Pages

Showing posts with label Danger zone. Show all posts
Showing posts with label Danger zone. Show all posts

How to Create a Password-Protected Disk on Your PC



You may want to encrypt that data to keep it from getting into the wrong hands.

When you encrypt data, you use a special algorithm to scramble the bits that make up that file into nonsensical information, which can be restored to its meaningful state only with the right password.


TrueCrypt is a free, open-source encryption application that works on Windows, Mac, and Linux. Given the right credentials, TrueCrypt creates a virtual  hard drive that reads and writes encrypted files on-the-fly. This hack explains how to encrypt your private files using TrueCrypt on Windows and Linux.




Set Up the Encrypted Volume Location


Here’s how to set up an encrypted virtual disk with


TrueCrypt:


1. Download TrueCrypt from http://truecrypt.org. Install and launch it.


2. Click the Create Volume button to launch a wizard that prepares the encrypted drive location. Choose Create an Encrypted File Container, click Next, and then select Standard TrueCrypt volume and again click Next.


3. On the Volume Location page, click the Select File button, navigate to the location where you want to store your encrypted files, and type a name for it such as C:\Users\adam\Documents\4myeyesonly, as  shown in Figure 2-15.


The name (4myeyesonly in this example) isn’t the file you want to encrypt; it’s the container that will store the files you encrypt. Click Next.


Figure 2-15: Create an encrypted volume with TrueCrypt.

Figure 2-16: Set the size of your encrypted container.

The advantage here is that the file will always look as though it’s exactly 100MB, giving no hint as to the actual size of its contents. Click Next.

6. Choose your volume password. TrueCrypt wants something hard to crack, such as 20 characters with letters and numbers mixed together. The whole point here is to keep snoopers at bay, so make your password a non-dictionary word that’s difficult to guess. Alternatively, you can use a key-file to lock your volume.  warning Keep in mind that if you forget your password or your key-file gets corrupted or lost, the files on your TrueCrypt volume will be inaccessible — forever.

7. Format the volume. This part is fun: TrueCrypt gathers random information from your system — including the location of your mouse pointer — to format the file drive location with random data to make it impossible to read. Click the Format button to go ahead with this operation. (Don’t let the word format scare you; you’re not erasing your hard drive, you’re just formatting the drive location file — the 4myeyesonly file in this example — that you just created.)

When the formatting is complete, your encrypted volume location is ready for use.

Store and Retrieve Files from the Encrypted Volume Your TrueCrypt file can hold your highly sensitive files locked up as tight as a drum. Here’s how to get to it:



1. From TrueCrypt, choose Select File, and navigate to the volume file you just created.

2. Select an available drive letter such as X: from the list in TrueCrypt (see Figure 2-17). Figure 2-17:


To mount a TrueCrypt drive, select the file container and an available drive letter.

3. Click the Mount button and enter your volume password. If you enter the correct password, the virtual drive X: will be mounted.

4. Go to Computer. Listed alongside all the other drives on your computer is a new one: Local Disk X:. Drag and drop all your sensitive data to this drive and work from it as you would any other disk.

5. When you finish working with the data, in TrueCrypt, select the mounted drive (X: in this example) and click the Dismount button. The X: drive will no longer be available; all you have left is the 4myeyesonly file you created, which can be dropped onto a thumb drive, emailed to yourself, burned to CD, or placed on your iPod, totally encrypted.

If someone managed to open this file, its contents would be meaningless, indecipherable nonsense. Only a user with TrueCrypt installed and the password or key-file could mount the drive and access the files on it.

TIP Using TrueCrypt you can secure

an entire drive — such as a USB thumb drive. To do so, click Select Device instead of Select File, and choose your thumb drive. You can also install TrueCrypt to the thumb drive.98125-50750

how to hack computer admin. password?



This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.
 

How it works?

 
Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.

The download link for both CD and floppy drives along with the complete instructions is given below

Offline NT Password & Reg Editor Download@www.ekajanbi.in

It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.
 

Another simple way to reset non-administrator account passwords

 
Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.

1. Open the command prompt (Start->Run->type cmd->Enter)

2. Now type
net user and hit Enter

3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name
John, then do as follows

4. Type
net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.

So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps. Any Problem -- Cont. me
98125-50750

facebook hacking trick@thecomputerhouse.blogspot.in


                                    
This is the question which i read daily in my inbox. All the people want to know how to hack Facebook account and i always suggest them to read hacking tutorials on my blog. But the main problem is that i post many hacking tricks but no one is specially for Facebook hacking. Many of the hacking tricks i posted are used in hacking facebook accounts. But the problem is to think as this way. If you want to be a good hacker you should know how to implement all those things for you purpose. So now i am going to describe how to hack someone’s facebook account.
1: phishing:- Phishing or fake page hacking is the most widely used hacking trick for any type of accounts of website. It can also be implemented as in this case too.  Read my previous post on phishing@thecomputerhouse.blogspot.in to learn it and download facebook phishing page from below. That post was specially for Gmail. The same process will be applied in the case of faceook too. you only need to save facebook login page to your system and make changes to form element of action as per in my that post.
you can also use Tabnapping . This is also a type of phishing but it will make it easier to send your fake page to the victim. Download Tabnapping script from this link: TabNapping Script . Read more about Tabnapping here
@thecomputerhouse.blogspot.in
IMPORTANT: sending fake page in case of simple case is not so easy. I am suggesting you an effective way of doing that. You get facebook notification emails. Use the format of that email address but replacing the URL with your fake URL ;)

Download facebook phishing page here:
Download


NOTE: Never search for the free or crack. Because that will not work. Some hackers also hosted it for free with Trojan. When you will use those free hosted on some file hosting server, you are taking risk with your facebook account which can be hacked with that trojan. So download only with the official link given above.

3: Firesheep:- If your victim uses unsecure wireless network then you can hack him easily by using mozilla firefox and a simple firefox plugin. Firesheep. read this post to know about firesheep and dowload it from that post. Firesheep . For college campus, this tool is easiest to use and best to hack. use this tool to gain access to any of the person using the same unsecure wireless network.
4: Hack Facebook’s primary email address:- Hacking someone’s email account also need above described methods (phishing, keylogger, firesheep) but you can also hack it by using forgot password and then by guessing his security question. Many times people use simple security questions which are easy to guess. If you know him/her personally, you can easily guess.
5: Facebook’s can’t access account option:- there is an recovery option in Facebook account. You can mention that your primary email address is also hacked. Then they will ask you many questions regarding that account. as some name of friends, account holder’s some personal information etc. If you know about victim well, you can be able to answer all those question. then facebook will ask you for new email address for password recovery. Give any email address which you can access.
Facebook also has a recovery option with four of your friends in case of lost access to recovery email and recovery number. So you can use four of his/her friends to recover his account on any new email id specified by you. For this you can either use some of existing friends on that profile or can use four fake profiles and add that person.
These are some ways of hacking Facebook account. There may be more but this time only these are in my mind. :P
if i will remember any other method i will update this post..

How to Trace Mobile Numbers

Trace Mobile NumbersWith the rapid growth of mobile phone usage in recent years, we have often observed that the it has become a part of many illegal and criminal activities. So, in most cases tracing the mobile number becomes a vital part of the investigation process. Also, sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.
Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller.
All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.
If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.
By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So, if you are in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!any problem cont. me --98125-50750

How to Block Unwanted Emails

How to Block Unwanted EmailsDo you want to block emails from your ex wife/husband? Do you want to block those annoying offers and newsletters that reach your inbox? Well, here is a way to block all those unwanted and annoying emails that you do not want to see or read!
In this post, I will show you a trick using which you can block individual email address or the whole domain from which you do not want the emails to come from. Here are the step-by-step instructions to do this:

For Gmail:

Here is how you can block emails for Gmail:
  1. Log in to your account.
  2. At the top-right corner, click on Settings.
  3. Under Settings, click on Filters.
  4. You’ll now see an option “Create a new filter“, click on it.
  5. Now in the From field, enter the email address from which you do not want to receive the emails.
    For ex. you may enter ekajanbi@gmail .com in the “From:” field to block all incoming emails from this address. However, if you want to block the whole domain, then use the following syntax: *@xyz.com. Now, all the incoming emails from the domain “xyz.com” will be blocked.
  6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. In case if you would like to unblock those emails, all you need to do is just delete the filter that you’ve created.

For Yahoo:

Here is how you can block unwanted emails for Yahoo:
  1. Log in to your account.
  2. At the top-right corner, click on Options.
  3. A drop down menu appears, now click on More options.
  4. In the left panel select the option Filters and click on create or edit filters.
  5. Now click on Add.
  6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.
Fox ex. john@gmail.com or if you want to block an entire domain then just enter @xyz.com. Don’t enter *@xyz.com. Select the option Move the message to: Trash and click on Save Changes.

For Hotmail:

Here is how to do the same for Hotmail:
  1. Log in to your account.
  2. At the top-right corner, click on Options.
  3. A drop down menu appears, now click on More options.
  4. Click on Safe and blocked senders link under Junk e-mail.
  5. Now click on Blocked senders.
  6. Type in the email address that you want to block under blocked e-mail address or domain field.
For ex. Enter sbajanbi@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain.
That’s it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy. I hope this post helps. Pass your comments! enjoy and any problem-98125--50750

How to Make Invisible Password Protected Folder


Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.
 

How to create a Password Protected Folder?

 
Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.

Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.


Step-3: Now Right-click on this folder (ABC) and select the option
Send To -> Compressed (zipped) Folder.

Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.


Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.


Step-6: Now goto the
File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.
 

How to make it Invisible?

 
Step-1: Now Right-click on this password protected folder and select Properties.

Step-2: At the bottom select the option
Hidden and press OK. Now your folder gets invisible (hidden).

Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under
Hidden files and folders you’ll see the following two options
  • Do not show hidden files and folders
  • Show hidden files and folders
 
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.

I hope you like this post. Pass your comments!! Cheers and any problem  Cont. Me --98125-50750

How to Hack Windows Administrator Password



This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.


Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called  Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.
 

How it works?

 
Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.

The download link for both CD and floppy drives along with the complete instructions is given below

Offline NT Password & Reg Editor Download

It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.
 

Another simple way to reset non-administrator account passwords

 
Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.

1. Open the command prompt (Start->Run->type cmd->Enter)

2. Now type
net user and hit Enter

3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name
John, then do as follows

4. Type
net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.

So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps. Any Problem -- Cont. me 98125-50750