Sunday 27 November 2011

Why Use Registry Cleaners?


Get yourself a registry cleaner and scan your system for broken links, CLSID or DLL's. These redundant files are just clogging up your system and slowing it down. A registry clean up will do your computer loads of good.

Over time your system will become slow and sluggish. This may be because of all your activity on the Internet. You will have through the years or months depending on your Internet activity, downloaded tons of stuff from the Internet. Most of the stuff you download you will forget about. These downloads, be it music, programs, pictures, or links will all be stored in the system registry and this registry keeps on growing. You will need to clean the registry of your system in order to make your system run more efficiently. A registry cleaner can repair and clean your registry on the computer. A free registry cleaner, such as the windows XP registry cleaner or the Eusing Registry cleaner can organize and streamline your computer registry by unclogging all the junk that has been downloaded onto the hard drives and are no longer of any use but are there and slowing down the system.

Regular registry cleaning and tuning is very necessary. Without this the system is definitely going to crash attracting a very high bill from the technician not to mention the data that could be lost in the bargain. You can take the cheaper way out by downloading one of the free registry cleaner software from the Internet. There are loads of windows XP registry cleaner software or just registry cleaner software that are compatible with whatever operating system you are using.



Analyze The Registry Cleaner Before Using It

A good registry repair software will have the following features:

Registry cleaners scan all types of problems such as invalid paths, file types, CLSID's DLL's Sound files, Fonts, extensions and class keys. The registry cleaner will have these features in a place where they are easy to access and well organized. The registry Cleaner will be easy to use. It should be user-friendly software and not require complicated steps to setup and use.

In addition the registry cleaner software that you download free or purchase, should have very good customer support. Many downloadable registry cleaner software can create backups of the registry. So if something goes wrong during the cleaning process it is important that you can restore the registry to its original state. Restoring the registry may not be as simple as cleaning up the registry with the help of the software and so it is important for the company that supplied you with the registry cleaner software to have a customer support to help you restore your registry to a working state.

Thursday 24 November 2011

How to Avoid Hard Drive Overheating




Even though the hard drive stores data, it isn't perfect by any means. Hard drive failure is very common with all computers, with no real way to prevent it. Although there are several different reasons why a hard drive can fail, the most common is overheating. Viruses and crashes are common as well, along with theft and accidental deletion.

With the older style and mechanics of hard drives, the RPM speed was low, meaning that the drives wouldn't overheat. The hard drives we use now days, have speeds between 7,200 and 10,000 RPM, meaning that they can get quite hot when they start working. Computers of this day and age come with fans to cool everything down, with most hard drives including temperature sensors as well, so you can keep track of just how hot your hard drive becomes.

With hard drives today, overheating is a very common problem. The faster hard drives come with speeds of 10,000 RPM, which can make the temperature soar above 70 degrees F, really heating things up inside the drive. The mechanics on the inside are built to withstand the heat, although if things become too hot, you'll encounter problems. If a drive becomes too hot and ends up losing the data, it may be next to impossible to retrieve the information - no matter how good your data recovery specialists may be.

One area that suffers from the drive overheating is the platters, which are magnetic media. Platters are what carry the data throughout the hard drive. Platters are constructed from optical glass, aluminum, or ceramic and normally coated with a layer of magnetic material. Once the hard drive begins to heat up, the platters will start to expand, which changes their size. When this happens, the magnetic surface on the platters will get destroyed, which results in a loss of data. If the physical area of the platters are damaged, it will result in unreadable sectors.

Other areas of the hard drive that can be damaged due to overheating are the read and write heads, head actuator, and the controller chip. Hard drives are very sophisticated pieces of hardware, and can't handle overheating. The read and write heads are a common example, as they can easily render the drive useless if they become damaged.

To prevent your hard drive from overheating, you should always make sure that it is cooled properly and well ventilated. You can always get additional fans and coolers, which will improve both ventilation and the flow of air in your computer. You can buy fans and coolers at very affordable prices, which makes them an ideal investment for keeping your hard drive or hard drives cool.

You can also get software that monitors the temperature of your hard drive as well. Whether it's software, or additional fans, you should always ensure that your hard drives are kept cool. By keeping them cool, you'll greatly reduce the amount of crashes. You'll also increase the stability of your hard drive as well, which will make your entire computer perform much better. 

Tuesday 1 November 2011

Posting from Mobile

Hello friends and my fellow bloggers.

Was off net due to ram problem. Now i am posting from my mobile blogger app for Android. Lets see how it works well or not.

Thanks for your patience.

Tuesday 11 October 2011

Hack an ADSL router

Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.

Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.

Before you proceed, you need the following tool in the process

Angry IP Scanner or any ip scanner s/w

Here is a detailed information on how to exploit the vulnerability of an ADSL router.

Step-1: Go to www.whatismyipaddress.com. Once the page is loaded you will find your IP address. Note it down.

Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.
Suppose your IP is 117.192.195.101, you can set the range something as 117.192.194.0 to 117.192.200.255 so that there exists atleast 200-300 IP addresses in the range.


Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.


Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open.


Step-5: Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.

Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router.

If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

Once you are into router settings, you can change the password and many other settings. If you want to use free internet from that users account you need to set login settings in your router. But you cant read password because its in asterisks.To overcome this open the routers page in Internet explorer(Very vulnerable) browser. Download asterie first and open it.
What asterie does it reads whatever data is in asterisks in IE shows in cleartext.

so you have username available in routers settings page, password in asterie :) .

Please note that I will not be responsible for any problems faced (not that it would ) by you.

Monday 10 October 2011

Easy Note making / Diary using Notepad in Windows

Diary is rare to find now-a-days in age of computers. To make a diary on computer the easy way,

  1. Open up a Notepad window
  2. Type LOG in first line and save the file.
  3. Now next time you open this file it will show Date and time on the second line 
  4. Now you have to just type your message and your diary is set up


Theres another way to do this by pressing F5 while using notepad inserts Date and time. But for those who want to automatically insert time and date when file is opened above method is helpful.  :)

Sunday 9 October 2011

Write a Virus that Scares Your Friends

Open notepad. Type this:

@echo off
echo OMFG YOU GOT A VIRUS.
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo It will now begin to delete your files.
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo Do you want to abort the deletion of your files?
pause
echo Wow you really fell for that. Pressing a key made the virus delete your account.
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo deleting.......
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
pathping localhost -q 2 -p 250 > nul
echo YOU'VE BEEN FOOLED. THERE IS NO VIRUS. YOU'RE JUST A N00B.
pause





Save this as gift.bat or anything else that ends in .bat and sounds like it's NOT a virus. This way, you can give a friend the file, and make them run it and then scare them silly. It's pretty entertaining.

Warning : Seriously, don't do these if someone is watching. They may be fun, but it's easy for someone to monitor your account. If they catch you, well, then you're screwed.

Hacker hacked himself : an irc conversation


Hi friends found this conversation on net its very funny

yet another funny IRC conversation

For anyone that may be less savvy than bitchecker, 127.0.0.1 is always the IP-adress of the computer you're currently using, any request there will return to your computer.
QUOTE:
* bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
* bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> why do you kick me
<bitchchecker> can't you discus normally
<bitchchecker> answer!
<Elch> we didn't kick you
<Elch> you had a ping timeout: * bitchchecker (~java@euirc-a97f9137.dip.t-dialin.net) Quit (Ping timeout#)
<bitchchecker> what ping man
<bitchchecker> the timing of my pc is right
<bitchchecker> i even have dst
<bitchchecker> you banned me
<bitchchecker> amit it you son of a bitch
<HopperHunter|afk> LOL
<HopperHunter|afk> shit you're stupid, DST^^
<bitchchecker> shut your mouth WE HAVE DST!
<bitchchecker> for two weaks already
<bitchchecker> when you start your pc there is a message from windows that DST is applied.
<Elch> You're a real computer expert
<bitchchecker> shut up i hack you
<Elch> ok, i'm quiet, hope you don't show us how good a hacker you are ^^
<bitchchecker> tell me your network number man then you're dead
<Elch> Eh, it's 129.0.0.1
<Elch> or maybe 127.0.0.1
<Elch> yes exactly that's it: 127.0.0.1 I'm waiting for you great attack
<bitchchecker> in five minutes your hard drive is deleted
<Elch> Now I'm frightened
<bitchchecker> shut up you'll be gone
<bitchchecker> i have a program where i enter your ip and you're dead
<bitchchecker> say goodbye
<Elch> to whom?
<bitchchecker> to you man
<bitchchecker> buy buy
<Elch> I'm shivering thinking about such great Hack0rs like you
* bitchchecker (~java@euirc-61a2169c.dip.t-dialin.net) Quit (Ping timeout#)

What happened is clear: That guy entered his own IP-Adress in his mighty Hack-Tool and crashed his own PC. This way, the attack on my PC was a failure. I was already starting to think that I did not have to worry, but a good hacker never calls it a day. Two minutes later he returned.

QUOTE:
* bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> dude be happy my pc crashed otherwise you'd be gone
<Metanot> lol
<Elch> bitchchecker: Then try hacking me again... I still have the same IP: 127.0.0.1
<bitchchecker> you're so stupid man
<bitchchecker> say buy buy
<Metanot> ah, [Please control your cussing] off
<bitchchecker> buy buy elch
* bitchchecker (~java@euirc-b5cd558e.dip.t-dialin.net) Quit (Ping timeout#)

There was a tension in the room... Would he manage, after these two failures, to crash my PC? I waited. Nothing happened. I felt relieve... Six minutes passed by until he prepared the next wave of attack. Being a Hacker, who usually cracks whole data centers, he knew what his problem was now.


QUOTE:
* bitchchecker (~java@euirc-9ff3c180.dip.t-dialin.net) has joined #stopHipHop
<bitchchecker> elch you son of a bitch
<Metanot> bitchchecker how old are you?
<Elch> What's up bitchchecker?
<bitchchecker> you have a frie wal
<bitchchecker> fire wall
<Elch> maybe, i don't know
<bitchchecker> i'm 26
<Metanot> such behaviour with 26?
<Elch> how did you find out that I have a firewall?
<Metanot> tststs this is not very nice missy
<bitchchecker> because your gay fire wall directed my turn off signal back to me
<bitchchecker> be a man turn that shit off
<Elch> cool, didn't know this was possible.
<bitchchecker> thn my virus destroys your pc man
<Metanot> are you hacking yourselves?
<Elch> yes bitchchecker is trying to hack me
<Metanot> he bitchchecker if you're a hacker you have to get around a firewall even i can do that
<bitchchecker> yes man i hack the elch but the sucker has a fire wall the
<Metanot> what firewall do you have?
<bitchchecker> like a girl
<Metanot> firewall is normal a normal hacker has to be able to get past it...you girl^^
<He> Bitch give yourself a jackson and chill you're letting them provoce you and give those little girls new material all the time
<bitchchecker> turn the firewall off then i send you a virus [Please control your cussing]er
<Elch> Noo
<Metanot> he bitchchecker why turn it off, you should turn it off
<bitchchecker> you're afraid
<bitchchecker> i don't wanna hack like this if he hides like a girl behind a fire wall
<bitchchecker> elch turn off your shit wall!
<Metanot> i wanted to say something about this, do you know the definition of hacking??? if he turns of the firewall that's an invitation and that has nothing to do with hacking
<bitchchecker> shut up
<Metanot> lol
<bitchchecker> my grandma surfs with fire wall
<bitchchecker> and you suckers think you're cool and don't dare going into the internet without a fire wall

He calls me girly and says only his grandma would use a firewall. I know that elder people are much more intelligent then younger, but I couldn't let that rest. To see whether he really is a good hacker I lie and let everything as it is. I don't have a firewall at all, only my router.

QUOTE:
<Elch> bitchchecker, a collegue showed me how to turn the firewall off. Now you can try again
<Metanot> bitchhacker can't hack
<Black<TdV>> nice play on words ^^
<bitchchecker> wort man
<Elch> bitchchecker: I'm still waiting for your attack!
<Metanot> how many times again he is no hacker
<bitchchecker> man do you want a virus
<bitchchecker> tell me your ip and it deletes your hard drive
<Metanot> lol ne give it up i'm a hacker myself and i know how hackers behave and i can tell you 100.00% you're no hacker..^^
<Elch> 127.0.0.1
<Elch> it's easy
<bitchchecker> lolololol you so stupid man you'll be gone
<bitchchecker> and are the first files being deleted
<Elch> mom...
<Elch> i'll take a look

In panic I started the Windows Explorer, my heart beating faster. Had I under-estimated him?


QUOTE:
<bitchchecker> don't need to rescue you can't son of a bitch
<Elch> that's bad
<bitchchecker> elch you idiout your hard drive g: is deleted
<Elch> yes, there's nothing i can do about it
<bitchchecker> and in 20 seconds f: is gone

Yes, true, G: and F: were gone. Did I ever have them? Doesn't matter, I did not have time to think, I was scared. bitchchecker was comforting me with a music tip.

QUOTE:
<bitchchecker> tupac rules
<bitchchecker> elch you son of a bitch your f: is gone and e: too

Drive E:? Oh my god... All the games are there! And the vacation pictures! I instantly take a look. Everything still there. But the hacker said it was deleted....


Or isn't it happening on my computer?
QUOTE:
<bitchchecker> and d: is at 45% you idiot lolololol
<He> why doesn't meta say anything
<Elch> he's probably rolling on the floor laughing
<Black<TdV>> ^^
<bitchchecker> your d: is gone
<He> go on BITCH

The guy is good: My CD-drive is allegedly deleted! Bitchchecker turned my ancient disk sucker into a burner! But how did he do this? I'll have to ask him. Some encourage him. He himself is giving advice how to avoid the disaster on my hard drives.

QUOTE:
<bitchchecker> elch man you're so stupid never give your ip on the internet
<bitchchecker> i'm already at c: 30 percent
Should I tell him he's not attacking my computer?
QUOTE:
* bitchchecker (~java@euirc-9ff3c180.dip.t-dialin.net) Quit (Ping timeout#)

Too late... It's 20:22 when we get the last message of our hacker with the alias "bitchchecker". We see that he has a "Ping timeout". We haven't seen him since then... must be the Daylight Saving Time.

real page http://www.disk919.com/bb2/bitchecker.html