Ethical hacking ebooks| tips and tricks| windows tricks| software| mobile| infotechno| free download with full version| games| ipad and; iphone|Android| google | java | c language | mobile | facebook | whatsapp | Earn money


Get Serial NO. of Any Software through Google

6/11/2012

What is Serial No. -

A serial number is a unique code assigned for identification of a single unit. Although usually called a number, it may include letters, though ending with digits. Typically serial numbers of a production run are incremented by one, or another fixed difference, from one unit to the next. Units may be marked with several alphanumeric codes, but only one of these will be a serial number; others are sometimes called nominal numbers, and may identify the part, specify installed options, and so on.
 - wikipedia


A Short Trick

                     Go to Google
                     Type this syntax in search bar " 94FBR "

Replace Product name with desired software and leave     a space then type   94FBR




Press enter, thats it

Now you receive Many pages which contains Serial no, Crack, Patches....





How to Get YOUR FRIEND'S IP Address STEP BY STEP

6/11/2012

First Method

is help of cmd commad netstat

open ur cmd type in netstat help to get all the commands and to find ip use netstat -a

share as many things with victim like photos, song or any other type of file

when ur sharing then open cmd type in netstat -an and all the list will come and see the establishment and you will get the ip

Other netstat commands:

-a   Displays all connections and listening ports.
-e   Displays Ethernet statistics. This may be combined with the -s option.
-n   Displays addresses and port numbers in numerical form.
-p   Proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s   Option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r   Displays the routing table.
-s  Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
-p  Option may be used to specify a subset of the default.


Second method is the help of websites

I give you two websites that help you to find the ip address

here are the links

http://shivampatel.net/trace/

http://whatstheirip.com/

open these websites and read the instructions you will get to know how to do it.

NotePad Tricks To Scare Your Friends

6/10/2012


Most of you must be aware about a tool called notepad. It is a simple text based editor. But today I am going to discuss some cool tricks which you can perform on your computer using notepad. You can also use these tricks to scare your friends.

FOR MESSAGE BOX:

TYPE:

@ECHO off

:Begin

msg * Hi

msg * Are you having fun?

msg * I am!

msg * Lets have fun together!

msg * Because you have been o-w-n-e-d

GOTO BEGIN


Save it as pc.bat and send it to your friends.

___________________________________________________________________________


Make Keyboard Keys Type Continuously:

Type :

MsgBox “stop me..! if you can”

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{bs}”

loop


Save it as pc.vbs and send it to your friends.

_____________________________________________________________________________


Convey your friend a message and shut down his/ her computer.

Type :

@echo off

msg * I don’t like you

shutdown -c “Hahahah You are Doomed” -s

Save it as pc.bat and send it to your friends.



_______________________________________________________________________________



Toggle your friend’s Caps Lock button simultaneously

Type :

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do 

wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}” 

loop


Save it as pc.vbs and send it to your friends.
______________________________________________________________________________


Frustrate your friend by making their keyboard hit Enter simultaneously whenever they press a key :

Type :

Set wshShell = wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “~(enter)”

loop


Save it as pc.vbs and send it to your friends.

________________________________________________________________________________


Hack your friend’s keyboard and make him type “You are a fool” simultaneously:

Type : 

Set wshShell = wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “You are a fool.”

loop


Save it as pc.vbs and send it to your friends.

________________________________________________________________________________

Open Notepad, slowly type anythingand freak your friends out:
Type :

WScript.Sleep 180000

WScript.Sleep 10000

Set WshShell = WScript.CreateObject(“WScript.Shell”)

WshShell.Run “notepad”

WScript.Sleep 100

WshShell.AppActivate “Notepad”

WScript.Sleep 500

WshShell.SendKeys “Hel”

WScript.Sleep 500

WshShell.SendKeys “lo “

WScript.Sleep 500

WshShell.SendKeys “, ho”

WScript.Sleep 500

WshShell.SendKeys “w a”

WScript.Sleep 500

WshShell.SendKeys “re “

WScript.Sleep 500

WshShell.SendKeys “you”

WScript.Sleep 500

WshShell.SendKeys “? “

WScript.Sleep 500

WshShell.SendKeys “I a”

WScript.Sleep 500

WshShell.SendKeys “m g”

WScript.Sleep 500

WshShell.SendKeys “ood”

WScript.Sleep 500

WshShell.SendKeys ” th”

WScript.Sleep 500

WshShell.SendKeys “ank”

WScript.Sleep 500

WshShell.SendKeys “s! “



Save it as pc.vbs and send it to your friends.
____________________________________________________________________________

Frustrate your friend by making their keyboard hit Backspace simultaneously whenever they press a key :
Type :

MsgBox “Let’s rock and roll”

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{bs}”

loop



Save it as pc.vbs and send it to your friends. 
____________________________________________________________________________

Open Notepad continuously in your friend’s computer:

Type :

@ECHO off

:top

START %SystemRoot%\system32\notepad.exe

GOTO top

Save it as pc.bat and send it.
______________________________________________________________________________

Continuously pop out your friend’s CD or DVD Drive.

Type :

Set oWMP = CreateObject(“WMPlayer.OCX.7″)

Set colCDROMs = oWMP.cdromCollection

do

if colCDROMs.Count >= 1 then

For i = 0 to colCDROMs.Count – 1

colCDROMs.Item(i).Eject

Next

For i = 0 to colCDROMs.Count – 1

colCDROMs.Item(i).Eject

Next

End If

wscript.sleep 5000

loop



Save it as pc.vbs and send it to your friends.
___________________________________________________________________________

How to Make Your PC Virus Free

6/10/2012

1. E-mails:
This is the most of the common way through which spywares, worms, Trojans and viruses find their easy way into your computer. When you have your own private emails, increase the privacy settings and never ever open unsolicited and unknown emails, as they may be the source of the much awaiting harms that can damage your whole computer. To avoid this harming your computer, use very good anti-spam software. Never click links in e-mails if you are not sure what are they.


                                               

2. USB thumb or pen drives:
This is another and most common source that could affect your computer in a number of ways. The best option to avoid this from happening is by performing a virus scan before copying any data onto your computer and another small tip is not to double click the pen drive for opening. Use right click to open or explore the files in the drive before opening is the best alternative.

3. Use of MS Outlook:
It is not known that MS Outlook could be a source and the best way to spread and hack into your computer, unless you have a real time antivirus programs running. Alternatives to MS Outlook will include the use Windows Mail (which can even identify spam emails from known sources), Pegasus of thunderbird, or web based programs like hotmail or Yahoo.

4. Internet or World Wide Web:
Even a basic computer user knows that internet is the best way to spread viruses like pandemic and are the main sources of malicious programs like viruses, worms, Trojans, etc., which can range up to 80 percent of the worldwide transfer during surfing of the web. By following some of the best surfing habits this danger could be waded off, which will include by not clicking the pop-up windows or by using pop-up blockers.

5. Search Engines:
Most of us surf the web using mostly with the help of search engines, and one of the best ways either to prevent from visiting malicious website from being listed in your search or to point them out when listed, is by installing some powerful scanners like AVG Link scanner, which is a free ware. Even Mozilla says if a site will harm your computer or not.

6. Use a good antivirus:
If you are looking for one solution that can do most of the jobs mentioned so far, it is also good for preventing from someone else stealing your personal information like online identity, credit card information, password stealing and many other such activities. So always use a powerful antivirus.

Comments are always appreciated!!

How To Detect That a Keylogger is Installed on a Computer or Not

6/10/2012

Key loggers are software that traces the key strokes on your computer. It is done in such a way that a person using the computer is unaware of the fact that a key logger is installed on a particular PC.

How does keyloggers enters your computer ?


There are several ways in which a key logger can get into your computer either it is directly installed or it is indirectly transferred to your computer. Most of the time, this malicious file enters a computer when the user downloads an infected application like movies, music or other software applications.
So how to get rid of keyloggers that is installed on a computer


1. Use updated antivirus and anti spyware

Some of the good anti viruses have capability to detect key loggers. So you should update your antiviruses regularly so that it gets updated for new keyloggers.


2. Use Anti keyloggers

There are anti keyloggers available that will make the task easy for you in finding a keyloggers. Use these softwares if you think there is a high possibility of keyloggers on a computer. The anti keyloggers that i will suggest you is Cyberhawk. Even Kasperky does a good job in this area too. Also check anti-spy.info. More examples:

http://www.microsoft.com/athome/security/spyware/software/default.mspx
http://www.lavasoftusa.com/software/adaware/

3. Search for keyloggers yourself

Keyloggers have the capability that they hide them self from the user but are active in the background. There are some shortcuts that are used to see them live on screen

For example : Ctrl + Alt + X or Ctrl + Alt + Wondows Key + X or desktopshark etc.

4. Use special tools

SnoopFree

Freeware antikeylogger that block hook based keyloggers as well as screen captures. For Windows XP.

PSMAntiKeyLogger

PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.

Security cameras on internet through Google

6/10/2012

Here’s a trick that will blow your mind. You can get access to all open public webcams through Google. There are many tricks by which one may get accessed to all the webcams running currently at a particular position and at particular time. However the Google Webcam trick seems to be one the easiest. Here are a simple few steps by which one may do the same.



Step 1. Open internet your web browser.
Step 2. Go to a search engine of your choice (i.e. Google, Yahoo, etc.), and input any of the search commands as listed below.
Step 3. After you search one of these queries, you will see some search results, click on any one of them.
Step 4. Depending on the type of camera that you have access to, you may be able to control the camera like zoom, pan, and tilt the camera to see what you want to.
Step 5. Do not try to get onto password protected cameras, as this will not go unnoticed if too many attempts are made

Some Commands to be Remember to Find Live CCTV Cameras.

 inurl:/view.shtml
 intitle:”Live View / – AXIS” | inurl:view/view.shtml^
 inurl:ViewerFrame?Mode=
 inurl:ViewerFrame?Mode=Refresh
 inurl:axis-cgi/jpg
 inurl:view/index.shtml
 inurl:view/view.shtml
 liveapplet
 intitle:liveapplet
 allintitle:”Network Camera NetworkCamera”
 intitle:axis intitle:”video server”
 intitle:liveapplet inurl:LvAppl
 intitle:”EvoCam” inurl:”webcam.html”
 intitle:”Live NetSnap Cam-Server feed”
 intitle:”Live View / – AXIS 206M”
 intitle:”Live View / – AXIS 206W”
 intitle:”Live View / – AXIS 210″
 inurl:indexFrame.shtml Axis
 intitle:start inurl:cgistart
 intitle:”WJ-NT104 Main Page”
 intitle:snc-z20 inurl:home/
 intitle:snc-cs3 inurl:home/
 intitle:snc-rz30 inurl:home/
 intitle:”sony network camera snc-p1″
 viewnetcam.com
 intitle:”Toshiba Network Camera” user login
 intitle:”i-Catcher Console – Web Monitor”


Use these commands in Google Search and get the desired result.