Showing posts with label XP TWEAKS. Show all posts
Showing posts with label XP TWEAKS. Show all posts

Wednesday, 13 June 2012

Trick to LogIn to any Version of Windows without Password

There is a Trick to LogIn Windows even if we have forgotten our Account's Password. Mostly people reinstalls the Windows again and lose all their Documents or Data saved in the Windows Drive. But now we have a simple Trick by which we need not worry to lose our Data and Install the Windows again.

For this Trick we just need is your Windows Installer Disc and the Locked Computer to having an Optical Drive i.e CD Drive. This is very handy Trick if  we ever forgot our Password and don't have access to our Computer.
To use this Trick follow these simple steps :
1) Put the Windows Installer Disc into the CD / DVD Drive and Press any key when prompted to Boot from CD.
2) After all Process when it asks for License Agreement jusr press F8 to Agree.
3) On the Next Screen when Prompted to Repair or Install a Fresh Copy of Windows, just select the Earlier Installed Windows Installation and press R to Repair it.
4) The system will then Reboot after Setup Checking and Copying Setup Files. When it Reboots, don't press any key when Prompted to Press any key to Boot from CD. The setup will be Automatically Start the Setup Process.
5) Now this is the most Important Step. Wait for the setup to Install the Devices and when this Setup starts press Shift Key + F10.
6) After that a Command console would Open. Now type "NUSRMGR.CPL" ( without quotes ) and press Enter.
7) Now this will give Access to the User Account Window similar to the Control Panel where we can Delete or Edit the Forgotten Password. Now choose Remove to LogIn the Computer without Entering Password or Edit to Change the Password.
8) After Deleting or Edit Password, close the Command Window and let the Setup to Finish.
9) When Setup Finishes, Computer will Restart and Windows will Start Normally. If You earlier selected to Edit Password, then it will Prompt to Enter Password so Enter it and LogIn.
10) Now it is done. We have now Login to Locked Windows Computer.
So it is a simple Trick to LogIn to any Version of Windows without Password.

Trick to Hack any version Windows

There is a simple Trick to Hack any version Windows even if we don't know the Windows Password. We just need not worry to apply any manual effort for this as the Trick is based on the Free Rescue Software for Windows. We just need this Software and have to Run at Startup by Booting it. By this Software we can Perform many Administrator Task even if we don't know the Administrator Password.
This Software is Trinity Rescue Kit.
We can do following things using this Software :
1) Easily Reset Windows Passwords.
2) Perform a Virus Scan by the Products Integrated in a Single Uniform Commandline.
3) Full NTFS Write.
4) Winclean to Clean Up all sorts of unnecessary Temporary Files on Computer.
5) BackUp the Data using BackUp Utility.
6) Run Utility like Windows Filesharing by Samba Fileserver.
7) Run a SSH Server.
8) Recovery and Undelete Files.
9) Recovery Lost Partitions.
10) Evacuate Dying Disks.
11) Use Rootkit Detection Utilities.

To Download this Software visit here.

Here is the procedure to follow for this Trick :
1) Download Trinity Rescue Kit.
2) Extract the Files onto the Computer in Specific Folder.
3) Now we have to do the main Job. If you want to make a Rescue CD / DVD then Burn all the Extracted Files to
CD / DVD or if you want to make a Rescue USB or Pen Drive then Copy and Paste the Extracted Files to USB or
Pen Drive.
4) Now it is done. Whenever you forgot your Password and need to Hack the Windows i.e.wants to perform
Administrator Task, then use the Rescue CD / DVD or USB / PEn Drive, so created by you.
So it is a simple Trick to Hack any version Windows.

Sunday, 10 June 2012

Trick to make Windows XP 100% Genuine



Every person who has used Computer has been familiar with the Windows XP. Windows XP is the most liked Operating System by people all over the Globe.

It is very simple and have many nice features than any other Operating System.

Due to these features many people buys the original Windows XP.



As Original Windows is just better than the pirated one like Online Windows Update, Genuine Microsoft Softwares or similar more can be only used on Genuine Windows.

But all people cannot afford it or don't want to spend even a penny on it. So this Trick is for those who want to make their Windows XP Genuine without spending a penny on it.
Please note that you are not going to Misuse this Trick.

So to use this Trick just follow these simple Steps :

1) Open NotePad.
2) Copy and Paste the following Code into Notepad :

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersion]
“CurrentBuild”=”1.511.1 () (Obsolete data – do not use)”
“ProductId”=”55274-640-1011873-23081?
“DigitalProductId”=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,
31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00,00,41,32,32,2d,30,30,30,
30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a,a3,78,8e,8f,98,5c,00,00,
00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00,00,00,00,00,00,00,00,00,
00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00,00,00,00,00,00,00,b5,16,
00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00,00,00,00,00,00,00,00,00,
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,66,e5,70,f3
“LicenseInfo”=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6,35,51,fd,52,57,17,86,3e,18,
d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9,9a,35,17,46,7a,4f,91,fc,
4a,d9,db,64,5c,c4,e2,0f,34,f3,ea
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWPAEvents]
“OOBETimer”=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd

3) Now Save this file as WindowsXPGenuine.reg.

4) Run this file and Restart the Computer.

5) Now it is done.
Now your Windows XP is no more Pirated i.e it is now Genuine. If you want to check whether it is Genuine or not then visit the Microsoft Site and Check here.

Trick to Delete Empty Folders in Windows Automatically


We all use Computers or Laptops and we all are Happy in Installing and Uninstalling the New softwares and Programs on our Windows. But have you ever thought that Installing of any Software or Program create many Directories and Folders for it's working ? It's obvious everybody knows this thing ! But do you know when we Uninstall that Software or Program, many of the Folders or Directories are not Removed from our Computer Hard Drive and these act as the residual waste on our Computer which is of no use.
These Folders even after being Empty, occupy some space on our Hard Drive and if we frequently Installor Uninstall the softwares or Programs then the size of these Folders could be very large which can even Slow Down the already Slow Running Computer. So here is the simple Trick to Remove these Empty Folders and Directories.

To use this Trick just Download the Software, Remove Empty Directories from here.

Now after Downloading, Install the RED ( Remove Empty Directories ) on your Computer and choose the Specific Drive from Browse Option to Scan for Empty Folders & Directories and then just select the Option Delete Folders from the Menu located below. If you have any Problem in using this software then you can Comment here or Contact Us anytime.
Note : After Deleting the Folders do not forget to Empty Recycle Bin, as all the Deleted Folders would be sent to Reycle Bin.
So this is the simple Trick to Delete Empty Folders in Windows Automatically.

Saturday, 9 June 2012

Trick to Repair Windows XP without Installation CD

It is very annoying when our Computer is running on the Operating System whose files are corrupted and many times shows an Error message and make us Frustated and leaving us with none other option than Reinstalling the Windows. But this is not the solution we an also Repair it. But what if do not have the Installation CD.
No problem Top Tricks and Tips is always there.

Here is a simple Trick to Repair Windows XP without Installation CD. To make use of this Trick just follow these steps :
1) Click on Start  >>  Run  >>  Type "webfldrs.msi" ( without quotes ).
2) Now follow the Instructions.and select Reinstall Mode.
3) Now Check all the options on the New Screen which appears and click OK.
4) Now after it Restart the Computer and it is done.
So it is a simple Trick to Repair Windows XP without Installation CD.

Friday, 8 June 2012

Trick to Disable Windows logo Key.

There is a Trick to Disable Windows logo Key. It is very annoying for many people the Windows Logo Key. So now we can Disable it via simple Trick.
Here is a simple Trick to Disable Windows logo Key.1) Open Notepad.
2) Copy and Paste the following Code into Notepad :

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]
“Scancode Map”=hex:00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b,e0,00,00,5c,e0,\
00,00,00,00

3) Save it as WindowsLogoKey.reg.
4) Run it and Restart the Computer.
5) Now it is done.
So it is a simple Trick to Disable Windows logo Key.

Sunday, 27 May 2012

How To Hide Any Drive in Windows

Most of you must have wondered if there exists a way without using software to Hide A Drive completely so that it cannot be viewed or accessed without unlocking it. so, here is a easiest method to hide drive simple 4 steps.

Follow The Steps For Do This..


1. Goto run type “gpedit.msc” (without quotes)


2. select user configuration —> administrative templates —> windows components —> windows explorer(click on it) 

3. On right panel search for hide theses specified drives in my computer.

4. Double click it mark on enable to hide the drive and select drive the which you want to hide. If u wanted to hide all the drives which are on your system then select restrict all drives.
to make it unhidden mark on disable option.

I hope this tips helps u!!

Saturday, 18 June 2011

How to disable”Turn Off Computer”button in XP?


Image Hosted by ImageShack.us
Today tip is very useful particularly for those users who want to restrict the common users to shutdown public computer in common areas. You can disable the “Turn off Computer” button on the start menu and a common user will not “Turn Off, Restart and Stand By” a computer. Using registry editor, you can implement this task in all windows XP versions with minimum effort.
Follow the given steps to disable Turn off Computer” button on the start menu:
To use this feature, you will need to be logged into your computer with administrative rights.
Click Start button and type regedit in Run option then press Enter for next.
Image Hosted by ImageShack.us
Here locate the location to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
Here in right side panel, right click to create a new DWORD value with the name NoClose.

Now assign number 1 in value data box and close the registry editor.
Image Hosted by ImageShack.us
Now close the registry editor and restart your computer after any changes to go into effect.
But next time, if you want to enable “Turn Off Computer” button on start menu then simply change the value of data box to 0 or delete NoClose DWORD item.

Friday, 17 June 2011

How to display a message on your computer before Windows XP loads

how to display a message on your computer before Windows XP loads

1. Go to Start->Run.

2. On the Run window type regedit and press Enter.

2.Navigate to the key HKEY_LOCAL_MACHINE\SOFTWARE\Mcft\Windows NT\CurrentVersion\Winlogon.

3.Modify the key legalnoticecaption and write the name of the window you want to appear.

4.Modify the key legalnoticetext with what you want the window to say.

5.Restart your computer. ..!!..;s

Monday, 6 June 2011

Hacking on XP part 3

How to Forge Email with Windows XP Telnet
Want a computer you can telnet into and mess around with, and not get into trouble no matter what you do to it? I've set up my
techbroker.com (206.61.52.33) with user xyz, password guest for you to play with. Here's how to forge email to xyz@techbroker.com using
telnet. Start with the command:
C:\>telnet techbroker.com 25
Connecting To Techbroker.com
220 <techbroker.com> Service ready
Now you type in who you want the message to appear to come from:
helo santa@techbroker.com
Techbroker.com will answer:
250 <techbroker.com> host ready
Next type in your mail from address:
mail from:santa@techbroker.com
250 Requested mail action okay, completed
Your next command:
rcpt to:xyz@techbroker.com
250 Requested mail action okay, completed
Your next command:
data
354 Start main input; end with <CRLF>.<CRLF>
Newbie note: <CRLF> just means hit return. In case you can't see that little period between the <CRLF>s, what you do to end composing your email is to hit enter, type a period, then hit enter again.
Anyhow, try typing:
This is a test.
.
250 Requested mail action okay, completed
quit
221 <techbroker.com> Service closing transmission channel
Connection to host lost.
Using techbroker's mail server, even if you enable full headers, the
message we just composed looks like:
Status: R
X-status: N
This is a test.
That's a pretty pathetic forged email, huh? No "from", no date.
However, you can make your headers better by using a trick with the data command. After you give it, you can insert as many headers as you choose. The trick is easier to show than explain:
220 <techbroker.com> Service ready
helo santa@northpole.org
250 <techbroker.com> host ready
mail from:santa@northpole.com
250 Requested mail action okay, completed
rcpt to:<script language="JavaScript"><!-- var name = "cmeinel"; var domain = "techbroker.com"; document.write('<a href=\"mailto:' + name + '@' + domain + '\">'); document.write(name + '@' + domain + '</a>'); // --></script>
250 Requested mail action okay, completed
data
354 Start main input; end with <CRLF>.<CRLF>
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221 <techbroker.com> Service closing transmission channel
Connection to host lost.
The message then looks like:
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
The trick is to start each line you want in the headers with one word
followed by a colon, and the a line followed by "return". As soon as
you write a line that doesn't begin this way, the rest of what you
type goes into the body of the email.
Notice that the santa@northpole.com from the "mail from:" command didn't show up in the header. Some mail servers would show both "from" addresses.
You can forge email on techbroker.com within one strict limitation.
Your email has to go to someone at techbroker.com. If you can find any way to send email to someone outside techbroker, let us know, because you will have broken our security, muhahaha! Don't worry, you have my permission.
Next, you can read the email you forge on techbroker.com via telnet:
C:\>telnet techbroker.com 110
+OK <30961.5910984301@techbroker.com> service ready
Give this command:
user xyz
+OK user is known
Then type in this:
pass test
+OK mail drop has 2 message(s)
retr 1
+OK message follows
This is a test.
If you want to know all possible commands, give this command:
help
+OK help list follows
USER user
PASS password
STAT
LIST [message]
RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message]
HELP
Unless you use a weird online provider like AOL, you can use these
same tricks to send and receive your own email. Or you can forge email to a friend by telnetting to his or her online provider's email
sending computer(s).

Hacking on XP part 2

How to Telnet with Windows XP
The queen of hacker commands is telnet. To get Windows help for
telnet, in the cmd.exe window give the command:
C:\>telnet /?
Here's what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.
port Specifies a port number or service name.
****************
Newbie note: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer. Some ports are easy to understand, like keyboard, monitor, printer and modem. Other ports are virtual, meaning that they are created by software. When that modem port of yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has the ability to open or close any of over 65,000 different virtual ports, and has the ability to connect to any of these on another computer - if it is running that port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There are two ways: by number or by name.
****************
The simplest use of telnet is to log into a remote computer. Give the
command:
C:/>telnet targetcomputer.com (substituting the name of the computer you want to telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you may
get the message:
login:
Type your user name here, making sure to be exact. You can't swap between lower case and capital letters. For example, user name Guest is not the same as guest.
****************
Newbie note: Lots of people email me asking how to learn what their user name and password are. Stop laughing, darn it, they really do. If you don't know your user name and password, that means whoever runs that computer didn't give you an account and doesn't want you to log on.
****************
Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?
Every day people write to me complaining they can't telnet. That is
usually because they try to telnet into a computer, or a port on a
computer that is set up to refuse telnet connections. Here's what it
might look like when a computer refuses a telnet connection:
C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
Or you might see:
C:\ >telnet techbroker.com
Connecting To techbroker.com...Could not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.
If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.
**************
Newbie note: your Windows computer has a telnet client program,
meaning it will let you telnet out of it. However you have to install
a telnet server before anyone can telnet into port 23 on your
computer.

*************
If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.
How to Telnet into a Shell Account
Even though you can't telnet into an account inside some computer, often you can get some information back or get that computer to do something interesting for you. Yes, you can get a telnet connection to succeed -without doing anything illegal --against almost any computer, even if you don't have permission to log in. There are many legal things you can do to many randomly chosen computers with telnet. For example:
C:/telnet freeshell.org 22
SSH-1.99-OpenSSH_3.4p1
That tells us the target computer is running an SSH server, which enables encrypted connections between computers. If you want to SSH into an account there, you can get a shell account for free at
<http://freeshell.org/> . You can get a free SSH client program from
<http://winfiles.com/> .
One reason most hackers have shell accounts on Internet servers is because you can meet the real hackers there. When you've logged in, give the command w or who. That gives a list of user names. You can talk to other users with tht talk command. Another fun thing, if your shell account allows it, is to give the command
ps -auxww
It might tell you what commands and processes other users are running. Ask other users what they are doing and they might teach you something. Just be careful not to be a pest!
***************
You can get punched in the nose warning: Your online provider might kick you off for making telnet probes of other computers. The solution is to get a local online provider and make friends with the people who run it, and convince them you are just doing harmless, legal explorations.
*************
Sometimes a port is running an interesting program, but a firewall won't let you in. For example, 10.0.0.3, a computer on my local area network, runs an email sending program, (sendmail working together with Postfix, and using Kmail to compose emails). I can use it from an account inside 10.0.0.3 to send emails with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer,
here's what happens:
C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on
port 25.
No connection could be made because the target machine actively
refused it.
However, if I log into an account on 10.0.0.3 and then telnet from
inside to port 25, here's what I get:
Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical
address meaning localhost, the same computer you are logged into]
Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix
The reason I keep this port 25 hidden behind a firewall is to keep
people from using it to try to break in or to forge email. Now the
ubergeniuses reading this will start to make fun of me because no
Internet address that begins with 10. is reachable from the Internet.
However, sometimes I place this "test-box" computer online with a
static Internet address, meaning whenever it is on the Internet, it
always has the same numerical address. I'm not going to tell you what its Internet address is because I don't want anyone messing with it. I just want to mess with other people's computers with it, muhahaha. That's also why I always keep my Internet address from showing up in the headers of my emails.
***************
Newbie note: What is all this about headers? It's stuff at the
beginning of an email that may - or may not - tell you a lot about
where it came from and when. To see full headers, in Outlook click
view -> full headers. In Eudora, click the "Blah blah blah" icon.

****************

hacking on XP part 1

Part I: The Magic of DOS
In this guide you will learn how to telnet <beginninea.shtml>, forge email, <beginnineb.shtml> use
nslookup <beginninec.shtml> and netcat <beginnined.shtml> with Windows XP.
So you have the newest, glitziest, "Fisher Price" version of Windows: XP. How can you use XP in a way that sets you apart from the boring millions of ordinary users?
****************
Luser Alert: Anyone who thinks this GTMHH will reveal how to blow up people's TV sets and steal Sandra Bullock's email is going to find out that I won't tell them how.
****************
The key to doing amazing things with XP is as simple as D O S. Yes, that's right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS version. Various versions of command.com come with Windows 95, 98, SE, ME, Window 3, and DOS only operating systems.
The other DOS, which comes only with the XP, 2000 and NT operating systems, is cmd.exe. Usually cmd.exe is better than command.com because it is easier to use, has more commands, and in some ways resembles the bash shell in Linux and other Unix-type operating systems. For example, you can repeat a command by using the up arrow until you back up to the desired command. Unlike bash, however, your DOS command history is erased whenever you shut down cmd.exe. The reason XP has both versions of DOS is that sometimes a program that won?t run right in cmd.exe will work in command.com
****************
Flame Alert: Some readers are throwing fits because I dared to compare DOS to bash. I can compare cmd.exe to bash if I want to. Nanny nanny nah nah.
****************
DOS is your number one Windows gateway to the Internet, and the open sesame to local area networks. From DOS, without needing to download a single hacker program, you can do amazingly sophisticated explorations and even break into poorly defended computers.
****************
You can go to jail warning: Breaking into computers is against the law if you do not have permission to do so from the owner of that computer. For example, if your friend gives you permission to break into her Hotmail account, that won't protect you because Microsoft owns Hotmail and they will never give you permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN permission before demonstrating that you can hack on a school computer.
****************
So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying something like this:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>
Your first step is to find out what commands you can run in DOS. If you type "help" at the DOS prompt, it gives you a long list of commands. However, this list leaves out all the commands hackers love to use. Here are some of those left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup
TCP/IP stands for transmission control protocol/Internet protocol. As you can guess by the name, TCP/IP is the protocol under which the Internet runs. along with user datagram protocol (UDP). So when you are connected to the Internet, you can try these commands against other Internet computers. Most local area networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to communicate between computers. This is often used by Windows computers, and by Unix/Linux type computers running Samba. You can often use NetBIOS commands over the Internet (being carried inside of, so to speak, TCP/IP). In many cases, however, NetBIOS commands will be blocked by firewalls. Also, not many Internet computers run NetBIOS because it is so easy to break in using them. We will cover NetBIOS commands in the next Guide to XP Hacking.