole computer manuals from a Pacific Bell telephone switching center in Los Angeles
Read the e-mail of computer security officials at MCI Communications and Digital
Wiretapped the California DMV
Made free cell phone calls
Hacked SCO, PacBell, FBI, Pentagon, Novell, CA DMV, USC and Los Angeles Unified School District systems.

Kevin Mitnick myths:
Hacked into NORAD
"Theft of... at least 20,000 credit card numbers from computer systems around the nation"
Ability to launch nuclear weapons by whistling into a payphone
Issued a false press release for Security Pacific Bank causing a $400 million loss in market capitilization
Changed a judge's TRW credit report
Wiretapped FBI agents
Turned off the utilities of an FBI agent
Vandalized many government, corporate and university computer systems.
Hacked into Tsutomu Shimomura's home computer
Harassed actress Kristy McNichol.

Controversy :
Kevin Mitnick's criminal activities, arrest, and trial were controversial, as was the journalism surrounding his conviction.
The controversy is highlighted by the differing views offered in two books: John Markoff and Tsutomu Shimomura's Takedown, and Bendelladj Hamza's The Fugitive Game. Littman made four notable allegations:

journalistic impropriety by Markoff, who had covered the case for the New York Times
overzealous prosecution of Mitnick by the government
mainstream media over-hyping Mitnick's actual crimes
Shimomura's involvement in the matter being unclear or of dubious legality
Further controversy came over the release of the movie Takedown, with Littman alleging that portions of the film were taken from his book without permission.

The case against Mitnick tested then-nascent laws that had been enacted for dealing with computer crime, and it raised public awareness of security issues involving networked computers. The controversy remains, however, as Mitnick is often used today as an example of the quintessential computer criminal although his exploits are less notable than his notoriety suggests.

Supporters of Mitnick have asserted that many of the charges against him were fraudulent and not based on actual losses.
Falsehoods have also surrounded Mitnick's exploits. For example, many mistakenly believe that Mitnick was once in the FBI's most wanted list. Federal prosecutor Kent Walker said in an interview with the New York Times that Mitnick " was arguably the most wanted computer hacker in the world, he allegedly had access to corporate trade secrets worth millions of dollars. He was a very big threat". The headline of the resultant article, "A Most-Wanted Cyberthief Is Caught in His Own Web," was later picked up by Associated Press, Time Magazine and Reuters, thus perpetuating the myth.

While Mitnick's actual actions may not have justified the level of official concern they received, the fact that his activities were criminal is not disputed. Mitnick's first adult criminal sentence was considerably shorter than is the norm today.
The film Freedom Downtime, a documentary that centers on the topics of Kevin Mitnick's incarceration in a maximum security prison, Miramax's film's screen adaptation of Takedown, and the "FREE KEVIN" movement, was made in 2001 by Emmanuel Goldstein and produced by 2600 Films.

Attacks on Mitnick's sites :
On August 20, 2006, Kevin Mitnick's site was defaced by Palestine PHP Emperor with offensive messages against him. The domain names defensivethinking.com, mitsec.com, kevinmitnick.com and mitnicksecurity.com displayed the vandalism for hours before the affected files were replaced.


Mitnick commented: The Web hosting provider that hosts my sites was hacked, fortunately, I don't keep any confidential data on my Web site, so it wasn't that serious. Of course it is embarrassing to be defaced-nobody likes it.

As a notorious figure, Mitnick has been targeted by hackers who wish to bolster their status and for people seeking to prove their abilities.
Zone-H reports that on one occasion, there was a struggle between different black hat and white hat hackers when some defacers put their nicks on Mitnick's site and fans replaced the vandalized copy with an original unmodified one. This went on for a full day.

Recent activity :
Kevin Mitnick is now a professional computer consultant (doing business as Mitnick Security Consulting, LLC), and has co-authored two books on computer security: The Art of Deception (2002), which focuses on social engineering, and The Art of Intrusion (2005), focusing on real stories of security exploits.

He co-authored (with Alexis Kasperavicius) a social engineering prevention training course and certification: CSEPS.
On August 20, 2006, a Syrian editor, Nidal Maalouf, accused Mitnick of stealing his domain name (Syria-news.com). He falsely claimed that Mitnick is the FBI's No.1 wanted person for illegal acts against a number of internet sites. Maalouf was interviewed by the local newspaper "Bourses & Markets", and the interview was quoted by Al-Ayham Saleh on his personal website.

Mitnick occasionally appears on the late night radio show Coast to Coast AM. He has also hosted the show, interviewing Steve Wozniak (on April 30, 2006) and others.

Mitnick has spoken at events: IAPP (International Association of Privacy Professionals) Privacy Academy in Las Vegas, October, 2005 (keynote speaker); National Youth Leadership Forum on Technology in San Jose, CA, in the summer of 2004; the Fifth H.O.P.E. in New York, NY, July, 2004 (keynote speaker); ITESM Monterrey Tec, in February 2003 (keynote speaker).

Kevin Mitnick was a "surprise guest" in the 40th TWiT podcast when he ran into Steve Wozniak by chance in Las Vegas. Wozniak was on the line with fellow TWiT hosts via Skype on his notebook computer, and Mitnick remained with Wozniak for much of the remainder of the show.
Kevin Mitnick appeared on "Thebroken", an online videozine marketing itself as 'borderline legal.' He appeared on the third episode of the show, but was given mention in the first.

Mitnick guest starred in a first season episode of Alias. The casting was an in-joke, since Mitnick played a CIA hacker. Due to the conditions of his parole, however, the computer he used in the scene was a prop.

Kevin Mitnick appeared on the South African actuality programme "Carte Blanche".

On 2 March 2007, the WELL declined his application for admission, refunding his membership fee.
Mitnick teamed up with John Walsh on the November 10, 2007 episode of America's Most Wanted on a segment on Edward Pena, another computer hacker.


4:57 AM | 0 comments | Read More

ROBERT TAPPAN MORRIS :


Robert Tappan Morris (also known as rtm, born 1965 (age 42-43)) is an associate professor at Massachusetts Institute of Technology, in the Institute's department of Electical Engineering and Computer Science. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet. He is the son of Robert Morris, the former chief scientist at the National Computer Security Center, a division of the National Security Agency (NSA)..

Robert Tappan Morris




The worm :

Morris created the worm while he was a graduate student at Cornell University. The original intent, according to him, was to gauge the size of the Internet.

He released the worm from the Massachusetts Institute of Technology (MIT) to conceal the fact that it actually originated from Cornell. Unknown to Morris, the worm had a design flaw. The worm was programmed to check each computer it found to determine if the infection was already present.

However, Morris believed that some administrators might try to defeat his worm by instructing the computer to report a false positive. To compensate for this possibility, Morris directed the worm to copy itself anyway, fourteen percent of the time, no matter the response to the infection-status interrogation.

This level of replication proved excessive and the worm spread rapidly, infecting several thousand computers. It was estimated that the cost of repair for the damage caused by the worm at each system ranged from $200 to more than $53,000.

The worm exploited several vulnerabilities to gain entry to targeted systems, including:
a hole in the debug mode of the Unix sendmail program,
a buffer overrun hole in the fingerd network service,
the transitive trust enabled by people setting up rexec/rsh network logins without password requirements...

Biography :

1987 - Received his A.B. from Harvard.

1988 - Released the Morris worm (when he was a graduate student at Cornell).

1989 - Indicted under the Computer Fraud and Abuse Act of 1986 on July 26, 1989 - the first person to be indicted under this Act.

1990 - Convicted and sentenced to three years of probation, 400 hours of community service, a fine of $10,050 and the cost of his supervision.

1995 - Founded Viaweb, a start-up company that made software for building online stores - with Paul Graham.

1998 - Viaweb sold to Yahoo, who renamed it software Yahoo! Store.

1999 - Received Ph.D. in Applied Sciences from Harvard.

1999 - Appointed as a professor at MIT.

2005 - Founded Y Combinator, a venture capital firm - with Paul Graham.

2006 - Awarded tenure.

2006 - Technical advisor for Meraki Networks.

His principal research interest is computer network architectures which includes work on distributed hash tables such as Chord and wireless mesh networks such as Roofnet.


Morris is a longtime friend of Paul Graham (Graham dedicated his book ANSI Common Lisp to him) and Graham named the programming language that generates the online stores' web pages RTML in his honor.



4:51 AM | 0 comments | Read More

KEVIN POULSEN :


Kevin Lee Poulsen (born 1965 in Pasadena, California, U.S.) is a former black hat hacker. He is currently a senior editor at Wired News.


Kevin Lee Poulsen


Biography:-
Before segueing into journalism, he had a notorious career in the 1980s as a cracker whose handle was Dark Dante. He worked for SRI International by day, and hacked at night.
During this time, Poulsen taught himself lock picking, and engaged in a brash spree of high-tech stunts that would ultimately make him one of America's best-known cyber-criminals.
Among other things, Poulsen reactivated old Yellow Page escort telephone numbers for an acquaintance that then ran a virtual escort agency.

His best-appreciated hack was a takeover of all of the telephone lines for Los Angeles radio station KIIS-FM, guaranteeing that he would be the 102nd caller, and netting him a Porsche 944 S2.

When the FBI started pursuing Poulsen, he went underground as a fugitive. When he was featured on NBC's Unsolved Mysteries, the show's 1-800 telephone lines mysteriously crashed. He was finally arrested in April 1991.
In June 1994, Poulsen pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, and obstruction of justice, and was sentenced to 51 months in prison and ordered to pay $56,000 in restitution. At the time, it was the longest sentence ever given for cracking. He also pleaded guilty to breaking into computers and obtaining information on undercover businesses run by the FBI.

Poulsen enjoyed brief celebrity in the tech world upon his release from federal prison, and was the subject of the book Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen, a work which Poulsen himself has decried.
Poulsen has reinvented himself as a journalist since his release from prison, and sought to distance himself from his criminal past. Poulsen served in a number of journalistic capacities at California-based security research firm SecurityFocus, where he began writing security and hacking news in early 2000.
Despite a late arrival to a market saturated with technology media, SecurityFocus News became a well-known name in the tech news world during Poulsen's tenure with the company and was acquired by Symantec. His original investigative reporting was frequently picked up by the mainstream press. Poulsen left SecurityFocus in 2005 to freelance and pursue independent writing projects. He became a senior editor for Wired News in June 2005, which hosts his recent (as of 2006) blog, 27BStroke6, which has since been renamed Threat Level.

In October 2006, Poulsen released information detailing his successful search for registered sex offenders using MySpace to solicit sex from children. His work identified 744 registered persons with MySpace profiles, and led to the arrest of one, Andrew Lubrano.


4:41 AM | 0 comments | Read More

More Colors for Your SmartArt ..

Written By Akshay Prabhale on Saturday, April 5, 2008 | 12:22 AM

Do you use SmartArt in MS Office 2007?
To do so, do you go to the Design Ribbon and change the colors?


Perhaps you prefer the multicolored options, but you're disappointed in how few choices you have.
Well, I happened to stumble across a pretty easy way to alter the color choices for SmartArt. So, if you're looking for more options, this one is for you!
For Word and Excel, I found a Themes gallery on the Page Layout Ribbon (on the far left side).

In PowerPoint 2007, I found the Themes on the Design Ribbon.


When I chose a theme from the gallery, it altered the color choices for the SmartArt as well.
(I'd like to add that I found this easiest to do with the SmartArt already created. With that, the program previewed the effects each theme would cause).

Another way to get color changes for your SmartArt in all of these programs is through the Colors button, located to the right of the Themes.


As you can see, the theme color sets are listed and at the bottom, you have the choice to "Create New Theme Colors."



If you select that option, a dialogue window will open, allowing you to put colors together that fit you best.
After you choose the colors that strike your fancy, you can name your Theme at the bottom. Then just finish the process by clicking Save.
There you have it. SmartArt colored to your exact specifications!

12:22 AM | 0 comments | Read More

LOCK YOUR DESKTOP IN A MODERN WAY

Written By Akshay Prabhale on Tuesday, March 11, 2008 | 6:50 AM

This is a interesting piece of info that you can use to lock your work-stations without using the combo key “CTRL- ALT- DEL ”

If CTRL-ALT-DELETE seems like too much of a hassle, try this instead:

  • Right click an empty spot on the desktop, point to New and clickShortcut.
  • In the Create Shortcut dialog box, type the following into the Typethe location of the item text box:“rundll32 user32.dll,LockWork Station” // remove quotes while typing.
  • Click Next.
  • In the Select a Title for the Program dialog box, type “LockDesktop” in the Type a name for this shortcut text box.
  • Click Finish.

Now the desktop will lock when you click your new Lock the Desktop icon.

6:50 AM | 0 comments | Read More

Add a program to the Right Click Menu

So as to Use it Everywhere by just doing a Right-Clicking
When you right click on any folder, you can have access to that application, the same as using Sent To and New.
Open Registry Editor.
Navigate and choose:
HKEY_CLASSES_ROOT\Folder\shell.

Add a new Key to the "Shell" Key and name it anything you like. Give it a default value that will appear when you right click a folder, i.e. NewKey (use an "&" without the quotes, in front of any character and it will allow you to use the keyboard).
Navigate and click on the registry key
HKEY_CLASSES_ROOT\Folder\shell\NewKey.
Now you have to add a New Key named Command and Set the (Default) value of the application you want to run. For example:
c:\program files\internet explorer\iexplore.exe
(Include the full path)
6:38 AM | 0 comments | Read More

Disabling Recent Documents History

Many pplz have ask me hw to clear or disable recent document history. So here is a small little trick for them .

The bad thing about Recent Documents History is that Windows XP has to calculate
what should be put there each time you boot Windows, which can slow things down.

  • Open the Registry Editor (select Start/Run, type regedit, and click OK).
  • Navigate to
    HKEY_CURRENT_USER\Software\Mcft\Windows\CurrentVersion\Policies\Explorer.
  • Create a NoRecentDocsHistory D_WORD key. Double-click the value to open itonce it is created.
  • Set the Data Value to 1 to enable the restriction.
  • Click OK and close the Registry Editor. You'll need to restart the computer for thechange to take effect

U r Done :)

6:32 AM | 0 comments | Read More

Change Logon Wallpaper-Windows XP

Logon wallpaper is the wallpaper or image that windows xp shows on screen when windows logs on (before it asks for username & password) .
It’s usually set to the image-logo of the brand (manufacturer) of our computer (e.g. in compaq laptops).
Now we can set it to our own image or any other image (any bmp file) by following trick

Open Startmenu
->Run type regedit and press ok to open registry editor. (shows a tree like structure of directories at left)

In that hierarchical structure in left, navigate to registry entry
HKEY_USERS\.DEFAULT\Control Panel\Desktop


In right side pane see a number of values placed in a table format.
choose the value named Wallpaper from there and double click it.
Now you see a box with value name as Wallpaper and value data as Path to the image file .
There give the full path of the image (bmp file) which you want to set as logon wallpaper by deleting previous path and writing path to your bmp file e.g.
C:\WINDOWS\lon.BMP (to set image lon.BMP file as log on wall paper).

Also double click on WallpaperStyle and change it’s value to 2 to get a stretched wallpaper at logon.

Put that bmp file in windows directory for better results.If that is a jpeg file, convert to bmp file by opening in Windows Image Viewer and save as bmp.
6:25 AM | 0 comments | Read More

Hiding Drives in XP

  • Go to Start > run > type "diskpart".(Without Quote)a dos window will appear with following prompt.

DISKPART>

  • Then type "list volume" this will look like it
Volume### Ltr Label Fs Type Size Status Info
-------------- ---- ------ --- ----- ---- ------- --
Volume 0 F DC-ROM
Volume 1 C NTFS Partition 7000MB Healthy
Volume 2 D soft NTFS Partition 8000MB Healthy
Volume 3 E ---- NTFS Partition 8000MB Healthy


  • If u wanna hide drive E then type "select volume 3"then a message will appear in same winwods { Volume 3 is the selected volume}
  • Now type " remove letter E" now a message will come { Diskpart Removed the Drive letter }sometime it requires the reboot the computer .
  • Diskpart will remove the letter .Windows XP is not having capabilty to identify the unkown volume.

Don afraid ur Data will remain same . To Come backe the Drive repeat the process . but in 4th step whish is shown in this post replace " remove" to "assign"i mean type " assign letter E"

if we hide the drives using this method then even administrator is not allowed to access that drive all the programs stored in that drive will not run so there is one more way to hide the drives for specific users
WINDOWS REGISTRY

go to Registry editor
HKEY_USERS or HKEY_LOCAL_MACHINE
(in you want to hide drive for all users)

then go to ....
  • Software
  • >> Microsoft
  • >> Windows
  • >> CurrentVersion
  • >> Policies
  • >> Explorer

in right plane create new DWORD value and name it as NoViewOnDrive and set it's value to the number of drive you want to hide

A: 1
B: 2
C: 4
D: 8
E: 16
F: 32
G: 64
H: 128
n so on ...

to hide all drives type - 67108863

n enjoy :-D
6:11 AM | 0 comments | Read More

1 of the 100 Xp hidden fact

Create a new folder with the name ABC
(of course you can give any name).
Open the command prompt and rename it to one of the following:

  • .{20D04FE0-3AEA-1069-A2D8-08002B30309D} (= My Computer)
  • .{450D8FBA-AD25-11D0-98A8-0800361B1103} (= My Documents)
  • .{208D2C60-3AEA-1069-A2D7-08002B30309D} (= My Network Places)
  • .{645FF040-5081-101B-9F08-00AA002F954E} (= Recycle Bin)
  • .{871C5380-42A0-1069-A2EA-08002B30309D} (= Internet Explorer)
  • .{21EC2020-3AEA-1069-A2DD-08002B30309D} (= Control Panel)
  • .{D20EA4E1-3957-11D2-A40B-0C5020524153} (= Administrative Tools)
  • .{00020D75-0000-0000-C000-000000000046} (= Inbox)
  • .{D20EA4E1-3957-11D2-A40B-0C5020524152} (= Fonts)
  • .{7007ACC7-3202-11D1-AAD2-00805FC1270E} (= Network Connections)
  • .{2227A280-3AEA-1069-A2DE-08002B30309D} (= Printers and Faxes)
  • .{7BE9D83C-A729-4D97-b5A7-1B7313C39E0A} (= Programs Folder)
  • .{E211B736-43FD-11D1-9EFB-0000F8757FCD} (= Scanners and Cameras)
  • .{D6277990-4C6A-11CF-8D87-00AA0060F5BF} (= Scheduled Tasks)
  • .{48E7CAAB-B918-4E58-A94D-505519C795DC} (= Start Menu Folder)
  • .{7BD29E00-76C1-11CF-9DD0-00A0C9034933} (= Temporary Internet Files)
  • .{BDEADF00-C265-11d0-BCED-00A0C90AB50F} (= Web Folders)
  • .{6DFD7C5C-2451-11D3-A299-00C04F8EF6AF} (= Folder Options)
  • .{00020801-0000-0000-C000-000000000046} (= Folder)
  • .{00021400-0000-0000-C000-000000000046} (= Another Folder)

Important: include the point and nothing before that!

Example: "rename ABC .{20D04FE0-3AEA-1069-A2D8-08002B30309D}"

Now wen you will see that the icon of tht folder has changed (No name) to My computer Icon.Now Make a shortcut to that folder, change the target and icon and you have a nameless shortcut.

I tested it on XP so i have no idea tht it will work on 98,ME....

6:05 AM | 0 comments | Read More

Hidden Star Wars Movie in 'Windows XP'

Hidden star wars movie in XP
Well, dis is an old trick...
juz info 4 those who don't know..
Microsoft has hidden a version of Star Wars done entirely with ASCII characters in the Windows XP operating system.
But you must be connected to internet to view it.
When online,
go to
  • start
  • ->run.....
  • Now type 'telnet towel.blinkenlights.nl' without the single quotes.
  • See it for yourself.

ENJOY!!!

6:02 AM | 0 comments | Read More

Play Video On desktop !!

start any video on any player in full screen...
Then take print screen of video..
then GO

  • start mean
  • >>> all programs
  • >>> Accessories
  • >>> Paint
paste dat pic on paint...
go to save as & save dis pic in PNG format then save dis pic in ur desktop...
video wll play on ur desktop!!!
6:00 AM | 0 comments | Read More

Trick to Show ur name after time in taskbar...

I m here to tell u a trick to add up ur name in place of AM and PM beside time and make urself to feel proud among ur group of frnds.
Its simple
  • Start
  • -> Control Pannel
  • -> Regional and LAnguage option
  • -> Customize (beside English US)
  • -> Go to TIME tab
  • -> Change AM symbol and PM symbol from AM and PM to ur name
  • -> Apply
  • -> Ok ...

IS it changed ???
Might be not ...Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time chnges in digital form i.e. 02:47:52 AM , click to arrow to cnage the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK
and be HAPPY 8-)
5:51 AM | 0 comments | Read More

Double click opens search option

Double-clicking any drive opens search option

Solution 1:
That's a virus named as ravmon.exe and autorun.infScan first with a good antivirus [Nod32 Recommanded]then try this trick....
First show the hidden files and folders options then try this method
  • Go to Start-->run and type cmd then click ok.
  • If u want to remove the infected file from c drive then type C: in command prompt and press enter.
  • Type autorun.inf and press enterautorun.inf file is opened.
  • Now type "attrib autorun.inf -s -h -r" and press enter.
  • Now delete the file by typing"del autorun.inf" and press enter.
  • Now type autorun.inf and press enter now, u will find no infected autorun.inf file..
  • same way do for all other drives then restart ur pc

Solution 2:

To resolve this problem, edit the registry to set the value data for the Default string value in the registry keys that are described in the "Cause" section of this article to none:

  • Start Registry Editor (Regedt32.exe).
  • Locate and then click the Default value under the following keys in the registry if this problem occurs with folders:HKEY_CLASSES_ROOT\Directory\shellIf this problem occurs with drives:HKEY_CLASSES_ROOT\Drive\shell.
  • Click Modify on the Edit menu.
  • Type none in the Value data box, and then click OK.
  • Quit Registry Editor.

Thats all :)

5:34 AM | 0 comments | Read More

Run is disabled by adminstrator

Following is the key which is responsible for it to work or not Work
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explore

OR

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

Look for 'NoRun' its a DWORD with default value of 00000000 (0).In your case it
could have been changed.Change it to original default value...!

Steps:

  • Open Run n type gpedit.msc n hit enter...!
  • Go to the left pannel : "User Configuration > Administrative Templates > Start Menu and Taskbar > ".
  • Towards ur right u'll find several options ....serach for.."Remove Run menu from Startmenu"...!
  • Disable it and if it is already set as not configured , enable it and then disable it .. !
  • U r now done....!

:-)

5:17 AM | 0 comments | Read More

Folder Options Disabled

go to run
type "control folders"
if it doesnt work, try:

Solution 1:

  • ->Run -> Type gpedit.msc Then
  • ->User Configuration ->Administrative Templates --> Windows Components
  • --> Windows Explorer-> Removes the Folder Options menu item from the Tools menu.
  • Right click: -> Properties -> Disable ->Apply -> Again set it to not configured

Solution 2:

Go to Startmenu->Run and enter regedit there and press ok to execute regedit (registry editor). There you’ll see a tree like structure of folders like stuff in left. There navigate to registry entry

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

and on right side you’ll see many values.

Out of these values in right see a value (key) named “NoFolderOptions” .Double click after highlighting it, if there under value box it’s written 1 then change it to 0 and press enter. Exit the registry editor and close any folder and open again to see the settings.If you want to disable Folder Options then set the value of “NoFolderOptions” to 1 (and to retrieve it back change it to 0).

5:10 AM | 0 comments | Read More

Game secrets in xp

FreeCellSecret

Instant WinInstructions -
Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.

Secret -
Game ModesInstructions -
In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.

Hearts

Secret -
Show All CardsInstructions -
Edit this registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Hearts and create a new String value named ZB with a Data value of 42. Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards.
Background -
This secret is a reference to Douglas Adams' book the Hitch Hiker's Guide to the Galaxy. 'ZB' is the initials of the character Zaphod Beeblebrox, the Galactic President. '42' is the answer to The Ultimate Question Of Life, the Universe and Everything.
Minesweeper
Secret -
Reveal MinesInstructions -
Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the
mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.
Secret -
Stop TimerInstructions -
Minesweeper and start a game so the timer starts counting, then press the Windows Key + D to show the desktop. Now when you select minesweeper from the taskbar you can continue playing with the timer stopped.
Pinball
Secret - Extra BallsInstructions -
Type 1max at the start of a new ball to get extra balls.
Secret - Gravity WellInstructions -
Type gmax at the start of a new game to activate the Gravity Well.
Secret - Instant PromotionInstructions -
Type rmax at the start of a new game to go up in ranks.
:D
4:55 AM | 0 comments | Read More

Enable/Disable Windows Task Manager

Written By Akshay Prabhale on Monday, March 10, 2008 | 12:13 AM

Task Manager is used to view the status of windows running applications, active processes, system performance, networking activities and active user history. As a system administrator you can manage all the features of Windows Task Manager, for example stop any running application or set the priority of any running process according to its importance. By default "Windows Task Manager Status" is enabled, but a user can disable or enable it manually. Some time a windows registry hack applies on windows task manager to disable it and your system gives you a message "Task Manager has been disabled by your administrator". You can manage this registry hack with editing the system registry keys or using Group Policy Editor.

Before proceeding further, first scan your system with up-to-date antivirus, and then follow the given steps to enable it using group policy editor.







To enable this feature, you will need to be logged into your computer with administrative rights.
Now click on Start button and type Gpedit.msc in Run option then press Ok button.





In Group Policy Editor, expand the Administrative Templates > System then click on Ctrl+Alt+Del Options, under the User Configuration option.

Now double click on "Remove Task Manager" option under Ctrl+Alt+Del Options folder.

A windows dialog box will appear with the title "Remove Task Manager Properties". Here select the "Enable" option to enable the task manager and if you want to disable it then select the "Disable" option.



U r done !!!!!

12:13 AM | 0 comments | Read More

TELNET HACK TOOL -

Written By Akshay Prabhale on Saturday, March 8, 2008 | 4:14 AM

STEP 1 :- Click here for ip scanner

If you have Ip adrress of someone first see it that of which it is,Means it`s of a site or someone`s computer
To see this u have to download this tool,after downloading this open it,go to
Options>Options(again) on top right corner you can see display,there u can see three options which r as follows
• All hosts
• only alive
• only open ports
Select only open ports third option
Then,okie & saveThen again go to options and then select ports,Third option in options
See this is nessecary u have to read this carefully
This is called an IP adrress
122.163.181.140
(Don`t try to open this i think they have changed the passwordonce i entered that)
okie coming to the point
This is a site IP adrress,
There are two diff. types of ports 23,80,If you have an site IP then in select ports u have to select ports 80
And if u have any IP of other computer u have to type port 23
59.95.100.128 This is a computer IP adrress
(DON`T ASK ME FRM WHERE TO GET IP ADRESS,IF U HAVE A FAKE LOGIN PAGE,THEN U CAN GET SOME IP`S EASILY)
Okieso if u have site IP post 80 and 23 on computer IP,
then save and exit(only option)
Then u r on main screen of angry IP scanner(REMEMBER EVERY TIME YOU OPEN IP SCANNER U HAVE TO SELECT PORTS)
Take this Ip
59.95.100.128
U can see Ip range on main screen of IP scanner
there`s is written
0.0.0.0.
on first 0 wirte 59
on second 95
third 100
and on fourth write down 1 (yes 1 coz the Ip range starts frm 1 to 255)
and in second section u have to write like this
on first 0 wirte 59
on second 95
third 100
and on fourth write down 255 (yes coz i told you it starts frm 1 so u always have to write 1 in first section and 255 in the second)


So it will look like
59.95.100.1 to 59.95.100.255
and then start scan if u get green Ips it`s ur luck and if not it`s ur bad luck start with othere IP adrress
Then if u get any any Ip adrress green
go to start>run>services.msc>ok
u can see a window of services,Click on any name and type t u will come to "T" portion
Then u can see telnet there if u scrol somewhat then,go to properties and there u can see startup type set it manual
ok then close that window,
Then again go to start>run>cmd
Then a DOS window will open,type there telnet enter then u can see Microsoft TELNET>Open (IP adrress)
ENTER

(REMEMBER U HAVE TO GIVE SPACE BETWEEN OPEN AND IP ADRRESS)
Then if u enter his computer it asks for Username & password
If that person has given password to the enter screen (when u enter windows XP)then u can`t enter his computer,or else most of the Pc`s have there username & password admin or administrator

Username = admin
Password = adminor

(IF IT SAYSY INCORRECT)

Username = administrator
Password = administratoror

if it again says incorrect then u can`t enter his computer
and if u have entered his computer
then,Sorry i can`t tell you after this if u know C++ then u already know that how to format his/her PC Hehehehe
I think it`s not overI have to tell you abt that ip adrress if u got abt an site
and how to dig thatfor now search it othere`s computer
4:14 AM | 0 comments | Read More

An easy way to hack a website !!

If you have the html and javascript knowledge then you can access password protected websites. So you want to know how??

keep reading.....
  • Open the website you want to hack. Provide wrong username-password in its log in form.(e.g : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be preparedYour experiment starts from here...
  • Right click anywhere on that error page =>> go to view source.
  • There you can see the html codings with javascripts.
  • There you find somewhat like this....<_form action="..login....">
  • Before this login information copy the url of the site in which you are.(e.g :"<_form..........action=http://www.targetwebsite.com/login.......>")
  • Then delete the javascript from the above that validates your information in the server.(Do this very carefully, ur success to hack the site depends upon this i.e how efficiently you delete the javascripts that validate ur account information)
  • Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> " there instead of "<_type=password>". See there if maxlength of password is less than 11 then increase it to 11 (e.g : if then write )
  • Just go to file => save as and save it any where in your hardisk with ext.html(e.g: c:\chan.html)
  • Reopen your target web page by double clicking 'chan.html' file that you saved in yourharddisk earlier.
  • U see that some changes in current page as compared to original One. Don't get worried.
  • Provide any username[e.g:hacker] and password[e.g:' or 1=1 --]Congrats!!!!!! You have successfully cracked the above website and entered into the account of Ist user saved in the server's database.

Please read "_form"="form" & "_type"="type" & "_input"="input" without quotes]

The above trick won't work on the websites using latest technique to protect there servers. Still you may find some websites to use this trick.

Enjoy !!!!

4:05 AM | 0 comments | Read More

Turn CD drive into DVD drive

That's right. You have read it perfectly from letter to letter and rest assured you're brain has'nt gone insane.

By some hardware manipulations you can run DVD in your CD drive.
Here is the basic information about a CD and a DVD.

There are two types of CD-ROM drives we can mod:
24x to 40x
40x or higher
Drives slower than 24x are too old to be modified.
24x to 40x CD ROMs

Code:
Laser Head Adjustments:
The track pitch of CDs is 1.6 microns, and the track pitch of DVDs is only 0.8 microns. The minimum length of track pits of CDs is 0.843mm, and the minimum length of track pits of DVDs is 0.293mm. That's why DVD discs can store much more data in the size of a CD.Pinpointing this situation, we need to adjust the laser head so it can read discs with smaller track pitches and shorter track pits. Open up the CD-ROM drive, do you see a lens on the rail? That's the laser head. On the side of the laser head, there's a screw you can adjust.

Code:
This is the key of this mod.
This screw can adjust the size of the laser beam that lands on the disc. Referring to the above, after adjusting, the laser beam should be less than 0.293mm, to suit the needs of DVD discs. So turn that screw 2-3 times.Mark with a pencil, in case you forget how many times you turned that screw.

Speed adjustments:
DVD-ROM drives can play DVD movies smoothly at 4x speed. If we're modifying a 32x CD-ROM drive, the rotation speed is obviously too high, increasing heat, and shortening the life of the drive.So we need to decrease the speed of it.
Most people know that power supplies can provide 5V (red wire) and 12V (yellow wire) electricity output for Molex connectors. Find the Molex connector you'll plug into the modifying CD-ROM drive, cut the yellow wire or insulate it with tape, so only 5V of electricity is transferred to the CD-ROM drive. The speed of the drive is now 32 * 5/17 = 9.41x and can now fulfill our requirements.

Code:
40x or higher CD ROMs
When 40x CD-ROM drives are released, most manufacturers are already producing DVD-ROM drives. To lower cost, they use the same core as DVD-ROM drives with DVD functions disabled. What we need to do here is to re-enable the DVD function.
Open up the CD-ROM, behind the circuit board, look for a jumper that says DVD JUMP. Find a jumper to connect this jumper. Thin metal wire also works fine.OK, so the DVD function is unlocked, but we still need to decrease the speed. Use the instructions above on how to decrease the speed of the drive.

I am Not Responsible !
If you are thinking i have tried it then i do have tried it out but hey
its better spending a few bucks more on getting a Combo drive rather than spoiling your CD drive.
I have got a DVD writer and i tried this trick on my spare CD drive.
:-D
3:59 AM | 0 comments | Read More