Blog Hijau

BLACK CAT HACKS ORGANIZATION

BLACK CAT ORGANIZATION was built in 2006,with 2 hackers and now we have more than 2000 Hackers and Crackers.

WE ARE ANNONYMOUS

BLACK CAT HACKS ORGANIZATION is annonymous for all over the world.We are annonymous..

WE ARE HACKERS AND CRACKERS

In our Organization,many hackers are work for us.We also have lot of Crackers who crack sites,softwares and much more...

MISSION

We are PAKISTANIES and work against enimies of Pakistan.

RANKS

COMMAND > Diamond Lion > Gold Lion > Silver Lion > 8* > 7* > 6* > 5* > 4* > 3* > 2* > 1* > 3 Dot > 2 Dot > 1 Dot > Begginer

Saturday, 31 December 2011

CEH v7 Instructor Slides


     This package includes the following modules.
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing


Thursday, 29 December 2011

Angry Birds for PC Full for Free


        The most popular and addictive mobile game Angry birds is now available for PC. To play this game your PC should have following hardware.
  • Operating System: Windows � XP / Vista / Windows � 7 
  • Processor: 2GHz 
  • Memory: 512 MB 
  • Video: 3D-graphics card compatible with DirectX, 128 MB 
  • Sound Card: Sound device compatible with DirectX � 9.0c
  • Free space on hard disk: 45.2 MB

Learning PHP, MYSQL and Javascript



     This book will help you to:

  • Understand PHP essentials and the basics of object-oriented programming
  • Master MySQL, from database structure to complex queries
  • Create web pages with PHP and MySQL by integrating forms and other HTML features
  • Learn about JavaScript, from functions and event handling to accessing the Document Object Model
  • Use libraries and packages, including the Smarty web template system, PEAR program repository, and the Yahoo! User Interface Library 
  • Make Ajax calls and turn your website into a highly dynamic environment
  • Upload and manipulate files and images, validate user input, and secure your applications

      NOTE : Password for the rar file is tricks4u


Wednesday, 28 December 2011

HTML in 10 Steps or Less


If you are building your own Web pages and need HTML solutions fast, then this book is for you-whether you're new to Web site authoring or you need a quick refresher on how to create a table. Open the book and you'll discover clear, easy-to-follow instructions for more than 250 key HTML Web tasks, each presented in ten quick steps-or less. Easy-to-navigate pages, lots of screen shots, and to-the-point directions guide you through every common (and not so common) HTML challenge-and help you get more done in less time.
  • Each solution is ten steps-or less-to help you get the job done fast
  • Self-contained two-page spreads deliver the answers you need-without flipping pages 
  • A no-fluff approach focuses on helping you achieve results
  • A resource packed with useful and fun ways to get the most out of HTML

   NOTE : Password for the rar file is tricks4u



Monday, 26 December 2011

Social Engineering - The art of human Hacking


                 The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick�one of the most famous social engineers in the world�popularized the term �social engineering.� He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.


  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats

      NOTE : Password for the rar file is tricks4u



Thursday, 22 December 2011

Teach yourself Linux in 24 hours


              Sams Teach Yourself Linux in 24 Hours is a tutorial aimed at making the Linux beginner more effective and productive users of the operating system. Most books in this category are more of a general reference in nature and are designed to cover Linux in general. Well, every Linux distribution is different - file locations can change, commands can be a little different, etc. This means the readers of those books may not find answers specific to their installation. This book will use the effective Sams Teach Yourself format to instruct the reader how to: install the operating system, configure their hardware, and effectively use the tools that come with the Red Hat distribution included on the CD-ROM.

  • Learn how to install Red Hat Linux by walking through an easy to follow hardware configuration
  • Understand how to use Linux commands, configure your network and servers and manage users of your system
  • Discover the power of X(TM) Windows

   NOTE : Password for the rar file is tricks4u


Wednesday, 21 December 2011

Hackers Evolution Game Download

Tuesday, 20 December 2011

Getting good with Javascript

Rockable javascript

        This book will introduce you to important programming concepts, It will show you how to write your first scripts, and make you comfortable with JavaScript codes. You will learn following topics in this book.


  • The basics of types, variables, and operators
  • Best practices for efficient coding
  • Testing and optimizing your JavaScript
  • Interacting with HTML elements
  NOTE : Pawword for the rar file is tricks4u


Sunday, 18 December 2011

Backtrack Hacking Video Tutorials

Backtrack Hacking Video Tutorials
This are amazing video tutorials of backtack which include very good collection of hacking videos using backtrack such as sql injection, phone phreaking, wireless hacking, website hacking, network hacking and more. Below is the complete list of videos included in DVD. 

Videos Included In The DVD

  • Episode 1 � Network Hacking � Arp Poisoning
  • Episode 2 � Wireless Hacking � Cracking WEP
  • Episode 3 � Wireless Hacking � DeAuth
  • Episode 5 � Lock Picking � Bump Key
  • Episode 6 � Phone Phreaking � Beige Box
  • Episode 7 � Phone Phreaking/Network Hacking � Sniffing VOIP
  • Episode 8 � Lock Picking � DIY Padlock Shims
  • Episode 9 � Lock Picking � Mult-Disc Combo Locks
  • Episode 10 � Hacking Basics � MD5
  • Episode 11 � Website Hacking � Sql Injection
  • Episode 12 � Hacking Basics � Backtrack
  • Episode 13 � Website Hacking � XSS
  • Episode 14 � Staying Secure � SSH Tunnel
  • Episode 15 � Modding � Xbox Softmod
  • Episode 16 � Wireless Hacking � Cracking WPA
  • Episode 17 � Triple Boot � Windows, Backtrack, & Ubuntu
  • Episode 18 � Local Password Cracking
  • Episode 19 � Lock Picking Basics
  • Episode 20 � Ettercap
  • Episode 21 � XSS Tunnel
  • Episode 22 � Playstation 2 Softmod
  • Episode 23 � Cracking WEP Update
  • Episode 24 � Bypass Hotspot�s Access Controls

  • Underground � Install Backtrack 3 on USB
  • Underground � CSRF(Cross Site Request Forgery)
  • Underground � Alternate Data Streams
  • Underground � Local File Inclusion
  • Underground � Windows Privilege Escalation
  • Underground � Bluetooth Hacking
  • Underground � VMWare
  • Underground � Fix Google Mail Enumerator
  • Underground � Home Made Lock Picks
  • Underground � Downfalls of Anti-Virus Software Part 2
  • Underground � Downfalls of Anti-Virus Software
  • Underground � Evilgrade
  • Underground � Trojan Basics
  • Underground � Manipulating Windows User ***s
  • Underground � Combine Files
  • Underground � Password Phishing
  • Underground � Windows SMB Relay Exploit
  • Underground � Application Patching
  • Underground � Metasploit Autopwn
  • Underground � Email Spoofing
  • Underground � Introduction
  • Extracting Database Information from Information_Schema
  • FPGA MD5 Cracker
  • Arduino ARP Cop
  • Email Injection
  • Ping of Death
  • DNS Spoofing with Virtual Hosts
  • Bypass Cisco Clean Access & Cisco NAC Appliance
  • Dual Boot � Windows & Backtrack
  • Sql Injection Challenge How-to
  • How to use Intel Pro/Wireless 3945ABG in Backtrack 2
  • Local Privilege Escalation Vulnerability in Cisco VPN Client


Friday, 16 December 2011

Introduction to Linux - A Begineers Guide

       
               Many people still believe that learning Linux is difficult, or that only experts can understand how a Linux system works. Though there is a lot of free documentation available, the documentation is widely scattered on the Web, and often confusing, since it is usually oriented toward experienced UNIX or Linux users. Today, thanks to the advancements in development, Linux has grown in popularity both at home and at work.
The goal of this guide is to show people of all ages that Linux can be simple and fun, and used for all kinds of purposes. This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples and encouraged to try out things on your own.

NOTE : Password for the rar file is tricks4u



Thursday, 15 December 2011

Ankit Fadias Ebook Collection

            This are a full collection of ankit fadias ebooks which includes almost all his ebooks if u like it then download it from below link. Some of Ebooks included are DOS attack,hacking into linux, Defacing websites  etc. Below is the screen shots of the all books included in download. For such more ebooks and tutorials subscribe below.







      Note: Password for the rar file is tricks4u



Wednesday, 14 December 2011

How to become Worlds No 1 Hacker

hacking ebooks

      This book will give you information on different concepts of hacking like cracking wireless network,hacking cell phone and many more. Below is the full list of hacking topics included in this book.

  • Attack Basics
  • Password Basics
  • Account Basics
  • Denial of Service Basics (DOS)
  • Logging Basics
  • Spyware
  • Port Scanning
  • Unix remote attack
  • SQL injection
  • Spoofing and Hijacking
  • Social Engineering
  • How to become hacker in 15 minutes
  • Making money as Hacker
      NOTE: Password for the rar file is tricks4u



Monday, 12 December 2011

World trade center attack trick on notepad


            As some of you might be knowing that the flight number of the plane that had hit World Trade Center on that dreadful day (9/11) was Q33NY. Now call this trick a coincidence or anything else but whatever it is, it does startle us. you will be definately amazed by the this trick.

  • First open Notepad.
  • Type �Q33N� (without quotes) in capital letters.
  • Increase the font size to 72.
  • Change the Font to Wingdings.

   Enjoy and subscribe below !!!

Sunday, 11 December 2011

Advance Matrix Effect Using Notepad

Advance Matrix Effects
I had previously posted about Matrix effect using Notepad . But this is more advance and it looks more realistic then the previous one. So open up your notepad and get started.

How To Create Matrix File ?

  1. Open Notepad and copy below code.

@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t  
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A

  2. Save the file as matrix.bat  (.bat is must)
  3. Done enjoy !!

    More Cool Tricks

    Friday, 9 December 2011

    Java Programming Ebook for Free

    • This book is for kids from 11 to 80 year old .
    • This book is for parents who want their child into computer programming .
    • This book is for college students who are looking for a suppliment to over complicated textbooks.
    • This book is easy for begineers of any age.
       NOTE : Password for the rar file is tricks4u 



    Make personal diary using notepad



                  Do you know that you can use your Notepad as a simple digital diary or a personal Log-Book to keep record of your daily work instead of using boring pen and book ? Well, if you dont know then follow the below mentioned steps to make one for yourself !


    • First open up the Notepad.
    • Then Type in .LOG (in capital letters) and press enter.
    • Save it with any name and close it.
    • Open the file again.

                  When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.

    Thursday, 8 December 2011

    Watch Star Wars movie in CMD

           
                        This is very intersting and amazing command prompt trick which will play star wars movie in the command prompt or cmd. Below are complete steps with screen shots for this trick with. Without wasting time lets gets started.


           1. Go to start > Run and type in cmd and press enter
           2. Now type in telnet as shown below and press enter.


           3. After that enter o as shown below and press enter.


           4. Next enter towel.blinkenlights.nl as shown below and press enter.


           5. Now star wars movie will start playing on your command prompt.


           6. Enjoy !! and dont miss to subscribe below .

    Wednesday, 7 December 2011

    How To Open Number Of Sites With A Single Click ?

     Open Number Of Sites With A Single Click
    Today i will show you how to make a batch file which will open number of websites with just one click. You can also use this method to open different computer programmes like internet explorer, notepad etc.

    How To Do ?

      1. Open Notepad and copy below codes
      @echo off
      start www.coolhackingtrick.com/
      start www.google.com
      start www.facebook.com
        2. Save this file as batch.bat
        3. Now open your save file and it will open three websites with just one click.
        4. You can also add more sites by writing Start followed by websites URL.

      More Tricks


      Tuesday, 6 December 2011

      Hacking For Begineers Free Ebook

      Hacking For Begineers
      Hacking for begineers, as the name says is completely for begineers you can begin your hacking journey with this book or Hackers underground handbook both are amazing books for noobs. The book is well written and you will enjoy reading it. More Ebooks and tutorials are own its way so subscribe below and dont miss them. Below are some topics covered in this book.

      • Concept of Ethical hacking
      • Email Hacking
      • Windows Hacking
      • Linux Hacking
      • Wireless Hacking
      • Mobile Hacking
      • Trojans
         Note : Password for the rar file is tricks4u


      Sunday, 4 December 2011

      Uninstall WindowsProgrammes With A Right Click

      Uninstall Windows programmes with a right click
      As you know when ever we want to uninstall any windows program we need to go to control panel and manually uninstall them. But here is a trick which let you uninstall any windows program from their desktop shortcuts. MenuUninstaller is a free peace of software that adds an "Uninstall" option to the Windows context menu so you can remove programs from their shortcuts.

      How To Uninstall WindowsProgrammes With A Right Click ?

        1. Download  Menu Uninstaller  and install it on your pc.
        2. After installing an uninstall option will be added to your windows context menu.
        3. Right click on any shortcut and you will See Uninstall option as below.
      Uninstall WindowsProgrammes With A Right Click
        4. Click on it to uninstall any programme.
        5. Check out some other cool trick and tips given below.

      Awesome Computer Tricks For You

      List of some good proxy sites

      proxy sites

                   Below is the list of some good proxy site which you can use to surf anoymously on the internet . Even you can use this proxy sites to open block website in school or offices. For example you can use facebook if it is block at your school or office.

      List Of Top Proxy Sites


      http://aniscartujo.com/webproxy
      http://www.badboysproxy.com
      http://www.surfscreened.com
      http://www.hagiomusic.info
      http://www.greenpips.info
      http://urlbrowse.com
      http://www.hideipaddress.net
      http://www.sneakfilter.com
      http://www.browsestealth.com
      http://www.sneak1.info
      http://proxiesrus.com
      http://www.surfindark.com
      http://www.navydog.com
      http://falsario.com
      http://www.proxypit.com
      http://www.proxypan.com
      http://myspacewebproxy.org/
      http://www.allfreehere.info
      http://www.takefreely.info
      http://autobypass.com
      http://www.proxcity.info
      http://www.proxyzip.org
      http://www.cheekyproxy.com
      http://www.eggproxy.com
      http://www.theschoolcloak.com
      http://www.hidemefast.com
      http://browseanywhere.info
      http://www.404surf.com
      http://www.cloakip.net
      http://www.browsedark.com
      http://www.dartprox.com
      http://www.proxish.com
      http://www.surfsneak.com
      http://www.surfsneaky.com
      http://www.browsehidden.com
      http://www.filterhide.com
      http://www.browsesneak.com
      http://myspaceproxyy.com
      http://www.browsesneaky.com
      http://www.proxyz.us
      http://www.sneakschool.com
      http://www.iphide.com
      http://www.proogle.info
      http://greatproxy.info
      http://www.playnsurf.info
      http://www.realproxy.info
      http://aplusproxy.com
      http://www.ecoproxy.com
      http://freedom.webtuo.com
      http://www.slyuser.com/
      http://tenpass.com
      http://pawxy.com
      http://pawxy.org
      http://logu.in

      Saturday, 3 December 2011

      Simple Trick To Find Facebook Profile ID

      facebook trick
      In my previous post i have posted about Facebook status update trick in which we use profile id, but what if  person got username. So this is the trick which will let you get profile id of any person who got custom username. Check below image and see how URL of  facebook profile looks before and after custom username.

      How To Get Facebook Profile Id ?

      facebook trick

      In case of Profile ID before custom username you can easily identify it by looking at Profile URL, But in case of profile with custom username its not same. Below are simple steps to find Profile ID having custom username.
      • Go to the profile you want to find Profile ID
      • That URL will look like this www.facebook.com/username
      • Change that URL to graph.facebook.com/username
      • Then you will get something like below image.
      facebook trick        

      More Awesome Facebook Hacks

      Friday, 2 December 2011

      What Is Keylogger And How To Be Safe From Keyloggers?

      keyloggers
      In this tutorial i am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers. keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn somthing about keyloggers.

       1. What is keylogger ?

      You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.

      2. How it can harm you ?

      In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
      • Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.

      3. Types of  keyloggers 

      There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.

                                    HARDWARE KEYLOGGER                                  
      hardware keyloggers 

       SOFTWARE KEYLOGGER
       software keyloggers
                                    

       4. How to Protect yourself from keyloggers ?

      Keylogger  can be used by your enemy  to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.
      • Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
      • You can even use above method to protect your facebook profile, yahoo or gmail id.
      • When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

      You May Also Like To Read

      Thursday, 1 December 2011

      Have Fun Playing Snake Game On Youtube

      As you know snake is one of the oldest but also most popular and fun playing game, which can now be played on youtube with a simple trick.You can have fun playing snake game while your video streams.

      How To Play ?

          1. Go to youtube and select any video.
          2. While video is streaming on youtube press left button of mouse and press up arrow key .
          3. Now the streaming circle will start to move like a snake.
          4. Play this snake game with arrow keys.

      Some Cool Tricks

      Wednesday, 30 November 2011

      VMware Workstation 7 + Serial Key


                  VMware workstaion is a virtual machine software which allows you to run multiple operating system virtually on same pc. VMware allow testing of live cd without first recording them on a physical disc.This is best tool for software developers and also for new learner who can experience linux and learn how to work on linux by virtually running on their operating system. You can test any operating system before installing it on you computer. It is great software and u must download it.


                 If you like my post or find any difficulties in installing this software feel free to leave the comment. Below is the link for VMware with serial key.


      Tuesday, 29 November 2011

      What is phishing and how to be safe from phishing ?


          What is Phishing ?

                          Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing page could be saif as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail. Target of phishing are mostly social networking sites like facebook, orkut etc. Also Banks website to acquire credit card details,website like yahoo, gmail are also target of phishing.



          Example of Phishing scams:
      • Email asking you to login to your locked account to unlock it.
      • Email carrying a Link to sites like Facebook,yahoo etc and asking you to Login.
      • Emails containing some Information of your Interest and asking you to Login to Your Account.
         
           How to be safe from phishing ?
      • Never login to any of your account through link provided in the Email.
      • Go to real website dont click on any link posted anywhere. such as link posted on your facebook wall by friend or link provided in comments or link to ceratin website on any blog.
      • Check the URL of website before entering any sensitive information. Because the URL of phishing page is not same as the URL of  real one.
      • Real gmail page looks like gmail.com while phishing looks different somthing like gmail.anything.com

      Is you antivirus working perfect ?


                     This trick will let you detect whether your antivirus software is working or is just a waste. We will create a file which every antivirus sofware will detect as virus but dont worry it is harmless and will not harm your computer.

      • First open Notepad and copy below code into it.
      X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
      •  Save the file as virus.exe
               As soon as you will run this file you antivirus will detect it as software. If not then you need to change your program.

      Monday, 28 November 2011

      Download Youtube Videos Without Any Software

      download youtube videos
      This is simple youtube trick which will allow you to download any youtube videos without any software or programme and in many different video formats such as mpeg4, 3gp, hd and many more from within the youtube site.

      How To Download Youtube Videos ?

      1. First Go to Youtube Homepage.
      2. Then select the video you want to download. I will demonstrate with video url given below.
      http://www.youtube.com/watch?v=_JAa3NvP6f4
      • Now add save or ss or kick before youtube and press enter.
      3. After adding any of the above  keyword the above link will become.
      http://www.saveyoutube.com/watch?v=_JAa3NvP6f4
      Or
      http://www.ssyoutube.com/watch?v=_JAa3NvP6f4
      Or
      http://www.kickyoutube.com/watch?v=_JAa3NvP6f4
       4. Now you will be redirected to a new page from where you can download youtube videos in any format of your choice. You may also download only the soundtrack of the video in mp3 format.

      Saturday, 26 November 2011

      Change your Ip in less then 1 minute

         
                           In my previous post i had show you how to Grab someone ip address now i will show you how to change ip address in less then a minute. For now it will take 2 to 3 minutes but with some practice you can do this within a minute.


      • Click on "Start" in the bottom left corner of the screen.
      • Click on "RUN"
      • Type in "command" and click OK

            You should be now at MSDOS prompt Screen

      • Type "ipconfig /release" just like that, and press "enter"
      • Type "exit" and leave the prompt
      • Right-click on "Network Places" or "My Network Places" on your desktop.
      • Click on "properties"

           Now you should  be on a screen with something titled "Local Area Connection", or something  similar to that, and, if you have a network hooked up, all of your other networks.

      •  Right click on "Local Area Connection" and click "properties"
      • Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
      • Click on "Use the following IP address" under the "General" tab
      • Create an IP address (It doesn't matter what it is)
      • Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
      • Press the "Ok" button here
      • Hit the "Ok" button again

           Now you should be back to the "Local Area Connection" screen.

      • Right-click back on "Local Area Connection" and go to properties again.
      • Go back to the "TCP/IP" settings
      • This time, select "Obtain an IP address automatically"
      • Click on "Ok"
      • Hit "Ok" again.
      • Now you have a New IP address.

      Friday, 25 November 2011

      Matrix Effect using notepad


              This is amazing notepad trick which will display matrix effect like you might have seen in movies, that is numbers flashes in green colour. Basically we will be creating a small batch file in notepad.

      • Go to Notepad and copy below codes
      @echo off

      color 02

      :start

      echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%

      goto start
      • Save this file as matrix.bat 
      • Now open this file as see matrix effect on your screen.
              If you like my posts then subscribe below for such more tutorials.

      Wednesday, 23 November 2011

      Get password behind asterisks


                 This is trick will let you see password behind asterisks. You might be thinking what is asterisks. It is dots or stars you see when you type password. This trick will let you see password behind asterisks. often people save their password on browser so this trick will let you get their password easily.

      • Go to the page that contain password in asterisks.
      • Now copy the following code.
      javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();
      • Paste the code into address bar of the page.
      • Now you will get the password on that page.
            NOTE: This trick works on internet explorer and might works on old version of other 
                          web browser.

        Tuesday, 22 November 2011

        Open multiple yahoo on same PC


                 This is very simple trick for windows xp users which let you open multiple yahoo messenger in same computer. It may be two three as many you want. I had not tried it but, It might also works on window 7 and windows vista. So below is the trick :



               1. Go to Start  >  Run
               2. Type in regedit and then press Enter .
               3. Navigate to HKEY_CURRENT_USER > Software > Yahoo > Pager > Test
               4. On the right side press right-click and choose new Dword value.
               5. Rename it as Plural.
               6. Now Double click and assign a decimal value of 1.
               7. Now you can open multilpe yahoo on same pc.

        Monday, 21 November 2011

        Enable facebook HTTPS


               
                        This is old trick but still if you are not aware of this then this is for you. Facebook has added new feature to browse it securely but is not set by default. Facebook has changed without any notification.Take a look at your URL (top box on your screen.). If you see "http" or just "www" instead of "https" you DO NOT have a secure session & can be hacked.To secure your facebook account just follow the below Steps.


               1. Go to Account 
               2. Then Account Settings 
               3. Then click on Security
               4. Check box (secure browsing)
               5. Click on Save changes.

        Sunday, 20 November 2011

        Open CD/DVD Rom From Desktop

           
                      This is simple script that let you open your CD/DVD Rom directly from your desktop. Follow below steps to do this :

        • Open Notepad and copy below codes in to it.
                 Set oWMP = CreateObject("WMPlayer.OCX.7" )
                 Set colCDROMs = oWMP.cdromCollection
                 if colCDROMs.Count >= 1 then
                 do
                 For i = 0 to colCDROMs.Count - 1
                 colCDROMs.Item(i).Eject
                 Next ' cdrom
                 For i = 0 to colCDROMs.Count - 1
                 colCDROMs.Item(i).Eject
                 Next ' cdrom
                 loop
                 End If
        •  Save the file as ejectcd.vbs and you will similar icon as below
        • Double click this saved file and it will eject you cd rom.
        • To stop this script go to Task manager > Process  and search for wscript.exe and click on END Process as shown in below image.


        Saturday, 19 November 2011

        Is Your Computer Male Or Female ?


                 This is funny trick that let you know the gender of your computer whether it is male or female. This trick work on mostly all windows operating system. So let get started.

        How To Do ?

           1. Open Notepad and paste the following codes.
         CreateObject("SAPI.SpVoice").Speak"i love you"
           2. Save the file as gender.vbs
           3. Now, open the save file
           4. If you hear male voice then your computer is male and if you hear female voice then its female.

        More Interesting Tricks

           My computer is male what about you ?

        Friday, 18 November 2011

        Enable Registry Editor Disabled By Admin

        windows registry
        Windows registry contains settings for low level operating system component as well as applications running on windows. In this tutorial i will teach you to enable registry editor disabled by the admin. So lets do it.

        What Is Registry ?

        Windows registry is hierarchical database that stores configuration setting and option on microsoft windows operating system.It contains settings for low level operating system component as well as applications running on windows.

        Registry is also called as Brain of Windows which store all information in form of registry keys Technically known as DWORD or STRING or BINARY or MULTI_STRING values which stores data.

        How To Enable Registry Editor Disabled By Admin ?

         1. Open Notepad and copy below codes.
         REGEDIT4
         [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
         "DisableRegistryTools"=dword:00000000
         2. Now save the file as anything.reg (.reg is must)
         3. Double click the save file.
         4. Done !!

        Windows Edit You Would Like To Do