This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Saturday, August 11, 2012

Free Tools for Spyware Removal


There are lot of PC users who know only little about “Spyware”, “Malware”, “hijackers”, “Dialers” & many more. This article will help you avoid pop-ups, spammers and all those baddies.
 

What is Spyware?

 
Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent. The term spyware suggests software that secretly monitors the user’s behavior. Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited etc.
 

How to check if a program has spyware?

 
It is this little site that keeps a database of programs that are known to install spyware.
Check Out: SpywareGuide
 

How To Block Pop-Ups?

 
If you would like to block pop-ups (IE Pop-ups) there are tons of different tools out there, but these are the two best, I think.
Try: Google Toolbar - This tool is a Freeware.
Try: AdMuncher – This tool is a Shareware.
 

How To Remove Spywares?

 
If you want to remove spwares then you may try the following tools/programs
Try: Lavasoft Ad-Aware – This tool is a freeware.
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.
Try: Spybot-S&D – This tool is a freeware.
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.
Try: Spy Sweeper – This tool is a shareware.
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. The best scanner out there, and updated all the time.
Try: BPS Spyware and Adware Remover – This tool is a shareware.
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you’d like to remove.
 

How To Prevent Spyware?

 
To prevent spyware attack you can try the following tools.
Try: SpywareBlaster – This tool is a freeware.
Info: SpywareBlaster doesn’t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.
Try: XP-AntiSpy – This tool is a freeware.
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Hack/Alter Windows Vista Base Score


If you are a Windows Vista user then you are very likely to be familiar with the Base Score. This score is calculated based on the computer’s hardware and software configuration. This score act’s as a rating to your PC. If you have a too low base score then don’t worry. Hacking Windows Vista’s so called Base Score is very easy. It is possible to hack this score within no time.Here are the snapshots of my own system. Actually my system’s base score is 3.7. But I have brought it up to 9.5 with this small hack. Can you beleive this!!
Here is a step-by-step instruction to hack Vista Base score
1. Navigate to
C:\Windows\Performance\WinSAT\DataStore
2. You should see a .xml file with Assessment (Formal).WinSAT as filename
3. Right-click it and select open with ‘Wordpad’ (Not notepad!)
4. On line 12, you should see something like the following:
9.5
9.5
9.5
9.5
5.5
9.5
9.5
9.5
5. You can enter any number in the place where I have written 9.5. But the number should be less than 10.
6. Once you have entered the number of your choice save the file and close it.
7. That’s it. You have successfully altered your Windows Vista base score. No restart is required.

How to Hack an Email using Hardware Keylogger


Did you know that keyloggers are the simplest way to hack an email password?. Today I’ll be giving you a detailed information on hardware keyloggers and their use. I will also teach how to hack an email using hardware keylogger. If you are new to the concept of keyloggers or haven’t read my previous post about email hacking then you must refer my previous post Hacking an email account. Here I’ll give a breif description about keyloggers.
software keylogger (or simple keylogger) is a stealth computer program that captures every keystroke entered through the keyboard.
Now I’ll tell you what is a hardware keylogger and how it can be used for hacking an email.

Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.
So by looking at the above images we can come to know that hardware keyloggers look just like any USB or PS/2 device. So it is very hard to identify it as a keylogger.
 

Insatalling a Hardware Keylogger to Hack the Email Password

 
The hardware keylogger must be installed between the keyboard plug and the USB or PS/2 port socket. That is you have to just plug in the keylogger to your keyboard’s plug (PS/2 or USB) and then plug it to the PC socket. The following image shows how the keylogger is installed.
Once you install the hardware keylogger as shown in the above two images the keylogger starts recording each and every keystroke of the keyboard including email passwords and other confidential information. The hardware keylogger has an inbuilt memory in which the logs are stored.

How to Copy Locked Photos from Orkut


Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album. So this makes it difficult to copy photos from Orkut. It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it. This may be annoying most of you! Then…
 
How To Copy Locked Photos From Orkut?
Yes it’s still possible to copy the photos from Orkut. Here’s a step-by-step procedure to copy the photo.
1. Login into your Orkut Account.
2. Goto your friend’s album and open the photo that you need to copy.
3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.
4. Press the left click button and drag and drop the photo onto the ADDRESS BAR. I think this trick is no longer working. So I have a new trick….
Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). Alternatively you can also Drag and Drop the photo onto the Desktop. That’s it. This trick is working now!!
4. Now the photo gets displayed seperately on your browser.
5. You can Right-Click and select the Save As option to save the photo onto your PC.
The browser also displays the direct link to the photo. This link can be used to share the Orkut photos with your friends without the need to login to your Orkut account to access photos.
Please express your opinions through comments. Cheer Up..
Happy Orkut Hacking.

How to Enable Telnet Command in Vista


Most of you are familiar with the telnet command. It is one of the well known Windows IP Utilities. In fact the telnetcommand is most important for sending a fake email which i have discussed in my previous post. If you are using Windows XP the telnet command is available by default.But if you use Windows Vista the telnet command is disabled by default.
So when you try to use the telnet command in Windows Vista you get the following error message.
‘telnet’ is not recognized as an internal or external command,operable program or batch file.
 
You get this error in Vista because unlike XP, Vista does not support telnet command by default. So, for this you have to manually enable/turn on the telnet feature in Vista.
Here’s the step by step procedure to enable telnet feature (telnet command) in Windows Vista.
 
1. Goto the Control Panel.
2. Click on the sub heading Uninstall a program under the main heading Programs.
NOTE: IF you are in the Classic View click on Programs and Features.
3. Now in the left panel under the Tasks select the option Turn Windows features on or off.
4. Now a new window opens. In the new window select the following
Telnet Client
Telnet Server (optional)
5. After selecting click on OK.
Now wait for few minutes till the telnet feature is installed. Once the telnet feature is installed you can goto the command prompt and use the telnet command. System restart is not required.