welcome

Click here

Thursday, January 27, 2011

Internet Explorer all shortcuts keys

Internet Explorer all shortcuts keys

In Internet Explorer, you can use the combination of different keyboard keys to accomplish your routine task. With shortcut keys, you can speed up your surfing without lifting your hands from the keys; otherwise require a conventional mouse to select menus and buttons options. Basically keyboard shortcuts keys help you to save time and you can perform any tasks without leaving the keyboard keys.


Useful Internet Explorer shortcuts keys
CTRL+A Selects the all items on active page
CTRL+B Display the "Organize Favorites" dialog box
CTRL+D Add the active page to your favorites list
CTRL+F Display "Find" dialog box to search text on active page
CTRL+I Display the Favorites pane
CTRL+H Display the History pane
CTRL+N Use to open new Internet Explorer page
CTRL+P Use to print the active web page
CTRL+W Closes the active explorer window
CTRL+Tab Go to address bar of current explorer page
ALT+Home Use to open the home page of internet explorer
ALT+Left Arrow Go to previous page of active page
ALT+Right Arrow Go to next page of active page
ALT+A Go to Internet Explorer Favorites Menu
ALT+D Go to address bar of current explorer page
ALT+E Go to Internet Explorer Edit Menu
ALT+F Go to Internet Explorer File Menu
ALT+T Go to Internet Explorer Tools Menu
ALT+V Go to Internet Explorer View Menu
Tab Move forward between all items on active web page
F5 Refresh the active web page
F11 Press F11 key to view any webpage in full-screen view and then again press for normal view.
Press Ctrl+Enter Windows will automatically add both "www" and ".com". For example, if we type

Your Ad Here


google in an address bar and then press Ctrl-Enter, Windows will take us to the www.google.com

How to Delete URLs from your Browser

How to Delete Specific URLs from your Browser(Firefox & IE)




Sometimes a situation comes that we have to delete certain specific website address (url) only from the web-browser location or address bar say to preserve your identity. For example, you visited a certain website and don’t want your friends or others to know that you visited that site, then you have two methods to delete the website links either delete all the urls from the address bar or only the specific one(recommended).

In Firefox, you just need to move your mouse over the website entry and press Shift + Delete Key combination to delete the desired address from the history.





For Internet Explorer, follow the steps exactly as described bellow; do keep in mind this trick needs editing the registry and you need to be very careful with it:

1)Close any open Internet Explorer window
2)Go to Start->Run and type in regedit.exe and press enter to launch the registry editor
3)Navigate to the following key: HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerTypedURLs
4)Delete the desired URL

Give your Firefox a Google Chrome look

Give your Firefox a Google Chrome look



The recently launched Google Chrome has got much applauds for it’s cool looks. The Google branded browser has a nice soft blue interface that is pleasing to the eyes.




But I’m one of the many Firefox addicts who just can’t seem to use any other browser or there are people running Linux or Mac for whom Chrome has not yet been released. So can’t we guys have our Firefox wearing those Chrome like looks? Well actually you can skin your Firefox with Chromifox.


Chromifox is a bright and soft blue theme for Firefox 3, inspired by the appearance of the Google Chrome web browser. You can use it on Windows, Linux, and Mac OS X.

Download Chromifox.

Note: You need to have Firefox 3 to use this theme.

BackUp Your Mozilla Firefox

BackUp Your Mozilla Firefox Profiles With MozBackup





MozBackup is a simple utility for creating backups of Mozilla Firefox, Mozilla Thunderbird, Mozilla Sunbird, Flock, SeaMonkey, Mozilla Suite, Spicebird and Netscape profiles.

It allows you to backup and restore bookmarks, mail, contacts, history, extensions, cache etc. It's an easy way to do Firefox backup, Thunderbird backup.



MozBackup is compatible with:

Firefox 1.0 - 3.0
Thunderbird 1.0 - 3.0 Alpha 1
Sunbird 0.3 - 0.8
Flock 1.0 - 1.1
SeaMonkey 1.0a - 1.1
Mozilla Suite 1.7 - 1.7.x
Spicebird 0.4
Netscape 7.x, 9.x

This program is freeware and works on Windows 98/ME/NT/2000/XP/2003/Vista. It's developed in Czech republic.

Have a look :

Click here to download

How to reduce memory usage in Mozilla Firefox

How to reduce memory usage in Mozilla Firefox



Type about:config in the Firefox address bar

Search for browser.sessionhistory.max_entries

Double click on the value 50, change it to something lower, 5 should be good.

========================

What this means?


Averagely we surf less than 5 of the websites we previously surfed before, there is no need to use up that much memory (which is 50 by default).

========================

Google Chrome vs Mozilla Firefox 3

Google Chrome vs Mozilla Firefox 3

Google Chrome

Pros:It’s been called minimalist, and it’s not hard to see why. Chrome features a very clean design and works to maximize your screen real estate. The OmniBar acts as both an address bar and a search bar, potentially saving you precious clicks. Chrome uses independent tab management, meaning that each tab is its own process, and the result is that if one tab crashes, the whole browser doesn’t go down. In what might be the most important stat, it’s also the fastest of the three at loading webpages.

Cons:The only stat that kept us from calling the last one the most important hands down happens to be the one Chrome fares worst in – extensions. There are, oh, just about NONE, although in theory some will be developed eventually. One example of how the lack of extensions hurts Chrome is that its native rss handling leaves something to be desired, but unlike the other two browsers there’s no easy plug-in, add-on or extension to solve the problem. Yet. (If you’re looking for something else to complain about, don’t forget that Chrome’s data collection sends your info into the deep, dark depths of Google’s datavault.


Mozilla Firefox 3

Pros: Here, extensions are king. There are probably more extras for Firefox than you can count, and they’ve been developed and refined over the course of many years. Really, seriously, the browser was designed for this, and along with tabbed browsing, extensions are Firefox’s gift to the browsing world. Firefox also loads up webpages at a good clip, but if it’s not quite as fast as Chrome we’ll still call load time a pro since starting with version 3.1 they’ll be using a new JavaScript engine (Tracemonkey) that is actually much faster than Chrome’s (V8), which should help balance things.


Cons: The address bar and search bar are separate with Firefox, potentially adding clicks, as Firefox’s address bar has only a word-wheeling history searcher (Chrome and IE present internet search options as well). Firefox also eats up more of your memory and takes longer to load than Chrome, although it still beats IE by a good margin. As far as stability, Firefox uses group tab handling, which means if one tab goes down they all go down. There is also no way to browse privately, which Chrome (Incognito) and IE (InPrivate) both can do easily.

Microsoft Internet Explorer 8 (Beta)

Pros: It seems like ever since Firefox emerged as a legitimate challenger to Internet Explorer, the browser has been playing catchup. One way in which it has caught up quite a bit is with extensions, and there is now a large gallery of choices for IE users to pick from. The address bar is like Chrome’s, but there is still a separate search bar too if that’s somehow easier for you. Unfortunately it defeats the purpose of saving real estate for other things, but maybe it’ll still save you a click and at least it won’t frighten you with change. As always, the biggest pro with IE is that the vast majority of web users browse with it, which means designers and developers will cater heavily to it.

Cons: IE absolutely devours your memory compared to Firefox or Chrome, and is slower to load pages too. On a fast machine the difference is small, but in particular on older machines the contrast shows. We mentioned the address bar as a loose pro, and to balance it out we’ll mention the tab architecture as a loose con. IE uses a degree of individual tab handling, but manages to retain enough overlap that if there is a crash on one tab the whole browser could still be threatened.


Conclusion:
On a fast machine in ideal conditions all three browsers work well, but there is a clear divide between these browsers in terms of focus. Chrome is ideal for light tasks, with a clean and simple interface and a better speed for booting up and loading webpages. Firefox is ideal for more complex tasks, sacrificing a little speed to be able to handle extensions and working better with JavaScript. Internet Explorer, although much improved, is still just for the multitudes either not savvy enough or unable to change their browser, as it is equal in the best circumstances and inferior in all the others. In the end, you just need to decide which pros are best for you.

Tips to use Pop up Blockers

Tips to use Pop up Blockers

Pop-up window messages basically used for online advertising to increase the web traffic with minimum cost, but these pop-up messages can be used to damage a computer or also for hacking purpose. In routine when you are browsing the internet and suddenly a new window pop-up dialog box display with different messages for example" speed-up your internet ","free upload your files or images". All pop-up messages are not dangerous for you but some unwanted program and website that might be disturb your computer performance.






There are many free pop-up blocker software's available in market but always download it from well-known sites. Simply Download Google toolbar and install it to use its feature "Block annoying pop-up" to block the pop-up messages, You can say this is simple and best way to block unwanted program.


If you are working with Internet Explorer and want to block the pop-ups windows and unwanted messages. Open the Internet Explorer and click on Tools menu and go to Pop-up Blocker option, here you can Turn Off Pop-up Blocker to block pop-up from all websites. But you have option to allow some websites for pop-up. For this purpose open the Pop-up Blocker Setting. Here you can add some specific websites name to allow for pop-up and click Add. If you feel any problem to block any pop-up message due to some problem, simply click on the X at the right top of the pop-up windows.

Internet Explorer Multiple Homepages

Internet Explorer Multiple Homepages



Many web browsers like Mozilla Firefox but now Internet Explorer 7.0 also allow you to set the multiple home pages. You can open all home pages at the same time; this is great option to open your favorite websites with a single click. But you have option to set single home page according to your need.

•Follow the given steps to set multiple home pages in Internet Explorer.

•First open the Internet Explorer 7 and go to the option Tools then click on Internet Options.

•Select the General tab, here you will get option "To create home page tabs, type each address on its own line" and type the URL in the Home page section.



•Type one URL in one line then press Enter to type another URL. Press Ok to finish.

Mozilla Firefox all shortcuts keys

Mozilla Firefox all shortcuts keys

In Mozilla Firefox, you can use the combination of different keyboard keys to accomplish your routine task. With shortcut keys, you can speed up your surfing without lifting your hands from the keys; otherwise require a conventional mouse to select menus and buttons options. Basically keyboard shortcuts keys help you to save time and you can perform any tasks without leaving the keyboard keys.



Useful Mozilla Firefox shortcuts keys
Shortcut keys Action
CTRL+A Selects the all items on active page
CTRL+B Display the "Organize Bookmarks" dialog box
CTRL+D Include the active page to your Bookmarks list
CTRL+F Display the "Find" dialog box to search text
CTRL+I Display the Bookmarks pane
CTRL+H Display the History sidebar of Mozilla Firefox
CTRL+N Use to open new Mozilla Firefox page
CTRL+P Use to print the active web page
CTRL+R Use to reload the active web page
CTRL+T Display a new Tab in active Firefox window
CTRL+U View the source code of active web page
CTRL+W Closes the active Mozilla Firefox window
CTRL++ Use to increase the font size of active page
CTRL+ - Use to decrease the font size of active page
CTRL+Tab Move to next Tab in Mozilla Firefox
ALT+Home Use to open the home page of internet explorer
ALT+Left Arrow Go to previous page of active page
ALT+Right Arrow Go to next page of active page
ALT+B Go to Mozilla Firefox Favorites Menu
ALT+D Go to address bar of current Firefox page
ALT+E Go to Mozilla Firefox Edit Menu
ALT+F Go to Mozilla Firefox File Menu
ALT+S Go to Mozilla Firefox History Menu
ALT+T Go to Mozilla Firefox Tools Menu
ALT+V Go to Mozilla Firefox View Menu
Tab Move forward between all items on active web page
F5 Refresh the active web page
F7 F7 activate the cursor to move with keyboard
CTRL+SHIFT+DEL Use to clear all Private Data history
CTRL+SHIFT+D Use to Bookmarks all Firefox Tabs
F11 Press F11 key to view any webpage in full-screen view and then again press for normal view.
Press Ctrl+Enter Windows will automatically add both "www" and ".com". For example, if we type google in an address bar and then press Ctrl-Enter,Windows will take us to the ........... www.google.com
Press Shift+Enter Windows will automatically add both "www" and ".net"
Press Ctrl+Shift+Enter Windows will automatically add both "www" and ".org"

Run Firefox inside Firefox

                           Run Firefox inside Firefox



Yup you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?

Not bad huh?

And its really easy too just type in this url in Firefox's address bar and there you go!

Firefox inside Firefox!

copy paste following url in a web browser (mozilla firefox).




chrome://browser/content/browser.xul

Monday, January 17, 2011

Hide ur drives

Hide ur drives
How to Hide the drives(c:,d:,e:,a:...etc)
How to Hide the drives(c:,d:,e:,a:...etc)
This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.
1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer



Your Ad Here


Now in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again. Magic........lol....

Change the Default Directory of Software Installat

Change the Default Directory of Software Installat 



You may want to change the location of your system default folder (C:Program Files) from C drive to another system drives (D or E drive). By default software setup will attempt to install program in C:Program Files directory. It is good practice to make the backup of the installed programs, if you installed all your programs in other than C drive. If you have little knowledge about editing windows registry then you can configure your computer for this purpose.

Follow the given steps to configure windows registry:

1. Click on Start button then type Regedit in Run option.

2. Here navigate to: HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion

3. In right side panel, double click on ProgramFileDir.

4. Now modify the value to any other drive (for example D:Program Files).



Now close the registry editor and restart your computer after any changes to go into effect.

How To Enable Task Manager

How To Enable Task Manager.....


Click Start
Click Run
Type REGEDIT
Click OK The Registry Editor will now open
Browse to the following key:
HKEY_CURRENT_USE>Software>Microsoft>Windows>
CurrentVersion>Policies>system

In the right pane, look for the value: DisableTaskMgr

Right click DisableTaskMgr and select Delete. (When prompted with "Are you sure you want to delete this value", select Yes.

Close the Registry by choosing

You should now be able to access Task Manager. If not, reboot into Safe Mode and repeat the steps outlined above.


=====================================================
WHEN VIRUS ENTERS THE PC, IT DISABLES TASK MANAGER.....

THIS IS VERY HELPFUL @ THAT TIME......

Run Commands In Windows XP

Run Commands In Windows XP

You can access all these programs by going through START/RUN or
Simply Click Windows Key+r

1. SQL Client Configuration - cliconfg
2. System Configuration Editor - sysedit
3. System Configuration Utility - msconfig
4. System File Checker Utility (Scan Immediately)- sfc /scannow
5. System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
6. System File Checker Utility (Scan On Every Boot) - sfc /scanboot
7. System File Checker Utility (Return to Default Setting)- sfc /revert
8. System File Checker Utility (Purge File Cache)- sfc /purgecache
9. System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
10. System Information - msinfo32.


11. Task Manager – taskmgr
12. System Properties - sysdm.cpl
13. Task Manager – taskmgr
14. TCP Tester - tcptest
15. Telnet Client - telnet
16. Tweak UI (if installed) - tweakui
17. User Account Management- nusrmgr.cpl
18. Utility Manager - utilman
19. Windows Address Book - wab
20. Windows Address Book Import Utility - wabmig
21. Windows Backup Utility (if installed)- ntbackup
22. Windows Explorer - explorer
23. Windows Firewall- firewall.cpl
24. Windows Magnifier- magnify

25. Windows Management Infrastructure - wmimgmt.msc
26. Windows Media Player - wmplayer
27. Windows Messenger - msmsgs
28. Windows Picture Import Wizard (need camera connected)- wiaacmgr
29. Windows System Security Tool – syskey
30. Windows Update Launches - wupdmgr
31. Windows Version (to show which version of windows)- winver
32. Windows XP Tour Wizard - tourstart
33. Wordpad - write
34. Password Properties - password.cpl
35. Performance Monitor - perfmon.msc
36. Phone and Modem Options - telephon.cpl
37. Phone Dialer - dialer
38. Pinball Game - pinball
39. Power Configuration - powercfg.cpl
40. Printers and Faxes - control printers
41. Printers Folder – printers
42. Private Character Editor - eudcedit
43. Quicktime (If Installed)- QuickTime.cpl
44. Real Player (if installed)- realplay
45. Regional Settings - intl.cpl
46. Registry Editor - regedit
47. Registry Editor - regedit32
48. Remote Access Phonebook - rasphone
49. Remote Desktop - mstsc
50. Removable Storage - ntmsmgr.msc
51. Removable Storage Operator Requests - ntmsoprq.msc
52. Resultant Set of Policy (XP Prof) - rsop.msc
53. Scanners and Cameras - sticpl.cpl
54. Scheduled Tasks - control schedtasks
55. Security Center - wscui.cpl
56. Services - services.msc
57. Shared Folders - fsmgmt.msc
58. Shuts Down Windows - shutdown
59. Sounds and Audio - mmsys.cpl
60. Spider Solitare Card Game - spider
61. Malicious Software Removal Tool - mrt
62. Microsoft Access (if installed) - access.cpl
63. Microsoft Chat - winchat
64. Microsoft Excel (if installed) - excel
65. Microsoft Frontpage (if installed)- frontpg
66. Microsoft Movie Maker - moviemk
67. Microsoft Paint - mspaint
68. Microsoft Powerpoint (if installed)- powerpnt
69. Microsoft Word (if installed)- winword
70. Microsoft Syncronization Tool - mobsync
71. Minesweeper Game - winmine
72. Mouse Properties - control mouse
73. Mouse Properties - main.cpl
74. Nero (if installed)- nero
75. Netmeeting - conf
76. Network Connections - control netconnections
77. Network Connections - ncpa.cpl
78. Network Setup Wizard - netsetup.cpl
79. Notepad - notepad
80. Nview Desktop Manager (If Installed)- nvtuicpl.cpl
81. Object Packager - packager
82. ODBC Data Source Administrator- odbccp32.cpl
83. On Screen Keyboard - osk
84. Opens AC3 Filter (If Installed) - ac3filter.cpl
85. Outlook Express - msimn
86. Paint – pbrush
87. Keyboard Properties - control keyboard
88. IP Configuration (Display Connection Configuration) - ipconfi/all
89. IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns
90. IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
91. IP Configuration (Release All Connections)- ipconfig /release
92. IP Configuration (Renew All Connections)- ipconfig /renew
93. IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns
94. IP Configuration (Display DHCP Class ID)- ipconfig/showclassid
95. IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid
96. Java Control Panel (If Installed)- jpicpl32.cpl
97. Java Control Panel (If Installed)- javaws
98. Local Security Settings - secpol.msc
99. Local Users and Groups - lusrmgr.msc
100. Logs You Out Of Windows - logoff.....
101. Accessibility Controls - access.cpl
102. Accessibility Wizard - accwiz
103. Add Hardware - Wizardhdwwiz.cpl
104. Add/Remove Programs - appwiz.cpl
105. Administrative Tools control - admintools
106. Adobe Acrobat (if installed) - acrobat
107. Adobe Designer (if installed)- acrodist
108. Adobe Distiller (if installed)- acrodist
109. Adobe ImageReady (if installed)- imageready
110. Adobe Photoshop (if installed)- photoshop
111. Automatic Updates - wuaucpl.cpl
112. Bluetooth Transfer Wizard – fsquirt
113. Calculator - calc
114. Certificate Manager - certmgr.msc
115. Character Map - charmap
116. Check Disk Utility - chkdsk
117. Clipboard Viewer - clipbrd
118. Command Prompt - cmd
119. Component Services - dcomcnfg
120. Computer Management - compmgmt.msc
121. Control Panel - control
122. Date and Time Properties - timedate.cpl
123. DDE Shares - ddeshare
124. Device Manager - devmgmt.msc
125. Direct X Control Panel (If Installed)- directx.cpl
126. Direct X Troubleshooter- dxdiag
127. Disk Cleanup Utility- cleanmgr
128. Disk Defragment- dfrg.msc
129. Disk Management- diskmgmt.msc
130. Disk Partition Manager- diskpart
131. Display Properties- control desktop
132. Display Properties- desk.cpl
133. Display Properties (w/Appearance Tab Preselected)- control color
134. Dr. Watson System Troubleshooting Utility- drwtsn32
135. Driver Verifier Utility- verifier
136. Event Viewer- eventvwr.msc
137. Files and Settings Transfer Tool- migwiz
138. File Signature Verification Tool- sigverif
139. Findfast- findfast.cpl
140. Firefox (if installed)- firefox
141. Folders Properties- control folders
142. Fonts- control fonts
143. Fonts Folder- fonts
144. Free Cell Card Game- freecell
145. Game Controllers- joy.cpl
146. Group Policy Editor (XP Prof)- gpedit.msc
147. Hearts Card Game- mshearts
148. Help and Support- helpctr
149. HyperTerminal- hypertrm
150. Iexpress Wizard- iexpress
151. Indexing Service- ciadv.msc
152. Internet Connection Wizard- icwconn1
153. Internet Explorer- iexplore
154. Internet Setup Wizard- inetwiz 

How to add Items to the Start Button using Registry

How to add Items to the Start Button using Registry




The best technique to edit the windows registry keys, always export or backup the whole windows registry keys on backup drive before editing. Because any mistake in Registry can cause serious problem in your computer to run properly.

Follow the given steps to change the Start button setting.

First click on Start button then type Regedit in Run option.

In Registry Editor go to left hand panel, and findHKey_Classes_Root/Directory/Shell

Here Right click on Shell folder option and add any new key with descriptive name and Press Enter.



Your Ad Here


Now Right click on that key and give the full path of that program you are interested to add in start button. For example if you want to add MS excel, then full path may be C:program filemsofficemsexcel.EXE.

Now close all open programs and check the changes in your computer Start button.

TO ENABLE REGISTRY....

TO ENABLE REGISTRY....



Your Ad Here





TO ENABLE REGISTRY....

If you have Windows XP Professional and access to an administrative user account, you could change the registry editor options in the Group Policy Editor.

1. Click Start, Run
2. Type GPEDIT.MSC and Press Enter
3. Go to-->* User Configuration-->* Administrative Templates-->* System


Your Ad Here


4. In the Settings Window, find the option for "Prevent Access to Registry Editing Tools" and double-click on it to change.
5. Select Disabled or Not Configured and choose OK
6. Close the Group Policy Editor and restart your computer
7. Try opening REGEDIT again
========================================

SECOND METHOD::::

DOWNLOAD THIS FILE......
http://securityresponse.symantec.com/avcenter/UnHookExec.inf
WHEN IT WILL BE DOWNLOADED, THEN RIGHT CLICK ON THIS FILE AND THEN CLICK ON "INSTALL"

{IT WILL RESET ALL SETTINGS OF REGISTRY....}

:::::::::::::::::::::::::::::::::::::::::

Tuesday, January 11, 2011

Important Security Tips

Important Security Tips 




Your Ad Here





1. Use anti-virus software:
Viruses spread rapidly and can damage or destroy your computer. New ones appear almost daily. It's critical that you install and update anti-virus software regularly. Use the program to scan all the files on your system once a week, deleting the infected ones.

2. Be wary of e-mail attachments:
A virus can hide in an attachment. Opening it will unleash the virus. Don't open an attachment from anyone you don't know. Even if you do know the sender, an infected attachment may have been surreptitiously sent from an infected machine. The safest thing to do is to scan the attachment with anti-virus software before you open it.



Your Ad Here


3. Install a firewall on your computer:
A firewall is a software program that blocks unauthorized access to your computer. This is particularly important if you have a broadband connection, such as DSL or a cable modem. Windows XP has a built-in firewall, so make sure it's activated if you use that operating system. If not, we recommend ZoneAlarm. You can download it for free for personal use from Zone Labs. Or better to use open source software "Comodo Firewall".

4. Protect your passwords:
Many online services, such as banking, brokerage and e-mail require the use of passwords. A secure password is the first line of defense against cyber-snoops. Use a different password for each account, don't divulge them to anyone and change them periodically.

5. Update security patches for your operating system and web browser:
You've probably read about security "holes" that turn up periodically. Once they are discovered, you can download fixes. For Windows users, an easy way to update your system is click on the Windows Update option under the Start menu.

6. Back up your data:
Make copies of your files in case they become corrupted, your system fails or your computer is damaged or stolen. Get in the habit of doing this regularly, at least once a week.

Hack This Website Test

If you really think you are a hacker, then

Go to 




www.hack-test.com


Reply with what level you are on

Top 15 Hacking Software


1. Nmap

I think everyone has heard of this one, recently evolved into the 4.x series.

Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.




Your Ad Here


Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.
Get Nmap Here

2. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework.

Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
Get Nessus Here

3. John the Ripper

Yes, JTR 1.7 was recently released!

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
You can get JTR Here

4. Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).

Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).
Get Nikto Here

5. SuperScan

Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.

If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.

Get SuperScan Here

6. p0f

P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:

- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.

Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
Get p0f Here

7. Wireshark (Formely Ethereal)

Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.

Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Get Wireshark Here

8. Yersinia

Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).

The best Layer 2 kit there is.
Get Yersinia Here

9. Eraser

Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.

An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.
Get Eraser Here

10. PuTTY

PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4×0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.
Get PuTTY Here

11. LCP

Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.

A good free alternative to L0phtcrack.

LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article
Get LCP Here

12. Cain and Abel

My personal favourite for password cracking of any kind.

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
Get Cain and Abel Here

13. Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.

A good wireless tool as long as your card supports rfmon (look for an orinocco gold).
Get Kismet Here

14. NetStumbler

Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.

NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:

Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized “rogue” access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.
Get NetStumbler Here

15. hping

To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.
Get hping Here

Profile of computers hacker

Profiles of Famous Computer Hackers

As it was mentioned before, the history of hacking is intermixed with the history of computers. Many of the famous computer hackers of the past are the billionaires of today. 




Your Ad Here





The most known hacker is Bill Gates, co-founder of Microsoft. Considered the richest person in the world for more than a decade, he became the most successful entrepreneur of the computer industry. His beginnings go back to the 1970's when he designed computer programs for the computer platforms of that era, and ended with the introduction of Windows in the world of personal computers.

After some time away from the media attention, Steve Jobs came back with the introduction of several new products in Apple. The most known of them is the iPod, which has revolutionized the music industry around the world. Jobs started nearly at the same time that Gates, founding Apple and introducing to the market the first home computer, the Apple II.

Although Linus Torvalds was known among the hacker community as the hero who created Linux, the open source operating system, it hasn't been until recent years that people started to wonder if there was another option apart from using Microsoft's operating system.



Your Ad Here


Profiles of Bad Hackers
Unfortunately, there are as many bad hackers as productive hackers. One of the most famous black hackers is Kevin Mitnick, who broke into the computers of several organizations, including Fujitsu, Motorola, Sun Microsystems and Nokia. He was imprisoned and even today can't use a computer due to a judicial restriction.

Another famous hacker is Vladimir Levin, a mathematician who led a group of Russian hackers and stole ten million dollars from Citibank. Until this day, no one knows how they did it.

Jonathan James case is a bit more complicated. He was the first juvenile from the teen hackers of the USA to be prosecuted for computer hacking. But that didn't stop him. Later, he was able to access the computer systems of NASA and the US Department of Defense. Finally, he was imprisoned.

Fraud for Sale
Years ago, before the coming of the internet, hackers around the world caused a lot of mayhem in organizations. But now that they have a potential market of hundreds of millions of persons, their options are almost limitless. That's why online fraud is considered one of the cancers of the internet. The only way to protect from it, is becoming an anti hacker ourselves, maintaining up to date with the most basic knowledge: firewall, antivirus, antispam, constant operating system updates and taking care of suspicious websites.

The effects of computer hacking in our history can't be denied. It is here and it won't disappear. But the most interesting thing about the history of hacking is that it was expected to happen. You only need to check old science fiction books to find it.

How to catch a hacker

Hacker's beware: A Crook is Caught One Day or the other




Your Ad Here





Hackers had broken into the Department of Defense's computers - again. With news like this, combined with the fact that other hackers are constantly seeking to steal people's identity, send out spam from innocent computers, and other computer crimes hacking into unauthorized places, makes it necessary for illegal hackers to be caught. If you are one of those who have suffered from a hack attack, then you may be one of those who say: "I need an IP specialist, to catch a hacker." This article will show you some things that you can do.



Your Ad Here


How Hackers Are Caught?
With the fact that Microsoft and some other software companies have been notified - yes, by hackers, that there are many "holes" in Windows that a hacker can take advantage of. Microsoft has responded by attempting to fix the "holes" each time one is pointed out. Then, it sends out a patch to block hackers from attacking through that "hole." Keeping up with the update's from Microsoft is one way to close down the problems that exist in the Windows software - though it is unknown if all such "holes" will ever be known.

Normally, it is rather hard to notice that a hacker has hacked into your computer. If all he is doing is having a look around, or taking minimum amounts of data - you really cannot be sure that you are being hacked. The are some effects of computer hacking, though, that might tip you off. Here are a couple of ways to detect hackers.

Detecting Hackers
Hackers, by nature are very stealthy. Their ability to gain access to your computer through the Internet can easily be done without your knowledge - and most of them seem to prefer that approach. Before time is spent on being able to detect a hacker, it should be noted that a determined hacker will not be stopped! They will get in - even to the Department of Defenses systems!

Some common things that might tip you off to an intrusion are:
-Lights showing hard drive activity being busier than what your own activities call for
-Suspicious files left on your computer - often in the Windows Temp directory with a tmp. suffix
-Obvious tampering - destroyed files, missing files, etc.
-Or, the worst case - someone's taking money out of your bank account or using your credit cards (Please note, though, that this could also be the result of phishing, too - not necessarily hacking)
-Your firewall keeps receives multiple packets from a single web address and notifies you.

CLICK HERE TO CONTINUE:-Facts about how to track a hacker 

History of hacking

Tips to become a hacker

Certainly there are many sources of information available that can give you computer hacking basics. There is actually some misconception about who a real hacker is. Hacking computers is performed by one who knows computers very well - even the extra tricks of a computer and electronics. He can easily tweak these according to his needs and become hacker. This is the way the term was used when Bill Gates was inventing Windows.




Your Ad Here





Those who are often referred to as hackers today, should actually be called "crackers" - people who do not have unauthorized access, like a safe-cracker. If you doubt me, and want to know how to be a hacker then do a search on the term "professional hacker," and you will find many professional and legitimate computer training courses being offered. They are the ones learning the real hacker secrets.

What Are The Basics Needed To Become A Hacker

Everyone has heard of one individual or another that was caught while hacking computers that belonged to this or that organization. Because hacking into computers is highly illegal, it should be mentioned that this article will not mention any real specifics about the subject, and this author would rather gladly encourage you to become a real hacker - professionally.



Your Ad Here


This article, will however, give a brief overview of criminal hackers, some of their methods, and a few things you can do to make your own computer safer from hack attacks. Here are those things you need to learn on how to become a hacker.

Learn Computers

It should go without saying that the first thing that is needed is to learn about computers. This means study. A lot of reading is involved along with just plain old-fashioned learning how to use a computer. Then, of course, there are the special aspects of computer study. The places where the tips are learned is often two-fold: a friend who has access to a computer, and a variety of places on the Web. But this is also an interesting thing - if a young person has the ability to learn, and wants to learn can use hacking tutorials- then why not take the time to learn the right things - things that can earn him a lot of money in the legit world? Is it possibly that it could be the friend he has that turns him away from the good?

Learn The Websites

Special hacker Web sites, where hackers congregate, exist on the Web - as does every other known group of people - whether legal or illegal. Some of these are known to be hacker chat rooms, hacker forum, and regular hacker sites.

Learn The Secrets

It is in these Web sites, and possibly some of the people that he may meet, maybe only online, where he will learn the hacking basics, and learn how to hack.

Tools Hackers Need To Get Into Websites

Some of the tools that a hacker may use are often varied and constantly changing. One such tool that was used last year allowed a hacker to gain control of the computers of those who simply mistyped the word Google - when trying to get the popular search engine. This automatically directed them to a special website that would give them such malware items as Trojan downloaders, backdoors and spyware.

Another tool would be the robot spider. These can be sent out and put on automatic and will look for ports of access into your computer. These spiders are running around all the time and some say that they may hit most computers that are online - up to 50 times a day.

Other tools use email attachments. It is claimed that as much as 65% of all email is spam. And as much as 1 in about 30 emails contains a virus, or some form of malware. This is why having your own virus and spam protection is a must, as well as a good spyware remover. Someone is busy. Once someone has been hacking information on a computer they will often leave a Trojan file that will give them further access - often more than one file. Then they could use your computer to send out spam attacks - without you even knowing that it is taking place. Or, they could simply be hacking your personal information off of your computer. These are just a few of their tools.

How Hackers Avoid Getting Caught

One of the first things that someone would learn about hacking tutorials when studying to be a hacker is how to cover their tracks. Of course, some are better than others. A young hacker is less likely to know all the little things that an expert hacker might know. Besides, the young hacker may be trying to impress others - and get a little careless about covering his tracks. This is why younger hackers are often caught.

An older hacker, on the other hand, will rarely leave any tracks. They know how to use their victim's computers as a tool for a launching place to get into another computer - leaving a phony IP address.

The truth is, and it is a good thing, that computer programmers are getting better software, and hardware (firewalls) that are constantly doing a better job - both in keeping hackers out, and in recording IP addresses better for tracking purposes.

There will always be hackers, and there will always be hackers in prison. The legislation is definitely turning against the hacker - with some hacking crimes becoming equal to terrorism, these days. Kevin Mitnick, a well-known hacker, had the Federal prosecutors accuse him of having caused $291 million in damages to corporate computers. A serious crime, and he remains in jail because of it - unable to touch anymore computers.

Even by learning some of the wrong type of hacking basics through hacking tutorials, a young person could start down a wrong path. Hacking computers, though often glorified on TV, is still criminal.

White Hat and Grey Hat Hacker

White Hat and Grey Hat Hacker--- What is the Real Difference?

Thanks to movies and books, our image of hackers has been distorted. What is worse, the public is not able to understand terms like grey hat, white hat, linux OS, or cracker. However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.




Your Ad Here





So, what is ethical hacking white hat and how does it differentiate from grey hackers?

The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.

What Is A White Hat Hacker?

According to Hollywood, a hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.



Your Ad Here


In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent ma chines so that kind of scenario is a bit dramatic.

Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.
v When computers appeared, this people found a new realm where they could exploit their skills. Now they were not limited to the constraints of the physical world, instead, they could travel through the virtual world of computers. Before the internet, they used Bulletin Board Systems (BBS) to communicate and exchange information. However, the real explosion occurred when the Internet appeared.

Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone who uses his computer knowledge in criminal activ ities in order to obtain personal benefits. A typical example is a person who exploits the weaknesses of the systems of a financial institution for making some money.

On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, linux, a PC and an internet connection is all you need.

Fool keylogger and protect yourself from hackers

Fool keylogger and protect yourself from hackers

when you surf net at public computers or net cafes…maybe it can be even at your friends house..etc.. there is a danger that a possible key logger software can steal your password, so i have come up with a simple and effective way to counter it…at least 50% …

lets see how simply you can fool a key logger,



Casinos.Net - since 1997
Poker, Slots, Blackjack and more!
Your Ad Here





When you choose passwords try using simple, capital & numbers as a combination..

when you enter them in a public computer rather than entering it in sequence try entering it in a combination

for this trick suppose my password is - hi2K1987 [DEMO password]

Now when you break your password into 3 combinations and enter them one after another (without using the backspace key) so what i did was i entered 2k first then using the mouse i went to the start of the password field and entered hi then i placed the cursor at the end and entered 1987 now simply the key logger is fooled.

he will read mah password as: delghi2k1987(fooled)



Your Ad Here


Now imagine if you use a set of numbers for your password and you enter them in a combination…

so, guys next time you enter your password you know you are safe, jst a simple trick so u can use ur own imagination..