The contents of this blog are not old now as I have not updates it since long. The mobile trick wont work now.

Using Google as a Hacker

Posted on Tuesday, December 22, 2009 by Ajit



The first thing here you need to know is : What is Google?

Google search is a web search engine owned by Google Inc. It is the most easy and user friendly search engines. It is also the most used search engine on the Internet. Google processes several million queries everyday through its different services. Google search was originally developed by Larry Page and Sergey Brin. Beyond the word-search capability, Google provides more than 22 special features, such as: sports scores; time zones; synonyms; movie showtimes; stock quotes; airports; earthquake data; weather forecasts; maps; home listings, etc. There are special features for numbers: prices; temperatures; money/unit conversions; calculations; package tracking; patents; area codes; plus rudimentary language translation of displayed pages.

What does a Hacker Mean?

In home computing, a hacker is a person who heavily modifies the software or hardware of their computer system. It includes building, rebuilding, modifying and creating software (software cracking, demo scene) and electronic hardware (hardware hacking, modding) either to make it better, faster, give added features or to make it do something it was never intended to do.

Today, mainstream usage mostly refers to computer criminals, due to the mass media usage of the word since the 1980s. This includes script kiddies, people breaking into computers using programs written by others, with very little knowledge about the way they work. This usage has become so predominant that a large segment of the general public is unaware that different meanings exist. While the use of the word by hobbyist hackers is acknowledged by all three kinds of hackers, and the computer security hackers accept all uses of the word, free software hackers consider the computer intrusion related usage incorrect, and refer to security breakers as "crackers"

What you need to be a hacker?
Good amount of knowledge with programming and scipts like php, java script, asp, etc. A good amount of knowledge on using Search Engines like Google, yahoo, etc. Logical and different way of thinking. A hacker is simple the one who hacks [breaks/decodes/decrypts] something.

"Google is your friend." Ever wondered why this saying became famous? If you are not a good programmer but you can think logically and use a search engine in a way that helps you learn what you want, you can become a hacker.

Google has crawlers, which is an automatic progarms which crawls through websites and saves each folders and files on the web in an index. Now this can be dangerous if your website has a private folder which you do not want to let others or google know about it. For this purpose you need to create a file named robots.txt on your web server which will tell google which sites to visit and which to avoid.

Special Features of Google which a Hacker can use :

site: Searches the keyword in the specified domain, eg :"Google Hacker site:techarena.in"

allintitle: Only the page titles are searched and not the remaining text on each webpage. eg: "allintitle:TechArena Community"

intitle: Prefix to search in a webpage title, such as "intitle:techarena forum" will list pages with word "techarena" in title, and word "forum" anywhere on the entire webpage

allinurl: Only the page URL address lines are searched and not the content of each webpage. This one is very useful for a hacker as he can search a website for a file where a password or similar stuff is stored.

inurl: Prefix for each word to be found in the URL, others words are matched anywhere, such as "inurl:techarena hardware" matches "techarena" in a URL, but matches "hardware" anywhere in the entire webpage.

Some Example on how to use Google as a Hacker. If you are a good programmer, you must know what is the name and where a file is by default saved which contains sensitive data like passwords.
Examples of search queries :

Code:
allinurl:auth_user_file.txt
OR

Code:
inurl:passlist.txt
This will search for passlist.txt or auth_user_file.txt on all the websites that is available with google.

One more command which is used to find a file on a webserver like. Suppose an MP3 file has to be searched, you can search it with the following query :

Code:
filetype:mp3 filename
In the above code replace "filename" with the name which you want to search.
I will not help you with the filenames which are generally used to save passwords of a server or anything which will be considered as a security breach.
The basic fundamental of hacking is to think like a hacker and to act wisely. You can combine multiple queries to search at once.

Example of a combinational query :
Code:
site:techarena.in inurl:guides Google Hacker
You will be shown multiple results for the search which is located on techarena.in which has "hardware" in url and has "Google" and/or "Hacker" anywhere in the contents of a listed page.

How to Password Protect a Pen Drive ?

Posted on by Ajit

The confidentiality of our documents and files is to add a point in the security of our data. In most cases, personal files and bank details, passwords, confidential documents, or even multimedia files of a personal nature, are fairly safe in our home computers.

Q. What happens to the information carried in a Pendrive?

Q. Can I hide information from my pendrive?

Q. How do I put a password on my Pendrive?

Of course you can hide files on a pendrive, and we can set a password to access a Pendrive. The method is simple, and we'll do a free program called Rohos Mini Drive.

Rohos Mini Drive creates hidden and encrypted partition on the USB flash drive memory. You work with the files on the hidden partition without opening a special program. Those who have megabytes of sensitive files on the USB drive and seriously concerned with a data security, cannot imagine their USB stick without the hidden volume that is created using this tool.


Main Features:

  1. Creates a virtual encrypted partiton volume (disk) within a USB flash drive free space
  2. Automatically detects your USB stick config and creates encrypted partition
  3. Program does not require installation to work with encrypted partiton on a guest computer. You can start it right from USB drive
  4. Encrypted partition is protected by password
  5. Encryption is automatic and on-the-fly
  6. Encryption algorithm: AES 256 bit key lenght. NIST approved.
  7. Rohos Disk Browser to open encrypted partition without having Admin rights
  8. Virtual Keyboard - to protect your encrypted disk password from a key logger
  9. Autorun Folder. Saved program’s/file’s shortcut will automatically start/open up upon disk connection
  10. The limit of encrypted partition size is 2 GB

System requirements:

* Windows 2000/XP/2003/Vista
* USB 1.1/2.0 port
* USB flash drive or U3 Smart flash drive with 1 Mb or more free space


Download : Rohos Mini Drive 1.19

kaspersky full version download

Posted on Monday, November 30, 2009 by Ajit

Download the kaspersky from its official website

here is the link

Download the latest version from here

Now here are the steps through which ur version would be converted into beta version and ur keys would never get blacklisted






1. Download and install Kaspersky (Activate with a Trial License)
2. Go to Kaspersky’s settings, click Options, and untick Enable Self-Defence
3. Exit Kaspersky
4. Go to Start, run, then type regedit and press enter
5. Press CTRL+F and type in ProductStatus and hit enter
6. Double click ProductStatus and change Release to Beta (it may say Trial instead of Release)
7. Press OK then open Kaspersky.
8. Tick Activate beta license then press Next and Finish
9. Re-enable Self-Defence.
10. Every 30 days Kaspersky will ask for a license, simply click Activate Beta and boom you’re good to go

How To Install Windows7 From USB Stick

Posted on Friday, November 13, 2009 by Ajit

Hey guys this is my first tutorial in CW. Today i am telling you about how to install Windows7 from USB stick or pen drive.I think most of the users will know already but as Windows 7 is releasing on 22/10/2009 which is really very near, i think you should know this method. As it can save your time and your blank DVD's also( ). Because installing from USB is much faster than installing from DVD. I have tried this method myself 5-6 times as i'm using windows 7 from past 6 months. I made this tutorial as easy that even a novice can create one for him. So here we go:

Installing Windows 7 with a USB flash drive - What you need
:
The Windows 7 ISO weighs a hefty 2.5GB of disk space, so a flash drive with at least 4GB of space is required. Also, you need the following programs: BootSect, USB_prep8, and PeToUSB. All of which can be downloaded in a handy package that I’ve uploaded here:

Code:
http://hotfile.com/dl/8841981/13fdb9a/bootable_thumbdrive_programs_by_snake_c.rar.html
When you have everything ready, insert your flash drive, plug in your notebook/laptop/netbook or whatever you call it to AC power and get ready to create a Windows 7 bootable USB flash drive.
Installing Windows 7 with a USB flash drive - Preparation
1. Download the packed RAR file which I gave you the link to earlier and extract its contents to your computer’s Desktop (this makes things easier). This contains the three programs you will need to make a bootable USB flash drive, which are BootSect, USB_prep8, and PeToUSB.
Now that the bootsect and USB_prep8 folders are on your Desktop, do the following.


2. Open the USB_prep8 folder, find USB_prep8.cmd and run it, pressing any key to continue when prompted. This will initiate PeToUSB. PeToUSB will be used to format your flash drive, so it is suggested that you back up any valuable data that you might have on your flash drive before proceeding. Once the backup’s done or you are sure it’s OK for you to format your flash drive, see the PeToUSB options and make sure that “Enable Disk Format”, “Quick Format” and “Enable LBA (FAT16X)” are checked. See photo below.

After you click start and agree to what comes next, your USB flash drive will be formatted, and the next step would be to configure it so that it becomes bootable. Close PeToUSB and the small command prompt window that you opened earlier.
3. Make your USB flash drive bootable using bootsect. Here’s how.
Assuming that the bootsect folder you extracted earlier is already on your desktop, simply do the following. Open a command prompt window by pressing the Windows key + R (or going to Start > Run > typing “cmd” without the quotation marks and hitting Enter).
At the command prompt, type the following word for word:
Code:
1. “cd Desktop”
2. “cd bootsect”
3. “BootSect.exe”
4. “BootSect.exe /nt60 d:” (wherein “d” stands for the designated letter of my USB flash drive; exchange it with yours if it’s different, since it could be e, f, g, etc.)
Here’s a photo of what it should look like:


And if all goes well, you should be able to read the following message: “Bootcode was successfully updated on all volumes”. This means you now have a bootable USB flash drive. Congratulations!


5. Copy the Windows 7 install files to your bootable USB flash drive. Perhaps the easiest step in all of this minor hackery, is this. Find your Windows 7 beta ISO file, extract its contents using WinRAR, and copy the resulting files (all of them) into your empty and newly configured to boot USB flash drive. Once that’s done, safely remove it, and use it to boot any computer to install Windows 7 on it. It’s that simple.
Installing Windows 7 with a USB flash drive - What now?



Now that you have a bootable USB flash drive with the Windows 7 install files inside it, you’ll be able to install Windows 7 on any machine, provided that the hardware supports it. I may have been unsuccessful in installing Windows 7 on my Aspire One, but I did succeed in installing it on my other laptop, which proves that the bootable USB flash drive I made works.
Hopefully, this little thing I’ve done helps someone out there. Maybe someone like me who didn’t have a spare blank DVD on hand when I wanted to install Windows 7 so bad.
Please say thanx if it helped you.
Enjoy...........

How To Repair Your Corrupted System

Posted on Wednesday, November 11, 2009 by Ajit

Sometimes we get registery entires or system files damaged somehow even if we dont know a real reason,but same time we need to fix without installing new system
here we go.in our windows is an application which can do this .

C:\WINDOWS\system32

then look for the application named "Webfolder.msi"

then insert ur windows Cd and run the programe then follow the pics




















Dont forget to restart ur computer.

Download the App:


Code:
http://rapidshare.com/files/190084713/webfldrs.rar

Learn C programming

Posted on Wednesday, October 14, 2009 by Ajit

Friends,
This is a very simple article regarding how to start with "C" programming. Let me first explain what is "C", It is basically a middle level language developed to make ease of the coding as compared to assembly level language.
Install Turbo C or whatever compiler known to you..........

To start with; Initially I suggest you to just know a simple header file "stdio.h".Now the question is, what is this header file ?. So the answer to this question is, this is a file called as standard input-output i.e is helps to call the pre defined functions like printf() and scanf().
so here is the syntax about how to write it.

#include

the "include" above informs the pre-processor to include the package.

Then, let us start with the main function, always remember that main is the function which gets executed first irrespective of its position in the code.
The syntax for main is

void main()
{
}

here the void specifies the return type i.e value returned by the function (not to worry for now, you will understand it later on)
The "{", "}" denotes the brackets in which whole code is written.

lets take an example

void main()
{
printf("Hii");
getch();
}

How to run a program ?
1)COMPILE ==> alt+F9
2)Run ==>ctrl+F9

In the above code there are 3 things to be noticed.
1) The printf statement is containing the value to be printed but, it is in quotes.
2)All the statements are ended by a ";"
3)"getch()", This is something which you would be worried about.Basically it a function for a character to be inputted. Now this function is used here just to make the output screen visible, and when you press any key then the sereen will exit.
you can run the program without getch() and see it.

Further part would be explained depending only upon your interest, please comment if any help is required.

Hotmail passwords leaked online

Posted on Monday, October 5, 2009 by Ajit

According to Neowin, it received information from a source claiming that a "hack or phishing scheme" allowed hackers to post passwords from thousands of Hotmail accounts.

Neowin first viewed the passwords on a developer forum on Pastebin.com. The posting was added to the site on October 1. According to Neowin, it saw "part" of the posted list and "can confirm the accounts are genuine and most appear to be based in Europe."

Although it was unsure how many accounts were hacked, the original list displays accounts with names starting with "A" and "B." It included users with @hotmail.com, @msn.com, and @live.com domains, the publication claimed.

Although Microsoft has yet to confirm the existence of the list or a breach of security, the company told BBC News on Monday that it knows about the claim and is working to determine whether it is accurate.

"We're actively investigating the situation and will take appropriate steps as rapidly as possible," the Microsoft representative told BBC News.

Microsoft did not immediately respond to CNET's request for comment.

Whether the passwords were leaked is still in question. That said, Twitter and other social networks are abuzzwith people advising others to change their passwords.

How to mazimise torrent speed for braodband connection

Posted on Friday, September 25, 2009 by Ajit

Most of the Internet users who have Broadband connection, use torrents to download applications and other media files from the World Wide Web. The application include movies, songs in MP3 format, articles among others. Some of them indulge in downloading proprietary applications which of course, is illegal. The most common torrentapplications that are used include µtorrent, Azureus among others.

The most common and often unclear issue the users face is the lack of speed when downloading the files. It is often experienced by downloaders who use torrent applications, that inspite of the bandwidth they have, the speed is abysmal and often so low that the download seems to be at snail's pace. The basic associated with the torrentdownloads are explained in this article.

Seeds and Peers:

Seeds and Peers are two common terms associated with torrents. What do they mean? Well a seed is a user who has downloaded the entire file and is basically sharing it with others. Those files or applications whose torrents have been uploaded recently means that the download is taking place from seeds. On the other hand, peers who are otherwise known as leechers, have only a part of file and they need the remaining part to complete their download. In most cases, thre are many peers and seeds who share the file to others, thus making the download as fast as possible. In other words, more the number of seeds and peers, greater the speed of the download. If the number of peers increase then the upload rate from your computer increases.

Torrent is basically a peer to peer download. More clearly, in normal downloads, the file that we are downloading is hosted on a server and then when we download the file, a one-to-one connection is established between the server on which the file is hosted and our system. On the other hand, torrent is a peer to peer download, which implies that the file that we download is hosted on systems that belong to individual users like most of us. These users have the entire file with them or a part of it. They may be downloading the remaining part from others much like what you are doing!

Maximum torrent speed for Broadband

Posted on by Ajit

Most of the Internet users who have Broadband connection, use torrents to download applications and other media files from the World Wide Web. The application include movies, songs in MP3 format, articles among others. Some of them indulge in downloading proprietary applications which of

course, is illegal. The most common torrentapplications that are used include µtorrent, Azureus among others.

The most common and often unclear issue the users face is the lack of speed when downloading the files. It is often experienced by downloaders who use torrent applications, that inspite of the bandwidth they have, the speed is abysmal and often so low that the download seems to be at snail's pace. The basic associated with the torrentdownloads are explained in this article.

Seeds and Peers:

Seeds and Peers are two common terms associated with torrents. What do they mean? Well a seed is a user who has downloaded the entire file and is basically sharing it with others. Those files or applications whose torrents have been uploaded recently means that the download is taking place from seeds. On the other hand, peers who are otherwise known as leechers, have only a part of file and they need the remaining part to complete their download. In most cases, thre are many peers and seeds who share the file to others, thus making the download as fast as possible. In other words, more the number of seeds and peers, greater the speed of the download. If the number of peers increase then the upload rate from your computer increases.

Torrent is basically a peer to peer download. More clearly, in normal downloads, the file that we are downloading is hosted on a server and then when we download the file, a one-to-one connection is established between the server on which the file is hosted and our system. On the other hand, torrent is a peer to peer download, which implies that the file that we download is hosted on systems that belong to individual users like most of us. These users have the entire file with them or a part of it. They may be downloading the remaining part from others much like what you are doing!

Free recharge trick for Reliance mobile

Posted on Saturday, August 15, 2009 by Ajit

Reliance free recharge trick is very simple.it has worked in many mobiles that we have tested.you have to just change the first four digits of the recharge card number to use reliance double recharge trick.100% working free recharge tricks for reliance gsm and cdmaRelience Double Recharge Trick:After Recharge From Scratch Card Replace 1st 4 Digit With 3699

Free GPRS-Airtel Live

Posted on Friday, July 24, 2009 by Ajit

i am back with my new free GPRS trick only for S40 Nokia phones as i researched it on ma cell N6233(You try on ur cell)..So below i am mentionin the trick.

To enjoy this trick your Mobile office [volume based by *567# ]and
airtel live should be activated and balance must be below 30 paisa.

Use APN: airtelfun.com
IP: 100.001.200.099

Here starts the trick Open your default browser
and make a bookmark named LIVE TV and use this url
rtsp://100.1.200.213/
and save it now back in default browser open http://m.orkut.com
with airtel live profile you will get error that
You are not authorised to view this service

Now,
Come to bookmarks and open LIVE TV , Keep it running for 15 to 20 seconds
then cancel it, AND VOILLA Everything is now free in Default browser.
Downloadin not sure.

Use UCWEB 6.3 for perfect browsing.
or visit: http://wap.google.com/gwt/n?u/ and enter URL m.t9space.com and browse for free.......
or visit: wap.google.com

Research Paper in Computer Science

Posted on Thursday, July 23, 2009 by Ajit

Guys I am genuinely sorry for this article here which no where suits in this section of Hacking but then as I have already mentioned that this blog would deal with all kinds of informative articles which I find as Important, this one is specially for my friends from CSE department........

Writing a research paper in computer science is not an easy thing. If you want to present a qualified piece of work, then you should have a look at this article. Interesting and informative hints on writing a research paper in computer science are given here.

Firstly, you should decide what topic you want to enlighten in your research papers in computer science. You know that such subject as Computer Science is rather wide, and you cannot just say that your research paper is in computer science. Make the topic more specific, narrow. It may be about software engineering or about the system of databases. In fact, a variety of topics for your research paper in computer science is borderless.

Secondly, you should find a good guideline as for the structure of your research papers in computer science. You should remember that each chapter should be logically connected to the next one.

Thirdly, you should find interesting materials for writing the computer science research paper. It is possible to use information not only from the libraries, but also data from the Internet and other possible articles. If you have a possibility and time to visit a seminar – do it! Fresh ideas and suggestions of the professionals will surely improve your computer science research paper.

Fourthly, you should edit your research papers in computer science. After you pick a topic, find interesting materials and write this paper according to the structure, it is time to edit yourcomputer science research papers. Read everything you have written and make sure that information in this research paper in computer science is clear and up to the point.

Try to follow these simple rules of writing a computer science research paper, and this writing process will seem easier to you.

Top 20 Websites To Download Free EBooks

Posted on Wednesday, July 15, 2009 by Ajit

Reading is the most simplest way for human to derive and constructing meaning in order to gain a particular knowledge from a source. This tendency has been digitized when books evolve into digital media equivalent – E-Books.

It would be nice if we’re able to download free e-book and take it with us. That’s why we’ve again crawled deep into the Internet to compile this list of 20 places to download free e-books for your use. Full list after jump.

  1. FreeBookSpot

    FreeBookSpot is an online source of free ebooks download with 4485 FREE E-BOOKS in 96categories which up to 71,97 GB.

    You can search and download free books in categories like scientific, engineering, programming, fiction and many other books. No registration is required to download free e-books.

    FreebookSpot

  2. 4eBooks

    4eBooks has a huge collection of computer programming ebooks. Each downloadable ebook has a short review with a description. You can find over thousand of free ebooks in everycomputer programming field like .Net, Actionscript, Ajax, Apache and etc.

    4ebooks

  3. Free-EBooks

    Free-eBooks is an online source for free ebook downloads, ebook resources and ebook authors. Besides free ebooks, you also download free magazines or submit your own ebook.

    You need to become a Free-EBooks.Net member to access their library. Registration is free.

    free-ebooks

  4. ManyBooks

    ManyBooks provides free ebooks for your PDA, iPod or eBook Reader. You can randomly browse for a ebook through the most popular titles, recommendations or recent reviews for visitors. There are 21,282 eBooks available here and they’re all free!

    manybooks

  5. GetFreeEBooks

    GetFreeEBooks is a free ebooks site where you can download free books totally free. All the ebooks within the site are legal downloadable free ebooks.

    getfreeebooks

  6. FreeComputerBooks

    FreeComputerBooks consists of a huge collection of free online Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials. It is very well categorized by topics, with 12 top level categories, and over 150 sub-categories.

    freecomputerbooks

  7. FreeTechBooks

    FreeTechBooks lists free online computer science, engineering and programming books,textbooks and lecture notes, all of which are legally and freely available over the Internet. Throughout FreeTechBooks, other terms are used to refer to a book, such as ebook, text,document, monogram or notes.

    freetechbooks

  8. Scribd

    Scribd, the online document sharing site which supports Word, Excel, PowerPoint, PDF and other popular formats. You can download a document or embed it in your blog or web page.

    scribd

  9. Globusz

    Globusz is a unique ePublishing house, specializing in free eBook downloads. They also provide an excellent Star Rating Showcase for new and evolving authors.

    globusz

  10. KnowFree

    KnowFree is a web portal where users are able to exchange freely e-books, video training and other materials for educational purposes and self-practice.

    knowfree

  11. OnlineFreeEBooks

    OnlineFreeEBooks provides links to various ebooks (mostly in pdf) spanning in 9 big categorieswhich are: Automotive Ebooks, Business Ebooks, Engineering Ebooks, Gadget Ebooks, Hardware Ebooks, Health & Medical Ebooks, Hobbies Ebooks, Programming & Technology Ebooks, Sport & Martial Art Ebooks.

    onlinefreeebooks

  12. MemoWare

    MemoWare has a unique collection of thousands of documents (databases, literature, maps, technical references, lists, etc.) specially formatted to be easily added to your PalmOS device,Pocket PC, Windows CE, EPOC, Symbian or other handheld device.

    memoware

  13. BluePortal

    blueportal

  14. OnlineComputerBooks

    OnlineComputerBooks contains details about free computer books, free ebooks, free online books and sample chapters related to Information Technology, Computer Science, Internet, Business, Marketing, Maths, Physics and Science which are provided by publishers or authors.

    onlinecomputerbooks

  15. SnipFiles

    SnipFiles offers you free ebooks and software legally by brought or attained PLR, resale or master rights to all the products on their page.

  16. snipfiles

  17. BookYards

    BookYards is a web portal in which books, education materials, information, and content will be freely to anyone who has an internet connection.

  18. bookyards

  19. The Online Books Page

    The Online Books Page is a Listing over 30,000 free books on the Web.

  20. The Online Books Page

  21. AskSam Ebooks

    AskSam Ebooks has a collection of free e-books like Shakespeare, and assorted legal & governmental texts.

  22. asksam

  23. Baen Free Library

    baen free library

    Baen Free Library is an online library of downloadable science fiction novels.

  24. EBookLobby

    Free ebooks in eBookLobby are divided into different categories. Categorys range from business, art, computing and education. Select the category appropriate to the e-book you’re looking for.

    ebooklobby