Lahore High Court has issued an order to ban the access of popular social networking site Facebook in Pakistan for holding a contest of Prophet Muhammad's Caricatures. Chinese News Agency Xinhua reported that Judge Ejaz Ahmed Chaudhry had instructed the Ministry of Telecom to block the access of Facebook in Pakistan and submit a written reply by May 31.
Islamic Lawyers Movement had filed a petition against a competition that was about Islamic religion founder Prophet Muhammad's blasphemous caricatures on Facebook. The lawyers stressed, "The competition has hurt the sentiments of the Muslims." The Ministry of Telecom officials told the court that after the news was reported, Facebook pages showing Prophet Muhammad's blasphemous caricatures were blocked.
However, the lawyers argued that the entire website should be blocked and hence Facebook is reportedly blocked in Pakistan by Telecommunication Authority. So until a written reply is received, the website will apparently be inaccessible in Pakistan .
That goes out to Facebook, ouch!
Pakistan Bans Facebook over Caricatures
Posted by
iCoolHacker
on Thursday, May 20, 2010
Labels:
Hacker News
/
Comments: (0)
Fujitsu CELSIUS Workstations Pepped for Adobe CS5
Fujitsu has launched CELSIUS workstations which are specially optimized for the new Adobe Creative Suite 5. The CELSIUS lineup consists of four workstations: CELSIUS W380, CELSIUS W480, CELSIUS M470-2 and CELSIUS R570-2, which promise to provide design professionals a choice of workstations suited for their needs. Needless to say, the systems have been configured and optimized for the best performance and stability for creative professionals from the online, print and video media industry who will be using the new Adobe CS5.

Each of the Fujitsu CELSIUS workstation comes preinstalled with a unified product design based on Fujitsu's intensive field tests. These workstations are touted to have high reliability and performance with environmental factors being taken into consideration. Along with all the above, these boast of elegant and timeless look rather than the boring appearance generally associated with workstations.

This new range of Fujitsu CELSIUS workstations optimized for Adobe is available throughout CEMEA&I. The pricing of the different workstation models under the CELSIUS lineup are as below.
The pricing may vary according to local markets and specifications.
Each of the Fujitsu CELSIUS workstation comes preinstalled with a unified product design based on Fujitsu's intensive field tests. These workstations are touted to have high reliability and performance with environmental factors being taken into consideration. Along with all the above, these boast of elegant and timeless look rather than the boring appearance generally associated with workstations.
This new range of Fujitsu CELSIUS workstations optimized for Adobe is available throughout CEMEA&I. The pricing of the different workstation models under the CELSIUS lineup are as below.
- W380 - Rs. 59,990
- W480 - Rs. 1, 29, 890
- M470 -2: Rs 1,89,970
- R570-2 : Rs 2, 59, 780
The pricing may vary according to local markets and specifications.
WebOS coming to Slates, Web-connected Printers: HP
HP has officially announced its plans for Palm's WebOS. HP CEO Mark Hurd revealed this juicy detail at the company's second-quarter 2010 earnings conference call. Hurd told analysts that the WebOS would hit in form factors such as Slates and web-connected devices. Hence, the buzz we've heard about the upcoming HP tablet internally dubbed asHurricane is true.
HP has recently acquired Palm and the transaction is set to close on July 31. Obviously, HP would be making best of Palm's WebOS and would be investing in the research and development of the same. At the recent conference call, Hurd told the analysts that "after closing the acquisition we expect to leverage webOS in the app store beyond Smartphones in the form factor such as slates and web connected printers".
HP already has Photosmart Premium printer sporting TouchSmart Web printer features and a 4.33-inch touchscreen. We suppose more such printers with WebOS loaded on them can be expected.
The transcript of HP's second quarter 2010 earnings call can be found at Scribd.
HP has recently acquired Palm and the transaction is set to close on July 31. Obviously, HP would be making best of Palm's WebOS and would be investing in the research and development of the same. At the recent conference call, Hurd told the analysts that "after closing the acquisition we expect to leverage webOS in the app store beyond Smartphones in the form factor such as slates and web connected printers".
HP already has Photosmart Premium printer sporting TouchSmart Web printer features and a 4.33-inch touchscreen. We suppose more such printers with WebOS loaded on them can be expected.
The transcript of HP's second quarter 2010 earnings call can be found at Scribd.
Fuzzdb Beta Release
Posted by
iCoolHacker
Labels:
Hacker News
/
Comments: (0)
Web Fuzzing Discovery and Attack Pattern Database – A comprehensive set of fuzzing patterns for discovery and attack during highly targeted brute force testing of web applications.
This is especially useful for many filter bypass type exploits. Identical encoding sequences have been observed to bypass filters for more than one application. Examples can be observed in categories including xss, sqli, evil script upload, OS command execution, traversal issues, directory indexing bugs, source code revealing vulnerabilities, etc. In recent times, for example, new embedded webservers were discovered to be vulnerable to directory traversal issues triggered by encodings that exploited Microsoft IIS in 2000.
This approach is also useful for targeted use of brute force for discovery using, for example, lists of known vulnerable scripts sorted by platform type, default locations of critical files of popular apps, high quality lists of common directory names.
More info and Download: http://code.google.com/p/fuzzdb
"World's Smallest Laser Printer" by Samsung
Samsung Electronics has enhanced its printer line-up with the launch of 8 new models in the Laser Printer, Multi Function Printer and Network Printer categories, including what the company claims to be the world's smallest laser printer-ML-1666.
The ML-1666 is a compact monochrome laser printer which has a speed of 16 pages per minute. It claims to offer a number of easy to use one touch features into the product design. This petit device is priced at an MRP of Rs. 5,499, which includes a starter toner of 1,500 pages, making it very affordable even for home users or small shopkeepers. At just Rs.399 extra, you get a 2 year warranty in addition to the standard one year onsite warranty.
In addition to the ML-1666, Samsung has launched three Mono Laser printers - ML-1911, ML-2525, and ML-2581N. These stylish Laser Printers boast monthly duty cycles of up to 12,000 pages, 8 MB Memory and Print speeds of 18ppm/24 ppm pages (ML-2526/2581N). All the Samsung Laser Printers launched today sport 'Printelligent' features such as Toner Save, Smart Panel (enables easy trouble shooting), One Touch print screen and AnyWEb Printing. The MRP of ML-1911 is Rs. 6,499; ML-2526 is Rs. 8,999 and the ML-2581 N is priced at Rs. 12,999. These printers come with a one year, onsite warranty.
Apart from these, Samsung has added a range of Laser Multi Function Printers to its current portfolio. These feature rich Multi Function Printers SCX-4601, SCX-4623 FH, SCX-4623 FN boast of high speeds up to 22 ppm and are designed for optimum usability. The MRP of SCX-4601 is Rs. 9,999 while the SCX-4623FH costs Rs.14,499.
The new SCX-4623FN is a versatile 22 ppm Network ready MFP with Print, Scan, Copy and Fax functions, gives up to 1200x1200 dpi effective output for print/scan and Copy functions. It comes with 128 MB memory; a monthly duty cycle of up to 10,000 pages and a 7 MB Fax memory. An ADF capacity of 40 sheets; Advanced Digital Copy Functions - 2 sides in 1 (ID Copy), Autofit, Clone, Poster Copy and Fax to PC and PC to Fax capability, all contribute to making this printer ideal for SMB and workgroup environments .The Samsung SCX-4623FN is priced at Rs. 15,499.
The ML-1666 is a compact monochrome laser printer which has a speed of 16 pages per minute. It claims to offer a number of easy to use one touch features into the product design. This petit device is priced at an MRP of Rs. 5,499, which includes a starter toner of 1,500 pages, making it very affordable even for home users or small shopkeepers. At just Rs.399 extra, you get a 2 year warranty in addition to the standard one year onsite warranty.
In addition to the ML-1666, Samsung has launched three Mono Laser printers - ML-1911, ML-2525, and ML-2581N. These stylish Laser Printers boast monthly duty cycles of up to 12,000 pages, 8 MB Memory and Print speeds of 18ppm/24 ppm pages (ML-2526/2581N). All the Samsung Laser Printers launched today sport 'Printelligent' features such as Toner Save, Smart Panel (enables easy trouble shooting), One Touch print screen and AnyWEb Printing. The MRP of ML-1911 is Rs. 6,499; ML-2526 is Rs. 8,999 and the ML-2581 N is priced at Rs. 12,999. These printers come with a one year, onsite warranty.
Apart from these, Samsung has added a range of Laser Multi Function Printers to its current portfolio. These feature rich Multi Function Printers SCX-4601, SCX-4623 FH, SCX-4623 FN boast of high speeds up to 22 ppm and are designed for optimum usability. The MRP of SCX-4601 is Rs. 9,999 while the SCX-4623FH costs Rs.14,499.
The new SCX-4623FN is a versatile 22 ppm Network ready MFP with Print, Scan, Copy and Fax functions, gives up to 1200x1200 dpi effective output for print/scan and Copy functions. It comes with 128 MB memory; a monthly duty cycle of up to 10,000 pages and a 7 MB Fax memory. An ADF capacity of 40 sheets; Advanced Digital Copy Functions - 2 sides in 1 (ID Copy), Autofit, Clone, Poster Copy and Fax to PC and PC to Fax capability, all contribute to making this printer ideal for SMB and workgroup environments .The Samsung SCX-4623FN is priced at Rs. 15,499.
Affiliate Programmes
Posted by
iCoolHacker
Labels:
Hacker News
/
Comments: (0)
I have a software as a service app that I've decided I would like to offer an affiliate program for. I spent some time today looking at various programs that are available and they all seem to have relatively high monthly fees, high setup fees, and obtuse setup processes.
Does anyone know of a simple affiliate program without setup or monthly fees? Ideally the provider would setup the affiliate accounts, charge me for the affiliate commissions plus their cut, then pay the affiliates. On my end, I'd look for the affiliate code and setup a cookie, and make a POST to the program with the affiliate code when someone signs up. I'd also like to review the affiliate applications to make sure they aren't spammy.
Does anything like this exist? What do you all use? If nothing like this exists, would anyone use it if I built it?
Does anyone know of a simple affiliate program without setup or monthly fees? Ideally the provider would setup the affiliate accounts, charge me for the affiliate commissions plus their cut, then pay the affiliates. On my end, I'd look for the affiliate code and setup a cookie, and make a POST to the program with the affiliate code when someone signs up. I'd also like to review the affiliate applications to make sure they aren't spammy.
Does anything like this exist? What do you all use? If nothing like this exists, would anyone use it if I built it?
Hacking Exposed Cisco Networks
Posted by
iCoolHacker
Labels:
Hacker News
/
Comments: (0)
Product Description Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposedmethodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies. From the Back Cover Implement bulletproof Cisco security the battle-tested Hacking Exposed way Defend against the sneakiest attacks by looking at your Cisco net (Programming)
Types of Hacking
Posted by
iCoolHacker
on Saturday, May 15, 2010
Labels:
Hackers Definition
/
Comments: (0)
There are three main types of hacking.
1. Local Hacking
2. Social Networking Hacking
3. Remote Hacking.
History of hacking
Posted by
iCoolHacker
Labels:
Hackers Definition
/
Comments: (0)
•Telephone hacking
–Use telephone freely
–It’s called phreaking
•Computer virus
–Destroy many computers
•Network hacking
–Hack the important server remotely and destroy/
modify/disclose the information
Who is hacker?
Posted by
iCoolHacker
Labels:
Hackers Definition
/
Comments: (0)
•Hack
–Cut with repeated irregular blows
–Examine something very minutely
•Hacker
–The person who hacks
•Cracker
–System intruder/destroyer
•Hacker means cracker nowadays
–Meaning has been changed
Create a Gradient Background Effect
A gradient background effect will display your selected HTML background colors in ascending or descending color variations - from lightest to darkest or darkest to lightest.
This powerful HTML code effect can be used to give your web pages a unique look and feel. However, it must be used very cautiously.
Please ensure that you select your HTML web page background colors very carefully, as your text must be clearly visible through the background colors you select.
In addition, you must select one light color and another color that is several shades lighter in order for this HTML gradient background effect to display properly.
This effect can be used for your entire web page background, or within your table cells.
To use the gradient effect as your web page background, use the following BODY tag:
This powerful HTML code effect can be used to give your web pages a unique look and feel. However, it must be used very cautiously.
Please ensure that you select your HTML web page background colors very carefully, as your text must be clearly visible through the background colors you select.
In addition, you must select one light color and another color that is several shades lighter in order for this HTML gradient background effect to display properly.
This effect can be used for your entire web page background, or within your table cells.
To use the gradient effect as your web page background, use the following BODY tag:
Microsoft.Gradient(endColorstr='#C0CFE2', startColorstr='#FFFFFF', gradientType='0');">
To use the gradient effect within your HTML tables, place the following code within your table tag:
style="filter:progid:DXImageTransform.Microsoft.Gradient(endColorstr='#C0CFE2', startColorstr='#FFFFFF', gradientType='0');"
Although you can edit the gradient colors indicated in red, keep in mind, in order for the gradient effect to display properly, you must select one light color and another color that is several shades lighter.
Embedding Web Pages within Web Pages
If you're looking for a way to display a web page within a web page, this HTML code may be just what you're looking for.
As you can see in the example below, we are displaying a web page within the web page that you are viewing right now.
This HTML code will enable you to display rotating tips, images or whatever you'd like.
Copy and paste the code below into your web page where you would like to embed the additional page.
Copy and paste the code below into your web page where you would like to embed the additional page.
As you can see in the example below, we are displaying a web page within the web page that you are viewing right now.
This HTML code will enable you to display rotating tips, images or whatever you'd like.
Copy and paste the code below into your web page where you would like to embed the additional page.
Copy and paste the code below into your web page where you would like to embed the additional page.
Change the text indicated in bold to suit your needs.
Changing Table Background Colors on Mouseover
If you're looking for a great way to spice up your HTML tables, this HTML mouseover code may be just what you're looking for.
Place your mouse pointer over each of the HTML table cells below to view this HTML mouseover effect. The HTML table cells will change to a specified color when you place your pointer over the cells.
This HTML code will enable you to give your HTML tables a more professional look and feel, as it will greatly improve the presentation of your HTML table data.
However, when using this HTML code, please ensure that you only use light colors within your HTML table cells to ensure your text can be easily viewed.
Place the following code within the or tag of your HTML table code:
Place your mouse pointer over each of the HTML table cells below to view this HTML mouseover effect. The HTML table cells will change to a specified color when you place your pointer over the cells.
This HTML code will enable you to give your HTML tables a more professional look and feel, as it will greatly improve the presentation of your HTML table data.
However, when using this HTML code, please ensure that you only use light colors within your HTML table cells to ensure your text can be easily viewed.
HTML table data 1 |
HTML table data 2 |
HTML table data 3 |
| onMouseover="this.bgColor='#EEEEEE'"onMouseout="this.bgColor='#FFFFFF'" |
Your table code might look something like this:
|
| Change the text indicated in bold to suit your needs. However, make sure you select a background color that will enable your text to be easily viewed. |
Protect Yourself from Google Hacking?
Posted by
iCoolHacker
on Thursday, May 13, 2010
Labels:
E-Mail Hacking
/
Comments: (0)
The first step for protecting yourself from something is knowing how that something works. In the case of Google hacking, you will have to learn how it can be used for acquiring confidential information from individuals and corporations.
An ideal place to look for a how to hack with Google tutorial is Amazon. Within this online store you will find two books that can help you. The first one has been written by Rael Dornfest and Tara Calishain, and it's title is Google Hacks : Tips & Tools for Smarter Searching. This book is considered the introductory course for any computer user who wants to learn how he can exploit the potential that Google offers.
The second book is Google hacking for penetration testers, written by the author Johnny Long. Considered a more advanced lecture, it gives the user the knowledge that only black hackers are aware of. The great thing of this book is that it focuses on the weak points that most system administrators overlook and that are exploited by almost every hacker. Google, as innocent as it may be, has become another tool waiting to be exploited.
After you have read this two books, you should be able to perform the most basic kind of Google hacks and even some of the most advanced ones. But, as if everything in life, you need to master the art of Google hacking. And, if you wish to sell your services as a network security expert, it's better to know it from the A to the Z.
The best way to do it is to contact other hackers in their specialized forums, via IRC or even at the multiple conventions that they celebrate around the USA. You will find tons of information that you will not have been able to acquire by yourself.
An ideal place to look for a how to hack with Google tutorial is Amazon. Within this online store you will find two books that can help you. The first one has been written by Rael Dornfest and Tara Calishain, and it's title is Google Hacks : Tips & Tools for Smarter Searching. This book is considered the introductory course for any computer user who wants to learn how he can exploit the potential that Google offers.
The second book is Google hacking for penetration testers, written by the author Johnny Long. Considered a more advanced lecture, it gives the user the knowledge that only black hackers are aware of. The great thing of this book is that it focuses on the weak points that most system administrators overlook and that are exploited by almost every hacker. Google, as innocent as it may be, has become another tool waiting to be exploited.
After you have read this two books, you should be able to perform the most basic kind of Google hacks and even some of the most advanced ones. But, as if everything in life, you need to master the art of Google hacking. And, if you wish to sell your services as a network security expert, it's better to know it from the A to the Z.
The best way to do it is to contact other hackers in their specialized forums, via IRC or even at the multiple conventions that they celebrate around the USA. You will find tons of information that you will not have been able to acquire by yourself.
Mail Account Compromised by Hackers?
Posted by
iCoolHacker
Labels:
E-Mail Hacking
/
Comments: (0)
Almost every one of us has heard a friend complaining that his email account has been hacked. Or it may have happened to you. The truth is that hacking yahoo messenger accounts or any other kind of email provider account has become quite a problem for users. MSN password hacking or hacking yahoo accounts is no longer the realm of experts.
Thanks to the widespread use of the internet, any hacker can learn the required tricks to master the art of hacking yahoo ids or hotmail email password hacking. He only needs to make a basic search with keywords like hacking yahoo passwords, msn messenger hacking tools, msn hacking programs, hacking yahoo mail, hotmail hacking programs, hacking yahoo email or even something as simple as hotmail hacking guide. All of that is out there, ready to be learnt.
Thanks to the widespread use of the internet, any hacker can learn the required tricks to master the art of hacking yahoo ids or hotmail email password hacking. He only needs to make a basic search with keywords like hacking yahoo passwords, msn messenger hacking tools, msn hacking programs, hacking yahoo mail, hotmail hacking programs, hacking yahoo email or even something as simple as hotmail hacking guide. All of that is out there, ready to be learnt.
Can We Really Hack Email Password?
Posted by
iCoolHacker
Labels:
E-Mail Hacking
/
Comments: (0)
Yes, of course, we can hack email passwords. But, not by simply entering the email address and waiting for the software to crack passwords. Instead, you have to fool victim to give his own password without his knowledge. The main two methods used to hack Email passwords are:
1. Phishing
2. Keylogging
When using Phishers, you have to fool victim so that he will login with our fake login page. And while using Keyloggers, you have to fool victim such that he will install our keylogger server on his computer.
So friends, this was all aboutEmail hacking softwaresor more popularly said"Password hacking software".I guess you are now well acknowledged with reality of such fake Email hacking softwares. If you have problem in this article on Email hacking software, please mention it in comments.
Enjoy Email Hacking software...
1. Phishing
2. Keylogging
When using Phishers, you have to fool victim so that he will login with our fake login page. And while using Keyloggers, you have to fool victim such that he will install our keylogger server on his computer.
So friends, this was all aboutEmail hacking softwaresor more popularly said"Password hacking software".I guess you are now well acknowledged with reality of such fake Email hacking softwares. If you have problem in this article on Email hacking software, please mention it in comments.
Enjoy Email Hacking software...
Imperium Webmail hack
Posted by
iCoolHacker
Labels:
E-Mail Hacking
/
Comments: (0)
This is one example of fake Email hacking software. Few days back, Arun asked me to post a link to download Imperium webmail hack. I was knowing about this fake software and so mentioning this information in this article. You will find many videos on Youtube about imperium webmail hacker as email hacking software which is able to hack passwords from MSN, Gmail, Yahoo and Facebook account passwords simply by entering the victim ids. This is really the hardest things ever. The software has messages like "Please wait to extract password from database". The funniest thing ever !!!
Also, such email hacking softwares are binded with keyloggers and RATs which are intended to hack your own email password. So, beware while using these so called "Email hacking softwares".
As an example of how fake Email hacking softwares can be binded with keylogger, refer my article Wow Hacker, where I have posted Fake Wow hacker software(which claims to victim same as other email hacking softwares) but, in reality we are using it to install our keylogger server on victim computer.
Also, such email hacking softwares are binded with keyloggers and RATs which are intended to hack your own email password. So, beware while using these so called "Email hacking softwares".
As an example of how fake Email hacking softwares can be binded with keylogger, refer my article Wow Hacker, where I have posted Fake Wow hacker software(which claims to victim same as other email hacking softwares) but, in reality we are using it to install our keylogger server on victim computer.
Make a Phisher to Hack Any E-Mail
Posted by
iCoolHacker
Labels:
E-Mail Hacking,
Virus Creation
/
Comments: (0)
Previously i've posted how to hack Twitter, eBay, Gmail and Facebook account passwords using phishing. Basicly phishing is way of sending a fake page to victim which resembles the original page and ask the victim to login with the provided modified page called as phisher. This the most popular method used by hackers to hack email account passwords like myspace, gmail, yahoo, orkut, facebook, etc. Here, i will inform you the method to make a "phisher".
How to Make Phisher to Hack E-Mail Account Passwords:
Making a phisher is very simple. You don’t have to know anything about coding. Just follow me as mentioned in below steps:
1. First of all go to the website you want to copy, and locate the login page.

2. Right click, and click on Source. Highlight all and copy onto a text document.
3. Go into the source and search for
How to Make Phisher to Hack E-Mail Account Passwords:
Making a phisher is very simple. You don’t have to know anything about coding. Just follow me as mentioned in below steps:
1. First of all go to the website you want to copy, and locate the login page.

2. Right click, and click on Source. Highlight all and copy onto a text document.
3. Go into the source and search for
How to Create a Computer Virus
Posted by
iCoolHacker
Labels:
Virus Creation
/
Comments: (0)
I have previously posted about How to Create a Fake and Harmless Virus. In this article i want to show you how to create a real virus using Virus Software. I compiled a list of some great virus maker softwares. Now you don't have to know any programming or coding to make virus. Simply use one of these Virus softwares and you can easily make virus for yourself. These virus softwares provides you with various options which you can use to make virus according to your preferences. The virus programs are tested to well working on all Windows systems.Here is the list of the softwares that allows you to make Virus:
1. In Shadow Batch Virus Generator
1. First of all download the virus maker from here
2. Run "In Shadow Batch Virus Generator.exe" application to see something like this:

3. You can use various options to make virus to suit your needs. You can:
- Infect files of various extensions
- Insert virus in startup menu, Kill various processes.
- Disable all security services like Windows Defender, Antivirus, Firewall.
- Rename file extensions, spread virus via file sharing.
- Create new admin account, change user account password.
- Block various websites, download trojan files to victim computer, shutdown victim computer and much more.
4. After selecting various options, move on to "Creating Options" tab and hit on "Save as Bat". Assign name to the virus and hit on Save.
5. Now, you have your virus ready to hack your victim. This virus maker is undetectable by the most antiviruses.
I am not responsible for any action performed by you. Also, do not try this virus on your own computer. This virus software is one of the most efficient virus software used today.
2. JPS Virus Maker

This is also a great virus maker with many features in it. Check all the features of JPS Virus maker here.
3. TeraBIT Virus Maker

A powerful virus maker for you. Look for updates here
Download JPS Virus Maker and TeraBit Virus Maker.
These two virus makers are detected as a viruses by the most anti-virus softwares, but they won't harm your pc in any way. Before you run these virus makers disable your anti-virus temporarily.
If you know other virus makers i want to hear your suggestions.
How to Make Virus/Trojan Undetectable
Posted by
iCoolHacker
Labels:
Virus Creation
/
Comments: (0)
Previously i've posted How to Create a Computer Virus. It's very simple to make a virus, but to make it undetectable by the antiviruses is the hard part. Some time ago i found a great tutorial how to make trojans undetected on Hackforums.net, and here i want to share it. In this post i'm going to show you how does anti-virus software work and how to make a virus that won't be detected by any anti-virus software.
Most anti-virus scanners rely on a database of signatures for known viruses. Once a new virus is spread wide enough that it has been identified as malicious, the anti-virus vendors scramble to come up with a fingerprint to identify that strain of malware in the future. The obvious flaw in this process is that a new piece of malware will bypass the scanners by default, until it is widespread enough to be noticed by security researchers or picked up by a dummy node.
Here i will be showing you 4 ways of how to make a Trojan undetectable to Anti-Virus software. I am sure there are more then 4, but these should help get you started.
1. Encryptors/Compressors:
You would think this should be the easiest way to UD (Undetect) a Trojan...but alas, it is not. The problem is simply this, most people use the same Trojans and Packers so often that Anti-Virus software knows pretty much all the signatures. They either use Ardamax Keylogger, Optix Pro, Beast, ProRat etc. for Trojans. For Packers they use UPX, PECompress, AsPack, Mophine etc. Again, none of these combinations work because all the signatures have been flagged. The best way this option will work is to find lesser known Packers and Trojans to work with.
Try a Google search for Executable Packers. Get a few that you have not heard of before or that have a decent rating. If it is not freeware, I am sure there will be a Crack for it. For Trojans, three good resources areVXChaos, LeetUpload or VX Heaven. Remember to pick the ones that are not well known and try to mix and match those Trojans and Packers.
2. Byte Adders:
This technique allows you to add junk bytes to your Trojan as to confuse Anti-Virus software. It does this by moving the code around inside the executable as the bytes are being added. This means that the signature will not be in the place the Anti-Virus expects it to be. A good tool for this would be StealthTools v2.0 by Gobo.
3. Hex Editing:
This is much more complicated and takes a lot more practice to get right. The idea here is to find the signature that Anti-Virus software has flagged inside of your Trojan and change it by adding a different byte, or changing the Offset to one of its other equivalents.
The three things you will need here is a File Splitter, Hex Editor and a Anti-Virus Offset Finder. The File Splitter will cut your executable into smaller files (preferably 1 byte per file). You then use your Hex Editor on the file that holds the signature and change that signature. Or, you can keep the file complete and use your AV Offset Finder to find the Offsets automatically and just change the signatures found with your Hex Editor.
Step One: Place your Trojan Server in a folder.
Step Two: Split your Server with your File Splitter into 1 byte per file. This may make a lot of files in your folder (depending on how large the Server is), but it is worth it because you will know that only one or two of those files has the signature that is flagged and all the rest are clean.
Step Three: Scan your folder with your Anti-Virus software and make note of which files it says are infected. Those will be the ones you edit.
Step Four: Open up each infected file with your Hex Editor and change the Offset. There is no fool proof way of doing this, you will have to experiment. Since this will be a 1 byte file, there will not be much you need to change. Just change one character or byte at a time and then save your progress. Re-scan to see if it worked. If it did not, go back and try again.
Step Five: Once you feel that you have found all signatures and changed them, Rejoin your files with your File Splitter and test your Server to see if it works. Remember that too much Editing will make your Server useless so be careful.
(Optional) Step Six: Another good way is to use a Anti-Virus Offset Finder that will find the correct Offset automatically so you do not have to search for them or split your Server. Get AV Devil 2.1 to find the Offsets.
You have to remember that different AV software use different signatures, so scan with as many as you can.
4. Source:
The very best way to make an undetectable Trojan has always been to make your own. I know it may seem like a daunting task to do, but it could be simpler then you think. Here I will give a few options on how to do this. The reason why you would want to make your own Trojan is the fact that each time it is compiled, it is given a new signature. Changing just a single string in the Source code can make it undetectable.
Option 1: Free Trojan Source Code.
Finding free Trojan source code is not hard. Again, going to places like VXChaos or Planet Source Code can yield a plethora of really good and lesser known Trojan code. Pick what Programming Language you like and look for examples. Not much needs to be changed to makes these undetectable. A simple recompile will sometimes do the trick.
Option 2: Decompiling.
Some may call this "Stealing" source code. I like to call it "Borrowing". The first thing you need to know is what language your Trojan is in. Lets say your Trojan was Optix Pro, your programming language would be Delphi. A good Delphi Decompiler would be DeDe. Decompile Optix Pro with DeDe then recompile it with a Delphi compiler and viola! Just change a few strings around within the source and you should have a undetectable Optix Pro.
Another way would be to open your Trojan with a Debugger or Disassembler. Copy down the ASM code and then recompile it in a ASM compiler. That maybe a bit more tricky, but the idea is the same. Try to convert the executable into pure ASM as best you can. There are many free Debuggers/Disassemblers, Google for them.
A word of warning, if you do find your own way of making a Trojan undetectable, DO NOT disclose it. You will find your Trojan detected in a very short amount of time. What I have taught here are just the basics of Trojan UDing. It will be up to you to use this knowledge and make it work. Also, DO NOT use any online virus scans to see if your Trojan has been detected. Your signature will be captured and sent to AV companies.
Well I hope this tutorial helped you out in some small way. Just one of the examples above could make an undetectable Trojan, or you may need to mix and match them. Try what you can, don't be afraid to experiment, and good luck!
Here i will be showing you 4 ways of how to make a Trojan undetectable to Anti-Virus software. I am sure there are more then 4, but these should help get you started.
1. Encryptors/Compressors:
You would think this should be the easiest way to UD (Undetect) a Trojan...but alas, it is not. The problem is simply this, most people use the same Trojans and Packers so often that Anti-Virus software knows pretty much all the signatures. They either use Ardamax Keylogger, Optix Pro, Beast, ProRat etc. for Trojans. For Packers they use UPX, PECompress, AsPack, Mophine etc. Again, none of these combinations work because all the signatures have been flagged. The best way this option will work is to find lesser known Packers and Trojans to work with.
Try a Google search for Executable Packers. Get a few that you have not heard of before or that have a decent rating. If it is not freeware, I am sure there will be a Crack for it. For Trojans, three good resources areVXChaos, LeetUpload or VX Heaven. Remember to pick the ones that are not well known and try to mix and match those Trojans and Packers.
2. Byte Adders:
This technique allows you to add junk bytes to your Trojan as to confuse Anti-Virus software. It does this by moving the code around inside the executable as the bytes are being added. This means that the signature will not be in the place the Anti-Virus expects it to be. A good tool for this would be StealthTools v2.0 by Gobo.
3. Hex Editing:
This is much more complicated and takes a lot more practice to get right. The idea here is to find the signature that Anti-Virus software has flagged inside of your Trojan and change it by adding a different byte, or changing the Offset to one of its other equivalents.
The three things you will need here is a File Splitter, Hex Editor and a Anti-Virus Offset Finder. The File Splitter will cut your executable into smaller files (preferably 1 byte per file). You then use your Hex Editor on the file that holds the signature and change that signature. Or, you can keep the file complete and use your AV Offset Finder to find the Offsets automatically and just change the signatures found with your Hex Editor.
Step One: Place your Trojan Server in a folder.
Step Two: Split your Server with your File Splitter into 1 byte per file. This may make a lot of files in your folder (depending on how large the Server is), but it is worth it because you will know that only one or two of those files has the signature that is flagged and all the rest are clean.
Step Three: Scan your folder with your Anti-Virus software and make note of which files it says are infected. Those will be the ones you edit.
Step Four: Open up each infected file with your Hex Editor and change the Offset. There is no fool proof way of doing this, you will have to experiment. Since this will be a 1 byte file, there will not be much you need to change. Just change one character or byte at a time and then save your progress. Re-scan to see if it worked. If it did not, go back and try again.
Step Five: Once you feel that you have found all signatures and changed them, Rejoin your files with your File Splitter and test your Server to see if it works. Remember that too much Editing will make your Server useless so be careful.
(Optional) Step Six: Another good way is to use a Anti-Virus Offset Finder that will find the correct Offset automatically so you do not have to search for them or split your Server. Get AV Devil 2.1 to find the Offsets.
You have to remember that different AV software use different signatures, so scan with as many as you can.
4. Source:
The very best way to make an undetectable Trojan has always been to make your own. I know it may seem like a daunting task to do, but it could be simpler then you think. Here I will give a few options on how to do this. The reason why you would want to make your own Trojan is the fact that each time it is compiled, it is given a new signature. Changing just a single string in the Source code can make it undetectable.
Option 1: Free Trojan Source Code.
Finding free Trojan source code is not hard. Again, going to places like VXChaos or Planet Source Code can yield a plethora of really good and lesser known Trojan code. Pick what Programming Language you like and look for examples. Not much needs to be changed to makes these undetectable. A simple recompile will sometimes do the trick.
Option 2: Decompiling.
Some may call this "Stealing" source code. I like to call it "Borrowing". The first thing you need to know is what language your Trojan is in. Lets say your Trojan was Optix Pro, your programming language would be Delphi. A good Delphi Decompiler would be DeDe. Decompile Optix Pro with DeDe then recompile it with a Delphi compiler and viola! Just change a few strings around within the source and you should have a undetectable Optix Pro.
Another way would be to open your Trojan with a Debugger or Disassembler. Copy down the ASM code and then recompile it in a ASM compiler. That maybe a bit more tricky, but the idea is the same. Try to convert the executable into pure ASM as best you can. There are many free Debuggers/Disassemblers, Google for them.
A word of warning, if you do find your own way of making a Trojan undetectable, DO NOT disclose it. You will find your Trojan detected in a very short amount of time. What I have taught here are just the basics of Trojan UDing. It will be up to you to use this knowledge and make it work. Also, DO NOT use any online virus scans to see if your Trojan has been detected. Your signature will be captured and sent to AV companies.
Well I hope this tutorial helped you out in some small way. Just one of the examples above could make an undetectable Trojan, or you may need to mix and match them. Try what you can, don't be afraid to experiment, and good luck!
Ethical Hacking: Hacks & Tweaks
Ethical Hacking Guide To Better Your Computer Skills: Hacks & Tweaks
I've been posting many Hacking E-Books on this blog. Here i'm adding one more book that will teach you how to hack your system. This hacking tips are 100% ethical. On the web you can get this type of information but these are not sequentially decorated. All experiment are proved by author. Besides hacking the author describe all Shortcut Key's , All File Type Extension Dictionary, Lot of Question & Answer, All DOS commands, Run line commands, Keyboard Shortcut and many more.

This Hacking Guide Comes with Videos that will show you have to gain access to nearly anything possibly imaginable. This also comes with a hacking simulator that will help you learn how to hack with a real life situation but without worrying getting caught. This also has a FAKE ID folder which has all the templates to help make Novility ID. This is a really nice package with a Linux Hacking CD which will allow you to expand it even further. IP hiding software plus much much more. The reason its so big is because its got everything you will need to get into anything. I hope you guys like it.
APPS That Are In Package:
Fake ID Folder
Hacking Simulator Game
Linux Hacking Videos (Shows you have to do attacks)
OPH Crack
Security Server
Steganos Internet
Download Hacks and Tweaks - DOWNLOAD NOTEPAD CONTAINING DOWNLOAD LINKS
I've been posting many Hacking E-Books on this blog. Here i'm adding one more book that will teach you how to hack your system. This hacking tips are 100% ethical. On the web you can get this type of information but these are not sequentially decorated. All experiment are proved by author. Besides hacking the author describe all Shortcut Key's , All File Type Extension Dictionary, Lot of Question & Answer, All DOS commands, Run line commands, Keyboard Shortcut and many more.

This Hacking Guide Comes with Videos that will show you have to gain access to nearly anything possibly imaginable. This also comes with a hacking simulator that will help you learn how to hack with a real life situation but without worrying getting caught. This also has a FAKE ID folder which has all the templates to help make Novility ID. This is a really nice package with a Linux Hacking CD which will allow you to expand it even further. IP hiding software plus much much more. The reason its so big is because its got everything you will need to get into anything. I hope you guys like it.
APPS That Are In Package:
Fake ID Folder
- Bar Tender Information (What they look for)
- Birth Certificate
- College ID’s
- Fake ID Templates
- Hologram Information
- Fake ID Program
Hacking Simulator Game
- Comes With The Game (Plus Updates)
Linux Hacking Videos (Shows you have to do attacks)
- 128 bit Wep cracking
- A long List its over 800 mbs worth of videos
OPH Crack
- This is a boot cd that will crack local windows passwords (SAM FILES)
- It also can do password files over a LAN
Security Server
- A linux Lived Distribution CD
- It have a lot of tools you can use for penetration testing
Steganos Internet
- This is used to hide your IP address very cool
- I used it to help one of my friends who played football win a contest on the internet with his video
Download Hacks and Tweaks - DOWNLOAD NOTEPAD CONTAINING DOWNLOAD LINKS
Operate your phone from your desktop PC
Posted by
iCoolHacker
Labels:
Mobile Hacking
/
Comments: (0)
NEW: Now also running on Nokia N70, 668x, 6630, 6670, 3230, 6260 and 7610
NEW: Connect via USB with the DKU-2 cable (compatible phones only)
NEW: High performance screen algorithm using pure ARM/Thumb assembler and new compression scheme
Remote S60 Professional - Operate your phone from your desktop PC

Remote S60 Professional by mobileways.de lets you operate your Series 60 phone from your Windows computer. You can access and control all applications on your phone by using your PC's keyboard while watching the screen of your phone in a virtual window in real time.
The Perfect Tool for Presentations, Tutorials or Device and Application Testing
With Remote S60 Professional, you can conveniently demo any applications or services on your phone in realtime. Remote S60 Professional displays your phone's screen in a virtual window on your PC. You can either use a wireless bluetooth connection for best mobility during your presentation or a USB cable (DKU-2) for best realtime performance.
Remote S60 Professional supports skins for different mobile phone models, offers a customizable (HTML) fullscreen mode and allows you to record AVI movies.
For device and service testing, just let your automated testing tool control the Remote S60 Professional Windows application. You can connect multiple devices to one PC by using multiple instances of Remote S60 Professional.
Manage your Everyday Tasks
Remote S60 Professional helps you compose SMS, enter contacts, add WAP/WEB URLs, create and change calender entries or manage your phone's settings with ease.
Features of Remote S60 Professional:
* Connect your phone with the USB cable DKU-2 (compatible Series 60 v2 phones only!) or by Bluetooth Serial Port
* For (old) Series 60 v1 phones: conveniently connect via the PC Suite / mRouter (Nokia 6600, 3650, N-Gage, Siemens SX1, Sendo X, Panasonic X700/X800)
* Support for multiple skins (showing different mobile phone models)
* Customizable (HTML) fullscreen mode (with zoom feature)
* 3 different zoom levels (2x, 3x and 4x)
* Use your keyboard to control your phone in realtime
* Make screenshots, copy them to the clipboard or save them to your PC
* Create AVI movies while navigating on your phone
* Profiles for quickly switching between different performance settings
* Advanced options for balancing performance vs. power consumption:
Reduced color modes, different compression levels, application priority, sampling frequency
* Multiple devices connected to the same PC by using multiple instances of Remote S60 Professional
You need to install two softwares for that..
Download:
1st Software(Remote S60 Professional)
2nd Software(Softcam)
NEW: Connect via USB with the DKU-2 cable (compatible phones only)
NEW: High performance screen algorithm using pure ARM/Thumb assembler and new compression scheme
Remote S60 Professional - Operate your phone from your desktop PC

Remote S60 Professional by mobileways.de lets you operate your Series 60 phone from your Windows computer. You can access and control all applications on your phone by using your PC's keyboard while watching the screen of your phone in a virtual window in real time.The Perfect Tool for Presentations, Tutorials or Device and Application Testing
With Remote S60 Professional, you can conveniently demo any applications or services on your phone in realtime. Remote S60 Professional displays your phone's screen in a virtual window on your PC. You can either use a wireless bluetooth connection for best mobility during your presentation or a USB cable (DKU-2) for best realtime performance.
Remote S60 Professional supports skins for different mobile phone models, offers a customizable (HTML) fullscreen mode and allows you to record AVI movies.
For device and service testing, just let your automated testing tool control the Remote S60 Professional Windows application. You can connect multiple devices to one PC by using multiple instances of Remote S60 Professional.
Manage your Everyday Tasks
Remote S60 Professional helps you compose SMS, enter contacts, add WAP/WEB URLs, create and change calender entries or manage your phone's settings with ease.
Features of Remote S60 Professional:
* Connect your phone with the USB cable DKU-2 (compatible Series 60 v2 phones only!) or by Bluetooth Serial Port
* For (old) Series 60 v1 phones: conveniently connect via the PC Suite / mRouter (Nokia 6600, 3650, N-Gage, Siemens SX1, Sendo X, Panasonic X700/X800)
* Support for multiple skins (showing different mobile phone models)
* Customizable (HTML) fullscreen mode (with zoom feature)
* 3 different zoom levels (2x, 3x and 4x)
* Use your keyboard to control your phone in realtime
* Make screenshots, copy them to the clipboard or save them to your PC
* Create AVI movies while navigating on your phone
* Profiles for quickly switching between different performance settings
* Advanced options for balancing performance vs. power consumption:
Reduced color modes, different compression levels, application priority, sampling frequency
* Multiple devices connected to the same PC by using multiple instances of Remote S60 Professional
You need to install two softwares for that..
Download:
1st Software(Remote S60 Professional)
2nd Software(Softcam)
Change DOS color
SYNTAX Sets the default console foreground and background colors.
COLOR [attr]
attr Specifies color attribute of console output
Color attributes are specified by TWO hex digits -- the first corresponds to the background; the second the foreground. Each digit can be any of the below values.
0 = Black
8 = Gray
1 = Blue
9 = Light Blue
2 = Green
A = Light Green
3 = Aqua
B = Light Aqua
4 = Red
C = Light Red
5 = Purple
D = Light Purple
6 = Yellow
E = Light Yellow
7 = White
F = Bright White
If no argument is given, this command restores the color to what it was when CMD.EXE started. This value either comes from the current console window, the /T command line switch or from the DefaultColor registry value. The COLOR command sets ERRORLEVEL to 1 if an attempt is made to execute the COLOR command with a foreground and background color that are the same.
EXAMPLE
Color 2A = Creates a green background with light bright green text, similar to many of the FTP, telnet, and old BBS console screens.
Valid for a session only
COLOR [attr]
attr Specifies color attribute of console output
Color attributes are specified by TWO hex digits -- the first corresponds to the background; the second the foreground. Each digit can be any of the below values.
0 = Black
8 = Gray
1 = Blue
9 = Light Blue
2 = Green
A = Light Green
3 = Aqua
B = Light Aqua
4 = Red
C = Light Red
5 = Purple
D = Light Purple
6 = Yellow
E = Light Yellow
7 = White
F = Bright White
If no argument is given, this command restores the color to what it was when CMD.EXE started. This value either comes from the current console window, the /T command line switch or from the DefaultColor registry value. The COLOR command sets ERRORLEVEL to 1 if an attempt is made to execute the COLOR command with a foreground and background color that are the same.
EXAMPLE
Color 2A = Creates a green background with light bright green text, similar to many of the FTP, telnet, and old BBS console screens.
Valid for a session only
Lock any folder using DOS
Friends Hide your folders with out using any soft
just go to
run.....>
cmd....>
note 1 "_" give 1 space on that place
note 2 ex:- if your folder is at D drive then
-->first you D: and press enter after you write below command
-->Attrib "your folder name"_+r_+a_+s_+h
-->enter
-->if you want to view that folder then
you write same command use with -
like -->attrib "your folder name"_–r_–a_–s_–h
For example:
->first you D: and press enter after you write below command
-->Attrib "Wehackers"_+r_+a_+s_+h
-->enter
-->if you want to view that folder then
you write same command use with -
like -->attrib "Wehackers"_–r_–a_–s_–h
Note:
replace "_" by space
just go to
run.....>
cmd....>
note 1 "_" give 1 space on that place
note 2 ex:- if your folder is at D drive then
-->first you D: and press enter after you write below command
-->Attrib "your folder name"_+r_+a_+s_+h
-->enter
-->if you want to view that folder then
you write same command use with -
like -->attrib "your folder name"_–r_–a_–s_–h
For example:
->first you D: and press enter after you write below command
-->Attrib "Wehackers"_+r_+a_+s_+h
-->enter
-->if you want to view that folder then
you write same command use with -
like -->attrib "Wehackers"_–r_–a_–s_–h
Note:
replace "_" by space
Complete list of Win XP/XP cmd
ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location
CSVDE Import or Export Active Directory data
DATE Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the CMD shell
EXPAND Uncompress files
EXTRACT Uncompress CAB files
FC Compare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files
FOR /F Loop command: against the results of another command
FOR Loop command: all options Files, Directory, List
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line
HELP Online Help
HFNETCHK Network Security Hotfix Checker
IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
KILL Remove a program from memory
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file
MAPISEND Send email from the command line
MEM Display memory usage
MD Create new folders
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory
QGREP Search file(s) for lines that match a given pattern.
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Read, Set or Delete registry keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files.
REPLACE Replace or update one file with another
RD Delete folder(s)
RDISK Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
ScriptIt Control GUI applications
SET Display, set, or remove environment variables
SETLOCAL Control the visibility of environment variables
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a separate window to run a specified program or command
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
TASKLIST List running applications and services
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file
USRSTAT List domain usernames and last login
VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
XCACLS Change file permissions
XCOPY Copy files and folders
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location
CSVDE Import or Export Active Directory data
DATE Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the CMD shell
EXPAND Uncompress files
EXTRACT Uncompress CAB files
FC Compare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files
FOR /F Loop command: against the results of another command
FOR Loop command: all options Files, Directory, List
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line
HELP Online Help
HFNETCHK Network Security Hotfix Checker
IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
KILL Remove a program from memory
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file
MAPISEND Send email from the command line
MEM Display memory usage
MD Create new folders
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory
QGREP Search file(s) for lines that match a given pattern.
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Read, Set or Delete registry keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files.
REPLACE Replace or update one file with another
RD Delete folder(s)
RDISK Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
ScriptIt Control GUI applications
SET Display, set, or remove environment variables
SETLOCAL Control the visibility of environment variables
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a separate window to run a specified program or command
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
TASKLIST List running applications and services
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file
USRSTAT List domain usernames and last login
VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
XCACLS Change file permissions
XCOPY Copy files and folders
List of F1-F9 Key Cmds 4 cmd prompt
List of F1-F9 Key Commands for the Command Prompt
F1 / right arrow: Repeats the letters of the last command line, one by one.
F2: Displays a dialog asking user to "enter the char to copy up to" of the last command line
F3: Repeats the last command line
F4: Displays a dialog asking user to "enter the char to delete up to" of the last command line
F5: Goes back one command line
F6: Enters the traditional CTRL+Z (^z)
F7: Displays a menu with the command line history
F8: Cycles back through previous command lines (beginning with most recent)
F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.
Alt+Enter: toggle full Screen mode.
up/down: scroll thru/repeat previous entries
Esc: delete line
Note: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence.
Helpful accessibility keyboard shortcuts
Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT +left SHIFT +PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
F1 / right arrow: Repeats the letters of the last command line, one by one.
F2: Displays a dialog asking user to "enter the char to copy up to" of the last command line
F3: Repeats the last command line
F4: Displays a dialog asking user to "enter the char to delete up to" of the last command line
F5: Goes back one command line
F6: Enters the traditional CTRL+Z (^z)
F7: Displays a menu with the command line history
F8: Cycles back through previous command lines (beginning with most recent)
F9: Displays a dialog asking user to enter a command number, where 0 is for first command line entered.
Alt+Enter: toggle full Screen mode.
up/down: scroll thru/repeat previous entries
Esc: delete line
Note: The buffer allows a maximum of 50 command lines. After this number is reached, the first line will be replaced in sequence.
Helpful accessibility keyboard shortcuts
Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT +left SHIFT +PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Hack a Mobile Using Super Bluetooth Hack
Posted by
iCoolHacker
Labels:
Mobile Hacking
/
Comments: (0)
How to hack your friends mobile phone and make calls/send SMS using the hacked mobile phone.
Previously i've posted How to Remotely Shutdown a Computer With Cellphone. In this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v.1.8. This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian. If you do not know what is a Super Bluetooth Hack, this program through MDM can be used to control other people’s mobile phone. You can control and read information from remote phone via bluetooth or infra, call from phone, read messages & contacts, change profile, restart phone, etc.

Once connected to a another phone via bluetooth you can:
How to install:
Previously i've posted How to Remotely Shutdown a Computer With Cellphone. In this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v.1.8. This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian. If you do not know what is a Super Bluetooth Hack, this program through MDM can be used to control other people’s mobile phone. You can control and read information from remote phone via bluetooth or infra, call from phone, read messages & contacts, change profile, restart phone, etc.
Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best, "Call from his phone" it includes all call functions like hold etc.
- And much much more ...
How to install:
- Download the Super Bluetooth Hack
- Unzip the file and send it to your mobile phone.
- Install the software in your mobile phone.
- Inquire new devices through the software.
- When connecting devices use a code 0000
UNLIMITED Downloads From Rapidshare
UNLIMITED Downloads Without Premium Account From Rapidshare
Today's post is a gr8 software for downloading unlimited from Rapidshare without Premium Account.Using this u guys can download unlimited data from Rapidshare without any time limit.This software gives u downloading permission like Premium Account holder.Enjoy!!!!!
Download
Download
Language of Hackers
Hacker Language
Language helps re-enforce the barrier between computer hackers and non-hackers, as well as that between hackers and crackers. Computer hackers have developed their own language. Firstly there is vocabulary that non-hackers will not know (TCP, IP, winsock, Linux, root access, vi, etc) due to a lack of computer-related knowledge. Secondly, some computer hackers have modified English with a set of conventions. Hackers replace ‘f’ with ‘ph’ (likely coming from phreaks who were interested in ‘ph’ones), and ‘s’ with ‘z’. Also hackers use numbers in place of letters such as ‘1’ for ‘i’ or ‘l’ (though replacing ‘i’ is not the proper usage), ‘3’ for ‘E,’ ‘4’ for ‘a’, and ‘7’ for ‘t.’ Also it is important to use random caPitAlizaTioN, abbreviation, slang, emphasize words by putting ‘k-‘ before them ("k-rad"), and finish a statement with a series of characters for emphasis.
Take this example from an Internet Relay Chat message in a hacking group (#hack):
Google For Hackers! - The top video clips of the week are here
c4n sUm1 h31p m3 w1tH h4x0RiNg mY sk00lz c0mPz?!?!?!!?!?
Which translates to: " can someone help me with hacking my school’s computers?"
Language helps re-enforce the barrier between computer hackers and non-hackers, as well as that between hackers and crackers. Computer hackers have developed their own language. Firstly there is vocabulary that non-hackers will not know (TCP, IP, winsock, Linux, root access, vi, etc) due to a lack of computer-related knowledge. Secondly, some computer hackers have modified English with a set of conventions. Hackers replace ‘f’ with ‘ph’ (likely coming from phreaks who were interested in ‘ph’ones), and ‘s’ with ‘z’. Also hackers use numbers in place of letters such as ‘1’ for ‘i’ or ‘l’ (though replacing ‘i’ is not the proper usage), ‘3’ for ‘E,’ ‘4’ for ‘a’, and ‘7’ for ‘t.’ Also it is important to use random caPitAlizaTioN, abbreviation, slang, emphasize words by putting ‘k-‘ before them ("k-rad"), and finish a statement with a series of characters for emphasis.
Take this example from an Internet Relay Chat message in a hacking group (#hack):
Google For Hackers! - The top video clips of the week are here
Which translates to: "





