Search In Site

15 June, 2013

A Proxy - An Overview

What is a Proxy Server? A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. I know many are looking for IP Maskers or Scramblers, but honestly, it aint real easy for the simple fact that any website that you visit needs your IP to send the info packets too. If its scrambled, you will get alot of errors and...

How To find Which Computer is Using NetBios ?

Any computer that is running something on port 139 is likely (but not certain) to be using NetBIOS. Most crackers use nmap to port scan. This tool runs on Unix/Linux type computers. You can get it at http://www.insecurity.org. There is also a Windows version of nmap, but it isn't very good. A better choice for Windows is Whats Up from http://www.ipswitch.com. You can get a one month free trial of it. Here's an example of an nmap scan of Oldguy: test-box:/home/cmeinel...

How To Install NetBios

How to Install NetBIOS You might have to make changes on your system in order to use these commands. Here's how to enable NetBIOS for Windows XP. (If you are stuck with Windows 95, 98, SE or ME, see the end of this Guide for how to enable NetBIOS.) Click: Control Panel -> Network Connections  There are two types of network connections that may appear here: "Dial-up" and "LAN or High-Speed Internet".  A dial-up connection uses a...

Guide to Hacking with sub7

Guide to Hacking with sub7 Well first you need a victim so ICQ would be a brilliant place to start, considering you can get a program that’ll give you that victim’s I.P if you can’t get the scanner on sub7 to work. However they need to be on your list to get their I.P a good program would be wonder ICQ me get it at http://www.8th-wonder.com after you’ve logged their I.P you need to customise your virus: See The screen shot f edit server:  In...

Guide to hack Unix For Beginners

In the following file, all references  made to the name unix, may also be  substituted to the xenix operating  system. Brief history: Back in the early  sixties, during the development of  third generation computers at mit,  a group of programmers studying the  potential of computers, discovered  their ability of performing two or  more tasks simultaneously.  Bell  labs, taking notice of this...

14 June, 2013

SOCIAL ENGINEERING - An Overview

What is social engineering? Social Engineering: n.  Term used among crackers and  samurai for cracking techniques that rely on weaknesses in  wetware rather than software; the aim is to trick people into revealing passwords or other information that compromises a target  system's security.  Classic scams include phoning up a mark who has  the required information and posing as a field service tech...

How To Do an unattended installation In Windows Xp

The Windows XP Setup routine is much nicer than that in Windows 2000 or Windows Me, but it's still an hour-long process that forces you to sit in front of your computer for an hour, answering dialog boxes and typing in product keys.  But Windows XP picks up one of the more useful features from Windows 2000, the ability to do an unattended installation, so you can simply prepare a script that will answer all those dialogs for you and let...

How to Unlock Window Xp Setup.ini

WinXP's setupp.ini controls how the CD acts. IE is it an OEM version or retail? First, find your setupp.ini file in the i386 directory on your WinXP CD. Open it up, it'll look something like this: ExtraData=707A667567736F696F697911AE7E05 Pid=55034000 The Pid value is what we're interested in. What's there now looks like a standard default. There are special numbers that determine if it's a retail, oem, or volume license edition. First, we break...

CLSID Folders In Windows

What Are CLSID Folders ? Before we go on, you need to understand what CLSID values are. These folders, like the Control Panel, Inbox, The Microsoft Network, Dial Up Networking etc are system folders. Each system folder has a unique CLSID key or the Class ID which is a 16-byte value which identifies an individual object that points to a corresponding key in the registry. To delete these system Folders from the desktop simply go to the following...

How To Customize Shortcut Arrow In Windows

Simple Trick To Customizing The Shortcut Arrow In Windows XP, Vista And 7 Is Here All shortcuts have a tiny black arrow attached to it's icon to distinguish from normal files. This arrow can sometimes be pretty annoying and as a Hacker should know how to change each and everything, here goes another trick. Launch the Registry Editor and go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Shell Icons. Now, on the right pane is a list of icons ( we found out that on some systems, Windows 98 especially, the right pane is...

collection of windows hacking Secrets

Some Selected PC Hacking Secrets Almost all system administrators make certain changes and make the system restricted. System Administrators can hide the RUN option, the FIND command, the entire Control Panel, drives in My Computer like D: A: etc. They can even restrict activities of a hacker my disabling or hiding, even the tiniest options or tools. Most commonly these restrictions are imposed locally and are controlled by the...

 
Twitter Bird Gadget