Showing posts with label Windows. Show all posts
Showing posts with label Windows. Show all posts

Tuesday, 2 July 2013

How To Use Trial Software Forever


Author – Leo Harsha

Click Here To Follow

Friends.Time Stopper is a great software that can enable any kind of trial application for unlimited use. Yes it is possible now with Time stopper software. You can change the time of any .exe trial version and use for ever. I think this will help you all as this is a totally free software. Download and enjoy ……..

timestopper
 
Important features of Time stopper.
1. It will eliminate the short time period of your trial versions.
2. It will extend your time period of executable files for unlimited time.
3. It will easily be installed.
4. It will not damage any file of your operating system.
5. It is 100% free.


Download Time Stopper free: Click here (Alternate Link)

Thursday, 27 June 2013

Tricks To Increase Your Internet Speed Working

Author – Leo Harsha

Click Here To Follow





Tricks To Increase Your #Internet #Speed:

Speed Up Your Net Speed By 20%

1. First you go to start button
2. Go To Run
3. Type gpedit.msc And Then Hit Enter.
4.Then Expand Administrative Templates.
5.Then Network
6.Then QoS Packet Scheduler.

Now A New List Appear . Click On Limit Reservable Bandwidth.

Just Disable it.

Now You Click On Apply.
That's It Now You Are Done !!

Now Just Restart Your Computer . And I hope You will Get change in Your Speed

Some Other Tricks:

1. Use IDM To Boost Your Downloading Speed.
2. Use A Good Anti-virus in Your Computer.
3. Remove Unwanted Add-ons, Software,Unwanted Files Form Your Computer.
4.Update Your Drivers Periodically.
5.Keep A Good Maintenance Of Your Computer :)
#Leo_Harsha

For More ==>http://thecomputerpedia.blogspot.in/

Friday, 14 June 2013

Download Windows 8 Official Themes By Microsoft

Author – Leo Harsha

Click Here To Follow

Windows 8 is one of the best operating system by Microsoft. Windows 8 released on oct 2012, with lots of new features like Metro UI, New task manager, Sky drive, and others. Windows 8 OS is also available for tablets and Windows phones.

If you don't have Windows 8 download it from here.
Download-Windows-8-Official-Themes-By-Microsoft

Well I'm impressed with windows 8 new User Interface (start menu or metro UI), Speed and performance  Windows 8 boots in 8 seconds and you can download thousands for free and paid apps from windows store. According to me Windows 8 is better than previous version of windows 7,Xp, and vista.

Let's come to our post, Microsoft official website released with bunch of new free themes for Windows 8 Operating system. You can download official windows of 8 themes on there page . Microsoft Website added 13+ different category themes on their page. Some themes are compatible with Windows 7 OS.

Download-Windows-8-Official-Themes-By-Microsoft



You can easily download Windows 8 themes from Microsoft website. Just select your desired theme and Click on Download button.

Saturday, 1 June 2013

Get Your Own Valid Visa Credit Card via Bancore

Author – Leo Harsha

Click Here To Follow

A Virtual Credit Card (VCC) behaves the same way as a traditional credit card does. The only difference is that you can only use it online (and it is 'virtual' as opposed to a 'plastic' card). There are many services that provide you a virtual credit card so that you can use it without having to attach your bank account or going through any complex process. Entropay, was a similar service which provided free virtual cards to the users. You just needed to create an account to receive a free virtual credit card of your own, but it stopped the service due to users registering just to misuse it. It now requires users to load their accounts with some money before they can get a VCC. The site I'm going to introduce to you today not only behaves the same way as Entropay, but also gives you your own free VCC just after registering on the site.




Note : You need to provide your telephone number to the site. It calls you to verify your identity. If you're not okay with that, no need to go through the tutorial. 



Steps Involved:

Step (1)

  1. Sign Up on the site. 
  2. Make sure that you provide your real phone number since you'll receive a call on your phone. 
  3. Press on Call me. 
  4. You'll receive a call on your phone.
  5. While on the phone, you'll need to enter a personal 4 digit pin.
  6. That same PIN will be asked every time you try to login on the site.



Step (2)

Now log in to the site. (The password is the PIN number that you had entered on your phone i.e. on step 1)
It will ask you to enter your name and email address. Fill up the form and click on Save.
Just after pressing Save, you'll get your Virtual Credit Card.


Whats In Bancore?



  • Less Transaction Cost
  • Your Mobile Phone Is Your Credit Card***
  • No AnualRenewalOr Setup Cost
  • You can also Order a Plastic Visa Card
  • Globally Accepted Valid Visa Card
  • Many Ways To Add Fund In Your Account
  • Option For Blocking or Unblocking Credit Card
  • Instant Mobile to Mobile Transfer Facility
  • Pay Your  Bills Instantly With Bancore Credit Card



Note:


Remember, the card is not pre-loaded with money. If you need to make online purchases, you can load money into the card by using the traditional credit/debit cards or through a voucher available on the site. It's more important to guys like me who don't have an international credit card and thus are not able to make use of different offers and deals. A particular place where this might come handy is while advertising on Facebook. Suppose I received a Facebook advertising coupon. Now, Facebook requires you to enter your credit card details before you can make use of an advertising coupon. I can now use the above virtual credit card to authorize my account without any hassle.


And for those of you who are wondering, no, you cannot use it to verify your PayPal

I hope the readers of my blog would have figured this.

Good Luck :)

Monday, 27 May 2013

Hack Other's Remote PC with RAT

Author – Leo Harsha

Click Here To Follow


Here is your solution fanz to hack remote PC using RAT (REMOTE ADMIN TOOL).
I am Showing here Tutorial for ProRat.


What is RAT?


1. Download ProRat. Once it is downloaded right click on the folder and choose to extract it.


2. Open up the program. You should see the following:



3. Next we will create the actual Trojan file. Click on Create and choose Create ProRat Server.


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.



5. Click on the General Settings button to continue. Here we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.



6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. In the example I will use an ordinary text document.





7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I will stick with the default because it has icon support, but exe’s looks suspicious so it would be smart to change it.



8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.



9. Finally click on Create Server to, you guessed it, create the server file. Below is what my server file looks like.



10. A hacker would probably rename it to something like “Funny Joke” and send it as an attachment to some people. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.


11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.


12. I’m going to run the server on my own computer to show you what would happen. Once I run it the trojan will be installed onto my computer in the background. The hacker would then get a message telling him that I was infected. He would then connect to my computer by typing in my IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to my computer and have full control over it.



13. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all my computer files, he can shut down my pc, get all the saved passwords off my computer, send a message to my computer, format my whole hard drive, take a screen shot of my computer, and so much more. Below I’ll show you a few examples.



14. The image below shows the message I would get on my screen if the hacker chose to message me.



15. Below is an image of my task bar after the hacker clicks on Hide Start Button.



16. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.



As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.Here 127.0.0.1 is Local IP Address. You can use your ISP IP address and Hack Victim PC.



/*NOTE for Education Purpose only. Hack PC using Rats is a Huge crime. I am not responsible any damage cause by you to Public. Do not Harm Public. You will be Punished for many years by cops.*

Tuesday, 21 May 2013

Hack with Command Prompt: All Command Prompt Commands

Author – Leo Harsha

Click Here To Follow


Command Prompt is the heart of windows and with a technical point of view, command prompt is the only good thing in windows for a techie. Command Prompt gives you a feel of how things work in the back end of windows. For example, if we copy and paste using usual right click feature we don't get to know what is happening behind the buttons to make copy and paste possible. But if we copy and paste using command prompt, we get to know how things are done.




This screenshot shows an example to copying contents of  "functionallog.txt" to a new file "android.txt".
When someone starts learning about computers and hacking, the priority should be to gain a firm hold on command prompt as command is very powerful and allows you to do a lot of stuff. Now I'll talk about some of the commands of command prompt which a hacker should surely know. Before trying these commands, make sure you are running command prompt as the administrator.(right click on cmd > run as administrator)

1. ipconfig:  ifconfig is a very basic command which tells the IP(Internet Protocol) address of your  machine if you are connected to the internet. Other information  such as default gateway, subnet mask etc. are also displayed. This command is similar to ifconfig command in linux systems.
Syntax: ipconfig 



                              
2.  Ping: Ping command is used to check if a host is up or not. It sends 32 bytes of data to the host whom we want to check, if the reply comes from the host, it means that the host is up.
Syntax: ping xxx.xxx.xxx.xxx (where xxx.xxx.xxx.xxx is the ip you want to check). 

 
Ping command can also be used to check the IP Address of website by pinging them and you can use that IP Address to open that site too by putting it on the URL box.
Syntax: ping thecyberelite.blogspot.com

Now you can use the ip address above to open up http://thecyberelite.blogspot.in/
3. Telnet: Telnet is a command line tool by microsoft which is used to establish connection remote servers. Telnet has been used widely for hacking where attackers used to establish remote connection to victim pc when the ports of the victim system where open. By default telnet operates on port 23. Telnet is not available in the windows system, you have to enable it manually. To enable telnet on windows follow the following steps:
  • Open up control panel and select system and security.
  • Select "programs" option from left side.
  • In program and features section click on "turn windows features on or off".
  • A menu will open up and from there select check the option "telnet click" and "telnet server".



                     
 If you know the ip of a person, you can gain access to his system using telnet. To open telnet window, type "telnet"(without quotes) in the command prompt. Here is an example of a simple telnet command used to open a connection.
Syntax: o xxx.xxx.xxx 171 (o: means "open", 23: default port for telnet)



Various other commands of telnet can also be used once the connection is established to the client machine. Simple type "help" in the telnet windows to see other options.

4. ARP: "arp" stands for Address Resolution Protocol and this command is used to monitor the network stats and connections. Address Resolution Protocol means that it link ip address to physical address or mac address. ARP command comes handy when you are in a school, college, office network. This command is available by simply typing "arp" in command prompt.
Syntax: arp -a (This command displays a list of current ARP entries)
  Syntax: arp -d xxx.xxx.xxx.xxx(This command deletes a host specified by you from network, here xxx.xxx.xxx.xxx is the specified host).




5. nslookup: This is a very useful command which you name of your domain and it's ip address.
Syntax: nslookup


You can also find information about an ip in using the same server in your netowrk by just simply typing name of the ip in the nslookup window.
6. Netstat: Netstat command gives you information about your internet connections. Netstat command gives a list of active connections. This command is very useful and if someone has RAT Ed your pc, then you can detect it by this command as it would display the connection of RAT being made with it's host.
Syntax: netstat



Here Protocol used by the connection, foreign address and the state of the connection are displayed.
If you suspect some connection then you can always see what is causing that connection by typing the following command : netstat -b (this would display the executable involved in creating that connection)


The pointed .exe's are the open which are creating a connection.
If you want to know statistics of each protocol, then your can try this command: netstat -s


Other netstat commands can be seen by typing "netstat help" (exclude commas).
With this, I conclude this article. I hope this helps people new to command prompt and renews the memory of ones already using it :) 





List of commands can be downloaded from HERE

Saturday, 11 May 2013

How To Hack Windows 7

Author – Leo Harsha

Click Here To Follow

 If you ever needed information on hacking Windows, then here are two methods you can use. However, keep in mind that this is for learning purposes only.

Method One: Hacking from the Start Screen1
  1. When the computer starts up, hold down F8 before you see the "Windows Starting" screen. This will bring you to a screen with choices. Your best bet will be "Safe Mode with Command Prompt". You can then do as you want.


2
  1. Go down to the bottom and select "All Files".

3
  1. Name the file: Batch.bat.

4
  1. Go to where you saved the file, and open it. This will open up Command Prompt.

5
  1. If the computer has Notepad blocked, you can use edit. Access this by opening command prompt or command.com and typing edit. Also, you can even use Microsoft Office or something if you can save it right.

6
  1. Do as you wish inside command prompt. Here is how to add or delete accounts:

  • Add Account: C:>net user USERNAME /add
  • Change Accounts password: C:>net user USERNAME * then you'll be able to enter a new password for the account. If you just press enter without typing anything, the account password will be reset.
  • Delete Account: C:>net local group Administrators# # Another way is to open up notepad, (if it's not blocked), and type in "command.com". Then go to File->Save As. A USERNAME /ADD
Method Two: Hacking from the Windows 7 CD
1
  1. Boot the system from the Windows 7 CD.

2
  1. Click on Next.

3
  1. Choose “Repair your computer”.

4
  1. Click Next in the System Recovery window.

5
  1. Choose the Command Prompt option below.

6
  1. In the command prompt window, copy the Seth file to C drive. Enter this command: “C:\windows\system32\Seth.exe c:” (without quotation marks).

7
  1. Replace the Seth.exe file with cmd.exe file with following command, and type “yes” to replace the file: "c:\windows\system32\cmd.exe c:\windows\syetem32\Seth.exe" (without quotation marks).

8
  1. Type "exit” to restart the Windows setup.

9
  1. Press the shift key 5 times, rapidly, when you're in the username screen. In the Sticky Keys window, click Yes.

10
  1. In the command prompt window type the “net user,” “user name” and “password”. For example: net user administrator 123