Monday, September 3, 2012

Hack Email accounts : 34 in 1phisher pack


 websites like: paypal,ebay,yahoo,gmail etc....

Download:
http://www.mediafire.com/?yzm3k1mojhu

bomb mobile phone with sms

BEAVER'S SMS BOMBER PRO. This program will bomb the victim's mobile phone with tons of SMS.

Download:
 http://www.mediafire.com/?rfxzf4jcjm2

How to set Computer Network for small business using WIN XP

Setting up a small business computer network has become easier over the years as operating systems and networking technologies have improved, and storage and networking peripherals have evolved to incorporate plug and play features.

What are the main reasons for having a computer network?
Setting up a network is a good way to get more use out of your computers and peripherals, particularly for small and home business users.
Networks allow you to share a single broadbandInternet connection among multiple computers and PC users.
They are able to share files among computers more easily and also share software resources such as diaries.
 Networking also allows you to use a printer connected to a different computer, and access media and other resources, such as images and music, which are stored remotely or across the office.

Should I go wired or wireless?
More and more small businesses are using wirelessnetworking equipment, particularly since it has fallen in price and become easier to configure and use.
Wireless networking allows you to have a more attractive and arguably safer office environment with fewer cables around. It gives you more flexibility about where you locate your IT kit, and you can use your laptop from anywhere in your office.
It also allows you to offer visitors wireless internet access or hot-desk facilities. 
However, Ethernet-based wired networking can still have the edge over wireless equipment in being more reliable, lower cost and offering faster connection speeds. Wireless signals on the other hand can vary depending on the layout of an office, the thickness of the walls and sometimes even the weather.

What equipment do I need to set up a basic network?
Operating systems like Microsoft Windows Vista, Windows XP and Apple Mac OS X have networking capabilities incorporated into them. This means that if you have a relatively up to date laptop or desktop PC, it should be fairly straightforward to network machines together.
Apart from the computers, you will also need some networking equipment, which may be as basic as having a single cable to connect two computers together.
For larger setups, you may require an additional wireless or wired router plus some Ethernet cables to link the PCs up.
To set up a wireless network, you will need a wireless router linked to your broadband connection, plus a cable that links the router to your main PC or server.
This will then allow other PCs and notebooks, which have wireless networking equipment integrated or attached, to pick up the wireless signals and join the local area network (LAN).

How do I secure the network?
After you set up your network, you should take time to protect it, and you can do this through the security settings in the router, or the operating system.
You can do this through technologies such as wireless encryption protocol (WEP) for a wireless network, which uses passwords to encrypt the network traffic.
You may also want to use Windows and network logins and passwords to limit access to the network to authorised users. You may also choose to use hardware security like fingerprint recognition, security and password keys, and full disk encryption to further protect the network.
When it comes to using the Internet, businesses should also check their browser security and privacy settings to ensure that the network is protected from from viruses, spam and hacking attempts.
You can add additional security packages to protect and maintain the network perimeters, checking for attacks from both the outside and the inside.

What else can I use my network for?
Apart from file and print operations, you can use your network to share other peripherals such as scanners and copiers.
You can also use the network to backup and store information on a network attached storage (NAS) device or through the web.
NAS devices often have their own hard drives and can be accessed via the network through a web browser, allowing you to configure and manage them and the way they backup information from your computers.
Wireless networks will also allow you to use wide variety of devices such as wireless cameras, and wireless digital multi-media receivers.


Google redirect virus removal too

If you are reading this because your system have been infected by a Google redirect virus or malware. Then let me tell you that you have come to a right place. Google redirect virus or (browser hijacker) is nothing but a malware program which might have entered in to your system through a newly downloaded toolbar or while browsing any malware infected website.Let me tell you that this malware is not harmful but definitely annoying  as it redirect google result to absolute random websites, which might try to download and infect you with more spyware and malware programs.

Below Mentioned are list of things that you should do or check for complete Google Redirect virus removal -
  • Check your DNS setting.
  • Check your Local Area Connection settings.
  • Check windows Host file in C:\WINDOWS\system32\drivers\etc.
  • Check unwanted add-ons in internet explorer and Firefox or chrome.
  • Scan with malware special programs like malware-bytes or  Spyware Doctor
  • Use online scanner and removal antivirus 
  • Use TDSSKiller tool that is fast in detecting the TDL3 rootkit. 
  • Remove temp files and folders and empty browser cache.
  • Flush and renew your DNS configuration.

1. Check Your DNS setting.

Is is possible that the malicious program might have altered your DNS settings A DNS(domain name System) binds your website address with unique IP of any website.When page requests are made, they are rerouted to specified Domain Name Servers. This allows a remote "administrator" to direct users to the pages of their choosing. Which is our main problem.For example if you navigate to www.google.com or www.yahoo.com you might be redirected to some unknown locations.
a) Go to control panel ( Start - Control panel )
b) Double click on network connections icon to open.
c) Right click on local area connection and select properties.
d) Select “Internet Protocol (TCP/IP)” which is generally last in the list and Double click on it.
e) Make sue that “Obtain DNS server address automatically” is selected not "Use the following DNS server address"
f) Click OK

Sometimes DNS.Changer kind of mawares chnage DNS automatically after every restart in that case you go to control panel > administrative tools > services and look for "dns client" double click on it to get its menu. Switch it to "disabled" and "stop" it and hit apply.

2. Check your Local Area Connection setting.

There are chances that the virus is redirecting your browser through some alien proxy.Make sure that the browser proxy is disable or if you use proxy then double check ip address and post number.
To check your LAN settings -
a) Open internet explorer >In internet explorer go to  Tools - Internet options.
b) Click on 5th tab ie.(Connections tab), then click “LAN settings” button.
c) Make sure that “Proxy server” option is Unchecked.
d) For firefox - Open firefox and go to Tools > Options
e) Click on the ‘Advanced’ > ‘Network’ tab, > ‘Settings’
f) Ensure the ‘No Proxy’ radio button is selected and click ‘OK’ and close.
For chrome, safari and other browser you can perform similar steps and Unchecked any proxy server option.

3. Check windows Host file in C:\WINDOWS\system32\drivers\etc.

In some case virus can edit and modify your system host file which will redirect we pages from one website to any other website.
a) Go to C:\WINDOWS\system32\drivers\etc and right click on “hosts” file and open with notepad.
An unmodified HOSTS file should only contain the IP address 127.0.0.1 localhost. If there are other entries in the HOSTS file, remove them and then resave the file.
Windows 7 users need to open this file With the administrator privileged else you wont be able to edit them.

4. Check unwanted add-ons in internet explorer and Firefox or chrome

Check with all browser,if it is browser specific issues then chances that your browser is infected, update your browser and check and remove unnecessary add-on and extensions.
a) Search for unwanted add-on or toolbar in your browser and uninstall any suspicious add-on and restart your browser to see if the problem still exist.
b) You can uninstall toolbar from control panel > 'Add and Remove program' option.
c) In Internet Explorer Tools->Manage Add-ons.
d) In Google Chrome Customize  > options > extensions.

5. Scan with malware removal programs like malware-bytes or Spyware Doctor

If your antivirus programs has stopped executing this means malware infection and it is recommended that you scan your PC with anti-virus and anti-malware programs.Spyware Doctor and Malwarebytes Anti-malware are recommended,you can download 30 days full version trial and perform a full scan.
Here are some Spyware/malware removal programs -
Hitman Pro - http://www.surfright.nl/en
Spybot S&D - http://www.safer-networking.org/en/home/index.html
A-Squared - http://www.emsisoft.com/
SuperAntiSpyware - http://www.superantispyware.com/
Update and perform full scan. Such malwares are the very effective will remove any other malwares if present.

6.Use online scanner and virus removal

Sometimes malware and virus attacks your Antivirus and Internet security programs and which does not allow them to work properly in that case you can go for these reputed online scanner and see if they are helpful.
Most recommended and most used online virus scanners are -
Bitdefender online scanner - http://www.bitdefender.com/scanner/online/free.html
Kaspersky virus scanner - http://www.kaspersky.com/virusscanner
Free eset  online scanner - http://go.eset.com/us/download/free-antivirus-utilities.

7.Use TDSSKiller tool that is fast in detecting the TDL3 rootkit.

Google redirect virus belongs to class TDL3 rootkit and kaspersky's TDSSKiller tool is effective Google redirect virus removal tool.
a) You can Download the file TDSSKiller.exe ( http://support.kaspersky.com/downloads/utils/tdsskiller.exe ) and execute.
b) Do a full scan and disinfect any malware or virus.

8.Remove temp files and folders and empty browser cache.

Manually clean you temporary file and folders-
Go to Start and then Run.
Type %Temp% and click OK.
Windows temp folder full of files and other folders will appear.All of the folders and files you see in this Temp folder are no longer being used by Windows XP and can safely be deleted.Select all files and press shift delete.
Use CCleaner to delete your internet cache and missing or corrupt registry keys to remove any remnants of the virus that might be left behind.

These 8 points cover all possible causes and solution to google redirect virus,some things are more difficult than others, if you fell i have missed something or if you have something more to add Do write in comments and i would be happy to answer you.

Friday, July 6, 2012

How to Hide Application Icon in Windows 7 Taskbar

Microsoft Windows 7 comes with a taskbar that has never before been witnessed in its predecessors. The Windows 7 taskbar features a dock-type appearance and utility tools like launching a program or running an application. Undoubtedly, the Windows 7 taskbar helps the user to an extent more than what meets the eye.
Here, we unveil a new utilization feature of the Windows 7 taskbar. Often, some programs and shortcuts to various applications are pinned to the taskbar for easy accessibility. However, sometimes for reasons concerning privacy and confidentiality, the user may want to hide these icons so that other users logging into his computer do not have access to his private applications or programs. We’ll now plow on the process to achieve this useful tweak.
To start with, the icon that needs to be hidden should remain invisible at the taskbar with only the creator knowing its perfect location and the authority to view and access it. We, here, take Mozilla Firefox as an example to the program that requires to be hidden. On completing the following procedure, your taskbar will contain Mozilla Firefox as a launch up program while keeping it invisible to anyone who logs on to your computer.

Making a program icon invisible

To make a program icon invisible, you need to use software called “Resource Hacker”. Download this freewareto start the process. The downloaded file is a “.zip” file. No installation is required to use this software.
On extraction, locate the file “ResHacker.exe” in the extracted folder. Right click on this file and select to “Run as Administrator”. Confirm on request to open Resource Hacker.
1. After the software opens, go to “File” menu (or simply press Alt+F). Select “Open” and navigate to the location where the Mozilla Firefox execution file is present. (It should be in the folder “Mozilla Firefox” in the “Programs” folder of the directory where Mozilla is installed). Select the file “firefox.exe” file and click “Open”.
2. The Resource Hacker wizard opens up. Select “Icon” and then click on the “Action” tab on the menu-bar. Select “Replace Icon“.
3. The “Replace Icon in” window appears. Select “1″ in the right pane of the window under the tag “Select icon to replace” and then click to “Open file with new Icon…“.
4. Navigate to “C:\Windows\System32\” and click on “shell32.dll” to open it.
5. On clicking “Open” a list of icons appear under the tag “Select new icon“. Select the icon number 52. Then click to “Replace”.
You will be notified that the icon has been replaced.
To proceed, you have to replace a second set of icons. Select “Open” under “File” menu. On asking whether to save your work, select “NO“, as the task is not completed yet. Follow the steps 1 to 5 once again with the exception that in step 3, this time, Select “32512″ in the right pane of the window under the tag “Select icon to replace”. Follow the remaining steps as you have done previously.
Save the file you have just created by pressing Ctrl+S to the installed program folder of Mozilla Firefox (in the folder “Mozilla Firefox” in the “Programs” folder of the directory where Mozilla is installed).
Exit Resource Hacker.
The new file created “firefox.exe” can be visualized when you open the folder where Mozilla is installed. This file does not have an icon, or more technically, the icon of this file is invisible. The original Firefox execution file still remains within the folder with it being renamed to “firefox_original.exe”. Now, right click on the file “firefox.exe” and select “Pin to taskbar”.
To the right of the pinned programs on the taskbar, appears a section which, on hovering your mouse pointer over it, displays “firefox.exe – Shortcut”. You have just created a secret invisible icon in your Windows 7 taskbar. Drag this section to the extreme left of the taskbar to the right of the “Start” button.
Your taskbar remains just as it was before you created this invisible icon. None, but you know the exact location of this icon. Your privacy gets boosted up with an increased accessibility option.

Search This Blog