Pages

June 9, 2011

Save any Web page as an image or PNG or PDF


Quickly save any web page as a JPEG or PNG image file or a PDF file using URLCapt. After the file has been generated using this service you can download the file, share it with others over social networks, or copy the generated URL pointing to the file.

Take full-length snapshot of any webpage.

Visit :  URLCapt

April 22, 2011

How to Create Your Own Customized Run Commands

The Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

 
Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.

1. Right click on your Desktop and select New -> Shortcut.

2. You will see a “Create Shortcut” Dialog box as shown below


3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.

4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.

5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.

6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.

To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for [...]

February 14, 2011

Change your Processor to Intel Xeon 8.0 GHZ or Any

Type following lines in notepad


Windows Registry Editor Version  5.00
[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]
"ProcessorNameString"="Intel Xeon 8.0GHz"

and save as processor.reg and run it.
To see new processor name click on "My Computer" and right click and choose property, which will show "Intel Xeon 8.0GHz. (It is temporary change only)

Note : For permanent changes regedit /s processor.reg in notepad and save as phack.bat

and put both files (Processor.reg and phack.bat)
in windows start up folder [Documents and settings\all users\start meny\programs\startup]
which will run whenever the system restarts.

Change any folder to Recycle Bin (For Data Security)

For changing any folder to recycle bin type these line in notepad :

[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}

And Save as Desktop.ini in your folder (Which you want to change into recycle bin) to change recycle bin.

We save desktop.ini in D:\data2 folder and then we open DOS prompt and type the below command, which will convert the data2 folder into Recycle Bin

D:\>attrib +a +r +s data2 /s /d

To change any folder into control panel use following CLSID:
Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}

Types of Hacking

1. Local Hacking :
Local hacking is done from local area where we have physical access, like through printer etc. We do this type of hacking Trojans and viruses with help of hard disk and pen drive.

2. Remote Hacking :
Remote hacking is done remotely by taking advantage of the vulnerability of the target system. We need to follow steps for remote hacking to enter on target system.

3. Social Engineering :
Social Engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face.

January 5, 2011

How to Create a CON folder in Windows?


If You try to create folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?

NO its Not Possible....

NOTE :- [If You Are Think About We Can Also Type By Using "ALTR+0160" But Its giving space and also its Invalid]

NO because when create a new folder and try to rename it to any  specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message “The specified device name is invalid”.
What is the reason for this? Simple, these names represent the internal devices and hence we cannot create folders with the above names.
YES because it is still possible to create these folders using the command prompt. Here’s the instructions to create it.

Step To Creat con Folder

Step 1:- Go to command prompt

 Type in prompt (FOR EG. TO CREATE CON FOLDER IN E: DRIVE)

C:\>md \\.\e:\con
  
 NOTE: “con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.

Step 2 :- To delete the folder use the following command

C:\>rd \\.\e:\con
NOTE: The folder can only be deleted from the command prompt.You cannot remove it by right-click delete.

Please give the comment for this valuable Information......

January 3, 2011

How to make simple calculation in dos prompt & make mini calculator

I am going to show how to make simple calculation in Dos prompt

Go to start > run > type cmd hit enter
Now type c:\>set /a 10+10 hit enter
You got answer 20.
Use all arithmetic operators and expressions for calculation.
See below calculation.












If you want more details type c;\>set /? hit enter.
If you want mini calculator in batch file, simply copy below code and paste to the notepad.

@echo off
:A
cls
echo Simple Calculator
set /p B=Enter the value and hit enter:
set /a C=%B%
echo %B% = %C%
pause
goto A

Save Calculator.bat
.bat is extension for batch file

Now double click that bat file, your mini calculator Is ready like below.


Freeup or clean RAM using Notepad


RAM - Random Access Memory is one of the main component of computer that is responsible for the process of the operating system. Since all the Operating systems support Multiprocessing, hence require a good RAM speed.
Since all the current running processes are stored onto the RAM, it slows the system speed. Sometimes the process which have executed but are not required by the OS are stored on the RAM. So, we can remove or freeup the RAM with unused junk data to Speedup the System or processing speed.
We can clean the RAM just by using a Notepad application. This donot require any advanced software. 
The process to do so is as follows.

Open Notepad
Type
FreeMem=Space(64000000)
save it as “CleanRAM.vbs” on desktop

Note: Type the name of file along with inverted commas
Run the file and your RAM may be free.
Of course you can edit the code in the file for a greater “cleaning-progress”.
 
For example:
FreeMem=Space(1280000000)
FreeMem=Space(2560000000)
FreeMem=Space(5120000000)
FreeMem=Space(10240000000)

Chat with Friends through ms dos Command Prompt (CMD).

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:

 

7) Now, type the IP Address of the computer you want to contact and press enter You will see something like this: 

 
8) Now all you need to do is type your message and press Enter.
Start Chatting.......!  

 

January 2, 2011

Top 5 Most Famous Hackers of All Time

 

. . .Top 5 Most Famous Hackers of All Time. . .

 
1. Jonathan James : James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at the age of 16 . In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off." James also cracked into NASA computers, stealing software worth approximately $1.7 million.



2. Adrian Lamo : Lamo's claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to make his intrusions. In a profile article, "He Hacks by Day, Squats by Night," Lamo reflects, "I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional."



3. Kevin Mitnick : A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.



4. Kevin Poulsen : Also known as Dark Dante, he gained recognition for his hack of LA radio's KIIS-FM phone lines, which earned him a brand new Porsche, among other items. His hacking specialty, however, revolved around telephones.



5. Robert Tappan Morris : Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.

Defining Hacker..........


Hacker is a word that has two meanings:

Traditionally, a hacker is someone who likes to tinker with software or electronic systems.
Hackers enjoy exploring and learning how computer systems operate.

Recently, hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gains. Technically, these criminals are crackers (criminal hackers). Crackers break into (crack) systems with malicious intent. They are out for personal gain: fame, profit, and even revenge. They modify, delete, and steal critical information, often making other people miserable.

 


The good-guy (white-hat) hackers don’t like being in the same category as the bad-guy (blackhat) hackers. (These terms come from Western movies where the good guys wore white cowboy hats and the bad guys wore black cowboy hats.) Whatever the case, most people give hacker a negative connotation. Many malicious hackers claim that they don’t cause damage but instead are altruistically helping others. Yeah, right. Many malicious hackers are electronic thieves.

Hackers (or bad guys) try to compromise computers.
Ethical hackers (or good guys) protect computers against illicit entry.

What is Computer Hacking ?


Computer hacking is a process to bypass the security mechanisms of an information system or network.

OR

In common usage, hacker is a generic term for a computer criminal, often with a specific specialty
in computer intrusion. While other definitions peculiar to the computer enthusiast community
exist, they are rarely used in mainstream context...

OR

Computer hacking is an unauthorized use of computer and network resources. (The term "hacker" originally
meant a very gifted programmer. In recent years though, with easier access to multiple systems,
it now has negative implications.)