Welcome to HaCkEr-BrAdRi

HaCkEr-BrAdRi you Quality Software's Free of Cost with full version Keep Visiting and Keep enjoying . . . Don't Forget To Comment on Posts.

HaCkEr-BrAdRi Features

HaCkEr-BrAdRi provide you cracked,registered, serial key, and much more for free

HaCkEr-BrAdRi Update Daily

Our Team Update Blog Daily Or Twice A Day With latest and Cool Stuff For You For Free Download . . .

HaCkEr-BrAdRi Give You Big Variety Of Software's

HaCkEr-BrAdRi Provide You Latest and registered software's. . .

HaCkEr-BrAdRi

A Solution Of Your Needs

64 tricks and techniques of Google Hacks

64 Excellent tricks and techniques of Google Hacks 
Google Hacks 

Google Hack 1:
ws_ftp.ini is a configuration file for a popular FTP client that stores usernames, (weakly) encoded passwords, sites and directories that the user can store for later reference. These should not be on the web!

That's some good stuff. Just copy/paste the text into your own WS FTP ini file and you're good as gold (assuming you're using the same version). Don't forget - even if they have taken the file offline, use the "cache:FULL_URL/wsftp.ini" to see the contents.
probably one of the best exploits I have seen in a long time, when I did it there were about 20 vulnerable computers, just recently there was 4 so I hope whitehats got to this before anyone else. really nice !!

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:index.of ws_ftp.ini


Google Hack 2
Frontpage.. very nice clean search results listing !! I magine with me that you can steal or know the password of any web site designed by "Frontpage". But the file containing the password might be encrypted; to decrypt the file download the program " john the ripper".

To see results; just write in the (http://www.google.com/) search engine the code:

"# -FrontPage-" inurl:service.pwd


Google Hack 3
This searches the password for "Website Access Analyzer", a Japanese software that creates webstatistics.

To see results; just write in the (http://www.google.com/) search engine the code:

"AutoCreate=TRUE password=*"


Google Hack 4
This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net.

To see results; just write in the (http://www.google.com/) search engine the code:

"http://*:*@www" bangbus or "http://*:*@www"bangbus
Or
http://bob:bob@www
Or
http://admin:*@www


Google Hack 5
This search is a cleanup of a previous entry by J0hnny. It uses "parent directory" to avoid results other than directory listings.

WS_FTP.ini is a configuration file for a popular win32 FTP client that stores usernames and weakly encoded passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:ini ws_ftp pwd
Or
"index of/" "ws_ftp.ini" "parent directory"


Google Hack 6
Microsoft Frontpage extensions appear on virtually every type of scanner. In the late 90's people thought they where hardcore by defacing sites with Frontpage. Today, there are still vulnerable servers found with Google.

An attacker can simply take advantage from administrators who 'forget' to set up the policies for Frontpage extensions. An attacker can also search for 'filetype:pwd users'.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:pwd service


Google Hack 7
Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are! And much adminstrated passwords and user passwords, a lot of emails and the such too…

To see results; just write in the (http://www.google.com/) search engine the code:

allinurl: admin mdb


Google Hack 8
DCForum's password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun.

To see results; just write in the (http://www.google.com/) search engine the code:

allinurl:auth_user_file.txt


Google Hack 9
This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. To see view the PHP files; there in lies the catch. Browsers are made to process the commands of PHP before display, so if no commands, nothing to show. You can't use that persay to get into the config file, but it would show potential threats if someone got into server anyway. (If that happens you're basically boned anyway, not much around that.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:index.of config.php

By the way, to know how to view the PHP file contents, you can use this code:

intitle:"Index of" phpinfo.php


Google Hack 10
These files contain ColdFusion source code. In some cases, the pages are examples that are found in discussion forums. However, in many cases these pages contain live sourcecode with usernames, database names or passwords in plaintext.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:cfm "cfapplication name" password


Google Hack 11
FlashFXP offers the easiest and fastest way to transfer any file using FTP, providing an exceptionally stable and robust program that you can always count on to get your job done quickly and efficiently. There are many, many features available in FlashFXP.

The flashFXP.ini file is its configuration file and may contain usernames/passwords and everything else that is needed to use FTP.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:ini inurl:flashFXP.ini


Google Hack 12
The encryption method used in WS_FTP is _extremely_ weak. These files can be found with the "index of" keyword or by searching directly for the PWD= value inside the configuration file.

There is an easy way to decrypt the hash, use the decryptor at:


http://www.codebluehacks.com/Tools.php?ID=1

Or

http://www.hispasec.com/directorio/laboratorio/Software/ws_ftp.html

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:ini ws_ftp pwd


Google Hack 13
These files contain cleartext usernames and passwords, as well as the sites associated with those credentials. Attackers can use this information to log on to that site as that user.
To see results; just write in the  (http://www.google.com/) search engine the code:

filetype:log inurl:"password.log"


Google Hack 14
Web Wiz Forums is a free ASP Bulletin Board software package. It uses a Microsoft Access database for storage. The installation instructions clearly indicate to change the default path and filename (admin/database/wwForum.mdb).
vendor: http://www.webwizguide.info/web_wiz_forums/

The forum database contains the members passwords, either encrypted or in plain text, depending on the version.

Please note: this search is proof that results can stay in Google's index for a long time, even when they are not on the site any longer. Currently only 2 out of 9 are actually still downloadable by an attacker.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:mdb wwforum


Google Hack 15
VNC is a remote-controlled desktop product. Depending on the configuration, remote users may not be presented with a password. Even when presented with a password, the mere existance of VNC can be important to an attacker, as is the open port of 5800.

To see results; just write in the (http://www.google.com/) search engine the code:

"VNC Desktop" inurl:5800

By the way, New version of VNC changed title to VNC Viewer so now you can search for…

intitle:vnc.desktop inurl:5800


Google Hack 16
linux vpns store their usernames and passwords for CHAP authentification in a file called "chap-secrets" where the usernames and the passwords are in cleartext.

To see results; just write in the (http://www.google.com/) search engine the code:

inurl:chap-secrets -cvs


Google Hack 17
These lock files often contain usernames of the user that has locked the file. Username harvesting can be done using this technique.

To see results; just write in the (http://www.google.com/) search engine the code:

"index of" / lck


Google Hack 18
A standard FTP configuration file that provides far too many details about how the server is setup, including installation paths, location of logfiles, generic username and associated group, etc.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:conf inurl:proftpd.conf -sample


Google Hack 19
This search finds registry files from the Windows Operating system. Considered the "soul" of the system, these files, and snippets from these files contain sensitive information, in this case usernames and/or passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:reg reg HKEY_CURRENT_USER username


Google Hack 20
Allows an attacker to create an account on a server running Argosoft mail server pro for windows with unlimited disk quota (but a 5mb per message limit should you use your account to send mail).

To see results; just write in the (http://www.google.com/) search engine the code:

"adding new user" inurl:addnewuser -"there are no domains"


Google Hack 21
The famous Sun linux appliance. The default page displays this text:

"Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting. This page can easily be replaced with your own page. To replace this page, transfer your new content to the directory /home/sites/home/web".

To see results; just write in the (http://www.google.com/) search engine the code:

(inurl:81/cgi-bin/.cobalt/) | (intext:"Welcome to the Cobalt RaQ")


Google Hack 22
WS_FTP.LOG can be used in many ways to find more information about a server. This query is very flexible, just substitute "+htpasswd" for "+FILENAME" and you may get several hits that you hadn't seen with the 'normal' search.

Filenames suggested by the forum to explore are: phpinfo, admin, MySQL, password, htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage, CMS, backend, https, editor, intranet . The list goes on and on..

A different approach might be "allinurl: "some.host.com" WS_FTP.LOG filetype:log" which tells you more about who's uploading files to a specific site.

To see results; just write in the (http://www.google.com/) search engine the code:

+htpasswd +WS_FTP.LOG filetype:log


Google Hack 23
The Web Data Administrator is a utility program implemented in ASP.NET that enables you to easily manage your SQL Server data wherever you are. Using its built-in features, you can do the following from Internet Explorer or your favorite Web browser.
Create and edit databases in Microsoft SQL Server 2000 or Microsoft SQL Server 2000 Desktop Engine (MSDE) Perform ad-hoc queries against databases and save them to your file system Export and import database schema and data.

To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Web Data Administrator - Login"


Google Hack 24
The Aanval Intrusion Detection Console is an advanced intrusion detection monitor and alerting system. Currently supporting modules for Snort and syslog - Aanval provides real-time monitoring, reporting, alerting and stability. Aanval's web-browser interface provides real-time event viewing and system/sensor management.

To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"remote assessment" OpenAanval Console


Google Hack 25
Google is so smart, it’s scary sometimes. I has found another interesting (to say the least) Google use.
I just ran across a pretty scary new google trick. It seems they have just recently added number span searching to their engine. Take a look at this example:

To see results; just write in the (http://www.google.com/) search engine the code:

visa 4356000000000000..4356999999999999

Basically, what this search does is search for the word “visa” [credit card] with any numbers that fit within your query. i.e. any Visa credit card number with the first four digits 4356.
As you can see, Google has searched the entire range against its DB. Within minutes I found some crazy sites like this one. Now please know that Google didn’t create this tool to be used like this. It’s actually quite handy when used correctly. Just an FYI for all of you.


Google Hack 26
Tired of websearching ? Want something to read ? You can find Ebooks (thousands of them) with this search..LIT files can be opened with Microsoft Reader (http://www.microsoft.com/reader/).

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:lit lit (books|ebooks)


Google Hack 27
Using Google, and some finely crafted searches we can find a lot of interesting information.

For Example we can find: Credit Card Numbers / Passwords / Software / MP3's
...... (and on and on and on)Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.
To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"Index of" passwords modified
And
allinurl:auth_user_file.txt
And
"access denied for user" "using password"
And
"A syntax error has occurred" filetype:ihtml
And
allinurl: admin mdb
And
"ORA-00921: unexpected end of SQL command"
And
inurl:passlist.txt
And
"Index of /backup"
And
"Chatologica MetaSearch" "stack tracking:"
And
Amex Numbers: 300000000000000..399999999999999
And
MC Numbers: 5178000000000000..5178999999999999
And
visa 4356000000000000..4356999999999999


Google Hack 28
Notice I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

To see results; just write in the (http://www.google.com/) search engine the code:
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Or
?intitle:index.of? mp3
You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson


Google Hack 29
You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…

To see results; just write in the (http://www.google.com/) search engine the code:
inurl:microsoft filetype:iso


Google Hack 30
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.

To see results; just write in the (http://www.google.com/) search engine the code:
"sets mode: +k"


Google Hack 31
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.

To see results; just write in the (http://www.google.com/ search engine the code:
eggdrop filetype:user user


Google Hack 32
This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version).

Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.
see results; just write in the (http://www.google.com/) search engine the code:

filetype:bak inurl:"htaccess|passwd|shadow|htusers"


Google Hack 33
Let's pretend you need a serial number for windows xp pro. The key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.
To see results; just write in the (http://www.google.com/) search engine the code:
"Windows XP Professional" 94FBR
By the way, don't forget to change "Window sXP Professional" to any product you need its serial number.


Google Hack 34
Notice this excellent trick. You can search for any product whether hardware or software (between any prices price: for example, $250.. $350 ).

To see results; just write in the (http://www.google.com/) search engine the code:
DVD player $250..350
By the way, don't forget to change "DVD player" to any product you need to search for.


Google Hack 35
At first glance, this search reveals even more examples of operating system users enabling the operating system default web server software. This is generally accepted to be a Bad Idea(TM) as mentioned in the previous example. However, the googleDork index on this particular category gets quite a boost from the fact that this particular screen should NEVER be seen by the general public. To quote the default index screen: "Any users attempting to connect to this site are currently receiving an 'Under Construction page'" THIS is not the 'Under Construction page.' I was only able to generate this screen while sitting at the console of the server. The fact that this screen is revealed to the general public may indicate a misconfiguration of a much more insidious nature...
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Welcome to Windows 2000 Internet Services"


Google Hack 36
Suppose you want a certain song to a singer and you can not find it; by this trick you can find the song in the original directory of the original web site.

To see results; just write in the (http://www.google.com/) search engine the code:

"index of/" "Top Gun" .mp3

By the way, don't forget to change "Top Gun" to any song you need to search for.


Google Hack 37
This is a fabulous link. This is the secret link of the web site "Google" to search for any "Crack" you need.
Just write the following link in the address bar:
http://www.googlecrack.com/WWW/


Google Hack 38
By the way, for anyone who needs to have an account in the google mail for "One GigaByte", go to the following address bar. You will receive within "36 hours" the confirmation mail for your registration:

http://www.googlemail.cjb.net/
Or from:
http://www.gmailforums.com/index.php

By the way, you can open your Google mail from your browser through this link:
http://toolbar.google.com/gmail-helper/


Google Hack 39
Imagine that when you enter any web site, and you are surprised that when searching for any program in it you can not find it. By this fabulous trick, you can find the link for downloading any program in this site through any search engine.

For example, suppose you want to search for the program "Norton" in the web site www.download.com ; when you go to www.google.com and write the following code, you will be surprised that the "Google" search engine searches only in the site www.download.com. To do this:

Write in the address bar of the web browser this address: www.google.com.
When opening the web site; write in the search engine this code: "norton site: www.download.com", and press the button search or "ÃÈÍË".
As mentioned earlier: the code is easy, you just write in the place of the word "Norton"; any word you need to search for in the site followed in the code.
The code again is....
norton site:www.download.com

By the way, you can practice this code at any search engine.

Another trick is that you can force the search engine of the "Google" web site to search for a certain category like "Linux" topics. When you add any category after the Google link and write any thing in the search engine, you will surprised that the site searched for Linux only. For example, if you wrote the following code:
http://www.google.com/linux
As I mentioned in the code earlier, the site followed by the word "Linux". So the web site is forced for searching for the Linux topics only all over the internet.


Google Hack 41
Imagine that you can connect to another computer remotely through the internet from the feature called "Remote Desktop Web Connection".
To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"Remote Desktop Web Connection"


Google Hack 42
Through this query you can find every web page "Google" has crawled for a specific site.

To see results; just write in the (http://www.google.com/) search engine the code:

Site: Microsoft.com

Google Hack 43
Through this query, you can see web servers with default pages can serve as juicy targets.

To see results; just write in the (http://www.google.com/) search engine the code:

Intitle:test.page.for.apache "it worked"


Google Hack 44
No one can deny that the directory listings can be a source of great information.

To see results; just write in the (http://www.google.com/) search engine the code:

Intitle:index.of/admin

Google Hack 45
We will use this query to locate additional servers, subtract common hostnames from the query.

To see results; just write in the  (http://www.google.com/) search engine the code:

Site: Microsoft.com - Site:www.Microsoft.com

Google Hack 46
 From this query you can get huge user names and passwords from huge sites for free.

To see results; just write in the (http://www.google.com/) search engine the code:

"Welcome to *" "Your password is *"

Google Hack 47
From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.

To see results; just write in the (http://www.google.com/) search engine the code:

outlook filetype:pst

Google Hack 48
The Cisco VPN 3000 concentrator is a remote access VPN. This web-based logon portal is for remote management of the Concentrator; by submitting a correct UID and PASS you will '0wn' their concentrator. I. E. is able to delete, copy, and configure whatever your heart desires. You would be in control of all of their VPN's that concentrator has control of.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:Cisco Systems, Inc. VPN 3000 Concentrator


Google Hack 49
 This query searches for open root directories of servers running online shopping carts. This shopping cart has an online store 'manager'; in /online-store/StoreManager where you can edit everything from product lists, databases, taxes and passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:Index.Of /" stats merchant online-store cgi-local etc | cgi-bin

Google Hack 50
Sometimes people make mistakes and post their Cisco configurations on "help sites" and don't edit info. So we might be able to find the enable passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

intext:"enable secret 5 $"


Or, for more specifications

intext:"enable secret 5 $" "Current configuration:"

Google Hack 51
This query searches for the following in the servers:
Network Statistics
General Info
Total disk space/memory
Php environment!!!
Current network connections!!!
Running services...

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"sysinfo * " intext:"Generated by Sysinfo *

Google Hack 52
Imagine that when you enter any web site, and you are surprised that when searching for any program in it you can not find it. By this fabulous trick, you can find the link for downloading any program in this site through any search engine.

For example, suppose you want to search for the program "norton" in the web site www.download.com ; when you go to www.google.com and write the following code, you will be surprised that the "google" search engine searches only in the site www.download.com. To do this:

Write in the address bar of the web browser this address: www.google.com.
When opening the web site; write in the search engine this code: "norton site:www.download.com", and press the button search or "ÃÈÍË".
As mentioned earlier: the code is easy, just write in the place of the word "norton"; any word you need to search for in the site followed in the code.

The code again is ....

norton site:www.download.com

By the way, you can practise this code at any seach engine.

Google Hack 53
Another trick is that you can force the search engine of the "google" web site to search for a certain category like "Linux" topics. when you add any category after the google link and write any thing in the search engine, you will surprised that the site searched for linux only. For example, if you wrote the following code:


http://www.google.com/linux


As we mentioned in the code earlier, the site followed by the word "linux". So the web site is forced for searching for the linux topics only all over the internet.




Google Hack 54
 Imagine that you can connect to another computer remotely through the internet from the feature called "Remote Desktop Web Connection".
To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"Remote Desktop Web Connection"

Google Hack 55
Through this query you can find every web page "Google" has crawled for a specific site.

To see results; just write in the (http://www.google.com/) search engine the code:

Site: Microsoft.com

Google Hack 56
 Through this query, you can see web servers with default pages can serve as juicy targets.

To see results; just write in the (http://www.google.com/) search engine the code:

Intitle:test.page.for.apache "it worked"

Google Hack 57
No one can deny that the directory listings can be a source of great information.

To see results; just write in the (http://www.google.com/) search engine the code:

Intitle:index.of/admin

Google Hack 58
We will use this query to locate additional servers, subtract common hostnames from the query.

To see results; just write in the (http://www.google.com/) search engine the code:

Site: Microsoft.com - Site:www.Microsoft.com

Google Hack 59
From this query you can get huge user names and passwords from huge sites for free.

To see results; just write in the (http://www.google.com/) search engine the code:

"Welcome to *" "Your password is *"

Google Hack 60
 From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.

To see results; just write in the (http://www.google.com/) search engine the code:

outlook filetype:pst

Google Hack 61
 The Cisco VPN 3000 concentrator is a remote access VPN. This web-based logon portal is for remote management of the Concentrator; by submitting a correct UID and PASS you will '0wn' their concentrator. I. E. is able to delete, copy, and configure whatever your heart desires. You would be in control of all of their VPN's that concentrator has control of.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:Cisco Systems, Inc. VPN 3000 Concentrator

Google Hack 62
This query searches for open root directories of servers running online shopping carts. This shopping cart has an online store 'manager'; in /online-store/StoreManager where you can edit everything from product lists, databases, taxes and passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:Index.Of /" stats merchant online-store cgi-local etc | cgi-bin

Google Hack 63
Sometimes people make mistakes and post their Cisco configurations on "help sites" and don't edit info. So we might be able to find the enable passwords.

To see results; just write in the (http://www.google.com/) search engine the code:
intext:"enable secret 5 $"

Or, for more specifications
intext:"enable secret 5 $" "Current configuration:"


Google Hack 64
This query searches for the following in the servers:
Network Statistics
General Info
Total disk space/memory
Php environment!!!
Current network connections!!!
Running services...

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"sysinfo * " intext:"Generated by Sysinfo *

History of Viruses and Evolution of Computer Viruses

History of Viruses and Evolution of Computer Viruses
Computer Viruses 

History of Viruses and Evolution of Computer Viruses


Like any other field in computer science, viruses have evolved -a great deal indeed- over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the present.

Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players’ computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars.

However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today.

At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write.

History of Viruses and Evolution of Computer Viruses www.hackerbradri.com

Shortly after, virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to come: 1988 set the date when the “Morris worm” appeared, infecting 6,000 computers.

From that date up to 1995 the types of malicious codes that are known today started being developed: the first macro viruses appeared, polymorphic viruses … Some of these even triggered epidemics, such as MichaelAngelo. However, there was an event that changed the virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, viruses started adapting to this new situation until the appearance, in 1999, of Melissa, the first malicious code to cause a worldwide epidemic, opening a new era for computer viruses.


This second installment of ‘The evolution of viruses’ will look at how malicious code used to spread before use of the Internet and e-mail became as commonplace as it is today, and the main objectives of the creators of those earlier viruses.
Until the worldwide web and e-mail were adopted as a standard means of communication the world over, the main mediums through which viruses spread were floppy disks, removable drives, CDs, etc., containing files that were already infected or with the virus code in an executable boot sector.

When a virus entered a system it could go memory resident, infecting other files as they were opened, or it could start to reproduce immediately, also infecting other files on the system. The virus code could also be triggered by a certain event, for example when the system clock reached a certain date or time.  In this case, the virus creator would calculate the time necessary for the virus to spread and then set a date –often with some particular significance- for the virus to activate. In this way, the virus would have an incubation period during which it didn’t visibly affect computers, but just spread from one system to another waiting for ‘D-day’ to launch its payload. This incubation period would be vital to the virus successfully infecting as many computers as possible.

One classic example of a destructive virus that lay low before releasing its payload was CIH, also known as Chernobyl. The most damaging version of this malicious code activated on April 26, when it would try to overwrite the flash-BIOS, the memory which includes the code needed to control PC devices. This virus, which first appeared in June 1998, had a serious impact for over two years and still continues to infect computers today.

Because of the way in which they propagate, these viruses spread very slowly, especially in comparison to the speed of today’s malicious code. Towards the end of the Eighties, for example, the Friday 13th (or Jerusalem) virus needed a long time to actually spread and continued to infect computers for some years. In contrast, experts reckon that in January 2003, SQLSlammer took just ten minutes to cause global communication problems across the Internet.

Notoriety versus stealth

For the most part, in the past, the activation of a malicious code triggered a series of on screen messages or images, or caused sounds to be emitted to catch the user’s attention.  Such was the case with the Ping Pong virus, which displayed a ball bouncing from one side of the screen to another. This kind of elaborate display was used by the creator of the virus to gain as much notoriety as possible. Nowadays however, the opposite is the norm, with virus authors trying to make malicious code as discreet as possible, infecting users’ systems without them noticing that anything is amiss.

This third installment of ‘The evolution of viruses’ will look at how the Internet and e-mail changed the propagation techniques used by computer viruses.

Internet and e-mail revolutionized communications. However, as expected, virus creators didn’t take long to realize that along with this new means of communication, an excellent way of spreading their creations far and wide had also dawned. Therefore, they quickly changed their aim from infecting a few computers while drawing as much attention to themselves as possible, to damaging as many computers as possible, as quickly as possible. This change in strategy resulted in the first global virus epidemic, which was caused by the Melissa worm.

With the appearance of Melissa, the economic impact of a virus started to become an issue. As a result, users -above all companies- started to become seriously concerned about the consequences of viruses on the security of their computers. This is how users discovered antivirus programs, which started to be installed widely. However, this also brought about a new challenge for virus writers, how to slip past this protection and how to persuade users to run infected files.

The answer to which of these virus strategies was the most effective came in the form of a new worm: Love Letter, which used a simple but effective ruse that could be considered an early type of social engineering. This strategy involves inserting false messages that trick users into thinking that the message includes anything, except a virus. This worm’s bait was simple; it led users to believe that they had received a love letter.

This technique is still the most widely used. However, it is closely followed by another tactic that has been the center of attention lately: exploiting vulnerabilities in commonly used software. This strategy offers a range of possibilities depending on the security hole exploited. The first malicious code to use this method –and quite successfully- were the BubbleBoy and Kakworm worms. These worms exploited a vulnerability in Internet Explorer by inserting HTML code in the body of the e-mail message, which allowed them to run automatically, without needing the user to do a thing.

Vulnerabilities allow many different types of actions to be carried out. For example, they allow viruses to be dropped on computers directly from the Internet -such as the Blaster worm-. In fact, the effects of the virus depend on the vulnerability that the virus author tries to exploit.

In the early days of computers, there were relatively few PCs likely to contain “sensitive” information, such as credit card numbers or other financial data, and these were generally limited to large companies that had already incorporated computers into working processes.

In any event, information stored in computers was not likely to be compromised, unless the computer was connected to a network through which the information could be transmitted. Of course, there were exceptions to this and there were cases in which hackers perpetrated frauds using data stored in IT systems. However, this was achieved through typical hacking activities, with no viruses involved.

The advent of the Internet however caused virus creators to change their objectives, and, from that moment on, they tried to infect as many computers as possible in the shortest time. Also, the introduction of Internet services -like e-banking or online shopping- brought in another change. Some virus creators started writing malicious codes not to infect computers, but, to steal confidential data associated to those services.  Evidently, to achieve this, they needed viruses that could infect many computers silently.

Their malicious labor was finally rewarded with the appearance, in 1986, of a new breed of malicious code generically called “Trojan Horse”, or simply “Trojan”. This first Trojan was called PC-Write and tried to pass itself off as the shareware version of a text processor. When run, the Trojan displayed a functional text processor on screen. The problem was that, while the user wrote, PC-Write deleted and corrupted files on the computers’ hard disk.

After PC-Write, this type of malicious code evolved very quickly to reach the stage of present-day Trojans. Today, many of the people who design Trojans to steal data cannot be considered virus writers but simply thieves who, instead of using blowtorches or dynamite have turned to viruses to commit their crimes. Ldpinch.W or the Bancos or Tolger families of Trojans are examples of this

Even though none of them can be left aside, some particular fields of computer science have played a more determinant role than others with regard to the evolution of viruses. One of the most influential fields has been the development of programming languages.

These languages are basically a means of communication with computers in order to tell them what to do. Even though each of them has its own specific development and formulation rules, computers in fact understand only one language called "machine code".

Programming languages act as an interpreter between the programmer and the computer. Obviously, the more directly you can communicate with the computer, the better it will understand you, and more complex actions you can ask it to perform.

According to this, programming languages can be divided into "low and high level" languages, depending on whether their syntax is more understandable for programmers or for computers. A "high level" language uses expressions that are easily understandable for most programmers, but not so much for computers. Visual Basic and C are good examples of this type of language.

On the contrary, expressions used by "low level" languages are closer to machine code, but are very difficult to understand for someone who has not been involved in the programming process. One of the most powerful, most widely used examples of this type of language is "assembler".

In order to explain the use of programming languages through virus history, it is necessary to refer to hardware evolution. It is not difficult to understand that an old 8-bit processor does not have the power of modern 64-bit processors, and this of course, has had an impact on the programming languages used.

In this and the next installments of this series, we will look at the different programming languages used by virus creators through computer history:

Virus antecessors: Core Wars

As was already explained in the first chapter of this series, a group of programs called Core Wars, developed by engineers at an important telecommunications company, are considered the antecessors of current-day viruses. Computer science was still in the early stages and programming languages had hardly developed. For this reason, authors of these proto-viruses used a language that was almost equal to machine code to program them.

Curiously enough, it seems that one of the Core Wars programmers was Robert Thomas Morris, whose son programmed -years later- the "Morris worm". This malicious code became extraordinarily famous since it managed to infect 6,000 computers, an impressive figure for 1988.

The new gurus of the 8-bits and the assembler language.

The names Altair, IMSAI and Apple in USA and Sinclair, Atari and Commodore in Europe, bring memories of times gone by, when a new generation of computer enthusiasts "fought" to establish their place in the programming world. To be the best, programmers needed to have profound knowledge of machine code and assembler, as interpreters of high-level languages used too much run time. BASIC, for example, was a relatively easy to learn language which allowed users to develop programs simply and quickly. It had however, many limitations.

This caused the appearance of two groups of programmers: those who used assembler and those who turned to high-level languages (BASIC and PASCAL, mainly).

Computer aficionados of the time enjoyed themselves more by programming useful software than malware. However, 1981 saw the birth of what can be considered the first 8-bit virus. Its name was "Elk Cloner", and was programmed in machine code. This virus could infect Apple II systems and displayed a message when it infected a computer.

Computer viruses evolve in much the same way as in other areas of IT. Two of the most important factors in understanding how viruses have reached their current level are the development of programming languages and the appearance of increasingly powerful hardware.

In 1981, almost at the same time as Elk Kloner (the first virus for 8-bit processors) made its appearance, a new operating system was growing in popularity. Its full name was Microsoft Disk Operating System, although computer buffs throughout the world would soon refer to it simply as DOS.

DOS viruses

The development of MS DOS systems occurred in parallel to the appearance of new, more powerful hardware. Personal computers were gradually establishing themselves as tools that people could use in their everyday lives, and the result was that the number of PCs users grew substantially. Perhaps inevitably, more users also started creating viruses. Gradually, we witnessed the appearance of the first viruses and Trojans for DOS, written in assembler language and demonstrating a degree of skill on the part of their authors.

Far less programmers know assembler language than are familiar with high-level languages that are far easier to learn. Malicious code written in Fortran, Basic, Cobol, C or Pascal soon began to appear. The last two languages, which are well established and very powerful, are the most widely used, particularly in their TurboC and Turbo Pascal versions. This ultimately led to the appearance of “virus families”: that is, viruses that are followed by a vast number of related viruses which are slightly modified forms of the original code.

Other users took the less ‘artistic’ approach of creating destructive viruses that did not require any great knowledge of programming. As a result, batch processing file viruses or BAT viruses began to appear.

Win16 viruses

The development of 16-bit processors led to a new era in computing. The first consequence was the birth of Windows, which, at the time, was just an application to make it easier to handle DOS using a graphic interface.

The structure of Windows 3.xx files is rather difficult to understand, and the assembler language code is very complicated, as a result of which few programmers initially attempted to develop viruses for this platform. But this problem was soon solved thanks to the development of programming tools for high-level languages, above all Visual Basic. This application is so effective that many virus creators adopted it as their ‘daily working tool’. This meant that writing a virus had become a very straightforward task, and viruses soon appeared in their hundreds. This development was accompanied by the appearance of the first Trojans able to steal passwords. As a result, more than 500 variants of the AOL Trojan family -designed to steal personal information from infected computers-  were identified.

This seventh edition on the history of computer viruses will look at how the development of Windows and Visual Basic has influenced the evolution of viruses, as with the development of these, worldwide epidemics also evolved such as the first one caused by Melissa in 1999.

While Windows changed from being an application designed to make DOS easier to manage to a 32-bit platform and operating system in its own right, virus creators went back to using assembler as the main language for programming viruses.

Versions 5 and 6 of Visual Basic (VB) were developed, making it the preferred tool, along with Borland Delphi (the Pascal development for the Windows environment), for Trojan and worm writers. Then, Visual C, a powerful environment developed in C for Windows, was adopted for creating viruses, Trojans and worms. This last type of malware gained unusual strength, taking over almost all other types of viruses. Even though the characteristics of worms have changed over time, they all have the same objective: to spread to as many computers as possible, as quickly as possible.

With time, Visual Basic became extremely popular and Microsoft implemented part of the functionality of this language as an interpreter capable of running script files with a similar syntax.

At the same time as the Win32 platform was implemented, the first script viruses also appeared: malware inside a simple text file. These demonstrated that not only executable files (.EXE and .COM files) could carry viruses. As already seen with BAT viruses, there are also other means of propagation, proving the saying "anything that can be executed directly or through a interpreter can contain malware." To be specific, the first viruses that infected the macros included in Microsoft Office emerged. As a result, Word, Excel, Access and PowerPoint become ways of spreading ‘lethal weapons’, which destroyed information when the user simply opened a document.

Melissa and self-executing worms

The powerful script interpreters in Microsoft Office allowed virus authors to arm their creations with the characteristics of worms. A clear example is Melissa, a Word macro virus with the characteristics of a worm that infects Word 97 and 2000 documents. This worm automatically sends itself out as an attachment to an e-mail message to the first 50 contacts in the Outlook address book on the affected computer. This technique, which has unfortunately become very popular nowadays, was first used in this virus which, in 1999, caused one of the largest epidemics in computer history in just a few days. In fact, companies like Microsoft, Intel or Lucent Technologies had to block their connections to the Internet due to the actions of Melissa.

The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer. Of these, the worm that most stands out from the rest is VBS/LoveLetter, more commonly known as ‘I love You’, which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million euros. In order to get the user’s attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU’ and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS’. When the user opened this attachment, the computer was infected.

As well as Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited a vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express, allowing it to infect computers without the user needing to run an attached file. These were the first samples of a series of worms, which were joined later on by worms capable of attacking computers when the user is browsing the Internet.

Enable Folder and Icon Refresh in Windows

 Enable Folder and Icon Refresh in Microsoft Windows
Windows Tips

This reg file Enables Folder and Icon Refresh.


Step 1. Copy the following (everything in the box) into notepdad.

_____________________________
QUOTE
Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"NoNetCrawling"=dword:00000000
_____________________________

Step 2. Save the file as disablerefreshundo.reg

Step 3. Double click the file to import into your registry.

NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

Eliminate IE's Auto complete Reminder

Eliminate IE's Auto complete Reminder

Auto-complete: Some people like it, some don't. Those who don't like it turn it off. Those of us who turned it off are now constantly being prompted to turn it on. By now, we despise it! How do we turn it off completely, with no more pop-ups asking us to turn it on?

It does seem that Internet Explorer really wants you to use AutoComplete. On a system with AutoComplete turned off, it will prompt you from time to time, asking to turn it on again. A Registry tweak will prevent IE's "helpful" reminders. First, close all IE windows. Launch REGEDIT from the Start menu's Run dialog. Navigate to the key HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel. Note that this key may not be present in its entirety. You may need to create the Internet Explorer and Control Panel subkeys. In the right-hand pane, look for a DWORD value named FormSuggest it will probably not be present. In that case, right-click in the right-hand pane and choose New | DWORD Value from the pop-up menu. Name the new value FormSuggest. Whether you found it or created it, double-click this value and set its data to 1. That should terminate the annoying reminder

How To Disable Microsoft Windows Logo Key

 Disable Windows Logo Key

 Read This article  no Microsoft website and Disable Windows Logo Key

CODE
http://support.microsoft.com/?kbid=181348


 You can copy the following messages into Your notepad and save as *.reg, and use it. To Disable Windows Logo Key

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]
"Scancode Map"=hex:00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b,e0,00,00,5c,e0,\
00,00,00,00

Disable The Send Error Report to Microsoft in Windows

Disable The Send Error Report to Microsoft in Windows
Microsoft Stupidities


To disable the stupid feature in Windows XP which tries to send a report to Microsoft every time a program crashes you will have to do this:

Lets Start

Step 1: Open Control Panel

Step 2: Click on Performance and Maintenance.

Step 3: Click on System.

Step 4: Then click on the Advanced tab

Step 5: Click on the error reporting button on the bottom of the windows.

Step 6: Select Disable error reporting.

Step 7: Click OK

Step 8: Click OK


About DirectX explained Full

 DirectX Explained

About DirectX explained Full


Ever wondered just what that enigmatic name means?

Gaming and multimedia applications are some of the most satisfying programs you can get for your PC, but getting them to run properly isn’t always as easy as it could be. First, the PC architecture was never designed as a gaming platform. Second, the wide-ranging nature of the PC means that one person’s machine can be different from another. While games consoles all contain the same hardware, PCs don’t: the massive range of difference can make gaming a headache.


To alleviate as much of the pain as possible, Microsoft needed to introduce a common standard which all games and multimedia applications could follow – a common interface between the OS and whatever hardware is installed in the PC, if you like. This common interface is DirectX, something which can be the source of much confusion.

DirectX is an interface designed to make certain programming tasks much easier, for both the game developer and the rest of us who just want to sit down and play the latest blockbuster. Before we can explain what DirectX is and how it works though, we need a little history lesson.

DirectX history

Any game needs to perform certain tasks again and again. It needs to watch for your input from mouse, joystick or keyboard, and it needs to be able to display screen images and play sounds or music. That’s pretty much any game at the most simplistic level.

Imagine how incredibly complex this was for programmers developing on the early pre-Windows PC architecture, then. Each programmer needed to develop their own way of reading the keyboard or detecting whether a joystick was even attached, let alone being used to play the game. Specific routines were needed even to display the simplest of images on the screen or play a simple sound.

Essentially, the game programmers were talking directly to your PC’s hardware at a fundamental level. When Microsoft introduced Windows, it was imperative for the stability and success of the PC platform that things were made easier for both the developer and the player. After all, who would bother writing games for a machine when they had to reinvent the wheel every time they began work on a new game? Microsoft’s idea was simple: stop programmers talking directly to the hardware, and build a common toolkit which they could use instead. DirectX was born.

How it works

At the most basic level, DirectX is an interface between the hardware in your PC and Windows itself, part of the Windows API or Application Programming Interface. Let’s look at a practical example. When a game developer wants to play a sound file, it’s simply a case of using the correct library function. When the game runs, this calls the DirectX API, which in turn plays the sound file. The developer doesn’t need to know what type of sound card he’s dealing with, what it’s capable of, or how to talk to it. Microsoft has provided DirectX, and the sound card manufacturer has provided a DirectX-capable driver. He asks for the sound to be played, and it is – whichever machine it runs on.

From our point of view as gamers, DirectX also makes things incredibly easy – at least in theory. You install a new sound card in place of your old one, and it comes with a DirectX driver. Next time you play your favourite game you can still hear sounds and music, and you haven’t had to make any complex configuration changes.

Originally, DirectX began life as a simple toolkit: early hardware was limited and only the most basic graphical functions were required. As hardware and software has evolved in complexity, so has DirectX. It’s now much more than a graphical toolkit, and the term has come to encompass a massive selection of routines which deal with all sorts of hardware communication. For example, the DirectInput routines can deal with all sorts of input devices, from simple two-button mice to complex flight joysticks. Other parts include DirectSound for audio devices and DirectPlay provides a toolkit for online or multiplayer gaming.

DirectX versions

The current version of DirectX at time of writing is DirectX 9.0. This runs on all versions of Windows from Windows 98 up to and including Windows Server 2003 along with every revision in between. It doesn’t run on Windows 95 though: if you have a machine with Windows 95 installed, you’re stuck with the older and less capable 8.0a. Windows NT 4 also requires a specific version – in this case, it’s DirectX 3.0a.

With so many versions of DirectX available over the years, it becomes difficult to keep track of which version you need. In all but the most rare cases, all versions of DirectX are backwardly compatible – games which say they require DirectX 7 will happily run with more recent versions, but not with older copies. Many current titles explicitly state that they require DirectX 9, and won’t run without the latest version installed. This is because they make use of new features introduced with this version, although it has been known for lazy developers to specify the very latest version as a requirement when the game in question doesn’t use any of the new enhancements. Generally speaking though, if a title is version locked like this, you will need to upgrade before you can play. Improvements to the core DirectX code mean you may even see improvements in many titles when you upgrade to the latest build of DirectX. Downloading and installing DirectX need not be complex, either.

Upgrading DirectX

All available versions of Windows come with DirectX in one form or another as a core system component which cannot be removed, so you should always have at least a basic implementation of the system installed on your PC. However, many new games require the very latest version before they work properly, or even at all.

Generally, the best place to install the latest version of DirectX from is the dedicated section of the Microsoft Web site, which is found at www.microsoft.com/windows/directx. As we went to press, the most recent build available for general download was DirectX 9.0b. You can download either a simple installer which will in turn download the components your system requires as it installs, or download the complete distribution package in one go for later offline installation.

Another good source for DirectX is games themselves. If a game requires a specific version, it’ll be on the installation CD and may even be installed automatically by the game’s installer itself. You won’t find it on magazine cover discs though, thanks to Microsoft’s licensing terms.

Diagnosing problems

Diagnosing problems with a DirectX installation can be problematic, especially if you don’t know which one of the many components is causing your newly purchased game to fall over. Thankfully, Microsoft provides a useful utility called the DirectX Diagnostic Tool, although this isn’t made obvious. You won’t find this tool in the Start Menu with any version of Windows, and each tends to install it in a different place.

The easiest way to use it is to open the Start Menu’s Run dialog, type in dxdiag and then click OK. When the application first loads, it takes a few seconds to interrogate your DirectX installation and find any problems. First, the DirectX Files tab displays version information on each one of the files your installation uses. The Notes section at the bottom is worth checking, as missing or corrupted files will be flagged here.

The tabs marked Display, Sound, Music, Input and Network all relate to specific areas of DirectX, and all but the Input tab provide tools to test the correct functioning on your hardware. Finally, the More Help tab provides a useful way to start the DirectX Troubleshooter, Microsoft’s simple linear problem solving tool for many common DirectX issues.

Direct Link To Any Page You Want To In Hotmail

Direct Link To Any Page You Want To In Hotmail

Direct Link To Any Page You Want To In Hotmail


This tutorial is for people that don't know how to direct link to .php pages on the web. If you are on a private computer, and don't mind auto-logging in, you will be able to access your folders much faster than going straight to hotmail.com

You will need a bit of information. Log into the hotmail main page. You will see a web address similar to the following:

http://by211.bay211.hotmail.msn.com/cgi-bin/hmhome?fti=yes&curmbox=00000000%2d0000...


It won't be exactly the same but it will be similar.

It's time to shorten this up. The only bit of information you really need is the direct web address to the server that contains your particular account. In the above example, you would just need:

CODE

http://by211.bay211.hotmail.msn.com/cgi-bin/


Just copy this section from your particular server addy in your browser's address bar.

Now that the explanation is over, these are the commands you can append to the above example to reach specific pages.
________________________________________________________________

'hmhome' - MSN Hotmail - Today
'HoTMaiL' - Inbox
'HoTMaiL?&curmbox=00000000-0000-0000-0000-000000000005' - Junk E-Mail
'HoTMaiL?&curmbox=00000000-0000-0000-0000-000000000004' - Drafts
'HoTMaiL?&curmbox=00000000-0000-0000-0000-000000000003' - Sent Messages
'HoTMaiL?&curmbox=00000000-0000-0000-0000-000000000002' - Trash Can
'compose' - Compose Message
'addresses' - Address Book
'options' - Options, Duh
'options?section=mail' - Mail Options
'options?section=personal' - Personal Details
'protect?screen=filter' - Junkmail Filter
'options?section=contacts' - Contact Options
________________________________________________________________

Remember, you just need to place these commands directly after 'http://.../cgi-bin/' without spaces.

If you have never tried this before, it works on many websites. So, if you don't like navigating websites, and would rather do that through your web-browser, go ahead and do it.

Delete Files From The Recent File List In Windows

Delete Files From The Recent File List In Windows

This tip requires a change to the Windows Registry. Please see the MSFN Guide "Backup Your Registry" if you are new to the Windows Registry.

Windows Media Player (WMP) is a built-in application that allows you to play multimedia files. Like many other applications, WMP remembers the most recently played files and displays them in the Recent File List under the File menu. This feature is useful if you regularly play certain files, but you may want to clear the list if you share the computer and a user account or create archives and CDs.

There are two ways you can clear the list:

I. The ClearMRU.exe Utility is available for free in the Windows Media Player Bonus Pack from Microsoft, but Microsoft does not support this tool.

II. You can also manually delete the list through the Windows Registry:

1. Start the Windows Registry Editor, regedit.exe, by typing regedit in the Windows Run Command Line.

2. Go to HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\RecentFileList.

3. Delete the RecentFileList subkey.

4. If you've also streamed content from the Internet, you can delete the RecentURLList subkey.

5. Exit the Registry Editor.

6. Restart the computer.

To keep certain files in the list, don't delete the entire key. Deleting individual entries within the key will get rid of the files that you no longer want in the Recent File List.

Delete An "undeletable" File in Windows

Delete An "undeletable" File in Windows

Open a Command Prompt window and leave it open.
Close all open programs.
Click Start, Run and enter TASKMGR.EXE
Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open.
Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.
At the command prompt type DEL where is the file you wish to delete.
Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
Close Task Manager.


Or you can try this

Open Notepad.exe

Click File>Save As..>

locate the folder where ur undeletable file is

Choose 'All files' from the file type box

click once on the file u wanna delete so its name appears in the 'filename' box

put a " at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it)

click save,

It should ask u to overwrite the existing file, choose yes and u can delete it as normal


Here's a manual way of doing it.

1. Start
2. Run
3. Type: command
4. To move into a directory type: cd c:\*** (The stars stand for your folder)
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

how to crack windows, programs manually

How to crack windows, programs  manually


how to crack windows, programs  manually


Debug is a program that comes with modern versions of DOS (I do not know when I started shipping out with DOS). Anyway, all Windows users should have it already.

It's a great tool for debuging programs, unassembling and cracking, and reading "hidden" memory areas like the boot sector, and much more.

The following was copied from an assembly tutorial who's author we cannot credit, because we have no idea who he is.

Get into DOS and type "debug", you will get a prompt like this:
-

now type "?", you should get the following response:
assemble A [address]
compare C range address
dump D [range]
enter E address [list]
fill F range list
go G [=address] [addresses]
hex H value1 value2
input I port
load L [address] [drive] [firstsector] [number]
move M range address
name N [pathname] [arglist]
output O port byte
proceed P [=address] [number]
quit Q
register R [register]
search S range list
trace T [=address] [value]
unassemble U [range]
write W [address] [drive] [firstsector] [number]
allocate expanded memory XA [#pages]
deallocate expanded memory XD [handle]
map expanded memory pages XM [Lpage] [Ppage] [handle]
display expanded memory status XS

Lets go through each of these commands:
Assemble:

-a
107A:0100

At this point you can start assembling some programs, just like using a assembler. However the debug assembler is very limited as you will probably notice. Lets try to enter a simple program:

-a
107A:0100 MOV AH,02
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-g
A

Program terminated normally

That's the same program we did at the end of the previous chapter. Notice how you run the program you just entered with "g", and also notice how the set-up part is not there? That's because debug is just too limited to support that.
Another thing you can do with assemble is specify the address at which you want to start, by default this is 0100 since that's where all .COM files start.
Compare:

Compare takes 2 block of memory and displays them side by side, byte for byte. Lets do an example. Quite out of debug if you haven't already using "q". Now type "debug c:\command.com"

-c 0100 l 8 0200
10A3:0100 7A 06 10A3:0200

This command compared offset 0100 with 0200 for a length of 8 bytes. Debug responded with the location that was DIFFERENT. If 2 locations were the same, debug would just omit them, if all are the same debug would simply return to the prompt without any response.
Dump:

Dump will dump a specified memory segment. To test it, code that assembly program again:

C:\>debug
-a
107A:0100 MOV AH,02
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-d 0100 l 8
107A:0100 B4 02 B2 41 CD 21 CD 20
...A.!.

The "B4 02 B2 41 CD 21 CD 20" is the program you just made in machine language.

B4 02 = MOV AH,02
B2 41 = MOV DL,41
CD 21 = INT 21
CD 20 = INT 20

The "...A.!." part is your program in ASCII. The "." represent non-printable characters. Notice the A in there.
Enter:

This is one of the hard commands. With it you can enter/change certain memory areas. Lets change our program so that it prints a B instead of an A.
-e 0103 <-- 0103="0103" at="at" br="br" edit="edit" program="program" segment="segment">107A:0103 41.42 <-- 41="41" 42="42" br="br" change="change" to="to">-g
B

Program terminated normally
-
Wasn't that amazing?
Fill:

This command is fairly useless, but who knows....
It fills the specified amount of memory with the specified data. Lets for example clear out all memory from segment 0100 to 0108, which happens to be our program.
-f 0100 l 8 0 <-- 0100="0100" 0="0" 8="8" a="a" br="br" bytes="bytes" file="file" for="for" length="length" of="of" offset="offset" with="with">-d 0100 l 8 <-- br="br" it="it" that="that" verify="verify" worked="worked">107A:0100 00 00 00 00 00 00 00 00 .......
Yep, it worked.
Go:

So far we used go (g) to start the program we just created. But Go can be used for much more. For example, lets say we want to execute a program at 107B:0100:
-r CS <-- 107b="107b" br="br" cs="cs" point="point" register="register" set="set" the="the" to="to">CS 107A
:107B
-g =100

You can also set breakpoints.
-a <-- br="br" enter="enter" have="have" original="original" our="our" program="program" so="so" something="something" we="we">107A:0100 MOV AH,02 to work with
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-g 102 <-- 107a:0102="107a:0102" a="a" at="at" br="br" break="break" point="point" set="set" up="up">
At this point the program will stop, display all registers and the current instruction.
Hex:

This can be very useful. It subtracts and adds two hexadecimal values:
-h 2 1
0003 0001 <-- -="-" 1="1" 1h="1h<br" 2h="2h" 3h="3h" and="and">
This is very useful for calculating a programs length, as you will see later.
Input:

This is one of the more advanced commands, and I decided not to talk about it too much for now. It will read a byte of data from any of your computers I/O ports (keyboard, mouse, printer, etc).

-i 3FD
60
-

Your data may be different.
In case you want to know, 3FD is Com port 1, also known as First Asynchronous Adapter.
Load:

This command has 2 formats. It can be used to load the filename specified with the name command (n), or it can load a specific sector.

-n c:\command.com
-l

This will load command.com into debug. When a valid program is loaded all registers will be set up and ready to execute the program.
The other method is a bit more complicated, but potential also more usefull. The syntax is

L

-l 100 2 10 20

This will load starting at offset 0100 from drive C (0 = A, 1 = B, 2 = C, etc), sector 10h for 20h sectors. This can be useful for recovering files you deleted.
Move:

Move takes a byte from the starting address and moves it to the destination address. This is very good to temporary move data into a free area, than manipulate it without having to worry about affecting the original program. It is especially useful if used in conjunction with the r command to which I will get later. Lets try an example:
-a <-- br="br" enter="enter" have="have" original="original" our="our" program="program" so="so" something="something" we="we">107A:0100 MOV AH,02 to work with
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-m 107A:0100 L 8 107B:0100 <-- 107a:0100="107a:0100" 107b:0100="107b:0100" 8="8" br="br" bytes="bytes" from="from" into="into" more="more" starting="starting">-e 107B:0103 <-- 107b:0103="107b:0103" br="br" edit="edit">107B:0103 41.42 <-- 42="42" and="and" br="br" change="change" it="it">-d 107A:0100 L 8 <-- br="br" it="it" make="make" sure="sure" worked="worked">107A:0100 B4 02 B2 41 CD 21 CD 20 ...A.!.
-d 107B:0100 L 8
107A:0100 B4 02 B2 42 CD 21 CD 20 ...B.!.
-m 107B:0100 L 8 107A:0100 <-- br="br" changes.="changes." like="like" original="original" program="program" restore="restore" since="since" the="the" we="we">Name:

This will set debug up with a filename to use for I/O commands. You have to include the file extension, and you may use addition commands:

-n c:\command.com
Output:

Exactly what you think it is. Output sends stuff to an I/O port. If you have an external modem with those cool lights on it, you can test this out. Find out what port your modem is on and use the corresponding hex number below:

Com 1 = 3F8 - 3FF (3DF for mine)
Com 2 = 2F8 - 2FF
Com 3 = ??? - ??? (if someone knows, please let me know)

Now turn on the DTA (Data Terminal Ready) bit by sending 01h to it:
-o XXX 1 <-- br="br" com="com" hex="hex" in="in" is="is" port="port" the="the" xxx="xxx">
As soon as you hit enter, take a look at your modem, you should see a light light up. You can have even more fun with the output command. Say someone put one of those BIOS passwords on "your" computer. Usually you'd have to take out the battery to get rid of it, but not anymore:

MI/AWARD BIOS
-o 70 17
-o 71 17

QPHOENIX BIOS
-o 70 FF
-o 71 17

QGENERIC
-o 70 2E
-o 71 FF

These commands will clear the BIOS memory, thus disabling the password.
Proceed:

Proceeds in the execution of a program, usually used together withy Trace, which I will cover later. Like the go command, you can specify an address from which to start

using =address
-p 2

Debug will respond with the registers and the current command to be executed.
Quite:

This has got to be the most advanced feature of debug, it exits debug!

-q
Register:

This command can be used to display the current value of all registers, or to manually set them. This is very useful for writing files as you will see later on.

-r AX
AX: 011B
:5
-
Search:

Another very useful command. It is used to find the occurrence of a specific byte, or series of bytes in a segment. The data to search for can by either characters, or a hex value. Hex values are entered with a space or comma in between them, and characters are enclosed with quotes (single or double). You can also search for hex and characters with the same string:
-n c:\command.com <-- br="br" command.com="command.com" data="data" have="have" in="in" load="load" search="search" so="so" some="some" to="to" we="we">-l
-s 0 l 0 "MS-DOS" <-- block="block" br="br" entire="entire" for="for" memory="memory" search="search">10A3:39E9 <-- 10a3:39e9="10a3:39e9" br="br" found="found" in="in" string="string" the="the">
NOTE: the search is case sensitive!
Trace:

This is a truly great feature of debug. It will trace through a program one instruction at a time, displaying the instruction and registers after each. Like the go command you can specify where to start executing from, and for how long.
-a <-- again="again" br="br" thing="thing" this="this" yes="yes">107A:0100 MOV AH,02
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-t =0100 8

If you leave out the amount of instructions that you want to trace, you can use the proceed (p) to continue the execution as long as you want.
Unassemble:

Unassembles a block of code. Great for debugging (and cracking)
-u 100 L 8 <-- 100="100" 8="8" at="at" br="br" bytes="bytes" offset="offset" starting="starting" unassembles="unassembles">107A:0100 MOV AH,02 <-- br="br" debut="debut" response="response" s="s">107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
Write:

This command works very similar to Load. It also has 2 ways it can operate: using name, and by specifying an exact location. Refer to back to Load for more information.

NOTE: The register CX must be set the file size in order to write!
NOTE: Write will not write .EXE or .HEX files.[SIZE=7][SIZE=14]

Woo Themes - Canvas Wordpress themes Free Download Latest Full

Woo Themes - Canvas WordPress themes Free Download
Woo Themes

Woo Themes - Canvas Wordpress themes Free Download Latest Full hacker bradri

Canvas is our most ambitious theme to date! Every element of Canvas is highly customizable through our options panel, so you can make the design, layout and typography exactly like you want. If you are after a highly customizable blog design or just a starter theme for your next client project, then Canvas will most definitely work for you!


Unique Features

Customize any element

Canvas will let you customize the style and typography of every element in the design. Packed with 100+ options, it allows you to make your blog look exactly like you want!

Google fonts support

You can change any text on your site to the font of your liking, and also use the awesome Google Fonts to go beyond those standard web-safe fonts.

Fully Responsive Design

The design will scale to fit on all browser widths/resolutions and on all mobile devices. Go ahead and scale your browser window and see the results.

Use your own images in design

The options panel lets you upload your own images for use as main background image and header background image. It’s never been this easy!

Advanced Layout Controls

Canvas lets you easily change your site width from 600px to 2000px, and also gives you the ability to change the layout of your columns through the Layout Manager.

Change your layout

You can also choose between 6 different layouts for and order of content/sidebars (full width, 2 col left, 2 col right, 3 col left, 3 col middle, 3 col right). Canvas also lets you specify individual layouts per post or page!

Magazine and business page templates

Canvas features a Magazine and Business page template, both with javascript sliders so now you can easily setup your homepage to act as a magazine or business theme.

Portfolio module

Canvas comes with a portfolio custom post type where you can showcase your latest projects, designs, or even product images. A dedicated page template showcases your portfolio with a category sorter and lightbox pop-up functionality for ease-of-use.

Tumblog functionality with iPhone App publishing!

NEW! Canvas now supports WooTumblog functionality so it can function like a Tumblr theme, and you can use our new Express iPhone App to publish to your Canvas powered blog!

Custom widgets

The theme has 2 widgetized areas in sidebar and 4 widgetized areas in the footer (optional), and also some extra Woo custom widgets (Woo Tabs, Flickr, Twitter, Adspace, Search).

Child theme friendly

Canvas is the first theme from WooThemes that has made use of custom hooks, which makes it a lot easier to customize the theme via a child theme without touching any code in the main parent theme. Download our sample child theme Fresh Canvas to get started.


Click Here For Demo

Click Here To Download

WooStore Wordpress eCommerce theme Free Download Full

WooStore Wordpress eCommerce Theme Free Download
WooThemes  eCommerce Theme


WooStore is a landmark for WooThemes, our first eCommerce theme for WordPress. Designed in-house by Magnus Jepson and brought to life with WooCommerce, WooStore provides you with a powerful and flexible eCommerce solution.

Unique Features

WooCommerce Goodness

As you’d expect, WooStore makes full use of all of WooCommerce features. We’ve painstakingly married theme and plugin to provide a seamless front-end experience. Every single one of WooCommerce widgets has been lovingly styled to match the beautiful design, as has each key component of the plugin such as the product categories, product descriptions, cart, checkout and user account sections. Read all about the benefits of WooCommerce here.

Featured Slider

A custom homepage featured slider to showcase your products with style, all powered by jQuery. Optional slider pagination gives your visitors easy overview.

Customisable Homepage

The homepage features a stylish jQuery slider as well as the option to display content from one of your pages. There’s even an option to display your featured products, either in a slider of their own or a static grid.

Custom Post Types

The theme takes full advantage of the new custom post types functionality that came with WordPress 3.0, so adding slides and products (via WooCommerce) is dead easy!

Custom Widgets

The theme has 1 widgetized sidebar (which can be moved from the right of the content to the left) and 4 footer regions, and as always comes with 8 custom Woo Widgets PLUS a multitude of WooCommerce widgets too. Widgelicious!


The Woostore theme offers shop facilities

This theme works out of the box, and includes styling for our freely available eCommerce plugin. In other words, you have the option to offer shop facilities right from your WordPress powered website.


With our huge catalog of commercial extensions you can add even further niche functionality to your shop.

Click Here For Demo 

Click Here To Download