Sunday, January 30, 2011

how to remove virus form pendrive | remove recycler.exe

hackers001.blogspot.com
You know Recycler.exe virus mainly spreads through Pen drives and other removable media devices. Each time you insert your Pen Drive in any infected computer it copies itself to the Pen Drive. It also opens a backdoor and secretly downloads some potentially unwanted and malicious files to your computer.

How to Remove recycler.exe virus from pen drive??

  • Download Flash Disinfector and save it on your desktop.
  • Run the app, it will ask you to insert Pen Drive.Insert your Pen Drive and click OK.
  • It will remove autorun.inf file from your Pen Drive. Now open your pendrive and delete unwanted files(recycle.exe, recycler.exe etc.) from it.

Download Flash Disinfector

Friday, January 28, 2011

how to change windows logon screen

happy weekend to all of you!!
today i will tell you how you can change windows logon screen...
softwares make human life easy!!
so i have a software for it also...
you can easily change logon screen and hard-disk's icon...
here is the link
http://www.4shared.com/file/tNjEOZXY/WinBubble.html

Wednesday, January 26, 2011

KEYLOGGER | HOW KEYLOGGER WORKS

hackers001.blogspot.com
keystroke logging (often called key-logging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

How Keyloggers Work

The way keyloggers work varies enormously. However, there are two main types of keyloggers.

External Keyloggers (hardware):

They can be connected directly to the keyboard's cable. The spy does not need actual access to the computer nor to turn it on, he just needs to be physically there. Anyone with access to your computer may install such devices secretly and it's very hard to notice them. The main downside is that the spy can be caught if anyone finds out, for he needs to be physically there to both install and retrieve the keylogger. However, if successfully installed, this keylogger won't be detected by any antivirus your computer may have. It will log every single keystroke and save it to its enormous database where everything you type, including passwords and credit card numbers shall be later viewed.

Internal Keyloggers (software):

The most common type of keyloggers. If anyone has physical access to your computer, then it's a "piece of cake" to install a keylogger with a CD. That's the easier way, for if he is knowledgeable, he can also disable a given antivirus for that keylogger . Remote keylogging is very popular despite the numerous anti-virus programs out there that block them. There are many programs that do not only send you a report of the keystrokes, but they do it in real-time. A spy can see exactly what his victim is typing as he or she is doing it. More advanced keyloggers such as SubSeven may go as far as being able to turn on a person's microphone, control his or her mouse and even shut down the computer - just as if the spy were the one in front of it.

Remote Keylogger - Monitor ANY computer through the Internet!

 

RealTime Spy offers users the ability to remotely monitor a computer via a web browser, without even having physical access to the PC. It will allows you to remotely install the monitoring system through an email attachment without the PC user recognizing the installation! And you can access the activity logs from anywhere via you favorite web browser!
No remembering long IP addresses or directly connecting to the remote PC - all you need to do is point your browser to the Remote Keylogger website to view logs of any machines you deploy Remote Keylogger on! All logs are password protected and securely stored for your eyes only - and no worrying about waiting for the remote machine to sign-on to retrieve its IP address to monitor it.
Keylogger Software Full



Main Features:

Remote Keylogger Records...
  • Online Conversations

  • Keystrokes typed

  • Website Visits

  • Applications Ran

  • Documents Viewed

  • Windows opened

  • System Login Activity

  • Key Features...
  • Remotely Installable/Uninstallable!

  • Monitor a PC from Anywhere

  • Secure online log storage

  • Monitor from anywhere

  • Check logs at any time

  • Remote log deleting

  • Log search

  • How Remote Keylogger works

    • Remote Keylogger comes with a configuration program that allows you to create a remote install module that you e-mail to the remote PC you wish to monitor. You must attach this file you create to an email, and then send it to the remote PC. From there the user must download and run the attached file to install Remote Keylogger. You can choose to enable or disable the 'alert user' option that Remote Keylogger has. Once the user runs the file, their activities will be stored on our servers, so you can view them from any location - securely, of course. To aid the install process, you can give any name to the install module you create - such as CoolPictures.exe or FunGame.exe (it must always end with the .exe extension to run).

    • Some e-mail systems may block executable attachments - do not worry, however, as this can be avoided. To bypass executable blocking by the remote e-mail server, you can drag and drop the Remote Spy module into a WORDPAD or Microsoft Works document. From there you can email this doc file with the embedded executable to the remote user - if they open the doc, and double click the executable - then Remote Keylogger will be installed. Zipping the file with software like Winzip also works.

    • If the remote user does not download the Remote Keylogger module and run it, then the software will not work - you will have to physically install the software. We are not responsible for getting the user to execute the logging module that you send them, nor will refunds be granted if they refuse to run it - as you can still physically install the software.


    Sunday, January 23, 2011

    how to activate windows7 | make windows7 genuine

    Good Evening Friends!!!!

    today i will tell you how can you make windows 7 geniune
    i have a software with the help of it you can easily make any windows7 original within a second....



    INTERESTING!!!! 

    hmmmmmmm.....
    so now here is the link....

    http://www.4shared.com/file/4E5EPgXI/w7a.html


    step1: extract the file

    step2: first read read me file

    step3: now click on exe file

    Thursday, January 20, 2011

    HOW TO PASSWORD PROTECT YOUR GOOGLE CHROME

    good evening guys!!!
    now you can set password on chrome....
    Simple Startup Password is an addon for Google Chrome browser that blocks unauthorized people from using your browser.  Just go to the extensions gallery of Google Chrome and install the Simple Startup Password add-on for your browser.


    hackers001.blogspot.com


    After installing the add-on go to Settings -> Tools ->Extensions. There look for Simple Startup Password and click on Options. Set a password for your browser and done. Now every time you start your Google Chrome browser it will ask you for the password and if you fail to give the correct password your browser will be closed.
    You can get this add on from Google Chrome’s extensions gallery.

    Link : Simple Startup Password for Google Chrome

    In case you forget your password there is no option to recover it. You will have to reinstall the browser.


    Google Sites and Chrome For DummiesGoogle Sites and Chrome For Dummies
    Panasonic BL-C230A Wireless Internet Security CameraPanasonic BL-C230A Wireless Internet Security Camera
    Web Geek's Guide to Google ChromeWeb Geek's Guide to Google Chrome

    Tuesday, January 18, 2011

    windows is better then linux | why linux is not popular

    Today when i was reading a linux book then i thought that why linux is not popular like windows!!!!
    Even linux have all the things and it is free for all then why it is so far......
    Windows still owns over 88% of all the desktops according to leading research.
    I am also a red-hat certified engineer and i also use windows 7 because there are many things that are not in linux.
    First of all, Linux won't necessarily crush Windows 7, it is true that Linux will one day crush Windows, but the key words here are "one day." I doubt that it will be in Windows 7's lifetime. It might not be in the lifetime of Windows 8 either, if any of the rumors I've heard about Windows 8's features are true. 
    Some changes that are necessary in red-hat are given below and some fundamental issues to why Windows 7 dominating....!!!!!



    1) INSTALLATION 
    Windows 7 installs easier, has simpler configuration of user settings, greater availability of software, support (you could argue that all support is awful, which is probably true) Windows support is easier to get when you need help. Gaming, MP3’s,… I could go on and on.
    2) GUI
    linux is command based but now these days GUI is also available in linux, but it is not comparable with windows.
    command line interface is useful when we know all the commands, but for a new user it creates only problem and problems. a new user dont wanna see all the time a black screen. plz change it, make it user friendly!!!
    3)DRIVERS
    In windows7 there is no problem of drivers all are automatically installed when windows is installed, but in RHEL it sucks man!!!
    packages are required in RHEL, we cant play songs, movies etc. without it.
    4)SERVERS
    In RHEL we can make all the servers easily, it is best for it according to my experience but Windows DNS is the best internal DNS server. 
    This server is very important it is good in linux but best in windows....
    5) FEATURE AND FEATURES
    Windows 7 has solved a long-standing thorn in Microsoft’s side, How to deliver a feature rich OS without killing resources?
    Windows 7 has made improvements to the Aero feature, installs as a VHD (making it truly portable) and has moved beyond the need for mouse and keyboard. The touch screen as well as the speech and handwriting recognition improvements makes it hard to ignore Windows 7. DirectAcess, Bitlocker to Go, Applocker and the new easier to use UAC ( yes I am not letting up on this one) makes Windows 7 secure but yet easy to administrate.
    The list of features goes on, and the speed of Windows 7 without the resource drain…rocks!

    I DONT WANNA SEE END OF PENGUIN, I REALLY LOVE LINUX. I WANNA SEE IMPROVEMENT IN LINUX....
    HOPE FOR BEST
    GOOD LUCK LINUX
      
     

    Sunday, January 16, 2011

    What Is Cross-site scripting

    Cross-site scripting or XSS is a threat to a website's security. It is the most common and popular hacking a websiteto gain access information from a user on a website. There are hackers with malicious objectives that utilize this to attack certain websites on the Internet. But mostly good hackers do this to find security holes for websites and help them find solutions.
    Cross-site scripting is a security loophole on a website that is hard to detect and stop, making the site vulnerable to attacks from malicious hackers. This security threat leaves the site and its users open to identity theft, financial theft and data theft. It would be advantageous for website owners to understand how cross-site scripting works and how it can affect them and their users so they could place the necessary security systems to block cross-site scripting on their website.

    XSS is a hacking technique in which a malicious user enters a short snippet of JavaScript into a textbox so that this script will be saved in the database and when a user retrieves and displays this later, the browser will execute the script.





    Cross-site scripting holes are web-application vulnerabilities which allow attackers to bypass client-side security mechanisms normally imposed on web content by modern browsers. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access privileges to sensitive page-content, session cookies, and a variety of other information maintained by the browser on behalf of the user. Cross-site scripting attacks are therefore a special case of code injection.

    The expression "cross-site scripting" originally referred to the act of loading the attacked, third-party web application from an unrelated attack site, in a manner that executes a fragment of JavaScript prepared by the attacker in the security context of the targeted domain (a reflected or non-persistent XSS vulnerability). The definition gradually expanded to encompass other modes of code injection, including persistent and non-JavaScript vectors (including Java, ActiveX, VBScript, Flash, or even pure HTML), causing some 

    Prominent sites affected in the past include the social-networking sites Twitter,Facebook, MySpace, and Orkut.In recent years, cross-site scripting flaws surpassed buffer overflows to become the most common publicly-reported security vulnerability,with some researchers viewing as many as 68% of websites as likely open to XSS attacks.

    Wednesday, January 12, 2011

    secret tricks to make blog popular

    today my friend ask me how can i make my blog popular!!!!

    then i just smiled and said read the today's damn post!!!
    every webmaster or blogger want to make blog popular....

    so here is some secret tricks to make it popular....

    1)Add Your Blog to Blog Communities
    Blog communities are really popular for blogs. There are tons of other bloggers and web enthusiasts constantly checking out these communities for blogs and information. There are many communities you can deal with but it’s better to stick with the ones which are popular and have a decent Google PR.
    Some good ones would be Blogged, FuelmyBlog, MyBlogLog, BlogCatalog, NetworkedBlogs etc. Try to Google and you will find a lot.
    When you follow a blog, you are basically increasing your visibility in the community. A lot of people will check you out and also subscribe to your blog if you are good. Always try to participate in a network and engage in conversations.

    2)Be a Guest Author on Popular Blogs
    Most blogs you will come across these days accept guest posts. Popular blogs like problogger, shoemoney, johnchow just to name a few; they give all the new bloggers some space on their blog to get noticed. Now this is a great opportunity and shouldn’t be missed. You can’t just post anything you like but it should be related to the niche and you have to prove your worth.
    Writing guest posts is a truly amazing way to get noticed and drive traffic to your blog. Of course you don’t get paid for it unless you are a big shot but this is a great and a free way to get traffic.
    To start with, you are most welcome to make a guest post on this site :)

    3)Give Something to Download for Free
    I love free stuffs and so do you. A good way to gain readers and make your blog popular is to give free stuffs to the public. It can be almost anything; an eBook, a wordpress theme, some popular tools or even free online class.

    how to increase speed of internet

    ARE YOU SUCKING FROM LOW INTERNET SPEED!!!!
    NOW SOLUTION IS HERE JUST FOLLOW THE SIMPLE STEPS THEN GOT HIGH SPEED.....
    Here are a few tips to Increase the Speed of Your Internet Connection

    (1) Connecting Port

    This may seem obvious, but you should connect to the internet though an ethernet port, rather than a serial, parallel or USB port. If ethernet is not an option, it may be advisable to update your hardware.

    (2) Enough RAM

    Make sure your system memory can handle the load! If you want to browse fast, you will need to close other applications in case your RAM is maxed out.

    (3) Fast Browser

    I ALWAYS USE MOZILLA, IT IS MY FAVOURITE BROWSER.
    Mozilla based browsers generally are among the fastest browsers, while still being comfortable to use. Whichever open source browser you pick, make sure you don’t overload it with extensions or addons, those will just slow your browser down dramatically. On the other hand, if speed and RAM are not an issue, go for the luxury!

    (4) Increase Speed under Windows XP Pro

    Windows XP Professional reserves 20% of your bandwidth for services like updates or spyware checks. If you would like to exploit this reserve, do the following:
      If you want to tap into this locked speed then make the following changes:
      1. Go to Start-> Run-> and type gpedit.msc
      2. Expand the Administrative Templates branch
      3. Expand the Network tab
      4. Highlight QoS Packet Scheduler
      5. Click on Limit Reservable Bandwidth and check the enabled box
      6. Then Change the Bandwidth limit % to 0 %
      Once you have done this click apply and restart your PC. After rebooting you should see a noticeable improvement in your net speed.

      (5) Tweak Tools

      There are a number of programs that promise to increase your internet speed. They may work, they may not. They all apply a number of changes to optimize your network settings. Whether or not they will really improve your internet speed or which one will work the best for you greatly depends on your system, hence it’s difficult to recommend an application.
      For further reading I will refer you to a set of articles found on About.com. Start with DSL and Cable Broadband Speed Tweaks and work your way through the links at the bottom.
      Which tools and tweaks worked best for you?
       

      Monday, January 10, 2011

      Download Opera 11 for Windows and Linux

      hello friends The final version of Opera 11 just came out with many new features and enhancements. Improved address bar, Mouse gestures, Tab grouping, Pinned tab, Automatic updates are few of the most noticeable features in the new Opera 11.


      One more important feature is its ability to run on external devices. While installing the browser you can select to install it on external devices. Which makes it a portable browser and you can carry it in your Pen Drive with you. Just click on the options button while installing and select install for external device in the next screen.



      You can read more about the new features of Opera 11 over here.
      Or just
      you can download it directly from here

      Download Opera 11 for Windows (7.1 MB)

      or Download Opera 11 for Linux

      Saturday, January 8, 2011

      HOW TO WRITE HTML CODE IN BLOG POST

      hello friends!!!
      every time a normal problem is occur, when you write plain html code in blogger post in Edit Html or compose section, you see it did not appear as it is as you like, there is so many ways to write plain java script or html code inside the blogger post, i told your here very simple way...

       


      1. Just visit... http://centricle.com/tools/html-entities/
       

      2. Paste your html code
       

      3. click decode, if the script already in decode form, so just click encode.
       

      4. Now paste the script in your blogger post.

      Download Norton 360 Version 4.0 2011 For Free

      Wanna Norton...
      well now you can download 90 days free pack of Norton.
      yes!! it is not a joke. Norton is giving away its Norton360 Version 4.0   and norton antivirus 2011 for 90 days free trial i.e 3 months.This is a special promotional offer.This is an OEM setup installer that has been released by norton in conjunction with microsoft.

      If you will directly go to the norton website you will not be able to benefit from this offer instead you will get only a 30-day trial version only after entering your credit card details.But if you use the link that I am giving at the end of this post you will get a 90 day trial and doesnot require to enter your credit card details.
      So dont waste your time and try the best antivirus solution as the new norton 2011
      • Provides excellent protection against viruses,spywares.
      • Its lightweight and uses less system resources.
      • Specially Designed for windows 7
      Click the link below to download Norton 360 Version 4.0  Or antivirus 2011 for free
      Download Norton360 Version 4.0 2011 for free

      Wednesday, January 5, 2011

      how to make your blog popular

      Blogging TipsThe success of your blog mostly depends on the amount of traffic it gets. This is especially more important if you want your blog to generate some kind of revenue. i will tell you some points how to make your blog popular for SEO


      •  Start a controversy. Just remember not to cross the line.
      • Start a contest. Make sure to end it too.
      • Give away free goodies. People love them.
      • Write about other bloggers to interest their visitors to read your blog. Keep it positive.
      • Dress up your blog often (By dress-up I mean tweaking the design)
      • Interview other bloggers and post the interview.
      • Write about your personal life sometimes.
      • Ask questions to your visitors.
      • Share some secrets.
      • Celebrate your birthday with your visitors. Think of innovative ways for doing this.
      • Celebrate your blog’s birthday too.
      • Write something funny or disgusting. (Don’t make it a habit)
      • Make a bumper sticker with your blog’s name and stick it on your car. (Just make sure you drive often)
      • Write an e-book and distribute it to your visitors for free.
      • Introduce a commission based affiliate program.
      • Tell your visitors about your latest fad or obsession.
      • Post interesting pictures of your pets.
      • Congratulate the top commentators occasionally.
      • Encourage sharing of opinions.
      • Donate for a cause or become a volunteer for a non-profit organization. Ask your visitors to join you.
      • Put your blog’s ad in the local newspaper or the yellow pages.
      • Hold blog competitions.
      • Create polls.
      • Hold an auction and let people bid for something useful (For example, advertising space on your blog).
      • Write about your blog achievements.
      • Share your hopes and aspirations about your blog.
      • Start an award distribution system.
      • Make contact with your local visitors and hold a get-together or a bloggers’ meet.
      • Start a blog comic strip.
      • Dig up some old article that you wrote on your blog which became famous and start a discussion.
      • Try and get a photograph clicked with a real celebrity and post it on your blog. (Hold on Tiger..don’t rush to that Photoshop button!)
      • Post videos that will help your visitors learn something new. Also submit them to video sharing websites like YouTube.com.
      • Write about your hobbies and interests. (For example, if you like cooking, post a new recipe)
      • Post about one of the weirdest thing that you ever did.
      • Get featured in a print magazine.
      • Buy a paid review from any famous blogger(s).
      • Brand your blog with a catch phrase along with a logo.
      • Distribute T-shirts or merchandise with your blog name on it.
      • Join Yahoo! Answers and put a link on your website to your answers.
      • Keep a track of websites that pick up your articles or press releases. Offer them exclusive news or content.
      • Start a newsletter.
      • Podcasting is another good way to make your blog popular.
      • Publicize your blog to your friends and relatives and let them do some work for you.
      • Be active in Social Bookmarking websites.
      • Share Link Love and you will get it back.
      • People like to read about Web 2.0. Write about it.
      • Write about something that’s already famous.
      • Last but not the least, be yourself.

      What is FUD Crypter?

      What Is FUD Crypter?
      FUD is acronym for fully undetectable.It is a software that can be used to encrypt your exe files.
      What is the use of FUD Crypter?
      FUD crypters can be used to encrypt viruses,RAT,keyloggers,spywares etc to make them undetectable from antiviruses.When these exe files are encrypted with Fud crypters they become undetectable with antiviruses

      How Does FUD Crypter Work?
      The Basic Working Of FUD Crypter is explained below
      The Crypter takes the original binary file of you exe and applies many encryption on it and stores on the end of file(EOF).So a new crypted executable file is created.
      Original Exe Crypted Exe
      001————- 010                                      101————-110
      100|Original File|000->  Cryptor  ->010|Original File|110
      010————- 111                                        110————-010
      The new exe is not detected by antiviruses because its code is scrambled by the crypter.When executed the new .exe file decrypts the binary file into small the data small pieces at a time and injects them into another already existing process or a new empty one, OR it drops the code into multiple chunks in alternative data streams(not scanned by most a/v) then executes it as a .txt or .mp3 file.
      Why Most FUD Crypters Donot Work?
      As a FUD crypter becomes popular it also get the eyes of antivirus companies.The antivirus companies update their software and employ detection mechanism that detect the encryption’s by the crypter.So, most of the popular FUD crypter are easily detected by antiviruses.
      Where can I test Whether my Crypter is FUD or not?
      To test you crypter encrypt any virus with it and test it on http://scanner.novirusthanks.org and make sure you check the box Do not distribute the sample .

      Monday, January 3, 2011

      How to show a banner at each startup in Windows

      hello friends...
      you know There is a hidden feature in Windows and not many users know anything about it. You can setup a banner with a message in it. Each time your Windows boots up the same banner will pop up. The message can be anything from a welcome message to some important information. You can use it in the way you want. Follow the simple steps given below to setup a banner for your Windows system :

      • First of all, go to “start” –> “run”.
      • Type “regedit” and hit Enter.
      • A new window will open named “registry editor”. In the left panal of the “registry editor”, go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\ system
      • Now right click on the right panel, choose “new”,Select “string value”. A new “string value” will be created.
      • Right click on it and choose “rename”. Type “LegalNoticeCaption” .
      • Right click on that “string value” and choose “modify”. On the “value data:” area, type the text or value that you want to see in the title bar of the banner.
      • Now create yet another new “string value” in the right panel and “rename” it to “LegalNoticeText”.
      • Right click on that “string value” and choose “modify”. On the “value data:” part, type the message you want to display each time windows boots.
      • Now, close the “registry editor”.
      • Restart your computer.
      Now, after the “boot screen” and just before the “welcome screen” a new banner will pop up which contains your message and an “OK” button. The users have to click on the “OK” button to proceed.

      Saturday, January 1, 2011

      how to make torrent fast new trick

      hi friends,
      today i am again posting a new trick for torrent
      after frustrating and spending more and more time with torrent finally again a found a new way to make its speed high. its is working on my laptop perfectly.....
      try it and get high speed



      here is step by step tutorial:
      step1: open your u-torrent or bit torrent
      and go to settings, as shown in highlighted part of picture

      step 2: now go to bandwidth and make the setting same as i make here

      step 3: after that go to next option bitTorrent and make protocol encryption outgoing enable

      step 4: now go to scheduler and enable it

       now all these steps are enough to make speed high
      enjoy!!!

      how to break winrar password

      GOOD EVENING TO ALL OF YOU
      today's post is about how to crack password of winrar
      In order to protect your winrar files frm others reading, you set the password with your files. After a long time, you forgot the password. Is there any way to break passwords in winrar?

      WinRARis a powerful tool allows you to create, manage and control archive files. It consistently makes smaller archives than the competition, saving disk space and transmission costs. Winrar itself can not break password for you. You need another tool which is Rar Paswrd Recovery to find your winrar password back.


      here is all the step to do this:

      Step 1: Download Rar Password Recovery , then install it on your computer.
      Step 2: Double click on Rar Password Recovery icon, make sure it is running.
      break password
      Step 3: Click the Open button on the top of Rar Password Revovery main windows.
      Step 4: Select the rar file which you forgot the password to open it.
      Step 5: Click Start button in the right of Open button on the top of main window.
      After you finished the steps above mentioned, Rar Password Revovery start to find the password of your rar file. You also can use rar password cracker to break rar password. If your file format is not rar, but is zip, your can use Zip Password Recovery to find your password back.