• USB Deview - See List of Lastly Connected USB's

    In this article, I have used USB Deview to see the list of information of previously connected USB, Open up the article to read more...

  • Keylogging on a XSS Vulnerable Site

    In this article I have shown to how to keylog on a XSS vulnerable website. Click to read more...

  • Enable Viacam - Control Mouse with Your Eyes

    In this article I have shown to how to control you PC's mouse with your eyes. Open the article to read more...

Tuesday 23 February 2016

Earn Money by Unlocking Phone


There is now a new android app Slide which gives you mobile balance just to unlock your phone. Yes thats right, just swipe to unlock your phone and you will get mobile balance. Slide will just show you a decent ad of your choice on your lock screen and its your own choice either you open the ad or simple unlock the phone, both will give you equal amount of money. Its will also give Rs.10 per every person you invite.

Even I have got the mobile balance a total of Rs. 130 twice;


So get this app now by clicking the below image and get Rs.10 balance free if you sign up on my link below;


Sunday 31 January 2016

Make your IP from Dynamic to Static


What is Dynamic IP and Static IP?
If your ISP have provided you Dynamic IP then your public IP it will change every time you reconnect to the internet(restarts the router).

If your ISP have provided you Static IP then your public IP will not be change and will stay same doesn't matter how many times you reconnect to the internet(restarts the router).

Usage of Static IP:
  • Can host any type of server.
  • Better Voice over IP communications.
  • Can have unattended remote support.

So as these usages seems, Static IP's are used generally in in office and organizations so they also cost much more then a Dynamic IP connection from the ISP, but in this tutorial I have shown how to make your IP from Dynamic to Static totally free with NO-IP.

1. First of all register on NO-IP and validate your account by confirmation email.

2. Now login to your NO-IP, now as shown in the below screenshot, perform the steps respectively to add redirect hosts to our account.

Click Hosts/Redirects from the navigation bar, it will open the Hosts section.

Click Manage Hosts from the sidebar, as you have no host added by default so you have to add one.

Now click Add A Host to add host.


3. Now enter the hostname of your choice and choose one of the freely available domain of No-IP.


4. Scroll down the page and then click Add Host and then download the No-IP client as per your OS from here and install the client.



5. After completing the installation, open the NO-IP client and login into it using No-IP account(which you have made in the start of the tutorial).

6. In the NO-IP client click Edit Hosts.


7. A new window will pop up, and check the host you want to select and click Save.


8. Now you are all done, all the status is ok. As soon as the client is running on the PC where ever you will use your NO-IP host, you static IP will be shown there.


Note: Do Not Use Any Tutorial Of This Blog To Harm Anyone. This Is Only For Educational Purpose. I Will Not Be Responsible For Anything Done By You.

Tuesday 26 January 2016

Gilisoft USB Lock Full


GiliSoft USB Lock is a data leak prevention tool that prevents leakage and copy of your data to USB Drives External Drives, CDs/DVDs or other such portable devices. Once installed, USB Lock lets you block all such drives and devices that do not belong to you. With USB Lock, you can share your PC with anyone without fear of data theft.This is an easy and powerful Endpoint DLP Suite that helps you to lock USB port, make DVD/CD burner read-only, some websites, forbid some programs and disable more devices.


Block USB Drives
Disable reading from USB disks or disable writing to USB disks.USB Lock doesnot allow any type of USB drive to access your computer unless you authorize it. By default, all types of USB drives are blocked including external drives, FireWire, Enhanced mini-USB, Host Controller Interface (HCI), HP-IL, Com, LPT, IrDA, USB on-the-go, U3, EHCI, RAID Controller, Host adapter, Serial Cable (use with data transfer), Serial ATA, ACCESS.bus and any storage device that is attached to USB port showing a drive in the system.

CD-Lock, Block Media and Blu-ray Discs
Disable reading from DVD/CD discs or making DVD/CD burner read-only.The application also blocks any disc that uses the disk hub, bay, combo or CD/DVD drive and allots a drive letter, for example; CD-R, CD-RW, CD-RAM, DVD-R, DVD-RW, DVD-RAM, HD-R, HD-RW, HD-RAM, Blu Ray-R, Blu Ray-RW, Blu Ray-RAM, Floppy Disk A, Floppy Disk B and Zip Drives.

Website Lock
Block accessing some websites. This utility allows you to block unwanted websites from display in Internet Explorer. If a website is blocked the user is forwarded to a blank page or to a blocked page and the contents of the original page are not loaded on your PC. Stop loading banners and ads, stop your kids from spending hours in chat rooms or remove undesired websites from their view. Prevent your children from having access to certain websites content such as adult sites and gambling.


Program Lock
Block running any programs, including IE, Outlook, AOL, AIM, and more. You can even lock your control panel with one button click. Other features include the ability to choose your own message to display if anyone attempts to run one of your locked programs, and also includes password protection so only you can unlock the program when you are ready to use it. Allows the entire computer to remain active and running, and it only locks and prevents access to the programs that you specify. Easy to use interface shows you current status of all locked programs, and allows you to easily click and unlock as you wish

Devices Lock
The program can be used to restrict read or write access to removable media devices such as CD, DVD, floppy, flash and USB drives.It also can be used to disable Printer, Modem, COM and LPT ports, Infrared, Bluetooth and 1394 ports.

Alarm Notification
If user enters wrong password more than 5 times, it will send alarm notifications to your e-mail.

Copy Protection
The program uses an advanced level of data leak prevention technology that does not permit duplication of your important files and copyright material to any USB drive or other such storage devices without your permission. The program works by blocking all types of unauthorized storage devices like USB drives, external drives, CDs, DVDs, etc., in this way it prevents plagiarism, piracy, illegal distribution and copying of your data

Data Leak Prevention
USB Lock is a data leak prevention software. It prevents your data from getting leaked out toUSB drives and other such storage devices by letting you control which device can access your computer while blocking all other unauthorized devices that do not belong to you. With USB Lock installed on your computer, you can feel safe that your data will remain on your PC safe and secure.


Note: Do Not Use Any Tutorial Of This Blog To Harm Anyone. This Is Only For Educational Purpose. I Will Not Be Responsible For Anything Done By You.

Size: 3.5 MB


Sunday 24 January 2016

Air VPN - The Best VPN on Internet


When it comes to privacy and anonymity, AirVPN is one of the most reliable and respected names in the VPN industry. A VPN based on OpenVPN and operated by activists and hacktivists in defence of net neutrality, privacy and against censorship. Air VPN tunnel encrypts your connection to the Internet. This impenetrable tunnel prevents criminal organizations, your ISP or even your government to spy on your communications.The most brutal techniques of monitoring, censorship, throttling and traffic shaping will fail against AirVPN, because your ISP and your government will see only TCP or UDP traffic on a unique port.

It Helps you surf Anonymously
Protection against snoopers, data miners and privacy intrusive entities.


  • Hide your IP - Get a new IP address, so that nobody can discover your identity through it.
  • No monitoring nor logging of your online activities.
  • Perfect Forward Secrecy - Through Diffie-Hellman key exchange DHE. After the initial key negotiation, re-keying is performed every 60 minutes (this value can be lowered unilaterally by you).
  • Additional connection types, supported by every Air VPN server, for ISPs or countries disrupting OpenVPN, are OpenVPN over SSH, SSL or Tor.
  • Stay protected with the security offered by high-level encryption: 4096 bit RSA keys size, AES-256-CBC Data Channel, HMAC SHA1 Control Channel.
  • Make it impossible to identify the type of traffic or protocol you are using, even for your ISP.
  • Connect to any wireless network without risking data eavesdropping between your computer and the WiFi hotspot.

Air VPN Features:
You will not find these features anywhere else but on Air VPN, for sure.

  • No traffic limit. No time limit. Access to all of Air VPN exit-nodes.
  • Three simultaneous connections per account.
  • Unlimited and free servers switches.
  • High-performance servers in many countries.
  • No maximum speed limit, it depends only on the server load (you can also view server load). Minimum allocated granted bandwidth: 4 Mbit/s download + 4 Mbit/s upload.
  • Every protocol is welcome, including p2p. Forwarded ports and DDNS to optimise your software.
  • Transparent policies on bandwidth allocation in order to give you an exact evaluation of the performance you can achieve: no overbooking, no overselling.
  • Uses OpenVPN to establish the connection between your computer and Air VPN servers. OpenVPN is the most reliable and secure solution for encrypted tunnels, offering a higher than military degree of security. Forget PPTP or other insecure protocols.
  • AirVPN offers OpenVPN on ports 80 TCP / UDP, 443 TCP / UDP and 53 TCP / UDP. Additionally, every Air VPN server supports directly OpenVPN over SSH, OpenVPN over SSL and OpenVPN over Tor. (This means that even the most brutal techniques of monitoring, censorship, throttling and traffic shaping will fail against AirVPN, because your ISP and your government will see only TCP or UDP traffic on a unique port).
  • API Supported.

Defeat Restrictions
Circumvent censorship, geo restrictions and traffic shaping. All protocols welcome. Net Neutrality respected.
  • All protocols allowed - No discrimination toward any service, protocol or application.
  • Internal VPN DNS based on root servers.
  • Port Forwarding / DDNS - Without port forwarding, the performance of some applications, for example BitTorrent and eMule clients, would be severely impaired and the services on your computer would not be reachable from the Internet.
  • Geo location routing - In order to bypass discriminations based on IP address geo-location, we execute only strictly necessary double-hops to an additional server.
It work on all major Operating Systems and devices (Windows, Linux, MAC OS, Android, iOS, DD-WART, Tomato, ASUS WRT, pfSense, TOR, SSH Tunnel and SSL Tunnel). 

So what are you waiting for? Click the below image and sign up now. You can not find any other VPN service like AirVPN!.

Air VPN - The air to breathe the real Internet

Saturday 29 August 2015

Hide IP from Resolver and Instant Messengers


In this article, I will show how to hide/change your IP Address from Instant Messengers to ensure your privacy. In this tutorial I am using Skype as an example, you can use any supported Instant Messenger(Yahoo, Live etc).

Connect to Proxy Service:

1. I have used TOR's SOCKS5 proxy, so open up the TOR (click here to download) and connect to the TOR network;


Setting up the Skype:

1. Open up the Skype and click Tools and the Select Options;


2. Then navigate to Advanced, and select Connections, now in the proxy tab select SOCKS5 and enter 127.0.0.1 in the host field and 8118 in the port, after all click Save and you are done.


This tweak can be done with any instant messenger which supports SOCKS5 proxy.

Note: Do Not Use Any Tutorial Of This Blog To Harm Anyone. This Is Only For Educational Purpose. I Will Not Be Responsible For Anything Done By You.


Tuesday 26 May 2015

Folder Colorizer


There are many software available over the internet with which can customize your Computer in an efficient manner that it looks so attractive as well as it becomes very easy to use. We always want our computer to be clean and well organized so that whenever we need to access something or need to search a particular file/folder in our computer we could find it easily.




As similar to that, in this article i am going to share a software which you can easily assign your favorite colors to your desired folders in order to differentiate them easily and to ease of access.


In this way you will be able to easily organize folders in any of your drive. You can also assign different colors to several folders in the same drive to give it more attractive and cool looks.


Note: Do Not Use Any Tutorial Of This Blog To Harm Anyone. This Is Only For Educational Purpose. I Will Not Be Responsible For Anything Done By You.


Size: 1.2 MB



Monday 25 May 2015

Modify Host file to Block Specific Website(s) on Different OS's


What is Host File?

The Hosts file is is used by OS to map host names to IP addresses. It is located deep down in the Windows folder.

In this article, I will show how to modify a host file to block website(s) on the computer with different OS's;
  • Windows
  • Linux
  • Mac OS

Windows:

In Windows, you are needed to open up the hosts files as an Adminsitrator.
1. Open Notepad as Administrator (otherwise file can not be modified);




2. Now select File and click Open then go to the location as per your OS;


Locations as per OS:
  • Windows 95/98/Me: C:\Windows\
  • Windows NT/2000/XP: C:\Winnt\System32\drivers\etc\ or C:\Windows\System32\drivers\etc\
  • Windows XP Home/Vista/Windows 7: C:\Windows\System32\drivers\etc\
  • Windows 8/8.1: C:\Windows\System32\drivers\etc\


3. Now, we need to open our hosts file, as the Host file is not a standard host file so it will not show by default, you have to change the File Type from Text Documents(*.txt) to All Files so it will be visible and then open the hosts file;




4. Be sure to make a backup of your hosts file in case if you will do anything wrong. As the hosts file will get open, edit the file with the site which you want to block, add the website just below the last # with the IP Address 0.0.0.0 so that it will get directed nowhere, i have added only single site but you can add multiple sites, one website with IP Address in per line;



4. Now press Crtl + s to save the file, and check if your entered site is running or not, in the screenshot below that it is blocked, you can revert the changes to make it working again.


Ubuntu (Linux):
In Ubuntu and many other Linux distro’s hosts file can be directly edited in the terminal. Like Windows in which file is needed to be opened as Administrator, now in Linux file is needed to be opened as root so the sudo is used to file the file as root.



1. Open up the terminal and enter the command sudo vim /etc/hosts/



Locations as per OS:
  •  Linux/Unix: /etc/hosts

2. Be sure to make a backup of your hosts file in case if you will do anything wrong. As the hosts file will get open, edit the file with the site which you want to block, add the website with the IP Address 0.0.0.0 so that it will get directed nowhere, i have added only single site but you can add multiple sites, one website with IP Address in per line, I have edited it to redirect Facebook into nothing;



3. Now press Crtl + s to save the file, and check if your entered site is running or not, in the screenshot below that it is blocked, you can revert the changes to make it working again.


Mac OS:
Accessing the hosts file in Mac OS is very similar to Ubuntu.

1. Open up the terminal(Applications -> Utilities -> Terminal) and enter the command sudo vim /private/etc/hosts/

Its will ask for a user password, enter it.



Locations as per OS:
  •  Mac OS(all versions): /private/etc/hosts/

2. Be sure to make a backup of your hosts file in case if you will do anything wrong. As the hosts file will get open, edit the file with the site which you want to block, add the website with the IP Address 0.0.0.0 so that it will get directed nowhere, i have added only single site but you can add multiple sites, one website with IP Address in per line, I have edited it to redirect Yahoo into nothing;


3. When you are done, press Control + O to save the file and return to accept the file name, Exit the editor by pressing Control + X. This takes you back to the terminal screen and check if your entered site is running or not, in the screenshot below that it is blocked, you can revert the changes to make it working again.



Its all done now.

Note: Do Not Use Any Tutorial Of This Blog To Harm Anyone. This Is Only For Educational Purpose. I Will Not Be Responsible For Anything Done By You.

Thursday 29 January 2015

HashGenerator


What is Hash?

A hash value (or simply hash), also called a message digest, is a number generated from a string of text. The hash is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will produce the same hash value.


Hash Generator is the universal hash generator tool which automates the generation of 14 different type of hashes or checksums. It support most of the popular hashes including MD5 family, SHA family, BASE64, LM, NTLM, CRC32, ROT13, RIPEMD, ALDER32, HAVAL, WHIRLPOOL etc.

Features:
  • Generate hashes for 15+ popular algorithms including MD5, SHA256, BASE64.
  • Create Hash for either the File or custom Text.
  • 'Drag & Drop' feature to quickly drag files onto the tool.
  • Shell Context Menu to quickly generate hash by simply right clicking on any file.
  • Option to to selectively copy the hash from the displayed list.
  • Save the generated hash list to HTML/TEXT/XML file.
  • Simple, Easy to Use GUI Interface.
  • Completely Portable.

Note: Do Not Use Any Tutorial Of This Blog To Harm Anyone. This Is Only For Educational Purpose. I Will Not Be Responsible For Anything Done By You.

Size: 1.1 MB



Monday 12 January 2015

HardDrive Bad Sectors - Checking and Repairing


What is Bad Sector?
A bad sector on a hard drive is simply a tiny cluster of storage space, a sector of the hard drive that appears to be defective. The sector will not respond to read or write requests. Bad sectors can occur on both traditional magnetic hard drives and modern solid-state drives. There are two types of bad sectors, one resulting from physical damage that can’t be repaired, and one resulting from software errors that can be fixed.
Types of Bad Sectors:
A physical bad sector is a cluster of storage on the hard drive that’s physically damaged. The hard drive’s head may have touched that part of the hard drive and damaged it, some dust may have settled on that sector and ruined it, a solid-state drive’s flash memory cell may have worn out, or the hard drive may have had other defects or wear issues that caused the sector to become physically damaged. This type of sector cannot be repaired.
A logical bad sector is a cluster of storage on the hard drive that appears to not be working properly. The operating system may have tried to read data on the hard drive from this sector and found that the it is not responding to read and write request. These may be marked as bad sectors, but can be repaired.
In this article, I have shown how to find out the logical bad sector and how to repair it;
Checking the Bad Sectors:
1. I have used MacroRit Disk Scanner to conduct the Hard drive Surface Test, which will scan the bad sectors on the hard drive, so download and run MacroRit Disk Scanner (click here to download);
2. Click the Start Now button to start scanning for the bad sector in your hard drive;
2. As soon as the scanning start, it will fill the block with colored boxes, in which Green color means the sector is working as it is designed whereas the Red color means that sector is not working as it is designed so that will be the bed sector;
Wait till the whole scanning will get completed, after it look for if any Red box present, if any one of it occurs, then you have to Repair your hard drive (shown in the next steps).

Repairing the Bad Sectors:

1. I have used HDAT2 for the repairing of bad sectors on the hard drive, so download HDAT2 (click here to download), now burn its ISO file into the Disc (click here for burning tutorial).

2. Reboot the Computer and boot it with CD/DVD, it will start HDAT2 and then select the device of which you want to repair the bad sectors;



3. Now select the Device Tests Menu and press Enter;


4. Now select the Check and Repair bad sectors and press Enter;


4. Now wait for the Scanning to get completed;


If the scans process is blue color and if not found a bad sector on the hard drive the line will be all blue, but if the scanning progess is red with B letter, so it means that the bad sectors are present. While the scanning HDAT2 tries to fix the bad sectors, and after re-scanning the device if bad sector will be gone, which means bad sectors already fixed and there is no more damaged sectors.

Note: Do Not Use Any Tutorial Of This Blog To Harm Anyone. This Is Only For Educational Purpose. I Will Not Be Responsible For Anything Done By You.