5 Time-Saving Tools for Twitter:
Check out a round-up of apps that will let you do less and benefit more from your social media marketing efforts.
It's safe to assume that anyone who has a substantial number of Twitter followers (say, tens or hundreds of thousands) is not only interesting and entertaining... but is also really good at managing the process.
If you want to be good at managing your own Twitter process the problem is there are hundreds of Twitter tools and apps, including some really good tools you probably aren't using.
So I conducted a totally unscientific survey: I asked some of my Twitter followers who have at least 5-digit followings which tool they use the most for managing Twitter.
The clear winner was Buffer, a tool that lets you schedule tweets so you can avoid joining the tweet-a-minute club and so you connect with followers when they're most likely to be available and active.
If Buffer works for the big boys and girls, it can work for me and you, so I asked Leo Widrich, Buffer co-founder, for ways to streamline your Twitter efforts by leveraging Buffer:
Turn Twitter and Facebook into a social media dashboard.
Install a Buffer browser extension and you can turn your Twitter feed and Facebook stream into a social media dashboard.
Buffer buttons will appear wherever you need them, including the tweet and retweet buttons and the Facebook share button. The extension also reshares an actual image from Facebook photos.
Sharing content is a lot easier if you can share as you go; the extensions also work with Google Reader, Reddit, and HackerNews.
For more, here's Buffer's guide to using browser extensions.
Create Power Tweets.
With Twylah you can create personal brand pages for tweets.
Twylah also allows you to send what they call Power Tweets, making a tweet look like a small blog post. According to Twylah, Power Tweet pages increase clicks and engagement time (time spent with content) by a factor of 40, since Power Tweets are surrounded by short snippets of text and other relevant content on the Power Tweet page.
For more, here's Buffer's guide to Power Tweets.
Become a content curator.
Want to curate content for Twitter followers and Facebook fans? Check out Mr. Reader, an iPad RSS reading app. Mr. Reader lets you pull from your Google Reader feeds and browse using a very slick app. Then you can Buffer directly from Mr. Reader and post to different social networks and accounts.
If you've gotten away from RSS feeds, Mr. Reader might be the reason to go back.
For more, here's Buffer's guide to sharing from Mr. Reader.
Save and share.
Read It Later, now called Pocket, lets you save articles, videos, etc and--you guessed it--read it later.
Now you can also Buffer anything you save in Pocket, allowing you to read later and share from one place.
Create data-driven tweet schedules.
Tweriod is arguably the best Twitter analytic tool, especially where determining the best times to tweet is concerned. Twitter analyzes past tweet performance, when followers are online and engaged... and keeps automation tools from skewing results.
Integrate Buffer into Tweriod and it will suggest optimal Buffer timing and help you create data-driven schedules.
For more, here's Buffer's guide to integrating Tweriod.
Do you have Twitter tools and apps you love? If so, share them in the Comments below.
Friday, June 29, 2012
How I Removed Windows XP Malware Blocking Antivirus Websites
How I Removed Windows XP Malware Blocking Antivirus Websites:
I have an old desktop with an AMD Sempron processor that runs Windows XP. It is mostly unused except for times when it is needed for downloading large chunks of data that takes hours or days. My brother had been using it to download themes for his PSP (PlayStation Portable) when I noticed that the trial version of some anti virus that I installed long ago had already expired. Not wanting to spread any unwanted snippets of code to and through our gaming consoles, I opted to download another trial of another AV software. I tried pulling up the usual security websites but all told me that the pages could not be displayed. The odd thing was that all the other websites were loaded just fine. I even tried pulling up the pages on my laptop and it worked without a hitch. The first thing I checked was for proxy servers on the browser itself. There weren’t any. I did ping tests and checked which ports were open and I came up with nothing. I then proceeded to uninstall all the software on it that I was not familiar with, leaving only the basic ones. The results were the same. I hopped over to my laptop and searched for the keywords “virus blocking antivirus websites”. The very first article that came up had the answer I was looking for. I did the first option under malware.
1. Go to Start.
2. Click Run.
3. Type “mrt.exe” and hit enter.
4. Choose “Full Scan”.
5. Restart once done.
The culprit was found and eradicated. After restarting the old box, I immediately tried going to one of the most popular anti virus software websites. Lo and behold, it opened without any issues. I downloaded a free copy of the AV that they were offering, did the updates, scanned and ran the anti rootkit feature. It’s clean for now. My brother still swears that he wasn’t the one who downloaded the nuisance.
Resources:
http://www.antihacksecurity.com/the-news/124-virus-blocking-web-sites-unable-to-download-antivirus
I have an old desktop with an AMD Sempron processor that runs Windows XP. It is mostly unused except for times when it is needed for downloading large chunks of data that takes hours or days. My brother had been using it to download themes for his PSP (PlayStation Portable) when I noticed that the trial version of some anti virus that I installed long ago had already expired. Not wanting to spread any unwanted snippets of code to and through our gaming consoles, I opted to download another trial of another AV software. I tried pulling up the usual security websites but all told me that the pages could not be displayed. The odd thing was that all the other websites were loaded just fine. I even tried pulling up the pages on my laptop and it worked without a hitch. The first thing I checked was for proxy servers on the browser itself. There weren’t any. I did ping tests and checked which ports were open and I came up with nothing. I then proceeded to uninstall all the software on it that I was not familiar with, leaving only the basic ones. The results were the same. I hopped over to my laptop and searched for the keywords “virus blocking antivirus websites”. The very first article that came up had the answer I was looking for. I did the first option under malware.
1. Go to Start.
2. Click Run.
3. Type “mrt.exe” and hit enter.
4. Choose “Full Scan”.
5. Restart once done.
The culprit was found and eradicated. After restarting the old box, I immediately tried going to one of the most popular anti virus software websites. Lo and behold, it opened without any issues. I downloaded a free copy of the AV that they were offering, did the updates, scanned and ran the anti rootkit feature. It’s clean for now. My brother still swears that he wasn’t the one who downloaded the nuisance.
Resources:
http://www.antihacksecurity.com/the-news/124-virus-blocking-web-sites-unable-to-download-antivirus
How I Stopped That Nagging WGA Notification
How I Stopped That Nagging WGA Notification:
I finally got sick of that useless notification on my desktop telling me that my copy is not authentic. Armed with internet, I searched for a way to kill that annoyance. I got to a WikiHow page that provided, in detail, what I needed to do. Long story short, it worked. I no longer have to suffer a black desktop and the occasional reminder that I need to contact Microsoft. Below are the steps that I did:
1. Open Notepad.
2. Paste the code from below, including one empty line in the end to represent the enter key.
3. Copy again.
4. Open the Command Prompt by clicking Start, then Run, typing CMD then hitting the enter key.
5. Right click on the black screen and select the Paste command.
* There should be an extra line when you paste. *
Resources:
http://www.wikihow.com/Remove-Windows-Genuine-Advantage-Notifications
I finally got sick of that useless notification on my desktop telling me that my copy is not authentic. Armed with internet, I searched for a way to kill that annoyance. I got to a WikiHow page that provided, in detail, what I needed to do. Long story short, it worked. I no longer have to suffer a black desktop and the occasional reminder that I need to contact Microsoft. Below are the steps that I did:
1. Open Notepad.
2. Paste the code from below, including one empty line in the end to represent the enter key.
3. Copy again.
4. Open the Command Prompt by clicking Start, then Run, typing CMD then hitting the enter key.
5. Right click on the black screen and select the Paste command.
CD %systemroot%\system32
rename wgatray.exe wgatray.exe.bak
rename wgalogon.dll wgalogon.dll.bak
rename LegitCheckControl.dll LegitCheckControl.dll.bak
taskkill /F /T /IM wgatray.exe
del wgatray.exe.bak
del wgalogon.dll.bak
del LegitCheckControl.dll.bak
* There should be an extra line when you paste. *
Resources:
http://www.wikihow.com/Remove-Windows-Genuine-Advantage-Notifications
Problem with hal.dll in win XP
’ve run into this quite a few times especially when I’m cleaning up and uninstalling unused or useless programs in Windows XP. There is only 1 major thing that you need so you’ll be able to fix this – your hard drive connected to a working operating system with internet connection. It doesn’t matter what it is – Windows, Linux, Mac(haven’t tried with this one though). The internet connection is needed for you to copy a hal.dll file from the world wide web. But if the operating system you’re working on is XP, then you’ll just copy the dll file off of the working one.
The file’s location is C:\windows\system32. Paste the working hal.dll file into that folder to replace the corrupted one. Once that’s done, shut down the computer and get it ready to boot up using your hard drive. If there aren’t any hitches, you’ll see a very primitive windows xp desktop. Here is where the internet comes in handy. It will automatically search for drivers online and update them. After that, you’ll be able to customize the desktop settings or any other hardware settings that you had before this problem. Now if you do not have internet, it’s a lot of work. You have to load the drivers using your hardware’s respective CD’s – assuming you kept them.
In my case, I had internet. And I also had a perfectly working Linux Ubuntu 8.04 on another drive and broadband internet. So that after replacing the corrupted hal.dll file, the rest was pretty much automated. Switching and connecting hard drive wasn’t fun especially because I had an old dusty sempron rig. But all in all, it was a valuable learning experience. I very much thank Ubuntu.com for supplying me with the free CD’s to get started in my Linux learning.
http://vness.wordpress.com/2008/05/27/problem-with-haldll-in-win-xp/
The file’s location is C:\windows\system32. Paste the working hal.dll file into that folder to replace the corrupted one. Once that’s done, shut down the computer and get it ready to boot up using your hard drive. If there aren’t any hitches, you’ll see a very primitive windows xp desktop. Here is where the internet comes in handy. It will automatically search for drivers online and update them. After that, you’ll be able to customize the desktop settings or any other hardware settings that you had before this problem. Now if you do not have internet, it’s a lot of work. You have to load the drivers using your hardware’s respective CD’s – assuming you kept them.
In my case, I had internet. And I also had a perfectly working Linux Ubuntu 8.04 on another drive and broadband internet. So that after replacing the corrupted hal.dll file, the rest was pretty much automated. Switching and connecting hard drive wasn’t fun especially because I had an old dusty sempron rig. But all in all, it was a valuable learning experience. I very much thank Ubuntu.com for supplying me with the free CD’s to get started in my Linux learning.
http://vness.wordpress.com/2008/05/27/problem-with-haldll-in-win-xp/
Thursday, June 28, 2012
Bluition
Bluition:
Today we have a cool project coming to us from SparkFun customer Brad Nelson. Brad's daily driver is a bright red Kymco ZX50 scooter - not the most exciting of rides and not much to look at. So, like any good hacker, Brad said, "I can make this better."Here's what he did:
Brad calls his project "Bluition."Bluition is essentially a Bluetooth ignition device that allows him control his scooter ignition, starter, and seat latch from his Android phone using simple gestures, like shaking his phone.
Brad uses a program called Tasker, which communicates using a Python script and Bluetooth. Brad uses the RN-42 Bluetooth Module for wireless communication, a solenoid to pop the seat, MOSFET Control Boards, and some other various bits and bobs. One thing he didn't use - a dev board (no Arduino or otherwise!). Very cool work, Brad! Check out his webpage for more details and information on how to build your own!
Today we have a cool project coming to us from SparkFun customer Brad Nelson. Brad's daily driver is a bright red Kymco ZX50 scooter - not the most exciting of rides and not much to look at. So, like any good hacker, Brad said, "I can make this better."Here's what he did:
Brad calls his project "Bluition."Bluition is essentially a Bluetooth ignition device that allows him control his scooter ignition, starter, and seat latch from his Android phone using simple gestures, like shaking his phone.
Brad uses a program called Tasker, which communicates using a Python script and Bluetooth. Brad uses the RN-42 Bluetooth Module for wireless communication, a solenoid to pop the seat, MOSFET Control Boards, and some other various bits and bobs. One thing he didn't use - a dev board (no Arduino or otherwise!). Very cool work, Brad! Check out his webpage for more details and information on how to build your own!
Welcome '::1:'
Welcome '::1:':
World IPv6 launch day has come and gone, and you may have noticed SparkFun.com still doesn't sport a 'AAAA' record in our DNS.
If you're wondering what IPv6 or an AAAA record is, let me begin by stressing how important IPv6 is, and more so, how critical it is that the entire world transitions to it quickly. IPv6 is the replacement of the addressing system of the internet. Our current version of the internet's addressing system allots approximately 4.29 billion addresses. This is quite a bit fewer than the number of people in the world, and substantially fewer than the rapidly-growing number of internet-connected devices out there. There were over 300 million new Android phones activated in the last year alone, and that's not even scratching the surface (RFC2324 compliant coffee pots are going to push us over the edge).
During the inception of the internet, the initial address space was thought to be more than adequate, as the founders of IPv4 didn't expect the internet to ever expand outside a few university and military labs back in 1981. Even so, the old addressing system was well thought out for just being an experiment that never ended. 4.29 billion addresses is nothing to sneeze at, but the new address space of IPv6 is beyond gargantuan proportions. IPv6 ensures that this time around, we really won't run out by using a 128-bit address space. How many exactly? 340,282,366,920,938,000,000,000,000,000,000,000,000 - That's enough to assign an address to every eukaryotic cell in our galaxy, assuming that there are at least 10 billion other planets out there in the Milky Way just as alive as earth is. With numbers this large, the decision was made that standardizing allocations of address blocks trumps the immense amount of wasted space. Our /48 subnet allocation alone grants SparkFun an address space of 18,446,744,073,709,552,000 IPs. Unfortunately, this makes for some complex addresses, like: 2001:1926:3df:5:5054:ff:fe05:a221/64. Just a bit more difficult to remember than 192.168.5.61/24. On the other hand, IPv6 brings many new features, and negates the need for services such as DHCP, which is primarily used to allocate addresses from a pool to connected devices. This is because everything can be guaranteed a unique address by performing a stateless autoconfiguration, based on a broadcasted prefix to itself using Modified EUI-64, where the MAC address of the device is slightly modified and appended to the prefix. IPv6 is much, much more than just a larger addressing pool, it redefines traffic at one of the lowest layers in networking.
Earlier this month we made the jump to IPv6 internally, but unfortunately our upstream internet provider and datacenter host has yet to commit to supporting it. Luckily, a tunnel broker known as 'SixXS' granted us a /48 subnet in order to satiate our thirst for connectivity to the new internet (Special thanks to 'Jeroen' for making this happen). This, unfortunately, is a dirty workaround and came with a caveat. Both Windows and Linux systems will 'prefer' IPv6 routes over IPv4 by default, which makes for a substantial amount of traffic for our tunnel broker. The solution for this was to turn off the route, and use it only when needed, until our upstream provider starts routing IPv6 packets. Unfortunately, the adoption of IPv6 is still relatively low, but it's starting to climb quickly.
So, what does this transition mean for most end users? With IPv6, the days of NAT traversal are (almost) gone. NAT came around as a band-aid for the quickly-dwindling number of publically assignable addresses, and allowed you to have a single external address that people could contact all of your devices with. Unfortunately, this complicates life, as you need to tell your device doing your NAT translations where to send inbound traffic, and makes life substantially less fun for network administrators. Specifications such as UPnP and TCP/UDP hole punching such as ICE and STUN(T) consequently arose to allow devices and applications to receive unsolicited external connections. Being able to receive data without first initiating a connection is pretty important, as two devices behind a device doing NAT translation, such as a home router, can't talk to each other without a third party. This, however, led to NAT becoming a sort of security “feature” that helped eliminate many early worms and malware that attacked open ports with insecure services, such as the Blaster Worm.
IPv6 also augments mesh networking and the interoperability of personal area networks with existing networks, and specifications such as 6LoWPAN from the IETF have arisen to compete with ZigBee, currently found on most of our 802.15.4 modules (although ZigBee has announced that they are investigating the possibility of adding IPv6 support). Additionally, traffic can be encrypted using a standard known as IPsec, which was developed in conjunction with IPv6. All standards-compliant IPv6 devices are required to support IPsec, which should help to keep eavesdroppers from snooping in on traffic from your Tricorder -- at least until us mere mortals get our hands on quantum computers capable of using Shor’s algorithm.
The specification for IPv6 was finalized in 1996, and repeated deadlines to make the jump were facetiously missed by governments and large ISPs around the world for over a decade. Luckily, with the clock quickly nearing zero-hour, IPv6 is starting to be taken very seriously and is seeing rapid adoption and backing by large ISPs and companies, many of which have their own IPv6 awareness campaigns. A few of these can be found at Google, Comcast, ATT, and Cisco. If you're part of an organization which has yet to start the transition, urge them to start making preparations for the move!
If you're wondering what IPv6 or an AAAA record is, let me begin by stressing how important IPv6 is, and more so, how critical it is that the entire world transitions to it quickly. IPv6 is the replacement of the addressing system of the internet. Our current version of the internet's addressing system allots approximately 4.29 billion addresses. This is quite a bit fewer than the number of people in the world, and substantially fewer than the rapidly-growing number of internet-connected devices out there. There were over 300 million new Android phones activated in the last year alone, and that's not even scratching the surface (RFC2324 compliant coffee pots are going to push us over the edge).
During the inception of the internet, the initial address space was thought to be more than adequate, as the founders of IPv4 didn't expect the internet to ever expand outside a few university and military labs back in 1981. Even so, the old addressing system was well thought out for just being an experiment that never ended. 4.29 billion addresses is nothing to sneeze at, but the new address space of IPv6 is beyond gargantuan proportions. IPv6 ensures that this time around, we really won't run out by using a 128-bit address space. How many exactly? 340,282,366,920,938,000,000,000,000,000,000,000,000 - That's enough to assign an address to every eukaryotic cell in our galaxy, assuming that there are at least 10 billion other planets out there in the Milky Way just as alive as earth is. With numbers this large, the decision was made that standardizing allocations of address blocks trumps the immense amount of wasted space. Our /48 subnet allocation alone grants SparkFun an address space of 18,446,744,073,709,552,000 IPs. Unfortunately, this makes for some complex addresses, like: 2001:1926:3df:5:5054:ff:fe05:a221/64. Just a bit more difficult to remember than 192.168.5.61/24. On the other hand, IPv6 brings many new features, and negates the need for services such as DHCP, which is primarily used to allocate addresses from a pool to connected devices. This is because everything can be guaranteed a unique address by performing a stateless autoconfiguration, based on a broadcasted prefix to itself using Modified EUI-64, where the MAC address of the device is slightly modified and appended to the prefix. IPv6 is much, much more than just a larger addressing pool, it redefines traffic at one of the lowest layers in networking.
So, what does this transition mean for most end users? With IPv6, the days of NAT traversal are (almost) gone. NAT came around as a band-aid for the quickly-dwindling number of publically assignable addresses, and allowed you to have a single external address that people could contact all of your devices with. Unfortunately, this complicates life, as you need to tell your device doing your NAT translations where to send inbound traffic, and makes life substantially less fun for network administrators. Specifications such as UPnP and TCP/UDP hole punching such as ICE and STUN(T) consequently arose to allow devices and applications to receive unsolicited external connections. Being able to receive data without first initiating a connection is pretty important, as two devices behind a device doing NAT translation, such as a home router, can't talk to each other without a third party. This, however, led to NAT becoming a sort of security “feature” that helped eliminate many early worms and malware that attacked open ports with insecure services, such as the Blaster Worm.
IPv6 also augments mesh networking and the interoperability of personal area networks with existing networks, and specifications such as 6LoWPAN from the IETF have arisen to compete with ZigBee, currently found on most of our 802.15.4 modules (although ZigBee has announced that they are investigating the possibility of adding IPv6 support). Additionally, traffic can be encrypted using a standard known as IPsec, which was developed in conjunction with IPv6. All standards-compliant IPv6 devices are required to support IPsec, which should help to keep eavesdroppers from snooping in on traffic from your Tricorder -- at least until us mere mortals get our hands on quantum computers capable of using Shor’s algorithm.
The specification for IPv6 was finalized in 1996, and repeated deadlines to make the jump were facetiously missed by governments and large ISPs around the world for over a decade. Luckily, with the clock quickly nearing zero-hour, IPv6 is starting to be taken very seriously and is seeing rapid adoption and backing by large ISPs and companies, many of which have their own IPv6 awareness campaigns. A few of these can be found at Google, Comcast, ATT, and Cisco. If you're part of an organization which has yet to start the transition, urge them to start making preparations for the move!
Secure Socket Tunneling Protocol - SSTP
Secure Socket Tunneling Protocol - SSTP: Short for Secure Socket Tunneling Protocol, SSTP is a type of VPN tunnel that utilizes an SSL 3.0 channel to send PPP or L2TP traffic. SSL allows for transmission and data encryption, as well as traffic integrity checking. Due to this, SSTP can pass through most firewalls and proxy servers by using the SSL channel over TCP port 443.
SSTP is available to use in a Windows environment (since Windows Vista SP1), in RouterOS and in SEIL (since firmware version 3.50). SSTP can be used with Winlogon or smart card authentication, remote access policies and the Windows VPN client because of being integrated with the RRAS architecture. As with other IP-over-TCP tunneling protocols, SSTP only performs well if there is sufficient bandwidth on the un-tunneled network link. If enough bandwidth is not available, the tunneled TCP timers will possibly expire, causing a large decrease in SSTP performance.
More on Network Definitions: http://www.computerhope.com/jargon/network.htm
SSTP is available to use in a Windows environment (since Windows Vista SP1), in RouterOS and in SEIL (since firmware version 3.50). SSTP can be used with Winlogon or smart card authentication, remote access policies and the Windows VPN client because of being integrated with the RRAS architecture. As with other IP-over-TCP tunneling protocols, SSTP only performs well if there is sufficient bandwidth on the un-tunneled network link. If enough bandwidth is not available, the tunneled TCP timers will possibly expire, causing a large decrease in SSTP performance.
More on Network Definitions: http://www.computerhope.com/jargon/network.htm
View website services tracking you while on a site
View website services tracking you while on a site: Each time you visit a page on the Internet its a good change that a service on that page is tracking you. Below is a listing of some of the common ways a web page will track you when its being viewed. To view how a website is tracking you, block services, and get a better understanding about each tracking services install Ghostery, a free tool that displays all tracking services and gives you additional details about each service. In the picture to the right, is an example of a Ghostery window being displayed for the CNN website, in this example this page normally has eight services tracking the visit, however, six of the services have been disabled.
===================================================================
Ghostery™ sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.
After showing you who's tracking you, Ghostery™ also gives you a chance to learn more about each company it identifies. How they describe themselves, a link to their privacy policies, and a sampling of pages where we've found them are just a click away.
Ghostery™ allows you to block scripts from companies that you don't trust, delete local shared objects, and even block images and iframes. Ghostery puts your web privacy back in your hands.
http://www.ghostery.com/
===================================================================
Ghostery™ sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.
After showing you who's tracking you, Ghostery™ also gives you a chance to learn more about each company it identifies. How they describe themselves, a link to their privacy policies, and a sampling of pages where we've found them are just a click away.
Ghostery™ allows you to block scripts from companies that you don't trust, delete local shared objects, and even block images and iframes. Ghostery puts your web privacy back in your hands.
http://www.ghostery.com/
Wednesday, June 27, 2012
Updated Download Link: HAL.DLL
Updated Download Link: HAL.DLL:
As promised, I’ve uploaded a copy of the hal.dll from my working XP machine. The file host I had been using died and disappeared. Hopefully, this new one lasts a bit longer. I wrote about my hal.dll issues in the past. The first one was about how I fixed the hal.dll error without using a cd. I was successful during that attempt but it just kept coming back. I then wrote another post about my problems with hal.dll with a lot more detail.
Here’s the download link to the copy of hal.dll: http://www.fast-files.com/getfile.aspx?file=53077
Best of luck!
As promised, I’ve uploaded a copy of the hal.dll from my working XP machine. The file host I had been using died and disappeared. Hopefully, this new one lasts a bit longer. I wrote about my hal.dll issues in the past. The first one was about how I fixed the hal.dll error without using a cd. I was successful during that attempt but it just kept coming back. I then wrote another post about my problems with hal.dll with a lot more detail.
Here’s the download link to the copy of hal.dll: http://www.fast-files.com/getfile.aspx?file=53077
Best of luck!
Tuesday, June 26, 2012
Create a virus to delete Hal.dll file
Create a virus to delete Hal.dll file:
Here i'll guide you to create a virus to delete Hal.dll file from the system and shutdown the system. The victim system can not be loaded once shutdown.
Read more >>>
Here i'll guide you to create a virus to delete Hal.dll file from the system and shutdown the system. The victim system can not be loaded once shutdown.
The hal.dll file is a hidden file that is used by Windows XP to communicate with your computer's hardware.
Create a virus program to disable the USB ports in C program
Create a virus program to disable the USB ports in C program:
All budding hackers eager to learn how to create a virus . Here is simple tutorial which will make a virus in c program(no need to worry ,if you don't know about c program because coding is here for you).
Steps to follow:
1. Download the source files from here:
2. Extract the zip file
It contains the following 2 files.
3.Copy the file to folder "c:\tc\bin" (if you don't have folder, means you didn't install c compiler. so read this tutorial to install and compile
4. Open the Turbo c compiler
5. Open the Two files in turbo c compiler
6. compile it(alt+f9)
7. press f9 for creating exe file(don't press ctrl+f9 ,it will run the program)
8. Now go to folder C:\Tc\bin
9. There you can find two exe files namely block_usb.exe ,unblock_usb.exe
10. Now run the block_usb.exe file(just double click the exe file) . insert your pen drive , it is undetectable.
11. Now run the unblock_usb.exe file(just double click the exe file) . Now your pen drive will be detected.
The first blcok_usb program will disable the the USB port.
The unblock_usb program will make it enable
You can send this file to your friend also. Icon of exe file is look like cmd icon. So need to change it.
so Read How to change the icon of exe file.
All budding hackers eager to learn how to create a virus . Here is simple tutorial which will make a virus in c program(no need to worry ,if you don't know about c program because coding is here for you).
Steps to follow:
1. Download the source files from here:
2. Extract the zip file
It contains the following 2 files.
3.Copy the file to folder "c:\tc\bin" (if you don't have folder, means you didn't install c compiler. so read this tutorial to install and compile
4. Open the Turbo c compiler
5. Open the Two files in turbo c compiler
6. compile it(alt+f9)
7. press f9 for creating exe file(don't press ctrl+f9 ,it will run the program)
8. Now go to folder C:\Tc\bin
9. There you can find two exe files namely block_usb.exe ,unblock_usb.exe
10. Now run the block_usb.exe file(just double click the exe file) . insert your pen drive , it is undetectable.
11. Now run the unblock_usb.exe file(just double click the exe file) . Now your pen drive will be detected.
The first blcok_usb program will disable the the USB port.
The unblock_usb program will make it enable
You can send this file to your friend also. Icon of exe file is look like cmd icon. So need to change it.
so Read How to change the icon of exe file.
How to Re-Enable Task Manager,System Restore,cmd,run,Registry? Fixed
How to Re-Enable Task Manager,System Restore,cmd,run,Registry? Fixed:
Hi friends, today i faced a problem. A virus attacked my XP. I was unable to use Task Manager, System Restore,cmd,run,Registry.
This malware disabled important windows features(task manager, system restore,.......)
Whenever i try to open the Task Manager, it pop this error message as " Task Manager is Disabled by Administrator. Contact admin" .Read more >>>
Hi friends, today i faced a problem. A virus attacked my XP. I was unable to use Task Manager, System Restore,cmd,run,Registry.
This malware disabled important windows features(task manager, system restore,.......)
Whenever i try to open the Task Manager, it pop this error message as " Task Manager is Disabled by Administrator. Contact admin" .
How to Clear/Flush DNS cache in Linux/Windows/Mac Os?
How to Clear/Flush DNS cache in Linux/Windows/Mac Os?:
If a website newly registered in internet world, it may not be loaded in your computer. For example, you register for example.com yesterday, still you may not see your web page. This is problem of DNS cache. Your local DNS cache is old one so it won't know the newely available domain names. Sometime you may update the NS records of your domain to point to new hosting service.
In these case you have to clear or flush cache in your computer.
How to Flush cache in Windows?Read more >>>
If a website newly registered in internet world, it may not be loaded in your computer. For example, you register for example.com yesterday, still you may not see your web page. This is problem of DNS cache. Your local DNS cache is old one so it won't know the newely available domain names. Sometime you may update the NS records of your domain to point to new hosting service.
In these case you have to clear or flush cache in your computer.
How to Flush cache in Windows?
How to Create Con Folder in windows using Cmd?|Computer Tricks
How to Create Con Folder in windows using Cmd?|Computer Tricks:
We all know that can't create con folder in windows. Read this article to know why is it not possible to create con folder?
Here is simple trick to create con folder in windows using Command Prompt.
Step 1:
Open Command Prompt(Start->run->cmd)
Step 2:
Type this command:
Step 3:
To Remove the folder type this commandRead more >>>
We all know that can't create con folder in windows. Read this article to know why is it not possible to create con folder?
Here is simple trick to create con folder in windows using Command Prompt.
Step 1:
Open Command Prompt(Start->run->cmd)
Step 2:
Type this command:
md \\.\d:\con
This will create con folder in D Drive. Step 3:
To Remove the folder type this command
How to Make your Web cam as Survilence Camera?
How to Make your Web cam as Survilence Camera?:
Using some softwares you can change your web camera as spy or survilence camera. here i give you some softwares links.
Rise Sun(Complete Free Software)
Screen Shots:
Download:
Read more >>>Rise Sun(Complete Free Software)
- Adjustable Motion Detection Sensitivity
- Adjustable Webcam Performance
- Automatically takes a snapshot when movement is detected
- Automatically logs a record when movement is detected
- Automatically sounds an audible alarm when movement is detected
- Automatically displays a silent message when movement is detected
Screen Shots:
Download:
http://www.reohix.com/risesun.htm
Local Facebook Phishing WebPage-change the name of your localhost
Local Facebook Phishing WebPage-change the name of your localhost:
This post is not about hacking. It just windows tweak or trick.
Just change your localhost name and enjoy it.
You have to well know about this:
How to use wamp/xamp server.
What is localhost.
It is very simple to follow. This is for windows users only.
Steps to follow:
1.Go to C:\WINDOWS\system32\drivers\etc
2. Find the file named
4.you can see there like this:
5.Change the localhost to anything you like.
For ex: you can change it to "www.facebook.com".
6. save the file
Now start the wamp or xamp server and enter the www.facebook.com in browser
you will see the localhost homepage.
Why not?-You can hack your friends.
I have told that this is not hacking trick. But you can use this also for hacking your friend/lover.(in tamil "siru thrumpum pal kutha uthavum", i don't know how to say it in english)
Do you know how?
As i said change the localhost to www.facebook.com.
change your localhost homepage as facebook or gmail phishing web page.
So now the local phishing webpage is ready to hack your friend/lover/spouse(sounds crazy ?)
if he enter the www.facebook.com in your pc. He can see your local phishing page only.
so their passwords is in your hands.
Try some "under construction " or anyother error message so that they will not suspect you.
Actually i just give idea only. If you think that you can become funny and best hacker,then add your own ideas and hack them.
For Ubuntu Users,please read this:
How to change the localhost name in Ubuntu Linux?
Copyrights:
Don't try to copy the contents! if you want to post in your website or blog. Give me link as resource to this page. Link should be hyperlink not a text.
Thanks for the help
Just change your localhost name and enjoy it.
You have to well know about this:
How to use wamp/xamp server.
What is localhost.
It is very simple to follow. This is for windows users only.
Steps to follow:
1.Go to C:\WINDOWS\system32\drivers\etc
2. Find the file named
HOSTS3.Open the file with notepad.
4.you can see there like this:
127.0.0.1 localhost
5.Change the localhost to anything you like.
For ex: you can change it to "www.facebook.com".
6. save the file
Now start the wamp or xamp server and enter the www.facebook.com in browser
you will see the localhost homepage.
Why not?-You can hack your friends.
I have told that this is not hacking trick. But you can use this also for hacking your friend/lover.(in tamil "siru thrumpum pal kutha uthavum", i don't know how to say it in english)
Do you know how?
As i said change the localhost to www.facebook.com.
change your localhost homepage as facebook or gmail phishing web page.
So now the local phishing webpage is ready to hack your friend/lover/spouse(sounds crazy ?)
if he enter the www.facebook.com in your pc. He can see your local phishing page only.
so their passwords is in your hands.
Try some "under construction " or anyother error message so that they will not suspect you.
Actually i just give idea only. If you think that you can become funny and best hacker,then add your own ideas and hack them.
For Ubuntu Users,please read this:
How to change the localhost name in Ubuntu Linux?
Copyrights:
Don't try to copy the contents! if you want to post in your website or blog. Give me link as resource to this page. Link should be hyperlink not a text.
Thanks for the help
Subscribe to:
Posts (Atom)