Sunday, June 30, 2013

5 Websites to Download Torrent Files using IDM

5 Websites to Download Torrent Files using IDM

Torrents are the most popular method of downloading large files. Torrents provide better speed, no file corruption, anytime resume and security. The speed of torrents depends on the number of users seeding the torrents i.e. the data or bandwidth is equally distributed among many users. If there are 100 seeders of a torrent, that means 100 users are sharing their bandwidth with you so you can get better download speed. But what if you want to download a large file which doesn’t have many seeders? For that we have online torrent clients which caches the torrent and then lets you download the file using your favorite download manager like Internet Download Manager (IDM).
Today we will share 5 websites which helps you to download torrents files using download managers. Remember that this is no way a trick as you might have seen on other websites, these are just online services helping you.

1.zbigz.com


    ZbigZ is an online bittorent client that lets you download torrent files using a download manager. It also lets you stream media files direct to your PC. Other features of ZbigZ are given below:
  • Download any type of content
  • No Speed and Bandwidth limit for Premium users
  • For free users, speed up to 150kbps and 8GB file size limit
  • No network or software restrictions
  • Download anonymously
  • Stream music and video
  • Download from anywhere, anytime
You just need to provide the link of the torrent file and ZbigZ will starting downloading for you which you can later download to your PC. The cache is stored only for a week and after that you will have to start over again.

2.Furknet

Update:This service doesn't work anymore
Furk.net is quite similar to ZbigZ, it lets you stream files from one computer to another. The only limitation is that it only works on Indian IP address, that means you need access to a PC in India. You can also use any VPN or similar software to download the file but registration would not work without Indian IP.
  • Bandwidth limit: up to 250GB per month
  • Disk storage limit: unlimited (as long as files are from public sources)
  • Download size limit is 700 MB though they don’t mention it on the website
  • File will be deleted if not downloaded in 30 days otherwise will be stored forever
  • Plugins available for Mozilla Firefox and Google Chrome
  • No speed limits
You will have to register using your Facebook account.
After that you can either provide the link of torrent or upload the torrent file itself.


3.boxopus

It is solely an online torrent client which stores the downloaded torrents in your DropBox account. It’s still in Beta so the functionality is limited but you can enjoy this.
  • Unlimited Bandwidth
  • 2GB file size limit
  • Cached files are deleted in 24 hours whether you download them or not
  • Stores your torrent file in DropBox
As this site is in Beta, you will need an invitation code to register. Alternatively, you can sign in using Facebook, Twitter or Dropbox accounts respectively. It will ask you to provide the link to torrent file or upload the torrent. Now, download the torrent to your PC using any download manager.

4.Torrenthandler


Torrent Handler is another service that lets you download torrents directly using your download manager.

  • No file size limit
  • Unlimited bandwidth available
  • Unlimited storage space
If you have heard about another service named Quick-Torrent then let me tell you that Quick-Torrent and TorrentHandler are both same services, just using different names. Similar to other services discussed above, it also lets you either upload a torrent file or provide a link to the torrent file. Once the file is cached, you will receive a notification on your mail. Now, you can download torrent file using download manager such as IDM.

5.put.io

    It is one of the best online media streaming service out there on the web. The only downside(for now) is that the free user slots are full so you can not use it for free. Nevertheless, you can submit your email address to get notified as soon as the free account registrations are open.

  • Space up to 1TB for Premium members, no free accounts on offer for now
  • Stream media files as well as download torrents
  • Unlimited bandwidth for premium members
  • Stores your files on its own server until you delete them yourself
You just need to enter the link to the torrent file and your torrent will start downloading and will be stored in your account. Now, you can download that file anytime using Internet Download Manager or any other download manager in high speed.
So, there you have 5 websites that lets you download torrents using download managers. Which one do you use from the above five? Do you use any service other than the above mentioned websites? If yes, then do let us know in the comments below.

Download youtube videos without any youtube downloader(Just by using VLC)

Download youtube videos using vlc

Do u wish to download videos from youtube. Are you using any youtube downloader to download the videos from youtube. From this moment you don't need such downloaders for downloading videos.
Because with this tutorial you can download any videos from youtube  using VLC player





You all might be familiar with VLC player now we re going to down load youtube vedios from this VLC player
Step 1: First grab the URL of the YouTube video page. 

Step 2: Now click on Media –>Open Network stream. 

Step 3:Paste the URL and click Play.

Step 4:Once VLC starts streaming the video, click Tools –>Codec Information

Step 5: At the bottom of the window you will see a Location box. Copy the URL and paste it on your browser’s 
address bar. 

Step 6:The browser will now download the file which you can save it to your hard disk. Alternatively, you can record the video.


or else you can paste that url in IDM or any other download manager to download faster

Friday, June 28, 2013

Great hackers and Hackers greatness

Company- Founder

Apple - Founder Steve Jobs was a Hacker, a Pirate.
Microsoft - Founder Bill Gates was a Hacker & a Pirate.
Facebook - Founder Mark Zuckerburg was a Hacker, a Explorer.
Google - Founders Larry Page, and Sergey Brin were algorithm Developer, yet Hacker.
Napster - Founder Sean Parker was a Hacker, a Free minded revolutionist. 
wikileaks- founder-julian assange hacker(he is more famous than obama)


Top 10 Hackers

10.Michael Calce:
When he first started hacking he was famously referred as mafia boy, and his name was prevented from getting public, for he was a minor, when fads nabbed him. A high school student from west island, Quebec who launched service attacks in the year 2000 against the top commercial websites including Yahoo!, amazon.com, Dell, E-trade, E-Bay and CNN. Like many hackers, Calce exploited websites primarily for pride and establishing dominance for himself and his cybergroup. On September 12, 2001, the Montreal Youth Court sentenced him to 8 months of open custody, one year probation, a small fine. He was restricted from accessing the internet. He obviously awestruck the people with his gig.
9. The Deceptive Duo:
In the year 2002 two young computer prodigies namely Benjamin stark,20 and Robert Lyttle,18 broke into government networks, including the U.S. navy, NASA, FAA and Department of Defense (DoD). They argued that they were merely trying to expose security failures and protect Americans because of the 9/11 incident. Stark was sentenced to 2 years imprisonment and Lyttle severed 4 months in prison with 3 years probation and was fined with an amount of ten thousand dollars each. The young tots definitely made top security officials to re-plan their security design. 

8 Raphael Gray:

Raphael was 19 years old when he hacked the computer systems around the world in over six weeks, and made mockery of the security the world felt safe in. His mission was to make a multi- million pound credit card. He published about 6,500 credit cards as an example of weak security in the consumer websites.


7 Vladimir Levin:

Vladimir Levin became famous for being involved in an attempt to fraudulent transfer of $10.7 million through Citibank’s computers. He and his 4 other members with him were involved in this activity. He was said to have coordinated the first ever internet bank raid.

Levin used a laptop computer in London, England for the access. He stole the customers codes and passwords. He made a transaction of $3.7 million via wires to accounts his group controlled in United States, Finland, the Netherlands, Germany and Israel. He was arrested in London airport in March 1995, was convicted upto 3 years in jail. He had to pay Citibank of amount $240,015. Levin’s ability to transfer Citibank client funds to his own accounts was possible through stolen account numbers and PINs. Levin’s scam was a simple interception of clients’ calls while recording the punched in account numbers.

6 Adrian Lamo:
Adrian Lamo was famous by his nickname “the homeless hacker”. He used coffee shops, libraries and internet cafés as his locations for hacking. Lamo is widely-known for breaking into a series of high-profile computer networks--The New York Times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he added his name to the The New York Times’ internal database of expert sources and utilized LexisNexis account to conduct research on high-profile subjects. The Times filed a complaint, and a warrant for Lamo’s arrest was issued.

After several days being underground, he finally surrendered to feds. He was ordered to pay approximately $65,000 in damages and was sentenced to six months house arrest at his parents’ home, with an additional two years of probation. Lamo is presently working as a threat analyst and donates his time and skills to a Sacramento-based nonprofit organization.
5 Jonathan James:
Jonathan James, aged only 16, was the first teenager to be held captive for computer hacking when he was only sixteen years old. He broke into the server of department of defense in the year 1999 which gave him a nick name comrade at the age of 16. He also broke into NASA. Stealing softwares of NASA and DoD later put him into big trouble. When he was accused of hacking several websites he said that he was actually having a look and fooling around and that what he found really interesting was the challenge to see what he could do.

On May 18, 2008, aged 25, he committed suicide using a gun. James in his suicide note expressed that he would be made a scapegoat and blamed for cyber crimes he did not commit: “I have no faith in the ‘justice’ system. Perhaps my actions today, and this letter, will send a stronger message to the public. Both way, I have lost control over this situation, and this is my only way to regain control,” as given in Listverse
4 Kevin Poulsen:
Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio’s KIIS-FM phone lines, (taing over all of the station’s phone lines) which earned him a brand new Porsche, among other items. His photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Law enforcement dubbed him “the Hannibal Lecter of computer crime.”Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information. Poulsen went underground as a fugitive when the FBI began its search for him, but in 1991, he was finally captured. He pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, obstruction of justice, and for obtaining information on covert businesses run by the FBI. Kevin Poulsen was sentenced to 51 months in prison (4 years and 3 months), which was the longest sentence ever given for hacking at the time.
 3.Kevin David Mitnick:
Kevin started with his minor cyber crimes when he was twelve years old. He hacked the Los Angeles bus transfer system to get free rides the biggest hacking was the breaking into the DEC system to view the VMS source code (open virtual memory system which lead to the clean-up cost of around $160,000. He broke into the computer of top technology and telecommunications like Nokia, Motorola, Fujitsu Siemens and sun Microsystems. He termed his activity as social engineering to legalize his acts. He also gained the full administration privileges to IBM minicomputers at the computer learning institute in Los Angeles for a bet. He was sent to prison for five years and eight months and when he was freed he decided to set up Mitnick Security, which is a safety consultancy company that offers its services for multinational firms.

2. Robert Tappan Morris:
On November 2, 1988, Robert Morris released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. At that time he was a student at Cornell and from that where he started writing codes to create worms as he wanted to know how large the internet world is. But the worm lead to the slow speed of internet and made the systems no longer usable.


He was sent to 3 years imprisonment, 400 hours of community service and was fined $10,500. At present he is a professor at Massachusetts institute of technology, computer science and artificial intelligence laboratory. He was the first person prosecuted under the 1986 Computer Fraud and Abuse Act. It’s been a turn big turn around in his life, from a young computer prodigy to feared hacker, and now a professor at one of the most respected university.


1.Gary McKinnon

Gary McKinnon comes first among his peer hackers. His hacking into top notch U.S. institutions was talk of legends. U.S. military, Pentagon, NASA succumbed to his hacking and reduced to sort of mockery. In 2002, an exceptionally odd message appeared on a US Army computer screen: “Your security system is crap,” it read. “I am Solo. I will continue to disrupt at the highest levels.” It was later identified as the work of Scottish systems administrator, Gary McKinnon. This made him the biggest hacker celebrity the world have ever seen and registered his name in golden words in book of hackers. McKinnon is now facing 70 years of imprisonment and is deprived from accessing internet. He has illegally accessed 97 computers and has caused around $700,000 damage to the economy.

The most shocking thing McKinnon’s motives for the large scale hackings, which he claims were in search of information on UFOs. He believed the US government was hiding such information in its military computers.


Wednesday, June 26, 2013

Spoof Mailing (Send fake Mail)

Most of the email forging tutorials on internet will teach us how to send fake mails connecting to SMTP server of ISP or any other domain. But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorized access. So we have to run our own SMTP server on our computer .SMTP server is a simple software program which can be installed on your computer in few seconds.

Download QK STMP Server: here

How To Send Fake Emails
This is the SMTP server i am using in my tutorial .Once you download and install the server on your comp then you are all set to send fake emails successfully .This will work. 

PART A: CONFIGURING SMTP SERVER

Once you have installed the QK SMTP server on your comp you must perform the following configuration.

1. Click on "Settings" button on the main screen, the Settings window pops up

2. On Settings window click on "Basic Parameter" tab

3. Set binding IP to "127.0.0.1"

4. Set port to "25"

PART B: FORGING EMAIL (SENDING FAKE MAIL)

1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running).If it is already running then this step can be ignored

2. Go to command prompt (Start-Accessories-Command prompt)

3. Type exactly as follows

C:\>telnet 127.0.0.1 25

Here 127.0.0.1 is the default IP of every computer.25 is the port number. SO you are connecting to the SMTP server running on your own computer.

NOTE: The IP 127.0.0.1 should not be substituted by any other IP.



4. After typing the telnet command in the command prompt you get entry to the server which displays the following message. The response of a OK SMTP server is given below. Message within yellow color is only explanation.

220 Welcome to QK SMTP Server 3
hello hacker (Type hello & any name followed by space)
250 Hello hacker (Server Welcomes You)
mail from:billg@microsoft.com (email address can be anything of your choice)
250 billg@microsoft.com Address Okay (Server gives a positive response)
rcpt to:admin@gmail.com (Type any valid recipient e-mail address)
250 admin@gmail.com Address Okay (Server gives a positive response)
data (type this command to start input data)
354 Please start mail input
From: bill 
To:name@gmail.com
Date: something
Subject: A test of fake mail
You can create as many headers followed by the ":" symbol.
NOTE: HEADERS SHOULD NOT CONTAIN A LINE GAP.IF SO IT IS CONSIDERED AS BODY OF THE MAIL. Press enter twice so that there is a line gap between the header & body data



End the body of mail by pressing [ENTER]. (dot) [ENTER]

250 Mail queued for delivery (Sever indicates that the mail is ready for sending)
Quit (Type this command to quit from server)
221 Closing connection. Good bye.
Connection to host lost
(You will get the above 2 lines of message after typing "quit" command)
(Your mail is sent to the recipient)

Monday, June 24, 2013

Passwords Location

Location of All Passwords in systems-My Ways To Hack


Welcome to (My Ways To Hack- "An approach to introduce people with the truth of HACKING"), Hello friends, Today in this post I'll tell you how can you find your saved passwords stores in windows. In today's Internet driven world, all of us use one or other applications starting from browsers & instant messengers. Most of these applications store the sensitive information such as user name, password in their private location using proprietary methods. This prevents hassle of entering the credentials every time during the authentication.
However it is important to know that this secret information if landed in other person's hands either accidentally  then it can easily put your privacy at risk.


Password Secrets of Windows Applications 


 Here is the list of popular applications falling into various categories such as Internet browsers, Instant Messengers whose password secrets are exposed below.

 Firefox 

The passwords are stored in one of the following filenames: signons.txt, signons2.txt, and signons3.txt (depends on Firefox version) The passwords stored in this sign-on file are encrypted using 3DES followed by BASE 64 encoding mechanism. Here is the default location of Firefox profile directory,

[Windows XP] 
C:\Documents and Settings\<user_name>\Application Data\Mozilla\Firefox\Profiles\<random_name>.default

[Windows vista and Windows 7]
C:\Users\<user_name>\AppData\Roaming\Mozilla\Firefox\Profiles\<random_name>.default
...........................................................................................................................
Google Chrome

Google Chrome stores all sign-on passwords in the sqlite database file called 'Web Data' within the profile directory. Here is the default location of Chrome profile directory.

[Windows XP]
C:\Documents and Settings\<user_name>\Local Settings\Application Data\Google\Chrome\User Data\Default

[Windows Vista & Windows 7]
C:\Users\<user_name>\Appdata\Local\Google\Chrome\User Data\Default
...........................................................................................................................

Internet Explorer

Internet Explorer stores two types of passwords, sign-on and HTTP basic authentication (generally proxy, router configuration) passwords. IE below version 7 stores both sign-on and HTTP basic authentication passwords in the secure location known as 'Protected Storage' in the following registry location,

HKEY_CURRENT_USER\Software\Microsoft\Protected Storage System Provider

With version 7 onwards IE uses the new mechanism to store the sign-on passwords. The encrypted password for each website are stored along with hash of the website URL in the following registry location.

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\Storage2

Also IE 7 onwards, HTTP basic authentication passwords are stored in the 'Credentials store' at following location based on the operating system.

[Windows XP]
C:\Documents and Settings\[username]\Application Data\Microsoft\Credentials

[Windows Vista and Windows 7]
C:\Users\[username]\AppData\Roaming\Microsoft\Credentials
............................................................................................................................

Opera 

Opera stores the login passwords in an encrypted format in the 'Magic Wand File' called 'Wand.dat' within its profile directory. This profile path is different for different versions of Opera as shown below.
For Opera Version less than 10

[Windows XP]
C:\Documents and Settings\<username>\Application Data\Opera\Opera\profile\wand.dat

[Windows Vista/Windows 7]
C:\users\<username>\AppData\Roaming\Opera\Opera\profile\wand.dat
...........................................................................................................................

 Microsoft Outlook

Newer version of Outlook starting from 2002 to latest version 2010, store the passwords (other than exchange server) for various email account such as POP3, IMAP, SMTP, HTTP at following registry location.

[Windows NT onwards]
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles

[Prior to Windows NT]
HKEY_CURRENT_USER\Software\Microsoft\Windows Messaging Subsystem\Profiles

Newer versions of Outlook from 2002-2010 stores the Exchange server passwords in 'Credential Store' as it provides better protection over other methods.

Older versions of Outlook (Outlook Express, 98, 2000 etc) stores the Email configuration information along with encrypted password at following registry location,


[For Outlook installed in Internet Mail Only Mode Configuration]
HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts

[For Outlook in normal mode]
HKCU\Software\Microsoft\Internet Account Manager\Accounts
............................................................................................................................

Google Talk 

Google Talk (GTalk) stores all remembered gmail account information at following registry location.

HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts

For each Google account separate registry key is created with the account email id as name under this key. Account password is encrypted and stored in the registry string value named 'pw' within this account registry key.
..............................................................................................................................

  Windows Live Mail

All account settings, including the encrypted passwords, are stored in
[Windows Profile]\Local Settings\Application Data\Microsoft\Windows Live Mail\[Account Name]

The account filename is an xml file with .oeaccount extension.
..............................................................................................................................

 Yahoo Messenger

Yahoo Messenger prior to version 7.5 used to store the password in the registry value 'EOptions String' at following registry location,

 HKEY_CURRENT_USER\Software\Yahoo\Pager

This encrypted password can be decrypted using ycrwin32.dll.
................................................................................................................................

 AIM (AOL Instant Messenger)

AIM version 6 onwards stores the password at the following registry location,
HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords

AIM PRO version uses the different registry location to store the passwords,

  HKEY_CURRENT_USER\Software\AIM\AIMPRO\<Account_Name>
................................................................................................................................

Pal talk 

PaltalkScene stores main account password at following registry location

 HKEY_CURRENT_USER\Software\Paltalk\<nick_name>

Password is encrypted and stored in the registry value 'pwd' under this key. All other IM passwords such as Gmail, Yahoo, AIM etc are saved under separate sub keys under this registry key.
...............................................................................................................................

 Skype

Skype does not store password directly. Instead it stores the encrypted hash of the password in the 'config.xml' located in Skype's user profile directory. Typical user profile directory for Skype will be as follows,
[Windows XP] 
C:\Documents and Settings\<user_name>\Application Data\Skype\<account_name>

[Windows Vista & Windows 7] 
C:\Users\<username>\AppData\Roaming\Skype\<account_name>
................................................................................................................................

 MSN Messenger 

The passwords are stored under
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds\[Account Name]
................................................................................................................................

Hope this will be informative for you, kindly post your comments on this article.

Be a real hacker - PROFESSIONAL, and change the trend of HACKING.
Thanks & Regards:

Rohith Gundra

Tricks with BatchFile

Tricks And Hacks By Batch scripting:

Welcome to (My Ways To Hach- "An approach to introduce people with the truth of HACKING"), Hello friends, Today in this post I'll show you how can you prank or make fake viruses using batch files, In my earlier post I'll introduce you with the BEGINNERS GUIDE TO BATCH PROGRAMMING, here you find some basic about batch file, now begin with some programs in batch file so with the help of this program you can make prank or make some fake viruses. We know that Batch files are basically plain text file containing DOS command. You can edit or write your batch file with notepad or DOS editor(EDIT). Always remember that a batch file should have an extension.BAT.

1. MATRIX EFFECT  
                                               

Follow the steps and see the amazing matrix effect happen in your DOS window :


Open Notepad.
Copy the below mentioned text in your notepad file:
@echo off
 color 02
:start
echo %random% %random% %random% %random% HACKING begins %random% %random% %random% %random% %random% %random%
goto start
Save the file with .bat extension like Matrix.bat. you can also change the text and color.
2. CONTINUOUSLY REPEAT MESSAGE                   

Using this notepad trick you can annoy anyone and can actually force them to log off . This notepad trick will create an infinite cycle of a message in the computer. Follow the steps to know more: 
Open Notepad.
Copy the below mentioned text in your notepad file:
@echo off
:BEGIN
msg * Welcome
msg * To
msg * MyWaysToHack
msg * Thanks for visiting
goto BEGIN
Save the file with .bat extension like message.bat. After saving the file just open it (by double clicking) and see what happens.
3. Open Notepad CONTINUOUSLY                                  

 Follow these steps to open Notepad continuously:
Open Notepad.
Copy the below mentioned text in your notepad file:
@echo off
:TOP
START %SystemRoot%/system32/notepad.exe
goto TOP
 Save the file with any name nut with .bat extension and close it.
Now open the file and see how it annoys you by opening notepad again and again. you can also save this .bat file into the C:\Documents and Settings\All Users\Start Menu\Programs\Startup folder, so when you start your computer then file runs into your computer & then Notepad continuously open in window.

4.OPEN CMD CONTINUOUSLY                                    
  
This trick is used to open CMD continuously till then you want, just open Notepad and write : START, depending upon you how many times you want to open CMD, you can make as many as you would like.


  Save file as any name you want with .bat extension. Then open that file and you observe that how many times you write START in Notepad, the CMD console box is open same as number of START written in Notepad.



5. SHUTDOWN SYSTEM WITH MESSAGE                       


This trick is used for shutdown your friend system, after display an message. When you friend or victim click on OK button, then the bat file force the system to shutdown. Follow these steps to turn off system.
Open Notepad.
Copy & paste the below code into Notepad.
@echo off
cls
msg * I  HATE YOU
shutdown -s -c "ERROR! YOU ARE HACKED"

Save the file with any name nut with .bat extension and close it.You can stop execution of file by typing "shutdown -a"  in RUN dialog box. 

Related Topic : BEGINNERS GUIDE TO BATCH PROGRAMMING

 Hope this was informative, kindly post your views or comments on this article . Suggestions are welcomed.

Be a real hacker - PROFESSIONAL, and change the trend of HACKING.

Thanks & Regards:


Rohith Gundra

Beginners of Batch Scripting

Hi Friends, Welcome to (HACKING begins - "An approach to introduce people with the truth of HACKING"), In this article I'll tell you about BATCH file (.bat) programming. According to Wikipedia : a batch file is a text file containing a series of commands intended to be executed by the command interpreter.
In this article I'll introduce you with the basic of batch file and developing of batch programmes.

Batch file programming is nothing but the windows version of Unix Shell programming. In MS-DOS, a batch file can be started from the command line by typing its name (along with any required parameters) and pressing the "enter" key. When MS-DOS loads, the file AUTOEXEC.BAT is automatically executed, so any commands that need to be run to set up the MS-DOS environment for use could be placed in this file.

Why we need batch file programs ?
When we need to execute a set of commands over and over again to perform a routine task like backup files, Del temp files, then there is very difficult to type the same set of command over and over again, batch files are used.

Creation of batch file :
Batch files are basically plain text file containing DOS command. You can edit or write your batch file with notepad or DOS editor(EDIT). Always remember that a batch file should have an extension.BAT. Firstly you have to learn how you can change directory in DOS.

  1. MD A (Make directory "A")
  2. CD A (Change directory to "A")
  3. CD.. (Back to previous directory)
  4. CD\ (Back to c:\> directory automatically)


Command used in DOS to make batch file

  •  ECHO

The ECHO command is used as a printing tool, this is used to display something on screen. It can be used to tell the user what the batch file is currently doing. to prevent DOS from displaying the command being executed , simply add ECHO OFF command in batch file, but it still shows the initial ECHO OFF command. To hide the even ECHO OFF command, simply replace the first line with @ECHO OFF.
examples:
echo ON {Restores normal display activity.}
echo OFF {Halts display of DOS prompt and commands.}


  • REM

The command REM or Remark is the basic command of batch file, it is used by programmers to insert the comment into their code. Don't place REM command overload in batch file, it effect  your execution speed to run your file. This command is basically used in huge batch files.
examples:
@rem {Hides the remark from display.}

  • PAUSE

This is also an effective command in batch file programming,  some time before deleting all files of a folder, you need to give user time to react or change his mind then PAUSE command is used to hold the working of process.
examples:
pause {Displays "Press any key to continue ...".}

  • GO TO

GOTO command is a looping command, used to execute an operation up to infinity loop or for some conditions, GOTO Transfers control within a batch file to a line identified by a label. The label must be of the form ":LABEL".
 examples:
goto LABEL
:LABEL
(you can replace label with any name you want)


  •  CLS

Clears the video display screen, setting the cursor in the upper left-hand corner. This command is used to clear the scree. Command : CLS.

  • IF [Conditional Branching]

The IF command is very useful command that allow us to make the batch file more intelligent and usefully. Using this command, one can make batch programs check the parameter and accordingly perform a task. IF command is used for checking the condition true or false.
Syntax : IF [NOT] EXIST FILENAME command
''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

A program to to check the existence of a file (Example)
@echo off
CLS
IF EXIST c:\>abc.dos GOTO PRINT
GOTO end
:PRINT
ECHO FILE EXIST
:END
This is just an overview to guide you with BATCH programming, shortly i make an post with some batch programs by which you can also make prank or fake virus in batch programming.

Hope this was informative, kindly post your views or comments on this article . Suggestions are welcomed.

Be a real hacker - PROFESSIONAL, and change the trend of HACKING.

Thanks & Regards:

Sunday, June 23, 2013

How ro recover hacked mail


It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
For Gmail:
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
Gmail Password Reset Link
If you cannot find success from the Step-1 then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page

Introduction to Hacking

 HACKING

Mywaystohack.blogspot.com

1. Introduction to Hacking

The Internet, like any other new media historically, provides new methods of engaging in illegal activities. That is not to say that the Internet is intrinsically 'bad', as many tabloid journalists would have us to believe, it is simply a means for human beings to express themselves and share common interests. Unfortunately, many of these common interests include pornography, trading Warez (pirated software), trading illegal MP3 files, and engaging in all kinds of fraud such as credit card fraud.

Hacking on the other hand is a greatly misrepresented activity as portrayed by the wider media and Hollywood movies. Although many hackers go on from being computer enthusiasts to Warez pirates, many also become system administrators, security consultants or website managers.


1.1 A Definition of Hacking

•Hacking generally refers to the act of a person abusing computer access, breaking into computers, or using computers without authorization.
•An Attack is the attempt of an individual or group to violate a system through some series of events. The attack can originate from someone inside or outside the network.
•An Intruder or Attacker is a person who carries out an attack. •
This is a simply definition, one which we will have to go beyond to understand. Firstly, there are in essence two types of hackers, often referred to as 'white-hat' hackers and 'black-hat' hackers.


White -Hat Hackers

This type of hacker enjoys learning and working with computer systems, and consequently gains a            deeper understanding of the subject. Such people normally go on to use their hacking skills in legitimate ways, such as becoming security consultants. The word 'hacker' was originally used to describe people such as these.

Black-Hat Hackers

This is the more conventional understanding of the term 'hacker', one that is portrayed in newspapers and films as being essentially 'chaotic', an obsessive social misfit hell-bent on the destruction of everything good about the Internet. White-hat hackers often call this kind of hacker a 'cracker', as they spend most of their time finding and exploiting system insecurities.
In reality, nobody really fits into either camp neatly. It is down to the individual's set of ethics to decide what path that they will take in their hacking career. Not all of the activities of white-hat hackers may be legal, while not all of the black-hat hackers activities are illegal, so many shades of gray exist.


2. Hacker Motivation & Hackers Attacking

The factors that affect the motivation of someone who is drawn to illegal hacker activities are not always clear. It is well known, for example, that few hackers are motivated by financial gain. Most hacker activity is of a nature were money is rarely involved.

2.1 Factors of Motivation

 Few studies have been carried out into hacker motivation, although much has been gained by interviewing former hackers who have now gone 'white-hat' (i.e. hacking for security companies etc.). Here are some of the factors that may motivate a person into becoming a hacker:
1. Curiosity
2. Money
3. Spying
4. Prestige Intellectual Challenge
5. Anarchy
6.  Money


2.2 Why Do Hackers Attack?

There are many reasons why a hacker might attack a system. Some possibilities may include:
•Obtain a company’s secrets or insider information
• Use the system’s hard drive for storage, often for pornography or stolen software
•Steal credit card numbers
•Steal passwords to other systems
•Use the computer in an attack on another computer or system
•To steal programs or files
•Read others’ email
•Stalking
•A challenge, or "to see if I can"
•To impress other hackers
Just something to do (boredom)


How Can I Determine If My Computer Has Been Hacked

Clues and Signs

Some signs that your computer or user account may have been hacked include:
Files disappear or are modified unexpectedly
Strange files appear or grow in size unexpectedly
Hard disk space shrinks without reason
The computer slows considerably, or problems appear suddenly
Strange messages or dialog boxes appear on the screen
The computer starts crashing frequently
Programs stop working as expected
Your internet connection slows dramatically for an extended period
You notice your internet connection is in use, but you are not using it
You get a phone call, letter, or email from your Internet service provider or administrator noting strange activity.


3. Hacking Techniques

3.1 Overview of Hacking Techniques

The depth and variety of techniques employed by hackers to illegally enter a computer system are vast, for this reason I intend to provide a brief overview of some of the more common techniques involved, without going into to much detail on any particular technique.
Hacking a system is a two-step process, Gathering Information and Launching an Attack.

3.2 Gathering Information

A dedicated hacker may spend several months gathering information on the intended target before launching an attack armed with this new information ", but there are also more remote methods available to the hacker.

Port Scanning: A port scanner is a program that automatically detects security weaknesses in a remote system. Scanners are TCP port scanners, that attack TCP/IP ports and services (Telnet or FTP, for example), and record the response from the target. In this way, they learn valuable information about the targeted system such as if whether or not the remote system will allow an anonymous user to log in, or indeed if the system is protected by a firewall.

Many hackers simply type large amounts of IP addresses into a port-scanning program and launch random attacks on many users simultaneously, hoping to strike it lucky with that one system that shows a serious weakness.

Packet Sniffing: A sniffer is a piece of software that grabs information 'packets' that travel along a network. That network could be running a protocol, such as Ethernet, TCP/IP, IPX or others. The purpose of the sniffer is to place the network interface into 'promiscuous' mode and by doing so, capture all network traffic. Looking into packets can reveal valuable information like usernames, passwords, addresses or the contents of e-mails.

3.3 Launching Attacks

There are many attacks employed by hackers. Here is an overview of just some of the more common:
Denial of Service (DOS): A denial of service attack is basically an act of sabotage against a service running on a port on a targeted system. The aim is to disable the service, for example a web server, in order to prevent people from being able to access that service remotely.
A typical denial of service attack would involve sending hundreds or even thousands of connection requests to a single machine at any one time, causing the machine to crash under the strain. A more advanced approach is to send corrupt connection requests that exploit a flaw in the service software which fails to recognize the malformed data when it attempts to process it, resulting in a system crash.


Password Cracking:  A password cracker is a program that attempts to decrypt or otherwise disable password protection. Often simulation tools are used to simulate the same algorithm as the original password program. Through a comparative analysis, these tools try to match encrypted versions of the password to the original. Many password crackers are simply brute-force engines that try word after word from a dictionary, often at very high speeds.


 Packet Sequence Attacks: In packet sequence attacks, the hacker tries to guess the random sequence number of TCP packets so that he/she can insert their own packets into a connection stream. In this way the hacker can supply new corrupt content between two hosts, while remaining largely anonymous.

Operating System Exploits: All operating systems (Windows NT, Unix, Red hat Linux etc.) have their own specific vulnerabilities and bugs that need to be resolved by 'patching' the OS in order to keep it up to date. Unfortunately, many system administrators neglect to do so frequently enough, leaving their systems open to attack. Hackers, however, are very thorough in keeping abreast of all the possible vulnerabilities in all operating systems.


FTP (File Transfer Protocol) Bounce Attacks: The main problem with FTP bounce attacks is that the hacker can use the PORT command in active FTP mode in order to establish connections with machines other the original FTP server, effectively allowing the hacker's connection to 'bounce' off the FTP server to another clients machine.

FTP Core Dumping: FTP core dumping enables the hacker to bring down the FTP service. A core dump may be stored on an FTP readable area, where it can then be retrieved in a following FTP session. The first few lines contain the password file that can be cracked offline. Once the hacker has the password, they can impersonate a legitimate user and remove, update or delete files at will.

4. Security

4.1 Server-side Security

Internet security can basically be broken into two separate areas: client-side security (i.e. you and me), and server-side security (web servers, LAN servers etc.). For the purpose of this discussion I will focus on client-side security, as this is the area that affects the majority of Internet users.

Server-side security is a large and very complex area, and generally falls within the domain of the system administrator. Server-side security only becomes a major issue for the average Internet user when their privacy is violated by sloppy server security, for example, if their e-mail server is hacked, or the server hosting their web site is hacked. It is the system administrator's responsibility to ensure that all measures that can be taken have been put in place to ensure that such eventualities do not take place.

4.2 Client-side Security

Personal security on the Internet is a real issue, one that is unfortunately overlooked or not taken seriously enough by the majority of Internet users.
This tutorial will be broken into four main areas:
1. Anti-virus security.
2. Personal firewall.
3. Encryption.


4.2-1 Anti-virus Security

In part 5 of this article, I discussed in detail what a computer virus is, but I neglected to discuss how you could protect your machine from computer viruses, which is exactly what I will cover here.
Anti-virus Software:
Anti-virus software resides in the active memory of your computer, and takes control of your machine to alert you if an active virus is present on your machine. If the software cannot repair the infected file, it will quarantine the file or give you the option of safely deleting the file from your system.

Anti-virus software may also be used to scan your hard disk, floppy disks, zip disks or CD ROMS. It may also be used to scan attachment files in e-mails, which is one of the main sources of viruses. The important thing to remember is that new viruses are being discovered daily, so if you have anti-virus software installed then you need to make sure that you keep it's library of known viruses up-to-date, otherwise you will have no protection against the latest batch of viruses.

General Virus Prevention Methods:
There are many other methods to prevent your computer files from becoming infected, most of which are common sense. Here are some of the more important ones:
ALWAYS be wary of unsolicited e-mails, especially ones of an 'unsavory' nature such as pornography          related e-mails.
Any .exe (executable) files should not be opened unless you trust the source 100%.
Always be wary of any software that you install on your system, especially free downloaded software. Check the software company's credentials.
Steer clear of 'Warez' (pirate software).
Finally, and most importantly, backup all of your important data onto floppies, zip disks or ideally CD ROMs. That way if the worse does happen, and you need to wipe you computer's hard disk (or the virus does it for you!), then at least all of your hard work is stored in a safe location.

4.2-2 Personal Firewall

Firewall technology is nothing new; it has been present on most Internet and LAN servers for many years. What is new is that firewall technology is now available on a smaller scale for the single user with one computer connected to the Internet. While not as immediately important as anti-virus software, if you are serious about your security and protecting your privacy online, you might consider buying a firewall.

Firewall software acts as a secure barrier between your computer and the outside world. It monitors all traffic to and from your computer, and decides whether or not this is normal Internet activity or an unauthorized security risk. To the hacker, firewall gives the impression of your computer not being there, or at very least being difficult to locate.
Furthermore firewall provides additional protection against Trojan horses, as it will block the Trojan horse's attempt to do so. The unauthorized e-mailing of the key-log file to it's intended recipient, and alert you of
From the above diagram, it is possible to see how a firewall protects your system by monitoring incoming traffic from the Internet, while at the same time watching for un-authorized software connections from your computer to the Internet.

Like anti-virus software, there are many brands of firewall software on the market. Many companies now offer anti-virus and firewall technologies bundled together at a reduced price, which generally prove to be excellent value for piece of mind.

4.2-3 Encryption

Let us assume that you are infected with a Trojan horse that e-mails off the contents of your 'My Documents' directory, or your e-mail server is hacked and some of your e-mail attachments are stolen, your privacy has now been utterly violated, right? But what if the files that fell into the hacker’s hands were encrypted using a powerful algorithm combined with long, complex password that the hacker could never crack? In theory, the integrity of your data should still be secure in this 'worse-case scenario', provided you have taken these precautions.

Encryption programs basically 'scramble' the original file so that it is unreadable to anyone without the correct password to de-scramble the file. Apart from the many commercial products available, there are many reputable encryption engines available online for free. These allow the user to encrypt all types of data files at will (Word documents, JPEGs, databases etc.), some even allow the user to create self-extracting zipped archives that are also encrypted, which provide an excellent means of transferring important data files via e-mail in a safe and secure way.

The key to data encryption is to choose your passwords carefully, and change your passwords frequently.


5. Conclusion

The main appeal of the Internet to me is the ability to communicate complex ideas in a fast, cheap and creative way. This may include e-mail, web design or even chat rooms and message boards. No other media in the history of the industrialized world provides such a level playing field, where the individual like you or I may compete with the giant corporations to have our voices heard online.

 I am certainly not saying that the threat does not exist, which would be irresponsible, but what I am saying is that a level-headed approach should be taken by all Internet users to protect their privacy and security online, and to ensure that they educate and inform themselves of the more serious risks involved in maintaining any kind of Internet presence.

The history of Internet hacking is an on going affair, one that will eventually show the true meaning of hacking to be to explore and understand, not to destroy and corrupt. When this ideal is realized, perhaps one-day people will again be able to publicly declare themselves to be hackers, without the fear of losing their jobs or facing prosecution.

6. References

Web resources:
Denial of Service: http://www.net-security.org/text/articles/index-security.php
Hacker Motives: http://www.net-security.org/text/articles/index-security.php
Hacking Techniques: http://www.securitywatch.com/
Hope you all like it.....