Showing posts with label os hacks. Show all posts
Showing posts with label os hacks. Show all posts

Tuesday, 30 August 2011

How to Hide IP Address and Spoof MAC Address | Become Anonymous on Internet


Now today i am going to have another interesting Tutorial , i.e HOW TO HIDE IP ADDRESS AND MAC ADDRESS AND BECOME ANONYMOUS ON NETWORK.
Many of my Daily readers have asked me about how can we become anonymous and do any hacking trick, so by now you will be having anew trick to become anonymous, such that no one can track you. Like wise you can send Phishing pages, spoofed pages and backtrack attack without the fear of being caught.
All the tutorials I have seen on internet tell people How To Set up RAT’s, Keyloggers etc. People follow these steps and start spreading, without doing anything to prevent themselves from being traced. You should follow the below steps before you start spreading, otherwise you will be easy to trace. There is no such thing as 100% anonymous, but this will help you.

This tutorial will show you how to become anonymous on the internet.

How To Hide IP And MAC Address And Becoming Anonymous On Network

How To Spoof/Hide MAC Address
First we will spoof our MAC address. MAC stands for “Media Access Control”. It is commonly used by the authorities to trace hackers. To make it harder to trace us, we can change it!Step1 : Firstly, download the Program NMAC here: 
Step2 : After you have installed it, open it up, and click proceed.You should see a list at the top of the window.
Click on the first one.
Note: The drop-down box under “Network Connection” changes.If you are using a wired connection, you need to select the one that says “Local Area Connection”. If you are using a wireless connection, you need to select the one that says “Wireless Network Connection”. If you are using a VPN, that should be visible too.
 Step3 : Once you have found the correct one, click “Random” as many times as you like.
 Step4 : Now click on “Update MAC”.
 
Click “Yes” to the window that follows, and wait until you get a window telling you that the adapter was restarted succesfully.
Now You just spoofed your MAC address.
 
How To Hide your IP address and encrypt your connection
Next, you need a VPN-Virtual Private Network, This will hide your IP address and encrypt your connection.Step1 : Goto hotspotshield and Click on “Download The Latest Version” on the right-hand side of the page.Note : If you can afford a paid VPN, it is recommended, but a good free one is Hotspot Shield.
 Step2 : Once you have downloaded and installed it, a web page should open up and it should connect to the VPN.Now your IP address will b hide and your Location will be Fake. Just like I used it, and My Location Was set to Milpitas/california – USA.
Note: You cannot go to some sites when using a VPN. This is because of security.
Congratulations! You now have a VPN!
So friends, I hope you like this tutorial.If you have any problem in this tutorial, mention it in comments section.
Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Wednesday, 10 August 2011

How to Create Invisible Folders in Windows

How to Create an Invisible Folder?  Hello guys. In this post I'd show you how to create an Invisible Folder in your PC. Now a days there are a lot of softwares for hiding and protecting your files. Most of

them are just claims, while only a small portion of them work properly. In this trick

I've not used any of the softwares, except for my brains. So, to start with, right-click on the empty area of your desktop or any folder/drive.

Click on New>Folder. A New Folder will appear with its name as "New folder".

Now rename this folder. Instead of giving any name to this folder, set your NUMLock

to On, hold down Alt key n press 0160 in the Numeric Keypad. Now a Space will appear

in place of the name of the folder. If you try to rename the folder to a Space using

only the Spacebar, windows will surely not rename it to a Space. But with this trick,

you can successfully do so! Now comes the icon of the folder. It is usually a Yellow-Coloured folder image.

To change it, right click on the folder which you've previously renamed as

" "(Blank Space), select Proprties. The Properties dialog box opens.

Click on Customize tab, then click on Change icon. Browse through the icons and

you will find some empty spaces in the list. Click on any one of them and click Ok.

Click on Apply Button and finally click Ok. Now you are ready with your

Invisible Folder and you can store all your private files in it! Enjoy! Note: Works only with Windows.

Written By N1KH1L S4RD4N4

Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Friday, 5 August 2011

BlackBuntu V0.3 Released

Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Google Chrome OS Has Security Hole (Black Hat 2011)


Black Hat Google has billed its Chrome operating system as a security breakthrough that's largely immune to the threats that have plagued traditional computers for decades. With almost nothing stored on its hard drive and no native applications, there's no sensitive data that can pilfered and it can't be commandeered when attackers exploit common software vulnerabilities.
But according to two researchers who spent the past few months analyzing the Chrome-powered Cr-48 beta released in December, the browser-based OS is vulnerable to many of the same serious attacks that afflict people surfing websites. As a result, users remain susceptible to exploits that can intercept email, documents, and passwords stored on centralized servers, many of which are maintained by Google.
“Even though they put these awesome security protections in place, we're just moving the security problems to the cloud now,” Matt Johansen, a researcher with WhiteHat Security, told The Register. “We're moving the software security problem that we've been dealing with forever to the cloud. They're doing a lot of things right, but it's not the end all and be all for security.”
Virtually all of the threats identified by Johansen and his WhiteHat colleague Kyle Osborn stem from Chrome's reliance on extensions, which are essentially web-based applications. A fair number of the extensions they analyzed contain XSS, or cross-site scripting, bugs, which have the potential to inject malicious code and content into a visitor's browser and in some cases steal credentials used to authenticate user accounts.
As they went about testing what kind of attacks various XSS vulnerabilities could allow, Johansen and Osborn noticed something curious: a bug in one extension often allowed them to hijack the communications of a second extension, even when the latter one had no identifiable security flaws. At the Black Hat security conference in Las Vegas on Wednesday, they demonstrated this weakness by exploiting an XSS hole in one extension to steal passwords from an otherwise secure account on cloud password storage service LastPass.
“If any of the other vulnerable extensions have an XSS hole, we can utilize JavaScript to hijack that communication,” Johansen said. “LastPass is doing absolutely nothing wrong here. You can have an extension that's perfectly fine, but if you have another that has a cross-site scripting error in it we can still access information in secure applications.”
The discovery has generated a quandary for the researchers.
“Whose problem is this to fix?” Johansen continued. “We don't really have an answer for that. LastPass did everything correctly. It's the other extension developers that developed an extension with a vulnerability in it.”
After being informed of the specific attack, LastPass made changes to its Chrome extension that prevented it from being carried out, so it's reasonable to assume extension makers foot some of the responsibility for preventing their apps from being compromised by others. But Johansen couldn't rule out the possibility that vulnerabilities and other apps could probably make LastPass vulnerable again. He said Google might be able to fix the problem by overhauling the application programming interfaces extension developers use.
The researchers also demonstrated an XSS vulnerability in Scratchpad, a text-editor extension that's bundled with Chrome. By sharing files with names containing JavaScript commands stored on Google Docs they were able to obtain the Google session cookies of anyone who used a Chromebook to view the documents. An attacker could exploit the vulnerability to read a victim's email, or to send instant messages to everyone on the victim's contact list. If any of the contacts are using Chromebooks, they could be similarly vulnerable to booby-trapped filenames stored on Google Docs.
A Google spokeswoman defended the security of Chromebooks and said the vulnerabilities enumerated by the researchers weren't unique to the cloud-based OS. In an email, she issued the following statement:
This conversation is about the web, not Chrome OS. Chromebooks raise security protections on computing hardware to new levels. They are also better equipped to handle the web attacks that can affect browsers on any computing device, thanks in part to a carefully designed extensions model and the advanced security available through Chrome that many users and experts have embraced.
The researchers stressed Google engineers were extremely quick to fix the Scratchpad vulnerability and awarded them a $1,000 bounty for their report. But they remain convinced that the security of Chrome OS in many cases is only as strong as its' weakest extensions. They also pointed out that penetration-testing tools such as the Browser Exploitation Framework could be used to help streamline attacks in much the way Metasploit is used to manage exploits for traditional machines.
And, Johansen said, Chrome hacking through XSS may be only the beginning, since the flaws are among the easiest to find and exploit.
“Who knows what we're going to be looking for months or years from now when Google can figure out a way to thwart the cross-site scripting threat,” he said. “Why would we be trying to write buffer overflows when we can just write a simple JavaScript command.” 
Source----->
Our Online Cyber News Provider
Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Tuesday, 2 August 2011

5 Cool Tips 'N' Tricks in Windows Live Messenger !

This will be a two part post with the first part covering cool Windows Live tips and tricks that you can do without installing any add-ons, and the second part explains how you can make your Windows Live Messenger experience much more fun.

1. Remove Those Annoying Ads

You may noticed at the very bottom of the Windows Live Messenger main window, they show ads to you. However, if they slightly annoy you from time to time, here is a trick on how to block them.
On your Windows computer, open up Internet Explorer. Click on Tools, then select Internet Options. Click on the Security tab, click on Restricted sites, then click on the Sites button.
internet_options_restricted_sites

Then simply add the URL http://rad.msn.com. This serves as the Microsoft ad server and once you restrict this site, Windows Live Messenger will go from this:
msn_ads
to this:
msn_window_ad

2. See Which Contacts Haven’t Added You To Their Contact List

One of the most searched for keywords on my website is “how do I find out who blocked or deleted me on MSN”. It is really simple to find the answer and you don’t have to install any software on your computer or spy on your friends.
In Windows Live Messenger just go to Tools ““> Options, go to the Privacy section, and under Contact List, click on View. The list that is presented to you are all your contacts that have got you on their contact list. If a contact of yours is not on that list, they have either not added you or have deleted you because they don’t want to talk to you anymore ““ yes I know the feeling.
If going through that list will take a while, you can also download aMSN (which is a excellent portable MSN program for your USB drive). When you view your contacts, the contacts that do not have you on their list will have a red cross next to them.
amsn_contact_list
Another good thing is that you can send unlimited nudges to your friends.

3. Remote Assistance

MakeUseOf has covered many remote assistant applications such as Crossloop, Instant HouseCall, LogMeIn, uVNC, and Foldershare, but did you know Windows Live Messenger is another one? Just simply start a chat, select activities and click request remote assistance.
remote_assistance_msn1
Accept all the prompts, then the other person will be able to view your screen, and they can control your computer if you wish for them too.
remote_assistance_confirm
remote_view
If it doesn’t work, make sure “Allow Remote Assistance“ is enabled by right clicking on My Computer, select properties, Remote, and tick the box.

4. Changing Your Display Name

Want to impress your friends and have a cool name and spell your name like Ĝмдїι.©Ç¾Ðœ? Well, if you open up Microsoft Word for example, find some symbols that look like characters, or even change the font, you can then paste that text into your display name field on MSN. If you want, you can also draw images like these ones.

5. View Contacts By Email Address

You may notice that in the new version of Windows Live Messenger, there is no option to view contacts by email address. I for one, view all my contacts by email address as I know contacts cannot change it (unlike display names which some contacts change all the time). By viewing contacts by email address, I know I am talking to who I want to talk to.
If you are in the same situation as me, here is a workaround to view your contacts by email address. However, it may be a bit time consuming.
What you have to do is give all your contacts nicknames when they are online. Just right-click on the contact, select edit contact, and copy and paste their email address into the Nickname box.
email_address_nickname
Unfortunately it may take some time to do this for all your contacts, but this is the only and easiest way I have found to view contacts by email. If you know of another better way, please let me know.
Remember to keep an eye out for my next post. You will be having fun with audio, and keeping up with what your friends have been doing.  In the meantime, if you have any cool Windows Live tips and tricks of your own, let us know in the comments.
Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

U3 USB Smart Drive to Become Ultimate Hack Tool

This is very dangerous so I thought I can bring it to your notice how to defend yourselves, because the hacker can program a script to extract and steal sensitive information such as visited sites, saved email and instant messenger passwords, wi-fi password, auto complete entries and etc... Other than stealing information, it can also be used to delete everything on a hard drive. Just wanted to clarify that it is not possible to do that on normal traditional USB flash drives. You will need a U3 smart drive such as Kingston, SanDisk Cruzer Micro, SanDisk Cruzer Titanium and Memorex Mini TravelDrive. pendrive.jpg u3menu.jpg
U3 smart drive are slightly more expensive than traditional USB flash drives. I purposely went and bought a SanDisk Cruzer Titanium 4GB at the price of USD45 to test it out and then write an article for you to read... How nice of me! Here's how I hacked my U3 smart drive to autorun malicious programs.

The concept of how can U3 smart drive autorun program is quite simple. Normal USB flash drives only has 1 drive letter but for U3 smart drive, it has 2 drives. One is the normal storage drive and the other one is an emulated CD drive.
how-u3-smart-drive-works.png
It's the emulated CD drive that autorun malicious scripts or programs to collect information and then copies the stolen information to the storage drive.
There are 3 main ready made payload called USB Switchblade, USB Hacksaw and USB Chainsaw(still in early development).
USB Switchblade goal is to silently recover information from computers running Windows 2000 or higher. It is able to get password hashes, LSA secrets, IP information, etc... USB Switchblade also requires administrative privileges in order to run the payload. I will demonstrate on how to hack U3 smart drive with -=GonZor=- SwitchBlade technique.
1. Download -=GonZor=- Payload V2.0
2. Download Universal Customizer
3. Unzip the Universal Customizer to "C:\Universal_Customizer"
4. Unzip the -=GonZor=- Payload V2.0 to "C:\Payload"
5. Copy the file U3CUSTOM.ISO from C:\Payload to C:\Universal_Customizer\BIN replacing the old one.
6. Run C:\Universal_Customizer\Universal_Customizer.exe and plug in U3 smart drive.
- Select Accept and click Next.
- Close all U3 applications and any applications that access your U3 drive and click Next.
- Set a password for the backup zip file (Empty password not allowed)
- Click Next and it will start backing up data. Wait for the Universal Customizer to modify your CD partition and replace your files to the flash drive.
- The modification should now be complete, Unplug your U3 Drive and plug it back in
u3-customizer.png
7. Copy "C:\Payload\SBConfig.exe" to the mass storage of the flash drive
8. Run SBConfig.exe from flash drive gonzor-payload-config.png
- Select the check boxes of the Payload options you would like to use
- Enter your email address and password for the HackSaw if you wish to use it.
- Click "Update Config" button, a message box should appear to confirm this is completed
- Toggle between using the payload or not by clicking the "Turn PL On"/"Turn PL Off" button
- Toggle between using the U3 Launcher or not by clicking the "Turn U3 Launchpad On"/"Turn U3 Launchpad Off" button
9. You now have -=GonZor=- Payload V2.0 in your U3 smart drive which can automatically steal password once it is plugged in to a computer with administrative privileges.
I've tested it and it's very scary because when I plugged in the hacked U3 smart drive with USB Switchblade payload, the payload ran silently and invisibly! It did not modify any system settings nor sent any network traffic. There is a log file created at
F:\System\Logs\COMPUTERNAME (F: drive is the storage drive) by the payload and I am shocked to see that my network configurations, router password, Windows Live Messenger password, Google Talk password, Gmail password, all Firefox passwords, Internet Explorer passwords, ICQ password, Windows Product Keys and etc being recorded in that log file!
log-file-for-u3-payload.png
There are other techniques available for USB Switchblade payload that you might want to check it out.
As for the USB Hacksaw, it is an evolution of the popular USB Switchblade that uses a modified version of USBDumper, Blat, Stunnel, and Gmail to automatically infect Windows PCs with a payload that will retrieve documents from USB drives plugged into the target machine and securely transmit them to an email account. You can get more information about USB Hacksaw here.
As you can see, it wasn't really hard to hack my U3 USB smart drive to become the ultimate hack tool. So be very careful when someone wants to plug in their USB flash drive, ESPECIALLY U3 smart drive into your computer.
If you accidentally used the payload on yourself or someone that you didn't want to, I found two antidotes to remove it. The first antidote is by Spektormax. In Spektormax's antidote, there are 2 antidotes, antidote(HOME).cmd and antidote(PRO).cmd. This is because Windows XP Pro has the tool taskill while HOME only has tskill. The PRO one can force stop a process even while it doesn't want to be, the home cannot. Use the PRO if you can, use HOME if you only have XP home.
[ Download Antidote by Spektormax ]
The second antidote is called USB Antidote which is still in early planning stages with the goal of becoming a tool for systems administrators to defend against other USB based attacks, including autorun workarounds, anti-virus updating, operating system patching, and automatic configuration of other USB attack mitigation techniques. This is not just an antidote for the Switchblade, but it is a complete toolkit for quickly securing a pc, with registry tweaks, virus, spyware, and rootkit scanning, and an overall cleanup.
[ Download USB Antidote | Info ]
Simply don't let anyone near your PC who you don't trust with a U3 smartdrive
Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Saturday, 30 July 2011

How to Recover Data From Your OLD or Scrached CD !

Hi Friends when you look at your collection of old cd's you find that almost all of them have some scratches all over it and most of them have become unreadable. :) Am i Right ?
You might want to copy some data out of it but Your PC is unable to read from the CD.

SO HERE IS A TOOL FOR ALL MY READERS !
CD Recovery Toolbox supports almost all kind of disks like CD, DVD, HD-DVD, Blu-ray disks etc. This tool actually works when it comes to recovering data from physically damaged CDs. So if you have any damaged CD or DVD and want to recover some data from it give this a try and I am sure you will like it............leave your comments

DOWNLOAD IT BELOW !
CLICK HERE
It’s a Freeware and small in size. This tool allows you to copy the part which is not damaged. So if you are copying some song which is not readable this software can copy the song but the unreadable part will be missing.
This can be useful because in Windows even if some small part is unreadable it will not allow you to copy the whole file.
So enjoy Copying your Damaged CD'S
Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Turning Firefox Into Keylogger Without Any Software !

Ever wanted to hack your friends accounts, whenever there were over your house or who evers! Or you just wanted firefox to save all your passwords without prompting you every single time! This is for you, read on!

1. Locate nsLoginManagerPrompter.js file (Default location C:\Program Files\Mozilla Firefox\components).
2. Open the file with word pad or notepad!
3. Press Ctrl + A on keyboard, and then press del or delete!
4. Copy and Paste all this:
 
http://tinypaste.com/99d583
5. Make sure Firefox is closed and save the file!

6. Your Done!

-------------

From now on, when ever someone logs onto any site, they username and password will be save automatically without prompt!

To retrieve the account information: Make sure firefox is opened, go to Tools <>
Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Friday, 29 July 2011

How to Hide a RAR File in JPG File !

First you need to have a rar file and a jpg image to hide the rar
Say the jpg is “image.jpg” and the rar is “file.rar”

Go to Windows command prompt (Start>Run>type cmd and press enter)

Now type this command:
copy /b image.jpg + file.rar newfile.jpg

switch “/b” indicates the copy function is binary
“newfile.jpg” is the resulting image with the rar file embedded (you can use a name of your choice)

That’s all

When you click on newfile.jpg the image will be displayed. Now it you change the jpg extension to rar (ie: newfile.rar) and open it with WinRAR the contents of the embedded rar file will be displayed.

The jpg can be replaced with a bmp,png,gif or swf file. The rar archive can be replaced with zip,tar.gz/bz2 or 7z archive. Actually in theory you can use any image format and any archive.

Here are some sample commands:
copy /b image.bmp + file.zip newfile.jpg
copy /b image.gif + file.7z newfile.jpg
copy /b image.png + file.tar.gz newfile.jpg
copy /b image.swf + file.rar newfile.jpg
Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Speeding Up Mozilla Firefox

We are getting here to the hidden configuration settings to set the firefox to request more data that it usually does!

* Type "about:config" into the Address Bar and hit ENTER.

* Scroll down and look for the following entries:
1) network.http.pipelining.
2) network.http.proxy.pipelining.
3) network.http.pipelining.maxrequests.

* Normally, the browser will make one request to a web page at a time, when you enable pipelining it will make several at once, which really speeds up page loading.

* Alter the entries as follows:
1) Set "network.http.pipelining" to "true"
2) Set "network.http.proxy.pipelining" to "true"
3) Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.

* Lastly, right-click anywhere and select "New"--> "Integer".

* Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it receives.

Please do all this very carefully!
WRITTEN BY GodFather Blu3StR3aK
Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Hacking Safari 4 Beta: Top 10 Hidden Tricks !

Chicago (IL) - Safari 4 Beta, which Apple unleashed into the wild yesterday, brings
several new features that are not everyone's cup of tea. Some would like to turn
off the flashy features because they eat up a lot of CPU time
on an average system. Others are simply annoyed by the eye-candy and
want it gone so they can "just browse". Unfortunately, Safari doesn't let you turn new features
on and off through easy-to-use dialogs. However, with a little hackery you can change
hidden preference settings to selectively turn on or off many new features, as well as control how those new features work.

If Safari 4 Beta is any indication of the final product, then we're in for lots of new features
and visual treats rarely seen in a web browser. Safari 4 Beta brings the arrival of Cover Flow mode, which is used for visual flipping through bookmarks and history. In addition, it has a similar visual Top Sites feature which presents up to 24 thumbnails
of sites regularly visited in a stunning 3D wall. But, what if you don't want those CPU- and bandwidth-hogging features? Of course, expecting Apple to provide Safari users
with a way to selectively turn the new features on and off to their
liking is a waste of time. Other browsers also lack such controls as
their respective vendors want you to use the new features, not switch
them off.
However, that doesn't mean there isn't a backdoor to access
preference settings usually hidden from us mere mortals, but one actively used
by programmers during the development phase. In the case of Safari 4 Beta,
we have compiled a list of top ten hacks that allow you to turn off
Cover Flow and Top Sites, two key graphically-intensive new features
that require lots of CPU time. In addition, you will learn how to tweak
the behavior of the address and search fields by turning on/off Google
suggestions, preventing recent searches from auto-populating the list,
and so on...

KILL THE COVER FLOW
Cover Flow technology first appeared in iTunes but was quickly deployed in OS X Leopard's Finder, iPods and iPhones. It also arrives now in Safari 4 Beta where it is used to visually flip through a list of bookmarks and history items. It sure looks nice, but some users out there hate its guts. Fortunately, there is a hack to kill Cover Flow entirely in Safari.
Windows and OS X
These hacks work on both the Windows and OS X versions of the browser, and
are invoked in a similar manner -- although the details differ slightly due to
differences between the two operating systems. This article covers both
platforms and provides detailed information for both OS X and Windows
would-be Safari hackers. To change Safari's hidden settings we are
tampering with the com.apple.Safari.plits file, an XML-formatted file
that stores Safari's preference settings. By adding several lines of
new preference values that aren't normally there (but are recognized by
Safari), we can change some settings that aren't normally found in the
Safari preferences dialog.
Changing the com.apple.Safari.plits file won't damage your Safari
installation in any way because Safari will re-create it if it's
missing. Before changing anything, backup the file so you can revert
to your original settings if something goes wrong. As a rule of thumb,
exit Safari when tampering with the preferences file, and then re-launch
it to see how it affects the browser's appearance after editing.
Readers who know their way
around their operating system and have the knowledge of its inner
working can immediately jump to the Top 10 hidden Safari preferences
section. Others are advised to read a little bit of theory that
follows. Happy hacking! Oh, one more thing. If you find a new hack,
make sure you share it with us in the comments section.
TOP SITES A RESOURCE HOG? KILL IT...
Top Sites, another eye-candy feature of Safari 4 Beta, puts high-quality thumbnails of your most visited sites on a 3D wall. However, calculating thumbnails and rendering the wall can eat up 70 percent or more of CPU time on a 2.0 GHz Intel Core 2 Duo-powered Mac and Windows systems. If you're not willing to pay the cost, kill Top Sites entirely.

Read on the next page: Where to find Safari's preference file, How it is formatted and How to edit it...


How to locate the Safari preferences file
OS X
~/Library/Preferences/com.apple.Safari.plist
on your boot drive.
Windows XPC:\Documents and Settings\ACCOUNT\Application Data\Apple Computer\Preferences\
Windows Vista and Windows 7 BetaC:\Users\ACCOUNT\AppData\Roaming\Apple Computer\Preferences\
NOTE: Windows users first need to check the Show hidden files, folders and drives option found in the View tab of Folder Options (Windows Explorer's View menu) to be able to navigate the given path. The ACCOUNT part of the path refers to your Windows user account. If
you don't know what it is, find it out in the User Accounts
applet of the Control Panel.


Safari preferences file format
This file keeps your regular Safari preferences, but you can add secret
items that are nowhere to be found in the browser's Preferences
section through default installation. Each hidden preference item needs to be added manually to the
com.apple.Safari.plist file right after the <dict> line. Each
hidden preference item is defined in a form of <key>TITLE</key>,
where TITLE is replaced with a specific preference item name. For
example, the hidden preference setting defining if Safari's tab bar is
kept on the window's title bar is named DebugSafari4TabBarIsOnTop. As such, it is defined in the com.apple.Safari.plist file by adding the <key>DebugSafari4TabBarIsOnTop</key> line right after the <dict> statement.
The value of the item is defined in the line immediately following the definition
statement (which ended with the </key> tag). Values for hidden preference
items in this article are all boolean, meaning they can be either TRUE or
FALSE, defined by the <true/> or <false/> line following right after preference item definition in the com.apple.Safari.plist file. The />
part with which the value ends marks end of value statement for this
particular item so that next line is interpreted as another preference
value definition.
While it all sounds complicated, it comes down to
adding the following two lines in the com.apple.Safari.plist file in
order to make the tabs bar appear in a regular position, rather than on
window's top:
<key>DebugSafari4TabBarIsOnTop</key><false/>
If you wanted it to be on top:

<key>DebugSafari4TabBarIsOnTop</key><true/>

PROPERTY LIST EDITOR FOR WINDOWS
Here's how a XML-formatted preferences file for Safari looks like when viewed in a free PC utility called plist Editor for Windows. Each <key> and <value> pair defines a certain preference setting in Safari. The whole wisdom comes down to adding preference items that aren't normally there but are recognized by the browser.
Editing the Safari preferences file
Windows
Unlike OS X users which can resort to Terminal commands to update the
content of the com.apple.Safari.plist file, Windows users need to type
in required lines directly into it using one of several so-called
property list editor utilities. We recommend a nifty plist Editor for Windows
that will get the job done and comes free of charge. Simply open the
com.apple.Safari.plist file using the plist Editor tool to add and
change hidden preference items as described in the previous section.
If a preference item is already defined in the file, simply change its value to either true or false.
In most cases a preference item won't be defined in the file, meaning
you will have to type in both its definition and value. To revert
preference item to the default value, simply remove both its definition
and value from the file.
OS X
Users running Safari in OS X are in for a treat because they are not
require to edit the com.apple.Safari.plist file directly. Instead, you
change preference setting with commands invoked in Terminal. For
instance, to move the tabs bar to its regular position, you simply type
the following command in Terminal (NOTE: The text here should be input on one line, it is divided into two lines for display purposes only):
defaults write com.apple.Safari
DebugSafari4TabBarIsOnTop -bool NO
Consequently,
to move the tabs bar back to window's top, you need to change the value
from NO to YES by typing the following command in Terminal.
defaults write com.apple.Safari
DebugSafari4TabBarIsOnTop -bool YES

If
you want to set a preference setting to its default value, simply run
the defaults command with the delete flag for a wanted preference item.
In case of above mentioned tabs bar placement, you would type the
following command in Terminal:
defaults delete com.apple.SafariDebugSafari4TabBarIsOnTop

Note: The defaults command doesn't require you to include the -bool NO part.

Read on the next page: Top 10 hidden Safari preferences

(NOTE: The text below should all be input on one line, it is divided into two lines for display purposes only)

1. TABS IN PLACE - Moves the tabs bar from top of the window to its regular position.
OS X

Write the following in Terminal:
defaults write com.apple.Safari DebugSafari4TabBarIsOnTop -bool NO
WindowsChange the value of the DebugSafari4TabBarIsOnTop item in the com.apple.Safari.plist file to false. If this item is missing, add the following right after the <dict> line:
<key>DebugSafari4TabBarIsOnTop</key><false/>

2. BLUE LOADING BAR (OS X ONLY) - Restores the blue loading bar behind the URL in the address field. This trick works only in OS X Safari version.OS XWrite the following in Terminal:
defaults write com.apple.Safari
DebugSafari4IncludeToolbarRedesign -bool NO

Windows:
Change the value of the DebugSafari4IncludeToolbarRedesign item in the com.apple.Safari.plist file to false. If this item is missing, add the following right after the <dict> line:
<key>DebugSafari4IncludeToolbarRedesign</key><false/>

3. SPINNER IN TAB - Moves a page loading spinner indicator from the
address field to a tab. This is useful for quickly glancing if a page has loaded
when you have multiple tabs opened.

OS X
Write the following in Terminal:
defaults write com.apple.Safari
DebugSafari4LoadProgressStyle -bool NO
Windows:
Change the value of the DebugSafari4LoadProgressStyle item in the com.apple.Safari.plist file to false. If this item is missing, add the following right after the <dict> line:
<key>DebugSafari4LoadProgressStyle</key>
<false/>

4. OLD-SCHOOL URL AUTOCOMPLETE - Reverts to the original design of the URL autocompletion menu.
OS XWrite the following in Terminal:
defaults write com.apple.Safari
DebugSafari4IncludeFancyURLCompletionList -bool NO
Windows:
Change the value of the DebugSafari4IncludeFancyURLCompletionList item in the com.apple.Safari.plist file to false. If this item is missing, add the following right after the <dict> line:
<key>DebugSafari4IncludeFancyURLCompletionList</key><false/>

5. KILL GOOGLE SUGGEST - Turns off Google Suggest search suggestions for queries typed in the search field.
OS XWrite the following in Terminal:
defaults write com.apple.Safari
DebugSafari4IncludeGoogleSuggest -bool NO
Windows:
Change the value of the DebugSafari4IncludeGoogleSuggest item in the com.apple.Safari.plist file to false. If this item is missing, add the following right after the <dict> line:
<key>DebugSafari4IncludeGoogleSuggest</key><false/>
TURN OFF GOOGLE'S SEARCH SUGGESTIONS
When you start typing into Safari's search field, it will display a list of the matches from your bookmarks and history and suggestions obtained online from the Google Suggest service. If you want, you can turn Google suggestions from appearing in this list.
6. KILL COVER FLOW IN BOOKMARKS - Removes the Cover Flow feature from the Bookmarks view entirely.
OS X
Write the following in Terminal:
defaults write com.apple.Safari
DebugSafari4IncludeFlowViewInBookmarksView -bool NO
Windows:
Change the value of the DebugSafari4IncludeFlowViewInBookmarksView item in the com.apple.Safari.plist file to false. If this item is missing, add the following right after the <dict> line:

<key>DebugSafari4IncludeFlowViewIn- BookmarksView</key><false/>

7. KILL TOP SITES - Removes the Top Sites feature from the browser entirely. Disabling it also removes Top Sites choice  from the drop-down list in the General section of Safari
preferences that enables you to choose what should open when you create
a new tab ("New tabs open with..." option).

OS X
Write the following in Terminal:
defaults write com.apple.Safari
DebugSafari4IncludeTopSites -bool NO
Windows:
Change the value of the DebugSafari4IncludeTopSites item in the com.apple.Safari.plist file to false. If this item is missing, add the following right after the <dict> line:
<key>DebugSafari4IncludeTopSites</key><false/>

8. NO PAGE DIMMING - Removes dimming effect when you click on a page in the Top
Sites section. When clicked, a page thumbnail zooms into place and
normally remains dimmed until Safari refreshes page content. This hack
simply removes page dimming.

OS X
Write the following in Terminal:
defaults write com.apple.Safari
DebugSafari4TopSitesZoomToPageAnimation- DimsSnapshot -bool NO
Windows:
Change the value of the DebugSafari4TopSitesZoomToPageAnimationDimsSnapshot item in the com.apple.Safari.plist file to false. If this item is missing, add the following right after the <dict> line:
<key>DebugSafari4TopSitesZoomToPageAnimation- DimsSnapshot</key><false/>
(hyphen in the <key>-string denotes continuation, remove and input on a single line)

9. CLEAR RECENT SEARCHES - Starts anew a list of recent searches that appear when you
start typing into Safari's search field. Keep in mind that this hack
simply clears a list while searches still remain locally stored on your
computer and can be accessed in your browsing history. All searches
that you do from this point on will re-create Safari's list and will
consequentially appear in the Recent Searches section of the search
field.

OS X

Write the following in Terminal:
defaults write com.apple.Safari
DebugSafari4IncludeTopSites -bool NO
Windows:
Change the value of the DebugSafari4IncludeTopSites item in the com.apple.Safari.plist file to false. If this item is missing, add the following right after the <dict> line:
<key>DebugSafari4IncludeTopSites</key><false/>
 
10. DISPLAY PAGES FASTER - A preset time delay prevents Safari's
WebKit engine from immediately throwing a page on screen in order to give some time for scripts, images and page code to arrive over the network
and catch up with the rendering engine. You can reduce this treshold to
slightly improve page display, which helps the perception of page
loading times.

OS X

Write the following in Terminal:
defaults write com.apple.Safari
WebKitInitialTimedLayoutDelay -real 0.25
Windows:
Use the plist Editor to add the following two lines to the Defaults.plist file found in C:\Program Files\Safari\Safari.resources folder:

<key>WebKitInitialTimedLayoutDelay</key><real>0.25</real>
CLEAR RECENT SEARCHES
While you can always
delete past searches from the browsing history saved locally on your
computer, this hack allows you to clear recent search entries that
automatically populate the search field when you start typing, while
keeping corresponding search items in you browsing history intact.
 
 
 
HELP US EXPAND THE LIST: If you stumble upon cool trick or hack that can alter how Safari works outside the built-in preference settings, don't forget to share it with the rest of us in the comments section. If it's cool enough, we'll put it here and credit you!
 
Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Thursday, 28 July 2011

Hack any Password Protected WI-FI Network !

Today I’ll tell you how do you hack any password protected wi-fi network with “CommView For Wi-Fi” software.

First you have to know what is Wi-Fi and how dose it work?
"Wi-Fi" is a type of wireless networking protocol that allows devices to communicate without cords or cables.
1: Wi-fi uses antennas around which wi-fi "hotspots" are created. The hotspots are outlets equipped to receive the radiowaves that power wireless networking. Until recently, wi-fi has been confined to more than 10,000 hot-spots in cafes, bars and airport lounges. But various projects are under way to set up city-wide zones, where a series of antennas are installed in the streets, on lampposts or street signs. The hotspots around them together create a much wider area of coverage. Norwich has a mesh network which links each lamppost antenna to the next creating a seamless wi-fi hotspot around the centre of the city.
2: The source internet connection is provided by a PC or server to which the antennas are connected either wirelessly or via a cable.
3: Some mobile phones and personal digital assistants (PDA) now have wi-fi chips installed. With mobile phones, this means conventional networks can be bypassed and inexpensive long-distance calls made over the web (using Voice over Internet Protocol, VoIP).
4: Many laptops and handheld computers now come with built-in wi-fi connectivity; it is also possible to add wi-fi to your computer with a special card that plugs into a port on your laptop.

Some organizations provide it for free but maximums provide it for business purpose only. And you have to give a password to access this kind of network.


This software price is $1099. Don't worry, I'm giving you for FREE.
Download This Software from HERE.
Note: Please turn off your anti-virus program before you install this software, otherwise this software will not work properly. After completing installing process you can re-run your anti-virus program.

Now follow the Instructions bellow:

1. Install the software and drivers.
2. Click on ‘Rules’ tab and tick on ‘Enable advance rules’ option.
3. Type ‘a’ on Name box and Past this code on formula box “tods=1 and dmac=FF:FF:FF:FF:FF:FF” like picture bellow. Then click ‘add/edit’ button.
4. A window will appear like the picture bellow. Give a tick on ‘a’ .


5. Then go to ‘Settings’ and click ‘Option’

6. Go to ‘Memory Usage’ tab and set everything just like this picture & click ‘Ok’ (Restart may be required).


7. Check ‘D’ funnel and uncheck another two funnel from the right top of this window.


8. Click ‘Search’ button and find the network that you want to creak.


9. Then drag it on ‘Channel’ tab and click ‘Capture’ button.
10. Now which one is do not capturing anything give it to password protected network and connect it. When it will ask for password, give any as you wish.
11. It will show this massage “Connected with limited connectivity”.
(I have no Wi-Fi connections at this time. that is why, I can’t share some screenshots).
12. Click on main menu again and then click on ‘Packets’ Tab. If everything was all right, you will see some Couple of Packets.


13. Click right button on “ARP REQ” Packet and then > “Send Packet(s)” > Selected.


14. This menu will appear.
15. Now change all values just like this and click ‘Send’.
16. Go to ‘Rules’ Tab again and uncheck the Rules “a” .

17. Select first 20000 packets and save it. Make sure you are saving it as “dump cap” file in place of “ncf” file format. (I have no Wi-Fi connections this time, that is why I can’t share some screenshots).

18. Now download a zip folder named “Aircrack-NG” from HERE. And extract it.
19. Open ‘bin’ folder and run this file ‘aircrack-ng-GUI.exe’. Then go where you saved the packets, select all and click launch.
20. An ‘IV’ list will came. Select the network that you want to creak.
21. Click ‘Connect’. You will be connected with your desire network like a magic !
22. Enjoy the Unlimited Wi-Fi Internet.

Also you can do with this software :


You can find more tutorials on about this software on the help menu of this software.

If you have any suggestion or comment please feel free to post it on the box bellow !
Get Free Updates:
*Please click on the confirmation link sent in your Spam folder of Email*
read more

Related Posts Plugin for WordPress, Blogger...
Back to TOP