Posts

Showing posts from 2011

SysKey Utility to Prevent Windows Password Cracking

Image
SYSKEY is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key. SysKey utility, also called the SAM lock tool, It can be helpful for preventing hackers from cracking Windows passwords Description Microsoft Windows Security Accounts Management Database (SAM) stores hashed copies of user passwords. This database is encrypted with a locally stored system key. To keep the SAM database secure, Windows requires that the password hashes are encrypted. Windows prevents the use of stored, unencrypted password hashes. Configure Windows System Key Protection Utility At a RUN window, type syskey, and then press ENTER.   In the Securing the Windows Account Database dialog box, note that the Encryption Enabled option is selected and is the only option available. When this option is selected, Windows will always encrypt the SAM database. Click Update. Click Password Startup if you want to require a pas

Secret Pages In Google

Image
Google is an American multinational public corporation invested in Internet search, cloud computing, and advertising technologies. Google hosts and develops a number of Internet-based services and products, and generates profit primarily from advertising through its AdWords program. Google has got several unpopular webpages , rather than the  usual Google pages we visit daily.However most of this unknown pages might be  familiar now a days,  but for those who hadn’t viewed yet , we have got a list of these pages.Of course by visiting Google Sitemap , we could easily understand the totality of Google Structure.We also like to share some sites that unlocks the cheat list of Google features. Google Official Secret Pages Google Moms - http://www.google.com/moms/ Google BSD Linux - http://www.google.com/bsd Google Linux - http://www.google.com/linux Google logos - http://www.google.com/logos / Google hacker - http://www.google.com/webhp?hl=xx-hacker Google bork -

Disable Google.com From Redirecting To Local Country Google Domain

Image
Google Web Search is customized for a number of countries and regions across the world. For example, Google.co.in provides search results that are most relevant for users in India; Google.co.uk is the Google domain for United Kingdom.Google try to direct users to the site that will give them the most relevant results . Google.com redirects to local Google country specific domain , depending on the country you are located. For example in India Google.com redirects to Google.co.in and In China Google.com redirects to Google.cn, Similarly it redirects in other countries.In the below picture "Image-1" show browser before redirecting,"Image-2" shows browser after redirecting. How to disable this redirection and use Google.com for search queries?   This does not involve any software or plugin install. Just type www.google.com/ncr instead of just typing www.google.com in the address bar, where ncr stands for “ No Country Redirect ”. Next time you type

Computer Cookie - Working, Vulnerability and Security Tips

Image
Computer cookies are small piece of information in text format that’s sent to an web browser by an web server. This information can be accessed either by the web server or by the client computer. Cookie information can be used for authentication, identification of a user session, user's preferences, shopping cart contents, or anything else that can be accomplished through storing text data. What are the types of Cookie? Session cookie Persistent cookie Secure cookie HttpOnly cookie First-Party Cookie Third-Party Cookie Super cookie Zombie cookie Unsatisfactory Cookie Role of Cookie in Internet Session Management Session management is the process of keeping track of a user's activity across sessions of interaction with the computer system. Personalization Cookies may be used to remember the information about the user who has visited a website in order to show relevant content in the future. For example a web server may send a cookie containing the usern

Top 10 Hacking softwares of 2011

Image
Roushan kumar mishra posted Top Ten Hacking Software 2011   Last year I posted a similar post on top hacking softwares for the year 2010. It was a huge success and it still recieves a lot of hits. Here I have compiled the new list of top 10 hacking softwares which were in limelight for the year 2011. Most of the tools are same but some of them have climbed great hights this year.  The tools listed here are open source and we are not listing any licensed software here. Also I would like to add that METASPLOIT" has been excluded from this list because it combines the power of several tools listed in top 10 so here we will only rate individual products. 1. NMAP - And the tradition continues and NMAP still the number one.  Nmap ,by far is the best security scanning and   hacking   tool ever made. This   software   tops every list of top hacking   softwares   for its two reasons. Firstly,its ease of use and secondly,its wide usage. It provides a wide range of features

How To Fix Windows Virtual Memory To Low in Windows XP

Image
Cause of Windows Virtual Memory To Low in Windows XP The Reason Why Windows Virtual Memory To Low is due to the registry files becoming corrupted, or messed up. usually running out of virtual memory means that you are running too many programs at the same time for your system or one of them is attempting to use too much memory. You might also want to check out what's running by using your "Task Manager" or manage your Startup file in "System Configuration Utility". Remember Than Download of Trial Software, Games, Screensavers, Apps, or Even Video Can Affect your file size and it Change the Setting of your System Registry. Due to Install/Uninstall the Program turns out for the wrong instructions in it. So, it will cause the computer to run slow, or in a worse case, crash and give you a blue screen error. if it this happen the computer is not sure what to do and this will really slow down the computer. The Best Way is Add or Increase the Amount

Cool Mozilla Firefox Browser Tricks and Tweaks

Image
There are a lot off  funny mozila trick Roushan Kumar Mishra Share with u. so use this command and enjoy With Roushan Kumar Mishra List Of Cool Tricks and Tweaks in Mozilla Firefox Browser ? Just Copy the Address Codes Below and Paste on your Mozilla Firefox Address Bar and Just Hit Enter. chrome://global/content/alerts/alert.xul Hide and Seek Mozilla Firefox Browser. chrome://browser/content/preferences/cookies.xul Opens the “Cookies window” inside a tab in the Firefox window. chrome://browser/content/preferences/sanitize.xul Opens the “Clear Private Data” window inside the current tab. chrome://browser/content/credits.xhtml Opens a scrolling list of firefox contributors. The one’s who we must thank for creating Firefox chrome://browser/content/aboutDialog.xul Opens the “About Firefox” Dialog box inside the tab. chrome://browser/content/browser.xul Opens another Firefox inside a tab in the the existing Firefox window. chrome://mozapps/content/extensions/extensions.xu

How to secure your password- tips and tricks!

Image
Here are few trick tips and tricks that will help you to secure your password: HOW TO SET SECURE PASSWORDS For a password to be secure, it needs to be difficult to guess, as long as possible and consist of a combination of letters, numbers and characters. It also needs to be unique for each service that you use. The trouble is that the longer and more difficult to crack a password becomes, the harder it becomes to remember, which is why many people use the same password everywhere. The good news is, there are a few strategies that you can use to set secure and unique, yet memorable, passwords: Use a password manager . This is probably the easiest and most secure option, and so it’s the one I recommend. There are several excellent tools available, such as LastPass , 1Password and KeePass , that can generate and store extremely tough to crack unique passwords for every service you use. Because the tool manages the passwords for you, you don’t need to worry about forgettin

How to crack or Reset BIOS Password? ~Cracking Tutorials

The BIOS software is built into the PC, and is the first code run by a PC when powered on ('boot firmware'). The primary function of the BIOS is to set up the hardware and load and start a boot loader. When the PC starts up, the first job for the BIOS is to initialize and identify system devices such as the video display card, keyboard and mouse, hard disk drive, optical disc drive and other hardware. The BIOS then locates software held on a peripheral device (designated as a 'boot device'), such as a hard disk or a CD/DVD, and loads and executes that software, giving it control of the PC. This process is known as booting, or booting up, which is short for bootstrapping. Bios password is usually used to protect the user's BIOS settings on the computer. If you want to reset the password on the BIOS does not need to bother to connect bateray CMOSnya, with a little trick on the Dos you can reset the BIOS password on it in 2 ways: 1. Clear CMOS This way

What is DoS or DDoS attacks: Denial of Service Attack Tutorial

Image
For any attack to be successful, there should be a vulnerability which exists in the system.  Generally the vulnerabilities that exist in the software such as Operating System and Applications can be removed by implementing proper patch management solutions. But there exists an inherent vulnerability in all the systems which is called “Limitations” and that is the vulnerability that is being targeted by DoS or DDoS attacks. To better understand that let us take an example of a fully patched web server hosting an e-commerce application, and availability of that application stands at the core of business for it to succeed.  Now since the server that hosts the applications is most critical business asset it has been properly patched and any operating system or application assumingly does not have any vulnerabilities. But as any other system the server has following limitations. • Bandwidth • Memory • Processing Power If any or all of these resources are consumed to th

Hack Hotmail and Facebook Account Password through Doxing method

Image
As we all know,On myhackingdairy we have discussed various hacking method to hack email account password. Today in this article, I am gonna to write article on Doxing which is most useful way to hack different types of email account password. Doxing is the process of gaining information about someone or something by using sources on the Internet and using basic deduction skills. Its name is derived from “Documents” and in short it is the retrieval of “Documents” on a person or company.. What is doxing? Doxing is basically finding out information about a person. The vast majority of people on the internet are anonymous and with anonymity comes power because you cannot hurt the physical person behind the username. Doxing takes away this power, that is why people will go to extreme lengths to make sure they remain anonymous. However, the internet stores information from decades ago. Almost everyone can be found on the internet if you know what to look for. Infor

Join The Largest World Of Ethical-Hacking

Image
welcome Friend my New website is open .please vist this site and enjoy with Roushan Mishra www.cybernisc.com www.cybernisc.com  www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com here you study the ethical hacking course and understand all about hacking ,virus, keyloger ,honeypot, httpattack , fakemailing ,orkut hacking, facebook hacking and many more. www.cybernisc.com www.cybernisc.com  www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com  www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com www.cybernisc.com visit us

The Easiest & Most Effective Hacking Method [iStealer 3.0]

Image
The Easiest & Most Effective Hacking Method [iStealer 3.0] What you will need for this tutorial - (CLICK THE WORDS) 1.ISTEALER 3.0 2.CRYPTER 3.DRIVEHQ ACCOUNT all UPLOADS contain the same password. Password Code: barcode@inwarez.org Step 1: Click the "Drivehq Account" link above, fill in the blank spaces with proper details as you will have to verify the account. Create the account and verify it, write down the details for later reference. Step 2: Click the "iStealer 3.0" link above. Download the .zip to a folder or your desktop. Step 3: Extract the folder to your desktop, you will be prompted for a password, that can be found below. Password: barcode@inwarez.org Step 4: Open the folder, inside you will find a subfolder and the iStealer executable program. Open the .exe. Fill in the blanks with the information of your drivehq account you made earlier, make sure the same boxes are ticked and leave the black area alone. Ste

Undetectable Remote Hacking Tricks

Image
Undetectable Remote Hacking By Roushan Mishra  A noob proof tutorial on remote hacking which is 90% undetectable In this tutorial you will learn how to hack a computer any where in the world. Ok well not anywhere obviously things like the military and the goverment will have very high security so you definately wont be able 2 hack them using this method. I hope not aniways =. A Major Notice If you are behind a router you will need to port forward your router. To do this you can use a DMS. Its hard to explain as every router has a different interface ( homepage that has a different layout ) so i suggest you go to google and search portforward.com. It will teach you how to port forward your router there. Ok to begin with you will need these three tools : - Daemon Crypt - http://rapidshare.com/files/8161346/Daemon_Crypt.rar Pc Guard - http://rapidshare.com/files/11136172/PC_GUard.rar Yuri Rat - http://rapidshare.com/files/8161510/Yuri_Rat.rar Ok now that you have these

download Autodesk Maya 2011 32 Bit With Keygen

Image
Autodesk® Maya® 3D animation software delivers an end-to-end creative workflow with comprehensive tools for animation, modeling, simulation, visual effects, rendering, matchmoving, and compositing on a highly extensible production platform. Whether you work in film, games, television, advertising, publishing, or graphic design, Maya offers state-of-the-art toolsets, combined into a single affordable offering designed to help meet today’s demanding production requirements. Autodesk® Maya® 2012 delivers new toolsets for previsualization and game prototyping, extended simulation capabilities, and improved pipeline integration. Screenshoot:   Download   Keygen   Enjoy with ☻Roushan Mishra☻  

WinUtilities Professional Edition 10.32 With Keygen

Image
dear friend many times we face some problem in pc thats some unknown reason. try the newest version of WinUtilities Professional Edition 10.32 With Keygen use this software and free ur pc of unwanted regestry and many more.  download  key-crack Enjoy with ☻☻ Roushan Mishra ☻☻  

HOW TO MAKE WINDOWS XP GENUINE 100% WORKING TRICK| MAKE WINDOWS XP GENUINE GUARANTEED 2011 LATEST

Image
  HOW TO MAKE WINDOWS XP GENUINE   make windows genuine However this method works better than many others i’ve tried before. forget the cracks and injectors etc… this is the BEST WAY: 1) start > run > “regedit” (without the quotes of course) 2) go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer …and doubleclick on it. Then change some of the value data to ANYTHING ELSE…delete some, add some letters, I don’t care…just change it! now close out regedit. 3) go to start > run > “ %systemroot%\system32\oobe\msoobe.exe /a ” (again, dont type the quotes) 4) the activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JD3T2-QH36R-X7W2W-7R3XT-DVRPQ. or JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ   NOTE: Before Doing All this, Remember to make your Window’s Automatic Updates OFF. Otherwise it will again Start Updating and generate the same Problem. ♥♥enjoy

How to hack Orkut account or password | Hacking orkut By Roushan

Image
we can use Phishing technique to hack Orkut account or password online the only thing differ is that we only need a new Phisher for Orkut hacking. Almost all phishers of Orkut are outdated so they can be easily identified by people, so i have made the new one for you guys. So in this tutorial i have come up with latest Orkut Phisher that looks absolutely similar to the original page. So guys read on how to hack orkut account or password online.♦ ☻♣ Note: This is for Educational Purposes only. Please Don't misuse it. You will be solely responsible for any misuse.☺♠ Lets Know what is fishing: What is Phishing? First of you must know what are phish pages, phish pages are the fake pages that are intentionally made to steal the credentials of the victim and hack his personal details. The process of making Phish pages and sending it user makes it a complete technique called Phishing. Technically Phishing is a technique to hack victims account password using the phish