Pages

February 14, 2011

Change your Processor to Intel Xeon 8.0 GHZ or Any

Type following lines in notepad


Windows Registry Editor Version  5.00
[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]
"ProcessorNameString"="Intel Xeon 8.0GHz"

and save as processor.reg and run it.
To see new processor name click on "My Computer" and right click and choose property, which will show "Intel Xeon 8.0GHz. (It is temporary change only)

Note : For permanent changes regedit /s processor.reg in notepad and save as phack.bat

and put both files (Processor.reg and phack.bat)
in windows start up folder [Documents and settings\all users\start meny\programs\startup]
which will run whenever the system restarts.

Change any folder to Recycle Bin (For Data Security)

For changing any folder to recycle bin type these line in notepad :

[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}

And Save as Desktop.ini in your folder (Which you want to change into recycle bin) to change recycle bin.

We save desktop.ini in D:\data2 folder and then we open DOS prompt and type the below command, which will convert the data2 folder into Recycle Bin

D:\>attrib +a +r +s data2 /s /d

To change any folder into control panel use following CLSID:
Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}

Types of Hacking

1. Local Hacking :
Local hacking is done from local area where we have physical access, like through printer etc. We do this type of hacking Trojans and viruses with help of hard disk and pen drive.

2. Remote Hacking :
Remote hacking is done remotely by taking advantage of the vulnerability of the target system. We need to follow steps for remote hacking to enter on target system.

3. Social Engineering :
Social Engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face.