Linux..Linux..Linux...what is this linux?? Well all those who read computer magzines or tech stuff might be knowing about linux..but hey this blog is for absolute beginners with no computer experience..so i am going to enlighten those newbies ...
Legal Disclaimer
In any blog that deals with so many controversial topics and skills, it has become necessary to address a few incidents and implement a user terms and services agreement. We want to provide a free, safe and legal training environment to the users of this blog.
Computervedas is definitely not a place that promotes or encourages computer hacking (unethical), but rather it is a Computer Security related website. In fact, Computer Hacking and Computer Security are the two concepts that goes hand-in-hand. They are like the two faces of the same coin. So with the existence of close proximity between Hacking and Security, it is more likely that people often mistake our blog to be one that promotes Hacking. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks.
Your usage of this website constitutes your agreement to the following terms.
1. All the information provided on this blog are for educational purposes only. The blog is no way responsible for any misuse of the information.
2. This blog is totally meant for providing information on “Computer Security” “Computer Programming” and other related topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
3. Few articles (posts) on this blog may contain the information related to “Hacking Passwords” or “Hacking Email Accounts” (Or Similar terms). These are not the GUIDES of Hacking. They only provide information about the legal ways of retrieving the passwords. You shall not misuse the information to gain unauthorised access. However you may try out these hacks on your own computer at your own risk. Performing hack attempts (without permission) on computers that you do not own is illegal.
4.The virus creation section on this blog provides demonstration on coding simple viruses using high level programming languages. These viruses are simple ones and cause no serious damage to the computer. However we strongly insist that these information shall only be used to expand programming knowledge and not for causing malicious attacks.
5. All the information on this blog are meant for developing Hacker Defense attitude among the users and help preventing the hack attacks.We insist that these information shall not be used for causing any kind of damage directly or indirectly. However you may try these codes on your own computer at your own risk.
6. The word “Hack” or “Hacking” that is used on this blog shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively.
7. We believe only in White Hat Hacking. On the other hand we condemn Black Hat Hacking.
8. Most of the information provided on this blog are simple computer tricks (may be called by the name hacks) and are no way related to the term hacking.
9. Some of the tricks provided by us may no longer work due to fixture in the bugs that enabled the exploits. We are not responsible for any direct or indirect damage caused due to the usage of the hacks provided on this site.
10. The blog holds no responsibility for the contents found in user comments and forum since we do not monitor them. However we may remove any sensitive information present in the user comments or on the forum upon request.
11. We reserve the right to modify the Disclaimer at any time without notice.
12.We believe that hacking is an art and one can put it to good use.Know Hacking but No Hacking!
Followers
USEFUL INFO
Labels
- About Us (1)
- Advanced Hacking (4)
- C++ (1)
- Gaming (1)
- Graphic Cards (1)
- Hardware (2)
- Miscellaneous (1)
- Simple Viruses (1)
- Windows 7 (3)
- Windows Xp (1)
- Windows Xp Hacks (5)
It is a well known fact that google is the most widely used search engine(around 80%).
But it is not known to many that while google-ingleads to easy acess to pubiclicly available info,it also can be used for accessing advanced info like C.V of people,downloading free music and all other stuff.Here is how it goes.You just need to type in special keywords for the various categories of data and you will be through!!
1. For C.V ,Personal info of people
Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.
To do this you just need to type in the following code
intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.
filetype:xls inurl:”email.xls”
Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query
intitle:index.of finances.xls
2. For downloading Free Stuff
Ever wondered how to use Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.
“?intitle:index.of?mp3 eminem“
Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.
Dats All Folks!!
Cheers!!
Well..many times you want to send mail to someone but without revealing your true e-mail address, or you want to stay anonymous or play some prank like sending a mail from say...bill@microsoft.com...but dont know how???...Well here in this post I am going to give you some gyan on this..
Well first let me give you an outline of what we are actually going to do..This is important to understand the concepts. Yahoo, Gmail and other popular mail services accept e-mails only from trusted servers and not from personal computers like the ones which you have at home..So what do we do?? ..well we will use a trusted server to send mail using fake email address..To do all this follow the procedure given below
1. Open an account with any of the free web hosting service providers that support "php" scripts. To make things easier for you, I would suggest www.x10hosting.com
2. Upload the scripts that I have attached with this post, using file manager to your server. And set the permissions for those scripts to maximum.
To Download Those Scripts -- DOWNLOAD SCRIPT
3. Ok once your are done with it..visit www.yourwebsite.com/sendmail.php Note- Replace "yourwebsite" with the name of your website.
4. Thats it!! :) Well for a live demo of this tutorial visit the link given below..
Well we are quite hardcore gamers.Many people like us are.And we all know the budget it takes to become one hard core gamer.Its huge.But this post is for people who can compromise just a little in their gaming standards for budget.
If you are aware of graphic cards of n-vidia you would be aware of 9400gt.
It is a low budget graphic card which is disregarded evrywhere.But let me tell you I have one and I m ,in fact quite satisfied the way it handles all the latest games despite of being regarded as a card suited only for movies.
My PC specs are-:
Intel Core 2 Duo E6700 2.40 GHz
2GB DDR2 RAM
9400GT(overclocked using EVGA Precision)
Here is the list of games that I was able to play successfully using a 9400GT.
1)Batman Arkham Asylum:
Resolution-:1280X1024
Graphics Detail-:High(No ambient occlusion)
Avg fps:25
2)Protoype:
Resolution-:1152X764
Graphics Detail-:High
Shadow -:High
Anti-aliasing-:2x
Avg. fps:25
3)Assassin's Creed
Resolution-:1280x1024
Everything MAXED OUT!!!(except anti-aliasing)
Avg. fps:24
4)Velvet Assassin
Resolution-:1152x764
Graphics Detail-:Medium
No Anti-aliasing
Avg fps:22
5)Call Of Duty Modern Warfare 2
Resolution-:1152x764
Everything MAXED OUT Except Anti-Aliasing
Avg fps:27
6)Bioshock
Resolution-:1152x764
Everything MAXED OUT!!(No AA)
Avg fps:23
7)Dead Space
Resolution-:1280x1024
Everything MAXED OUT!!
Avg fps:30
8)Fallout 3
Resolution-:1024x768
Graphics Detail:High
Avg fps:23
And many more.....
And yes I will keep updating this post!
Cheers
In this post I m going to tell the various emotions of people when they see their PC's behaving unexpectedly.All you need is one friend and his computer system and of course some privacy!!!
So here are few easy ways to do that:-
1)Run an application and see unexpected expert comments.
Its the easiest way to make your friend smile or frown depending on your intentions.
a)Create a textfile in notepad and type msg *YOUR COMMENTS. Save the file as anything.bat(Use any fancy name here to attract your victim). Also remember to put it under the category of All Files while saving.
b)Now you just need to make your victim click on that file.
2)Forced shutdown of a computer after a timer.
This will display a custom error message and start a countdown which will shut down the computer.
1)Right-click your desktop and create a new shortcut.
2)Paste the following code into the Location box in the Create Shortcut menu:
shutdown -s -t 30 -c “Your message here“
3)Replace 30 with the length of the countdown you want (in seconds) and place your custom error message between the quotes.
4) Click next and name the shortcut to something the victim would be likely to click on such as “Internet explorer” or “My Documents”, etc.
5)Next you’d want to change the icon. Right-click on the shortcut you made and click properties. Find the Change Icon button and click it. Choose a suitable icon for the name you chose earlier.
And that’s all! Now you just have to sneak the shortcut onto the victim’s desktop and run!
Note: to stop it, open Run from the start menu and type shutdown-a.
3)Endless Command prompt windows
This will open up a series of command prompt windows that will never end.
The basic idea is that there are two .bat files that open the other one when opened, so the other one opens the first one again and the windows just won’t stop coming.
How to do this:
1. Fire up notepad and type: start 2.bat
2. Save it as 1.bat (make sure you choose all files when saving it)
3. Make another new text document and type: start 1.bat
4. Save it as 2.bat into the same folder as the other one.
All you have to do to start it is to click on either of them.
The only way to stop it is to wait for the windows to become so numerous that they are a group on the taskbar. Then you can use Close group to get rid of the sequence.
4)Fake Command prompt viruses
These are also a good way to make the victim believe that a worm is gnawing at their hard drive and that they can’t do anything to stop it.
Open up notepad and type @echo off
* To make text appear, type it after an echo tag.
* To have the the commands wait for the user to press any key type pause
(Note: if you write pause >nul it won’t display Press Any key to continue…)
* To have a complete high-speed description of files in the drive of the .bat file, type dir /s
* You can also initiate any other command we covered earlier, such as shutdown, error message, etc.
5.And why no include all of these in one fake virus?
Remember everything here is for Informational Purposes Only
Cheers.
http://download.oracle.com/docs/cd/B28359_01/install.111/b28250.pdf
Thing is very advanced.So we do not know much about it.But you can see the link above.
Well every now and then..you read in the newspaper or see on television that mail was sent from ABC cyber cafe..or XYZ city...etc etc...Have you ever wondered..how police or ATC are actually able to do this??? Well you really dont need a IT professional to trace an email..because its not that complicated and difficult..
In this post computervedas is going to teach you how its done..
Well here is the outline of what we are actually going to do..
First we will find the ip address(much like the identity of a computer on the internet) of the sender of the mail...then we will trace his location on a map using that ip address..Simple isnt it?
Ok now in this trick i am going to use yahoo mail....because thats what i normally use..Ip adresses are normally not shown in a mail..because they are found in Headers.
Headers are enclosed beween square brackets, for instance, [129.130.1.1]
So to find them do the following...
1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
•Click on Options on the top-right corner
•In the Mail Options page, click on General Preferences
•Scroll down to Messages where you have the Headers option
•Make sure that Show all headers on incoming messages is selected
•Click on the Save button
•Go back to the mails and open that mail
5. You should see similar headers like above
Or if you want to manually find the IP address, proceed to 6.
6. Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is the IP address of the sender.
If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.
7. Now that you have the IP address of the sender..its time to hunt him down.. Enter the IP address that you want to trace in the dialog box and click on "Search”.
With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address
Well in the following box you can see your location,IP address etc etc....For a demo you can enter the ip address given below in the box above.....hope u like my post...lookin forward for comments and suggestions.