Disabl e windows key
Many gamers would like to disable the window key at the keyboard. Especially disable the left window key at the keyboard. They find it very irritating whenever they accidentally press it during the game time.
To disable window key at keyboard just follow the steps below:-
Click on Start -> Run -> type regedit
Go to HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Keyboard Layout
Create a new Binary Value with key name = Scancode Map (or modify it if exists)
Value set to 00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00
Once finish, close your registry editor and logout your window (or restart) and your window start key should be disable by now
░ HaÇk§ N cRáÇK§ ░- A Complete Hackers Guide Frnds This Is The place for all Enthusiasts of Hacking,Cracking To Gather n Share Their knoweledge Plz Contribute To This site.. Post U R Querries n post Some intresting topics Relating To Hacking N Cracking
Monday, October 29, 2007
Saving Flash files from websites
Here’s how you can save flash files from websites.
Visit the webpage (here i’m using http://www.xyz.com, just for an example)
Select Source( View > Source )
Now it would show up the HTML code for the site.
Now click CTRL+F buttons together or go to the Edit menu and select Find( Edit > Find )
In the search bar type swf and click find.
It will take you to something similar to EMBED xsrc=”abcd.swf”
Now select the file path. Example if it is EMBED xsrc=”/files/flash/abcd.swf” , copy the entire file path starting from the forward slash(/)
Now goto the address bar and paste the path next to the end of the current address.
It wouldd look like - www.xyz.com/files/flash/abcd.swf
Now click go or hit Enter and the same flash file will load for you but without the HTML - only the file.
Goto File > Save as and save the file in a safe place.
This may not work with some websites that has the files protected / also with some sites that use frames.
I have explained the procedure for internet explorer, this can be done in other browsers also with the same easy and with quite similar steps.
Visit the webpage (here i’m using http://www.xyz.com, just for an example)
Select Source( View > Source )
Now it would show up the HTML code for the site.
Now click CTRL+F buttons together or go to the Edit menu and select Find( Edit > Find )
In the search bar type swf and click find.
It will take you to something similar to EMBED xsrc=”abcd.swf”
Now select the file path. Example if it is EMBED xsrc=”/files/flash/abcd.swf” , copy the entire file path starting from the forward slash(/)
Now goto the address bar and paste the path next to the end of the current address.
It wouldd look like - www.xyz.com/files/flash/abcd.swf
Now click go or hit Enter and the same flash file will load for you but without the HTML - only the file.
Goto File > Save as and save the file in a safe place.
This may not work with some websites that has the files protected / also with some sites that use frames.
I have explained the procedure for internet explorer, this can be done in other browsers also with the same easy and with quite similar steps.
Wednesday, October 24, 2007
How to Use Telnet on a Windows Computer
How to Use Telnet on a Windows Computer
Telnet is great little program for doing a couple of interesting things. In fact, if you want to call yourself a hacker, you absolutely MUST be able to telnet! In this lesson you will find out a few of the cool things a hacker can do with telnet. If you are using Win95, you can find telnet in the c:\windows directory, and on NT, in the c:\winnt\system32 directory.
There isn't a lot of online help concerning the usage of the program, so my goal is to provide some information for new users. First off, telnet isn't so much an application as it is a protocol. Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine.
The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine. Now, telnet runs on your Win95 box as a GUI application...that is to say that you can type "telnet" at the command prompt (in Windows 95 this is the MS-DOS prompt), and assuming that your PATH is set correctly, a window titled "telnet" will open. This differs from your ftp program in that all commands are entered in the DOS window. Let's begin by opening telnet. Simply open a DOS window by clicking "start", then "programs", then "MS-DOS", and at the command prompt, type: c:\telnet The window for telnet will open, and you can browse the features of the program from the menu bar.
Telnet is great little program for doing a couple of interesting things. In fact, if you want to call yourself a hacker, you absolutely MUST be able to telnet! In this lesson you will find out a few of the cool things a hacker can do with telnet. If you are using Win95, you can find telnet in the c:\windows directory, and on NT, in the c:\winnt\system32 directory.
There isn't a lot of online help concerning the usage of the program, so my goal is to provide some information for new users. First off, telnet isn't so much an application as it is a protocol. Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine.
The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine. Now, telnet runs on your Win95 box as a GUI application...that is to say that you can type "telnet" at the command prompt (in Windows 95 this is the MS-DOS prompt), and assuming that your PATH is set correctly, a window titled "telnet" will open. This differs from your ftp program in that all commands are entered in the DOS window. Let's begin by opening telnet. Simply open a DOS window by clicking "start", then "programs", then "MS-DOS", and at the command prompt, type: c:\telnet The window for telnet will open, and you can browse the features of the program from the menu bar.
TO Crack the protected Web Pages
---TO Crack the protected Web Pages---------
Here are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting [ctl-alt-del ]when the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, by typing the directory name into the url address box of your browser, ie: you want access to www.target.com .
Try typing www.target.com/images .(almost ever y web site has an images directory) This will put you into the images directory,and give you a text list of all the images located there. Often, the title of an image will give you a clue to the name of another directory. ie: in www.target.com/images, there is a .gif named gamestitle.gif .
There is a good chance then, that there is a 'games' directory on the site,so you would then type in www.target.com/games, and if it isa valid directory, you again get a text listing of all the files available there.For a more automated approach, use a program like WEB SNAKE from anawave, or Web Wacker. These programs will create a mirror image of an entire web site, showing all director ies,or even mirror a complete server. They are indispensable for locating hidden files and directories.What do you do if you can't get past an opening "PasswordRequired" box? . First do an WHOIS Lookup for the site. In our example, www.target.com .
We find it's hosted by www.host.com at 100.100.100. 1. We then go to 100.100.100.1, and then launch \Web Snake, and mirror the entire server. Set Web Snake to NOT download anything over about 20K. (not many HTML pages are bigger than this) This speeds things up some, and keeps you from getting a lot of files and images you don't care about.
This can take a long time, so consider running it right before bed time. Once you have an image of the entire server, you look through the directories listed, and find /target. When we open that directory, we find its contents, and all of its sub-directories listed. Let's say we find /target/games/zip/zipindex.html . This would be the index page that would be displayed had you gone through the password procedure, and allowed it to redirect you here.By simply typing in the url www.target.com/games/zip/zipindex.html you will be onthe index page and ready to follow the links for downloading.
Here are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting [ctl-alt-del ]when the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, by typing the directory name into the url address box of your browser, ie: you want access to www.target.com .
Try typing www.target.com/images .(almost ever y web site has an images directory) This will put you into the images directory,and give you a text list of all the images located there. Often, the title of an image will give you a clue to the name of another directory. ie: in www.target.com/images, there is a .gif named gamestitle.gif .
There is a good chance then, that there is a 'games' directory on the site,so you would then type in www.target.com/games, and if it isa valid directory, you again get a text listing of all the files available there.For a more automated approach, use a program like WEB SNAKE from anawave, or Web Wacker. These programs will create a mirror image of an entire web site, showing all director ies,or even mirror a complete server. They are indispensable for locating hidden files and directories.What do you do if you can't get past an opening "PasswordRequired" box? . First do an WHOIS Lookup for the site. In our example, www.target.com .
We find it's hosted by www.host.com at 100.100.100. 1. We then go to 100.100.100.1, and then launch \Web Snake, and mirror the entire server. Set Web Snake to NOT download anything over about 20K. (not many HTML pages are bigger than this) This speeds things up some, and keeps you from getting a lot of files and images you don't care about.
This can take a long time, so consider running it right before bed time. Once you have an image of the entire server, you look through the directories listed, and find /target. When we open that directory, we find its contents, and all of its sub-directories listed. Let's say we find /target/games/zip/zipindex.html . This would be the index page that would be displayed had you gone through the password procedure, and allowed it to redirect you here.By simply typing in the url www.target.com/games/zip/zipindex.html you will be onthe index page and ready to follow the links for downloading.
Monday, October 22, 2007
Want to trace the IP address of the email sender
Want to Trace the ip address of Email sender
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.
First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.130.1.1]
Finding IP address in Gmail Log into your Gmail account with your username and password.Open the mail.To display the email headers, Click on the inverted triangle beside Reply. Select Show Orginal.You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 5.Look for Received: from followed by the IP address between square brackets [ ]. Received: from [69.138.30.1] by web31804.mail.mud.yahoo.com via HTTP;If you find more than one Received: from patterns, select the last one.Track the IP address of the sender
Finding IP address in Yahoo! MailLog into your Yahoo! mail with your username and password.Click on Inbox or whichever folder you have stored your mail.Open the mail.If you do not see the headers above the mail message, your headers are not displayed. To display the headers, Click on Options on the top-right cornerIn the Mail Options page, click on General PreferencesScroll down to Messages where you have the Headers optionMake sure that Show all headers on incoming messages is selectedClick on the Save buttonGo back to the mails and open that mailYou should see similar headers like this:
You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 7.Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.That is be the IP address of the sender.If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP. Track the IP address of the sender
Finding IP address in HotmailLog into your Hotmail account with your username and password.Click on the Mail tab on the top.Open the mail.If you do not see the headers above the mail message, your headers are not displayed. To display the headers, Click on Options on the top-right cornerIn the Mail Options page, click on Mail Display SettingsIn Message Headers, make sure Advanced option is checkedClick on Ok buttonGo back to the mails and open that mailYou should see the email headers now.You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 7.If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP addressIn this case the IP address of the sender is [68.34.60.59]. Jump to step 9. If you find a header with Received: from followed by a Gmail proxy like this
Look for Received: from followed by IP address within square brackets[].In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9. Or else if you have headers like this
Look for Received: from followed by IP address within square brackets[].In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9. * If you have multiple Received: from headers, eliminate the ones that have proxy.server.com.(e.g) Track the IP address of the sender
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.
First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.130.1.1]
Finding IP address in Gmail Log into your Gmail account with your username and password.Open the mail.To display the email headers, Click on the inverted triangle beside Reply. Select Show Orginal.You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 5.Look for Received: from followed by the IP address between square brackets [ ]. Received: from [69.138.30.1] by web31804.mail.mud.yahoo.com via HTTP;If you find more than one Received: from patterns, select the last one.Track the IP address of the sender
Finding IP address in Yahoo! MailLog into your Yahoo! mail with your username and password.Click on Inbox or whichever folder you have stored your mail.Open the mail.If you do not see the headers above the mail message, your headers are not displayed. To display the headers, Click on Options on the top-right cornerIn the Mail Options page, click on General PreferencesScroll down to Messages where you have the Headers optionMake sure that Show all headers on incoming messages is selectedClick on the Save buttonGo back to the mails and open that mailYou should see similar headers like this:
You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 7.Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.That is be the IP address of the sender.If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP. Track the IP address of the sender
Finding IP address in HotmailLog into your Hotmail account with your username and password.Click on the Mail tab on the top.Open the mail.If you do not see the headers above the mail message, your headers are not displayed. To display the headers, Click on Options on the top-right cornerIn the Mail Options page, click on Mail Display SettingsIn Message Headers, make sure Advanced option is checkedClick on Ok buttonGo back to the mails and open that mailYou should see the email headers now.You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 7.If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP addressIn this case the IP address of the sender is [68.34.60.59]. Jump to step 9. If you find a header with Received: from followed by a Gmail proxy like this
Look for Received: from followed by IP address within square brackets[].In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9. Or else if you have headers like this
Look for Received: from followed by IP address within square brackets[].In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9. * If you have multiple Received: from headers, eliminate the ones that have proxy.server.com.(e.g) Track the IP address of the sender
Tuesday, April 10, 2007
What is Hacking and Hackers
'Hacking' and 'Hackers' are terms that generally tend to have a negative effect on people. Most people straightaway start associating 'Hackers' with computer criminals or people who cause harm to systems, release viruses,etc.Nowadays the media has been wrongly and outrageously reffering to computer criminals as 'Hackers'.They fail to recognise the fact that criminals and hackers are two distinct terms and are not associated with wach other whatsover.People have wrong notions and for reasons not justified at all, they have a negative attitude and utter dislike for 'Hackers' and persons associated with 'Hacking'. Hackers in reality are actually good, pleasant and extremely intelligent people, who by using their knowledge in a constructive manner help organisations to secure documents and company secrets, help the government to protect national documents os strategic importance and even sometimes help justice to meet its end by ferreting out electronic evidence. Rather, these are the people who help to keep computer criminals on the run.
Subscribe to:
Posts (Atom)