Give your Desktop a Mozaic Touch

Experience the Windows 8 Metro Stlye UI on your Computer

Tuesday, December 21, 2010

Hackers hit New York tour firm, access 1,10,00 bank cards!!!

      Hackers have broken into the website of the New York tour company CitySights NY and stolen about 110,000 bank card numbers.       They broke in using a SQL Injection attack on the company's Web server, CitySights NY said in a Dec. 9 breach notification letter published by New Hampshire's attorney general. The company learned of the problem in late October, when, "a web programmer discovered [an] unauthorized script that appears to have been uploaded to the company's web server, which is believed to have compromised the security of...

Monday, December 20, 2010

Hide user accounts from user in XP

It is a very simple process:-  1) Go to Start >> Run, and type: GPEDIT.MSC   2)Open the path User Configuration >> Admin Templates >> Control Panel    3) Doubleclick "Hide specified Control Panel applets". 4) Select 'Enabled', then click 'Show". 5) Click Add button, and type "nusrmgt.cpl" into the add box...

How to Lock icons on desktop?

     You must have arranged your desktop to look nicely with your wallpaper. Presently comes someone and mess up the nice arrangement. To lock your desktop icons into place, first arrange it carefully the way you want it to be and then:- 1) Oopen up the registry editor. 2) Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. 3) Right-click in the right-side pane and select New >> DWORD Value  and name it as NoSaveSettings and press the Enter key.  4) Right-click on the new NoSaveSettings item and...

Thursday, December 16, 2010

Google Sharing: Hide yourself from google!!!

"If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place."       Suppose, I wouldn't want Google to know that I am searching for young singles on the internet, you would think that logging out of your Google account might keep Google from mapping the search queries to a specific user. But you are wrong, Google can still track your usage using some smart algorithms which Google is very good at.     ...

Monday, December 13, 2010

Hackers steal McDonald's customer data

     McDonald's is working with law enforcement authorities after malicious hackers broke into another company's databases and stole information about an undetermined number of the fast food chain's customers.      McDonald's has also alerted potentially affected customers via e-mail and through a message on its Web site.      "We have been informed by one of our long-time business partners, Arc Worldwide, that limited customer information collected in connection with certain McDonald’s websites and promotions was obtained by an unauthorized...

Sunday, December 12, 2010

Website Developers are also equally responsible for the hacking!!!

    Every time a website is hacked, the hackers are to be blamed. Is it only a hacker to be blamed?Web Developers are the real Criminals: Website Developers are equally responsible for the hacking.      The recent incidence of CBI website is biggest embracement. The CBI registered a case against unknown hackers for defacement. But the web developer who is been paid huge amount to develop and maintain such high profile sites gets escaped from the legal clutches.     ...

Friday, December 10, 2010

How To Setup Your Own DNS (Domain Name Server)

For Advanced Users and Professionals This is only a quick tutorial, there are literally hundreds of little tricks you can do with a DNS, but this will get your basics up and running. We are assuming you want to setup a windows DNS server, but the principals will work for most servers. You will need.. A domain name over which you have full control. DNS server software(Windows server always comes with one of these). At least one fixed IP address, allthough two is highly desirable. An idea of what services you want on your server.  The first thing you need to do is create your...

Wednesday, December 8, 2010

CBI Website hacked by Pakistan Cyber Army

     Barely a week after the Indian Cyber Army hacked 35 Pakistani Government sites, the Pakistani Cyber Army has hit back by hacking the CBI site of Indian Government at http://www.cbi.gov.in/index.php.      The CBI is the Central Bureau of Investigations for India and is one of the biggest crime investigation organization in the country. This hack is definitely a slap in the face for Indians. The Pakistan Cyber Army has left a message saying that this attack was a response to the "Indian Cyber Army". It is a known fact that the Indian and Pakistani...

Monday, December 6, 2010

Snaptu : All apps in a single app at one place

Snaptu is a fast stylish all-in-one app that includes your mobile essentials in one place: Twitter, Facebook, Flickr, Picasa, News, AccuWeather, Sports (Cricket, Soccer...) Movies, Sudoku and much more... Instead of cramming your phone with lots of individual apps that eat battery, waste space and slow things down, guess what? You can have Snaptu -- a single efficient and incredibly powerful app that keeps your phone running full speed ahead. Prepare to be amazed - download Snaptu now, for...

How to create a huge file?

You can create a file of any size of upto 1 GB without the use of any softwares without any contents in the file. 1) Start by converting the desired file size into hexadecimal notation. You can use the Windows Calculator in Scientific mode do to this. Suppose you want a file of 1 million bytes.  2) Enter 1000000 in the calculator and click on the Hex option to convert it (1 million in hex is F4240.)  Pad the result with zeroes at the left until the file size reaches eight digits—000F4240. 3) Now open a command prompt window.  4) Enter the command DEBUG BIGFILE.DAT and ignore...

Friday, December 3, 2010

Police: "College employee stole from students to fight HIV"

           A 19-year-old employee of a Rochester, New York, community college stole thousands of dollars from students' online accounts because he needed the money "to find a cure for HIV," according to investigators. Terry Zimmerman was charged late last week with one count of computer fraud after allegedly confessing to a Brighton, New York, police investigator.      Zimmerman said he stole the money "to help find a cure...

Boot Your Windows Xp Faster

     Well, this is not a hack but just a pure system trick. This simple trick would make u feel more handy on your System, as this one would make your win XP load much faster.. So here we go...  1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in C:\ 2. From the Start menu, select "Run" & type "gpedit.msc". 3. Go to "Computer Configuration" >> "Windows Settings" and double click again on "Shutdown"...

Tuesday, November 30, 2010

Kroxxu botnet affected over one million web users.

     A new botnet has been detected which could have potentially affected over a million web users in the last 12 months.      The Kroxxu botnet currently has its grip on around 100,000 web domains and has been spreading password-stealing malware whilst covering its tracks extremely effectively, avast! Virus Lab found.      The surreptitious nature of the botnet meant researchers were unable to determine how the masterminds had monetised...

Facebook "news feed" are actually malware!!!

     Security company BitDefender has said today that 20 percent of posts that Facebook users see on their "news feed" are actually malware.      60 percent of those attacks come from third-party apps. 22 percent of the malware apps say they will help you see who has been viewing your profile, 15 percent offer "extras" for games you might have like FarmVille, 11 percent offer a "dislike" button (it doesn't exist) and another 7 percent offer links to games.     ...

Configure Email on your cell phone : The Tutorial

These days almost all the phones from low-end to high-end if multimedia enabled support the Email function with an inbuilt phone application in the messages menu which we hardly use or notice. If you these applications are fantastic and work just very fine if configured correctly. The question here is most of us often don't know how to configure Email accounts and retrieve and send your mails without actually starting the phone browser or third party application. The first step in using email...

Sunday, November 28, 2010

TeraCopy 2.2 Beta 3 / 2.12.. | Copy/Move your files faster

TeraCopy is a free utility designed to copy/move files faster and more secure. Can resume broken file transfers.TeraCopy skips bad files during copy and even shows the skipped files at the end of files transfer. TeraCopy will calculate files CRC checksum on the fly to speed up source and target files comparsion. Seamless integration with Windows Explorer allows you to keep working with files as usual.Copy or move files using left mouse button drag or 'Copy' and 'Paste' commands. Here are some key...

Disable error reporting in Windows XP

     You might have seen this disturbing error report while you browse internet or running some application. Here are the step by step instructions on it. Step 1: Right Click on My Computer and go to properties Step 2: Go to Advance Tab (1) and Click on Error Reporting (2) Under start up and recovery Step 3: Select the Radio button near Disable error reporting (1) and Check the option But Notify me when Critical error occurs and Click on OK and OK aga...

Administrator Account Not appearing On the Welcome Screen

     If your Administrator Account is not coming on your welcome screen, then you dont have to do much. What you have to do is simply follow the trick.  1. Start the Registry Editor. 2. Go to: HKEY_LOCAL_MACHINE >> SOFTWARE >> Microsoft >> Windows NT >> CurrentVersion >> Winlogon >> SpecialAccounts >> UserList   3. Right-click an empty space in the right pane and select New > DWORD Value. Name the new value as Administrator.  4. Double-click this new value, and enter 1 as it's Value data.  5. Close the...

Saturday, November 27, 2010

Sextortion on Cyber Space: New Technique of Blackmail & Threatening Young People

Who’s watching your child on her or his PC Webcam -- just friends? Don't be too sure.      Age-old crimes take on a new twist in the cyber-world of today. Not least of these is “sextortion,” where in a recent high-profile case, the FBI uncovered 200 victims in just one incident, many of whom were young or even underage.      Sextortion has been around longer than most of us probably realize and way before the Web was around. An early use of the term was...

Thursday, November 25, 2010

How To Hack Content Advisor Password.

What is Content Advisor? As a parent you may have concerns about the content your children encounter as they surf the Web. Internet Explorer 6 helps you safeguard your family's browsing experience with Content Advisor, which can be used to control the Web sites that your family can view. With Content Advisor, you can give your children access to a specific list of Web sites that you allow and prevent them from accessing others. Find out how to use it so you can rest easier. The supervisor can set a password in order to prevent the other users from changing the Content Advisor properties. Process:- First...

Wednesday, November 24, 2010

Enable Aero Effects in Windows 7 even on unsupported Graphics cards

Aero Glass Transparency Effect one of best features of Windows Vista is also extended to Windows7. However the hardware requirement to enable aero in windows 7 is much higher then average users can have.  We might have some users who even after installing Windows 7 are disappointed by the fact that their graphics card is very primitive or low and they get an error message saying that Aero Themes are not supported by your Graphics Card.  What can be the solution? Change your graphics card ?? Noooo... not at all why to spend so much for that... So here we are showing you a small registry...

Gary Kelly: A hacker facing jail over £12m worldwide internet bank fraud

A computer hacker facing jail over £12m worldwide internet bank fraud begged a judge to free him while he awaits sentence. Gary Kelly, 21, from Salford, constructed a computer virus to retrieve bank account details from their unsuspecting owners through the internet. He then sold the information to other criminals through the GhostMarket.net website. Appearing at Southwark Crown Court in London, Kelly begged the judge to not remand him in custody until he is sentenced next year because he is a father. “Please, your honour. I have a little girl,” Kelly said. But Judge John Price ignored...

Tuesday, November 23, 2010

Are Saved Passwords in IE or Firefox Safe..??

     Do U think ur saved passwords in Internet Explorer and Mozilla Firefox are safe?? really!! Check out here how much you are:     Whenever u type passwords into any web forms, in both Internet Explorer & Mozilla Firefox, its prompt out whether 2 remember u passwords, & many of us clicks on yes & our passwords are saved in the browser.      Many of us think this “Remember Me” option in IE or Firefox is very much...

Monday, November 22, 2010

Automatically delete temporary files in Windows 7

Here you will have to create a batch(.bat) file. But dont worry, you do not need to have knowledge of batch file programming. Open notepad and paste the following code in it: cd C:\users\%username%\AppData\Local Rmdir /S /Q Temp Replace %username% with your account username. Account should have administrative privileges. Save the file with .bat extension. You can execute it right away. But to refrain from the pain of executing this file everytime, you just have to place it in the startup folder. So save the file in C:\Users\%username%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup...

Sunday, November 21, 2010

Google is Willing to Pay Hackers up to $3,133

     Wanted by Google: Bounty-hunting hackers who can find security vulnerabilities in popular Web apps.      For security researchers who find flaws in Internet services like Gmail, Blogger and YouTube, Google will reward $500 or more per bug. Vulnerabilities that are "severe or unusually clever" pay up to $3,133.70. Optionally, benevolent hackers can also donate their rewards to charity, in which case Google will match the winnings at its discretion.     ...

Friday, November 19, 2010

Open browser inside browser

You always open a website inside a web browser. Have you ever opened a new browser inside a web browser... Its really very simple:- 1) Open a new tab or a web browser. 2) Paste this in your address bar:-                                 chrome://browser/content/browser.xul 3) That's it. You have done ...

Wednesday, November 17, 2010

Google Hacking Database Reborn

      The incredible amount of information continuously leaked onto the Internet, and therefore accessible by Google, is of great use to penetration testers around the world. Johnny Long of Hackers for Charity started the Google Hacking Database (GHDB) to serve as a repository for search terms, called Google-Dorks, that expose sensitive information, vulnerabilities, passwords, and much more.       As Johnny is now pursing his mission in Uganda,...

Tuesday, November 16, 2010

Hackers n Cyber Criminals Beware!!! U.S. Cyber Command is Fully Operational!!

       Department of Defense announced today that U.S. Cyber Command has achieved full operational capability (FOC).         Achieving FOC involved U.S. Cyber Command completing a number of critical tasks to ensure it was capable of accomplishing its mission. U.S. Cyber Command is responsible for directing activities to operate and defend DoD networks.      “I am confident in the great service members and...

Monday, November 15, 2010

Hide urself in facebook

Its very simple to be invisible on facebook. Process:- 1) On the top-right side, go to the tab named Account >> Edit friends. 2) Click on Create list. 3) Name the list. Eg. College friends, Dance crew, etc. and add some 10-15 friends in each. 4) Now, click on home and see the chat list, you could see the chat list being divided into groups you had created. 5) Simply, turn off the green light besides a group to disable urself from being visible to them. Note:- The most important thing is if you are invisible to others, then even you can't see othe...

Saturday, November 13, 2010

Russian Hackers Hack Citibank: Steal Millions

      GLOBAL finance giant Citigroup is denying reports hackers stole “tens of millions” of dollars from its banking arm Citibank midway through the year.       The Wall Street Journal yesterday reported the money was lost to “malicious software created in Russia” and that the case was being investigated by the FBI. It also reported a specialised piece of malware known as “Black Energy” was behind the losses, having been modified to steal banking authentication details.      “There’s a newer, private version of Black...

Allow more than 2 simultaneous downloads in IE 6

This is to increase the the number of maximum downloads to 10. 1. Open Registry Editor 2. Go to:- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings 3. On the right-hand side pane, right-click and go to New >> Dword value, and then add the following registry values: "MaxConnectionsPer1_0Server"=Dword:0000000a "MaxConnectionsPerServer"=Dword:0000000a 4. Refresh Registry Editor and ex...

Thursday, November 11, 2010

Is your web browser safe.?

Do you think that the web browser you use for internet browsing is safe..? Do you think that your web browser is safe from different kinda attacks that the hacker can perform.? Its simple to test this, click here for direct link  and go to    Start the Test Its tests for the following vulnerabilities:- 1) Windows animated cursor overflow. 2) Mozilla crashes with evidence of memory corruption. 3) Internet Explorer bait & switch race condition. 4) Mozilla crashes with evidence of memory corruption. 5) Internet Explorer createTextRange arbitrary code execution. 6) Windows...

Tuesday, November 9, 2010

Hide files inside images without any software

What is Steganography? 1)      Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. 2)      The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "writing." Steganography, therefore, is covered writing. 3)      Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer ...

Monday, November 8, 2010

160by2 SMS Application for Mobile : Save your SMS costs

      Download 160by2 - the Free SMS service-on your mobile and enjoy free SMSing whenever you want. It's now easy to send SMS anywhere to on any mobile device within India. So, stay connected, even when you step out.       The download file is just 28KB and very simple to install. 160by2 on mobile is designed with a familiar look and feel, plus added features that will bring out the best of your mobile.       The Application...

Friday, November 5, 2010

Pakistani Hacker Cyber_Swati's website "Pakjanoon.com" Hacked by Lucky From Indian Cyber Army

       This information received on 02 November around 04:30 PM. If you open the website http://pakjanoon.com/and scroll it down, you will see the message left by Lucky from Indian Cyber Army. This hack is in response to the challenge made by CYBER_SWATI yesterday to ICA & All Indian Hackers. According to that message - HACKED BY INDIAN CYBER ARMY LUCKY OWNS YOU CYBER_SWATI F**K YOUR MOM SON OF A BI**H YOU CHALLENGE US LOL NOW SEE WHAT HAPPENED YOUR SITE OWNED...

Burlington man charged in eBay scam

          A 28-year-old Burlington man has been charged in connection with an online fraud through the popular online auction site eBay.      The Alamance County Sheriff's Office said a victim in Austin, Texas, contacted Elon police after items purchased were not delivered. The sheriff's office did not say what items were bought.      The sheriff's office, working with fraud investigators at eBay, found $1,817.51...

Thursday, November 4, 2010

DU Meter : Keep an eye on your internet usage

A utility that provides an accurate account of the data flowing through your computer's network connection at any given moment. This readout is presented in both numerical and graphical format, in real time. DU Meter includes extensive logging facility, flexible events system, and more. DU Meter works with virtually all types of network connections: phone modems, DSL, cable modem, LAN, satellite etc.  The current version includes some superb new features including full logging and reporting...

Page 1 of 12012345Next