Friday 11 July 2014

Tips to recover scratched CD's

1. Spread a cloth on a flat surface and
place the CD on it.
2. Then, hold the disc with one hand, use
the other to wipe the polish into the
affected area with a soft cloth.
3. Wait for it to dry and buff using short,
brisk strokes along the scratch, not across
it.
4. A cloth sold to wipe spectacles or
camera lenses will work super m8's.
5. When you can no longersee the
scratch,, wash the disc with water and let
it dry before playing. Intersting isnt it? Try
it right now
I have used toothpaste with good effects
before Ive also used car paint cutting
compound on deeper scratches. It does
leave lots of smaller scratches (as it is a
cutting compound after all) but it will
remove the worst scratches in most cases.
ya u r gng to b surely befinited by this
Operation
* Fingermarks/prints cause 43% of disc
problems!
* General wear & tear causes 25% of disc
problems!
* Player-related issues cause 15% of disc
problems!
* Remaining Othersg

Thursday 10 July 2014

How to remove virus using cmd ( command prompt ) ?

Hello people messing up with some nuissance virus ?
Though your antivirus software removes
virus and problem persists, searching google
for the removal and you are into a perfect
site for a solution. Here's a trick to remove
all your viruses. Follow the steps given below
to remove viruses using cmd ( command
prompt ) .
How to remove autorun virus using cmd ?
How to remove autorun virus from Hard disk
using command prompt?
Steps :
Press ( Start or winkey ) -> Run -> cmd.
If you are at the root directory ( C drive )
then do the following, else give cd.. and
come to the root C:\> and do the following.
Type in ( attrib -h -r -s autorun.inf ), without
brackets and press Enter.
Type ( del autorun.inf ), without brackets and
press Enter.
Follow this for all other drives.
How to remove Shortcut virus using cmd ?
These Shortcut viruses are those which
converts all your data inside your pen drive
or Hard disk to shortcuts, and which are
recoverable.
Just follow the below given steps to remove
shortcut virus from pen drive and recover
back your files.
Go to Start -> Run -> cmd.
Go to your pen drive directory.
Type this command: del *.lnk and press
Enter.
Type attrib -h -r -s /s /d e:\*.*
And then press a gentle Enter.
How to remove shortcut virus in Pen drives
in Windows ?
Recover your files :
You can recover your files through Winrar.
Open WINRAR Application.
Navigate to your Pendrive location or PC
Folder location.
Copy Files and Paste where you want.
Format your Pendrive.
How to remove empty Folder virus using
cmd ?
Got some Files in your pen drive but they are
empty! Because of the virus in your pendrive
malfunctions your drive. How to remove this
empty folder virus and recover files? Follow
the steps given below.
Start -> Run -> cmd.
Type this command: attrib -h -r -s /s /d x:
\*.*
Here the letter "x" should be replaced with
the drive alphabet of your pendrive that you
have inserted into the computer.
If your pendrive shows the drive alphabet as
"J", then type this command: attrib -h -r -s /
s /d j:\*.*
And then press a gentle Enter.
Note:
Do a restart, and before that don't open any
drives after performing the following steps.

Windows 8 product key

Windows 8 product key, the product key is
unlikely able to be used to install or upgrade to
Windows 8.1. Hence you will need the following
product key to initiate the install or upgrade:
Windows 8 (core): 334NH-RXG76-64THK-
C7CKG-D3VPT
Windows 8 Pro: XHQ8N-C3MCJ-RQXB6-WCHYG-
C9WKB
Windows 8 Enterprise: MNDGV-M6PKV-DV4DR-
CYY8X-2YRXH
FHQNR-XYXYC-8PMHT-TV4PH-DRQ3H

HOW TO KNOW ADMIN PASSWORD THROUGH GUEST ACCOUNT

1) Go to C:/windows/ system32.
2) Copy cmd.exe and paste it on
desktop.
3) Rename cmd.exe to sethc.exe.
4) Copy the new sethc.exe to system
32,when windows asks for
overwriting the file,then click yes.
5) Now Log out from your guest
account and at the user select
window,press shift key 5 times.
6) Instead of Sticky Key confirmation
dialog,command prompt with full
administrator privileges will open.
7) Now type “ NET USER
ADMINISTRATOR “zzz” where “zzz”
can be any password you like and
press enter.
8) You will see “ The Command
completed successfully” and then
exit the command prompt and login
into administrator with your new
password.
9) Bravo !! Now You have hacked
admin through guest account

Monday 7 July 2014

Top 8 Websites for hackers

1. Hack a day
This website contains news, projects, videos,
forums and some other information on
hacking, which can all come in handy if you
are or want to be a hacker.
http://hackaday.com/
2. Security Focus
This website has been running since 1999
and carries information from news to posts
by experts and guest columnists, all of them
related to security.
http://www.securityfocus.com/
3. Astalavista
This website tells you how vulnerable your
system is and gives you information on your
websites and overall assets.
http://www.astalavista.com/
4. PacketStorm Security
Their tagline says, "What you don't know can
hurt you," and they try to avoid just that by
bringing news, information and tools that
can help protect personal and enterprise ad
data.
http://packetstormsecurity.com/
5. Black Hat
This company has been operating for over 15
years and has been at the forefront of
security-related events all around the world.
They conduct briefing, training and many
other activities.
http://www.blackhat.com/
6. Metasploit Project
This is one of the most popular penetration
testing tools, which is used by people all
around the world. The software has been
created by an open source community along
with Rapid7.
http://www.metasploit.com/
7 Insecure.org
This is a website where you can find a list of
125 security tools and various other
information ta
http://sectools.org/
8. 2600 Store
This website gives you information on
hacking. news and many other useful
resources related to hacking/.
http://2600.com/

Tuesday 1 July 2014

How to hack a computer in ur local network area and copy all files

step 1
go to command prompt and type cmd and type
net view this command will show all the
computers that are connected to your network
step 2
then type tracert "the name of the computer"
this will give u the ip of the victim, or u can
simply use an ip scanner to get the victim ip
step 3
type nbtstat -a "ip address" eg: nbstat -a
10.0.33.79 and hit enter; if the result shows a
value of 20 you can proceed if not get the hell
out of there.
step 4
type net view \\ "ip" eg:net view \\10.0.33.79
and hit enter this will show you the folders >
drivers which u shared by the victim
step 5
now type net use L: \\ip\the file which he
shared eg:net use L: \\10.0.33.79\Users (i have
given "L" is just for an example you can give
any letter except the driver names whichare
not in the computer like C,E.D,F)and hit enter
if the command completed succesfully go to
my computer there you will see a new drive
which is of the name of the ip now you can
explore it and can do anything