Articles by "Hacking"
Showing posts with label Hacking. Show all posts
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
image
Representational Image

Unidentified hackers brought down several public Nato websites with cyber attacks on Saturday, the alliance said, in what appeared the latest escalation in cyberspace over growing tensions over Crimea.

A group calling itself “cyber berkut” said the attack had been carried out by patriotic Ukrainians angry over what they saw as Nato interference in their country.

The claim, made at www.cyber-berkut.org, could not immediately be independently verified. Cyber berkut is a reference to the feared and since disbanded riot squads used by the government of ousted pro-Russian Ukrainian President Viktor Yanukovich.

As well as the main Nato website www.NATO.int, the website of a Nato-affiliated cyber security centre in Estonia was also affected. The alliance said none of its essential systems were compromised.

Occupied by Russian forces for over a week, the largely Russian-speaking Crimea holds a referendum on seceding from Ukraine to join Russia on Sunday. Nato states have opposed the move, calling it unconstitutional and effectively an annexation of Ukraine’s sovereign territory.

Nato spokeswoman Oana Lungescu said the websites had been taken down by distributed denial-of-service (DDoS) attacks.

“Our experts working to restore normal function,” she said via the social networking site Twitter. “No operational impact… The attack hasn’t affected the integrity of Nato systems.”

She made no comment on where the attack might have originated.

John Bumgarner, chief technology officer at the US Cyber Consequences Unit, a non-profit research institute, said initial evidence strongly suggested that these cyber attacks were launched by pro-Russian sympathizers.

“One could equate these cyber attacks against Nato as kicking sand into one’s face,” he said.

Tensions between Moscow and the West have been rising steadily since Russia intervened following the ouster of Yanukovich. Ukrainian and Russian websites have both been targets for cyber attacks in recent weeks but this appeared the first major attack on a Western website since the crisis began.

Suspected Russian hackers used DDoS attacks to cripple websites and services in Estonia in 2007 during a dispute over a war memorial and against Georgia during its brief 2008 war with Russia. Moscow denied orchestrating such attacks, saying they were simply carried out by independent patriots.

Apparent Ukrainian groups calling themselves “cyber berkut” have attacked several Ukrainian websites in recent weeks, computer security experts say. It was not immediately clear if the attack on NATO was genuinely conducted by the same group.

The group – which some experts believe may be affiliated with Russian intelligence – published its statement in Russian rather than Ukrainian.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
image
Loophole discovered

Thought your WhatsApp messages cannot be accessed remotely? Think again as one security expert has discovered a way to read WhatsApp messages off Android devices.



Security consultant Bas Bosschert said that it was possible for others to access users’ private WhatsApp chats through downloaded Android apps. Bosschert insists his method works even on the latest WhatsApp update for Android which adds privacy settings. However, as he says it’s only possible when WhatsApp is backing up your messages to the SD card. If you have turned off message backup during the initial setup, then your messages are safe. But if you have turned on backups, the easiest way to prevent this attack is doing a clean install of WhatsApp and turning off backup when prompted during the setup.



Bosschert published a proof of concept on his blog and explained the workings in detail. Although there are a lot of technical details, the gist is that it takes basic app-development skills to create an app that could steal your WhatsApp messages. This is possible because WhatsApp stores backed-up messages on your Android phone’s SD card and any app that gains permission to read your SD card could technically siphon off this backup without you knowing.



Despite WhatsApp using encryption to secure the message database, it’s possible to extract messages using easily-available online tools. After getting hold of your messages, the attacker could use a tool called WhatsApp Xtract to decrypt the same and easily read the messages.



“The WhatsAppp database is a SQLite3 database which can be converted to Excel for easier access. Lately WhatsApp is using encryption to encrypt the database, so it can no longer be opened by SQLite. But we can simply decrypt this database using a simple python script. This script converts the crypted database to a plain SQLite3 database,” he said.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
image
Boeing Black is perfect for spies...in movies.

If you thought Snapchat’s self-destructing pictures were cool, wait till you get a load of this. US company Boeing has unveiled a new smartphone that appears to come straight from a James Bond spy movie.


In addition to encrypting your communication over the phone, any attempt to open the casing of the Boeing Black smartphone deletes all data and rendering the device inoperable. The secure phone marks an extension of the communications arm of the Chicago-based aerospace and defense contractor, which is best known for jetliners and fighter planes.


Made in the US, the phone runs on Google’s Android. The 5.2-by-2.7-inch (13.2-by-6.9 cm) handset, slightly larger than an iPhone, uses dual SIM cards to enable it to access multiple cell networks instead of a single network like a normal cellphone. “The Boeing Black phone is manufactured as a sealed device both with epoxy around the casing and with screws, the heads of which are covered with tamper proof covering to identify attempted disassembly. Any attempt to break open the casing of the device would trigger functions that would delete the data and software contained within the device and make the device inoperable,” the company said.


The self-destructing phone contains a rather small 1590mAh battery and is quite chunky looking from the renders Boeing has released. It sports a 4.3-inch 540×960 display of unspecified type and will play nicely with LTE, UMTS, and GSM networks. Customisation is also a major selling point for Boeing Black — the back door can be swapped out for add-on modules such as satellite radio, expanded battery packs, solar chargers, precise GPS receivers, secure discrete radio channels, biometric scanners, etc. The Black also sports a PDMI port that combines USB, audio, power, HDMI, and DisplayPort output in one connection. You will also find a a standard USB port for data and charging, along with a microSD slot.


An unspecified dual-core 1.2Ghz ARM Cortex-A9 processor is ticking within. Due to the phone’s security features, Boeing is releasing few details about the wireless network operators or manufacturer it is working with, and has not provided a price or date by which the phone might be widely available, but said it has begun offering the phone to potential customers. Boeing has not mentioned any specific details about the cameras on the phone, but we can clearly see one on the back


Boeing’s website says the phone can be configured to connect with biometric sensors or satellites. Other attachments can extend battery life or use solar power. The phone can operate on the WCDMA, GSM and LTE frequency bands and offers WiFi and Bluetooth connectivity.


Such a phone might have prevented damage to Washington’s diplomacy in Ukraine from a leaked telephone call. A senior US State Department officer and the ambassador to Ukraine apparently used unencrypted cellphones for a call about political developments in Ukraine that became public.


Boeing’s tamper-proof phone is aimed at government agencies and contractors who need to keep communication and data secure, according to Boeing and filings with the U.S. Federal Communications Commission.


The company has been developing the phone for 36 months, said Boeing spokeswoman Rebecca Yeamans. “We saw a need for our customers in a certain market space” that Boeing could meet with its technology expertise, she said.


A sample purchase contract submitted to the FCC says the phone would be sold directly by Boeing or its agents. Yeamans said Boeing combined its own engineers with the talent of people who joined Boeing recently through acquisitions that included Argon ST Inc, Digital Receiver Technology Inc, Kestrel Enterprises Inc, Ravenwing Inc, and Solutions Made Simple Inc.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images

With news of more hacks and leaks emerging every day, its pretty safe to say that you’re not necessarily paranoid if you constantly worry about your email being hacked. What with online vigilante hacker groups like the SEA and Anonymous leaking millions of passwords onto the web, and the NSA snooping on the email accounts of even world leaders, the chances that your mail could be hacked are not really that slim. But the good news is that if you have a 

Gmail account, you can easily check whether or not you have been hacked.

Google has provided users with tools right within the Gmail inbox that can help keep your account secured. Here’s how it works:

To check if your account has been targeted and hacked into without your knowledge, you need to log into your Gmail account using a desktop browser.

Now scroll down to the bottom of your inbox and locate a link called “Details”. When you click on it, a pop-up window will appear, and it will show you a detailed list of the last ten times you – or anyone else –has accessed your account. It will also show you not just when your account was accessed but also how it was viewed. You’ll know if the inbox was opened using an email app, browser, smartphone app and the IP address through which it was accessed.


If you see a suspicious device or IP address, you may want to change your password as soon as possible.
To strengthen the security on your Gmail account, you can even turn the two-factor authentication system on. You can store your IP addresses of the various computers and devices you use to access Gmail, in order to ensure nothing fishy is going on around your account.
While Google has been very particular about ensuring account safety from sleuths, it has been going through a rough couple of weeks with Gmail. An outage late last week caused about 10 percent of Google’s global users to lose access to their Gmail accounts for a good 30 minutes or so. This week, it was also revealed that a bug affecting certain Gmail apps was marking out wrong messages to be deleted or sent into spam folders.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com


It’s becoming a bit of an annual ritual now; Pakistani hackers deface Indian websites and Indian hackers hit back.

This year too leading up to and on Republic Day, a massive number of Indian websites were attacked and defaced by Pakistani hackers. In response, Indian hackers broke into more than 100 Pakistani websites yesterday. Sources in the Global Cyber Security Response Team (GCSRT) in Bangalore told The Hindu that the seemingly retaliatory attacks are expected to continue. The attacks are signed by the ‘Indian Cyber Rakshak’ with the affected sites displayed the group’s message “Hacked by Indian Cyber Rakshak”.

On Republic Day, Pakistani hackers defaced 2,118 Indian websites, including those of the Central Bank of India and the website of model-turned-actress Poonam Pandey. Her website fell victim to a group calling itself ‘Team Madleets’ and it had graffiti left behind that displayed messages such as “Pakistan Zindabad.”

Cyber security experts told the paper that some hackers who broke into the Indian websites have been identified, though only by their hacker names. These include “StrikerRude”, “KashmirCyberArmy”, “PakCyber Expert”, “HUnter Gujar”. The operation, if one can call it that, was called “#OP26jan”. The January 26 attack came two weeks after 1,400 other Indian websites had been hacked, the sources said.

Hitting back at Pakistani sites seems like exactly the kind of response one would expect from hackers. Though one can’t help but shake the feeling that there’s little point in this altercation beyond showing off. Instead, perhaps Indian hackers should consider using their “mad skills” to help keep websites from getting hacked into in the first place. Surely that would be of greater help to the sites affected.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images

On Friday, India’s Central Bureau of Investigation arrested an individual from Pune as part of an international law enforcement operation against cybercriminals. More details have been provided by the FBI.

The operation targeted the operators and the customers of websites that had offered email hacking services.

Law enforcement agencies from Romania, China, India and the US have been involved in this operation. In the US, five people have been charged with hacking email accounts. They’re expected to plead guilty.

Two of the US-based suspects are Mark Anthony Townsend, 45, and Joshua Alan Tabor, 29, both of Arkansas. They’re said to have been running an email hacking service called needpassword.com.

The FBI says the two have hacked into a total of around 6,000 email accounts. Their customers simply provided the email address to which they wanted access to. Payments were made via PayPal. Each of the suspects faces a five-year prison sentence.

The other three people charged in the US are customers of such services. One of them, a 30-year-old California man named John Ross Jesensky, has paid a Chinese website $21,675 (€15,847) for email account passwords.

In Romania, the Directorate for Combating Organized Crime (DCCO), under the authority of the Directorate for Investigating Infractions of Organized Crime and Terrorism (DIICOT), searched the residences of individuals believed to be operating various hacking websites such as e-mail-hackers.com, spyhackgroup.com, rajahackers.com, clickhack.com and zhackgroup.com.

Four people have been charged. They’re said to be responsible for hacking 1,600 email accounts between February 2011 and October 2012.

In India, the Pune-based individual that has been arrested is Amit Tiwari, the man behind hirehacker.net and anonymiti.com. Tiwari and his accomplices are accused of hacking into close to 1,000 email accounts, 171 of which belong to people in India.

A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images

India’s Central Bureau of Investigation (CBI) has searched several locations in Pune, Mumbai and Ghaziabad, and arrested one individual as part of an international law enforcement operation against cybercriminals.

According to the Press, the CBI received information on the suspects from the US Federal Bureau of Investigation (FBI). In addition to the US, law enforcement agencies from Romania and China are also involved in the operation.

No details have been provided regarding the targeted cybercriminal rings as the investigation is ongoing, but the suspects have been allegedly involved in hacking US-based websites and defrauding people.

The individual who has been detained is from Pune. He has been arrested for Information Technology Act violations.

In December, representatives of Indian and American police agreed to set up a new cybercrime portal that would enable them to cooperate more efficiently on investigations.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.

tip101tricks.blogspot.com

More than 200 Shortcut keys of Windows 8 operating system are listed below,Be an Windows 8 expert buddy :)



General Key Board Shortcuts
F1 - Display Help
F2 - Rename the selected item
F3 - Search for a file or folder
F4 - Display the address bar list in Windows Explorer
F5 - Refresh the active window
F6 - Cycle through screen elements in a window or on the desktop
F10 - Activate the menu bar in the active app
Alt+F4 - Close the active item, or exit the active app
Alt+Esc - Cycle through items in the order in which they were opened
Alt+underlined letter - Perform the command for that letter
Alt+Enter - Display properties for the selected item
Alt+spacebar - Open the shortcut menu for the active window
Alt+left arrow - Back
Alt+right arrow - Forward
Alt+Page Up - Move up one screen
Alt+Page Down - Move down one screen
Alt+Tab - Switch between open apps (except desktop apps)

Ctrl+F4 - Close the active document (in apps that allow you to have multiple documents open simultaneously)

Ctrl+A - Select all items in a document or window
Ctrl+C (or Ctrl+Insert) - Copy the selected item
Ctrl+R (or F5) - Refresh the active window
Ctrl+V (or Shift+Insert) - Paste the selected item
Ctrl+X - Cut the selected item
Ctrl+Z - Undo an action
Ctrl+Y - Redo an action
Ctrl+plus (+) or Ctrl+minus (-) - Zoom in or out of apps pinned to the Start screen
Ctrl+scroll wheel - Zoom in or out of apps pinned to the Start screen
Ctrl+ mouse scroll wheel - Change the size of desktop icons
Ctrl+right arrow - Move the cursor to the beginning of the next word
Ctrl+left arrow - Move the cursor to the beginning of the previous word
Ctrl+down arrow - Move the cursor to the beginning of the next paragraph
Ctrl+up arrow - Move the cursor to the beginning of the previous paragraph
Ctrl+Alt+Tab - Use the arrow keys to switch between all open apps
Ctrl with an arrow key+spacebar - Select multiple individual items in a window or on the desktop
Ctrl+Shift with an arrow key - Select a block of text
Ctrl+Esc - Open the Start screen
Ctrl+Shift+Esc - Open Task Manager
Ctrl+Shift - Switch the keyboard layout when multiple keyboard layouts are enabled
Shift+F10 - Display the shortcut menu for the selected item

Shift with any arrow key - Select more than one item in a window or on the desktop, or select text within a document

Shift+Delete - Delete the selected item without moving it to the Recycle Bin first
Right arrow - Open the next menu to the right, or open a submenu
Left arrow - Open the next menu to the left, or close a submenu
Esc - Cancel the current task

Ctrl+plus (+) or Ctrl+minus (-) - Zoom in or out of apps pinned to the Start screen
Ctrl+scroll wheel - Zoom in or out of apps pinned to the Start screen
Windows logo key+C - Open the Charms
Windows logo key+C - Open the commands for the app
Windows logo key+F - Open the Search charm to search files
Windows logo key+H - Open the Share charm
Windows logo key+I - Open the Settings charm
Windows logo key+J - Switch the main app and snapped app
Windows logo key+K - Open the Devices charm
Windows logo key+O - Lock the device orientation
Windows logo key+Q - Open the Search charm to search apps
Windows logo key+V - Cycle through notifications
Windows logo key+Shift+V - Cycle through notifications in reverse order
Windows logo key+W - Open the Search charm to search settings
Windows logo key+, - Temporarily peek at the desktop
Windows logo key+Z - Show the commands available in the app
Windows logo key+spacebar - Switch input language and keyboard layout
Windows logo key+Ctrl+spacebar - Change to a previously selected input
Windows logo key+Tab - Cycle through open apps (except desktop apps)

Windows logo key+Ctrl+Tab - Cycle through open apps (except desktop apps) and snaps them as they are cycled

Windows logo key+Shift+Tab - Cycle through open apps (except desktop apps) in reverse order

Windows logo key+PgUp - Move the Start screen and apps to the monitor on the left (Apps in the desktop won’t change monitors)

Windows logo key+PgDown - Move the Start screen and apps to the monitor on the right (Apps in the desktop won’t change monitors)

Windows logo key+Shift+period (.) - Snaps an app to the left
Windows logo key+period (.) - Snaps an app to the right

Dialog Box Shortcut Keys
F1 - Display Help
F4 - Display the items in the active list
Ctrl+Tab - Move forward through tabs
Ctrl+Shift+Tab - Move back through tabs
Ctrl+N (Number 1-9) - Move to Nth tab
Tab - Move forward through options
Shift+Tab - Move back through options
Alt+underlined letter - Perform the command or select the option for that letter
Enter - Replace clicking the mouse for many selected commands
Spacebar - Select or clear the check box if the active option is a check box
Backspace - Open a folder one level up if a folder is selected in the Save As or Opendialog box
Arrow keys - Select a button if the active option is a group of option buttons

Windows logo Key Shortcut Keys
Windows logo key+F1 - Open Windows Help and Support
Windows logo key - Display or hide the Start menu
Windows logo key+B - Set focus in the notification area
Windows logo key+C - Open the Charms
Windows logo key+C - Open the commands for the app
Windows logo key+D - Display and hides the desktop
Windows logo key+E - Open Computer
Windows logo key+F - Open the Search charm and search file
Windows logo key+G - Cycle through gadgets on the desktop
Windows logo key+H - Open the Share charm
Windows logo key+I - Open the Settings charm
Windows logo key+J - Switch the main app and snapped app
Windows logo key+K - Open the Devices charm
Windows logo key+L - Lock your PC or switch users
Windows logo key+M - Minimize all windows
Windows logo key+O - Lock device orientation
Windows logo key+P - Choose a presentation display mode
Windows logo key+Q - Open the Search charm and search apps
Windows logo key+R - Open the Run dialog box
Windows logo key+T - Cycle through apps on the taskbar
Windows logo key+U - Open Ease of Access Center
Windows logo key+V - Cycle through notifications
Windows logo key+Shift+V - Cycle through notifications in reverse order
Windows logo key+W - Open the Search charm and search settings
Windows logo key+X - Opens the Quick Link menu
Windows logo key+, - Temporarily peek at the desktop
Windows logo key+Z - Show the commands available in the app
Windows logo key+Pause - Display the System Properties dialog box
Windows logo key+Ctrl+F - Search for PCs (if you’re on a network)
Windows logo key+Shift+M - Restore minimized windows on the desktop

Windows logo key+number - Start the desktop app pinned to the taskbar in the position indicated by the number. If the app is already running, switch to that app.

Windows logo key+Shift+number - Start a new instance of the desktop app pinned to the taskbar in the position indicated by the number

Windows logo key+Ctrl+number - Switch to the last active window of the desktop app pinned to the taskbar in the position indicated by the number

Windows logo key+Alt+number - Open the Jump List for the desktop app pinned to the taskbar in the position indicated by the number

Windows logo key+Ctrl+Shift+number - Open a new instance of the desktop app located at the given position on the taskbar as admin

Windows logo key+Tab - Cycle through open apps (except desktop apps)

Windows logo key+Ctrl+Tab - Cycle through open apps (except desktop apps) and snaps them as they are cycled

Windows logo key+Ctrl+B - Switch to the app that displayed a message in the notification area
Windows logo key+up arrow - Maximize the desktop window
Windows logo key+down arrow - Minimize the desktop window
Windows logo key+left arrow - Maximize the desktop window to the left side of the screen
Windows logo key+right arrow - Maximize the desktop window to the right side of the screen

Windows logo key+Home - Minimize all but the active desktop window (restores all windows on second stroke)

Windows logo key+Shift+up arrow - Stretch the desktop window to the top and bottom of the screen

Windows logo key+Shift+down arrow - Restore/minimize active desktop windows vertically, maintaining width

Windows logo key+Shift+left arrow or right arrow - Move a window in the desktop from one monitor to another

Windows logo key+spacebar - Switch input language and keyboard layout
Windows logo key+Ctrl+spacebar - Change to a previously selected input
Windows logo key+Enter - Open Narrator

Windows logo key+PgUp - Move the Start screen and apps to the monitor on the left (Apps in the desktop won’t change monitors)

Windows logo key+PgDown - Move the Start screen and apps to the monitor on the right (Apps in the desktop won’t change monitors)

Windows logo key+Shift+period (.) - Snaps an app to the left
Windows logo key+period (.) - Snaps an app to the right
Windows logo key+Tab - Cycle through opens apps (except desktop apps)

Windows logo key+Shift+Tab - Cycle through opens apps (except desktop apps) in reverse order

Windows logo key+Ctrl+Tab - Cycle through opens apps (except desktop apps) and snaps them as they are cycled

Windows logo key+/ - Initiate IME reconversion
Windows logo key+Alt+Enter - Opens Windows Media Center
Windows logo key+plus (+) or minus (-) - Zoom in or out (in Magnifier)
Windows logo key+Esc - Exit Magnifier

File Explorer Shortcut Keys
Alt+D - Select the address bar
Ctrl+E - Select the search box
Ctrl+F - Select the search box
Ctrl+N - Open a new window
Ctrl+W - Close the current window
Ctrl+mouse scroll wheel - Change the size and appearance of file and folder icons
Ctrl+Shift+E - Display all folders above the selected folder
Ctrl+Shift+N - Create a new folder
Num Lock+Asterisk (*) - Display all subfolders under the selected folder
Num Lock+plus (+) - Display the contents of the selected folder
Num Lock+minus (-) - Collapse the selected folder
Alt+P - Display the preview pane
Alt+Enter - Open the Properties dialog box for the selected item
Alt+right arrow - View the next folder
Alt+up arrow - View the parent folder
Alt+left arrow - View the previous folder
Backspace - View the previous folder
Right arrow - Display the current selection (if it’s collapsed), or select the first subfolder
Left arrow - Collapse the current selection (if it’s expanded), or select the parent folder
End - Display the bottom of the active window
Home - Display the top of the active window
F11 - Maximize or minimize the active window

Taskbar Shortcut Keys
Shift+click on a taskbar button - Open a app or quickly open another instance of a app
Ctrl+Shift+click on a taskbar button - Open a app as an administrator
Shift+Right-click on a taskbar button - Show the window menu for the app
Shift+Right-click on a grouped taskbar button - Show the window menu for the group
Ctrl+Click on a grouped taskbar button - Cycle through the windows of the group

Ease of Access Shortcut Keys
Right Shift for eight seconds - Turn Filter Keys on and off
Left Alt+Left Shift+PrtScn - Turn High Contrast on or off
Left Alt+Left Shift+Num Lock - Turn Mouse Keys on or off
Shift five times - Turn Sticky Keys on or off
Num Lock for five seconds - Turn Toggle Keys on or off
Windows logo key+U - Open the Ease of Access Center

Magnifier Shortcut Keys
Windows logo key+plus (+) or minus (-) - Zoom in or out
Ctrl+Alt+spacebar - Preview the desktop in full-screen mode
Ctrl+Alt+D - Switch to docked mode
Ctrl+Alt+F - Switch to full-screen mode
Ctrl+Alt+I - Invert colors
Ctrl+Alt+L - Switch to lens mode
Ctrl+Alt+R - Resize the lens
Ctrl+Alt+arrow keys - Pan in the direction of the arrow keys
Windows logo key+Esc - Exit Magnifier

Narrator Shortcut Keys
Space or Enter - Activate current item
Tab and arrow keys - Move around on the screen
Ctrl - Stop reading
Caps Lock+D - Read item
Caps Lock+M - Start reading
Caps Lock+H - Read document
Caps Lock+V - Repeat phrase
Caps Lock+W - Read window
Caps Lock+Page Up/Down - Increase or decrease the volume of the voice
Caps Lock+plus (+) or minus (-) - Increase or decrease the speed of the voice
Caps Lock+spacebar - Do default action
Caps Lock+left or right arrows - Move to previous/next item
Caps Lock+F2 - Show commands for current item
Press Caps Lock twice in quick succession - Turn Caps Lock on or off
Caps Lock + Esc - Exit Narrator

Narrator touch Shortcut Keys
Tap once with two fingers - Stop Narrator from reading
Tap three times with four fingers - Show all Narrator commands (including the ones not in this list)
Double-tap - Activate primary action
Triple-tap - Activate secondary action
Touch or drag a single finger - Read what’s under your finger
Flick left/right with one finger - Move to next or previous item
Swipe left/right/up/down with two fingers - Scroll
Swipe down with three fingers - Start reading on explorable text

That's All!!!
Thank You..!!!
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images



In the gaming world, everyone likes a showoff.

It's true. Whether you're demonstrating how to beat a particularly difficult boss in Grand Theft Auto or bragging about how you beat Bioshock using nothing but the wrench and your plasmids (true story), if you record it and post it to YouTube, you're bound to find an audience for it.

Any forum or message board will tell you that there is no one right way to share your gaming footage on YouTube. Your platform, equipment, budget and skill will determine the quality of the footage you end up with. There are, however, three tried-and-true methods that should work just fine for most users.

1. Use a Camcorder

If you have a camcorder that supports direct video input, you can easily record your console's output into your camcorder. This method is simple; just make sure you have an RCA or digital splitter cable from the console to both the TV and the camcorder, so you can play and record at the same time.

To record audio, you can either need to use the camcorder's mic or use a separate mic — just remember to turn the TV volume down.

When you're finished recording, simply upload the camera's footage through the USB cable or memory card onto your computer. You can then edit the file using your choice of video editing software, and you're ready for Youtube.
2. Use a Capture Card

Another option is to use a capture card, a small device that converts audio and video signals carried by RCA cables so that they're USB ready. If you're on a budget or just aren't comfortable installing the internal version on your computer or console, an external capture card is relatively inexpensive and can plug into your USB port.

However, external cards encode the video as they capture, meaning that there will be a significant video delay (about 2 seconds). Any gamer who has suffered lag can tell you that 2 seconds is a lifetime, so be sure only to use an external capture card for games that allow you to save instant replays. That way, you can play, save the replay and then record the replays on the external card later.


For better quality and no lag time, we recommend investing in an internal capture card


For better quality and no lag time, we recommend investing in an internal capture card that you can install into your PCI slot on your computer or console. This option is more expensive and requires basic knowledge of computer installation to set them up (you'll need to actually open up your computer and place the internal card on your motherboard), but it's worth it if you're serious about capturing your footage.

If you're using an external card, you're going to need that RCA splitter cable again so you can record the console's output on the capture card as you play on the TV. Internal cards don't require a splitter. Once you're finished, use the software that came with the capture card (the card's purchase should have included some) to convert the recorded footage into a video file.

Now you'll want to edit your video for YouTube. If you use a capture card, you'll want to record the audio commentary now and add it in using the video editing software, rather than record as you play.

If you're going the capture card route, Hauppauge is one of the most trusted brands. Check out their wide selection of both internal and external capture cards.
3. Capture Directly From Your Computer

For PC gamers, you'll have the best luck capturing your footage straight from your computer. All you need is software that will record your computer screen's video output, such as Fraps orGameCam for Windows, and Snapz Pro X for Mac (Mac Users: if you know of a cheaper, but still worthwhile, option, let us know in the comments).

We don't really recommend this option for console gamers, but if you really want to use this method, you will need to install an emulator for your specific console and download the ROM file for the particular video game so you can play via your PC. You'll also need a USB gaming controller (or a console controller with a USB adapter) to use with your computer.

Note: Check the legality of owning and distributing ROM files in your area, as it varies between jurisdictions. Generally, owning a ROM file of a game you already own is OK, as is owning a ROM file for gaming consoles that are no longer in production.

Open your video capture software, open your emulator and then load the ROM file. Then just record with your chosen software and play. When you're finished, save the file for editing.

Like we said above, these are by no means the only ways of recording your gaming software, but they are the most widely accepted and commonly used. If you know of any hacks and tricks to get better quality, or if you simply prefer a specific type of software, let us know in the comments below.
no image
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
Get the serial number you need ! (For Certain Things)

* Go to Google.

* In the search field type: "Product name" 94FBR

* Where, "Product Name" is the name of the item you want to find the serial number for.

* And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:

"Photoshop 7" 94FBR

"Age of Mythology" 94FBR

"Nero Burning Rom 5.5" 94FBR

& if u cannot find from here, u can visit this site http://www.findserialnumber.me

Get Serial keys from Serials Search Engines
Here i also want to present you a list of "clean" crack/Serial Search sites for all the latest warez to unlock your software.Please note that the site reviews herein only include information about each site, not the contents of the 'cracks' themselves. Always use a reputable antivirus and antispyware program on cracks & keygens before using them. The same goes for Craagle

* www.serials.ws
* www.keygen.in
* www.smartserials.com
* www.keygenguru.com - Popular site with hundreds of thousands of results.
* www.serialkey.net
* www.zcrack.com
* www.subserials.net
* www.serialportal.com
* supercracks.net
* www.serialcrackz.com
* www.serials.be
* www.cracktop.com
* www.cracksfm.com
* www.cracklib.net
* www.crackdb.org
* www.theserials.com
no image
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.


open Notepad & Type

@echo off

color 02

:vicky

echo %random% %random% %random% %random% %random% %random% %random% %random%

goto vicky

Save as vicky.bat

This will produce matrix effects in your computer, actually this is a batch file means a virus. Give it a try you will see matrix effect if your Anti-virus won't detect it. 
no image
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
AIM Password DecryptorAIM Password Decryptor is the FREE software to instantly recover the login passwords stored by AIM (AOL Instant Messenger)
Asterisk Password SpyAsterisk Password Spy is the FREE tool to instantly reveal the hidden password behind asterisks (*****).
Browser Password DecryptorBrowser Password Decryptor is the FREE software to instantly recover website login passwords stored by popular web browsers
Chrome Password DecryptorChrome Password Decryptor is the FREE tool to instantly recover all stored passwords from Google Chrome browser.
Digsby Password DecryptorDigsby Password Decryptor is the FREE software to instantly recover all stored account passwords by Digsby.
Dreamweaver Password DecryptorDreamweaver Password Decryptor is the FREE software to instantly recover web server passwords stored by Adobe Dreamweaver product.
Appnimi Excel Password Recovery Appnimi Excel Password Recovery is the FREE software to recover the password of protected Excel documents.
Facebook Password DecryptorFacebook Password Decryptor is the FREE software to instantly recover stored Facebook account passwords stored by popular web browsers and messengers.
Filezilla Password DecryptorFilezilla Password Decryptor is the FREE software to instantly recover FTP login passwords stored by FileZilla.
Fire MasterFire Master is the first ever built tool to recover the lost master password of Firefox. Master password is used by Firefox to protect the stored sign-on information for all visited websites.
Foxmail Password DecryptorFoxmail Password Decryptor is the FREE software to instantly recover mail account passwords from Foxmail.
FTP Password DecryptorFTP Commander Password Decryptor is the FREE software to instantly recover FTP login passwords stored by FTP Commander- one of the popular FTP clients.
Google Password DecryptorGoogle Password Decryptor is the FREE software to instantly recover stored Google account passwords by various Google applications as well as popular web browsers and messengers
IDM Password DecryptorIDM Password Decryptor is the FREE software to instantly recover premium account passwords from Internet Download Manager (IDM).
IE Password DecryptorIE Password Decryptor is the FREE software to quickly and easily recover all the stored passwords from Internet Explorer.
IncrediMail Password DecryptorIncrediMail Password Decryptor is the FREE software to instantly recover mail account passwords from IncrediMail – a popular email client.
iTunes Password DecryptoriTunes Password Decryptor is the FREE software to instantly recover Apple iTunes account password from popular web browsers.
JDownloader Password DecryptorJDownloader Password Decryptor is the FREE software to instantly recover premium account passwords from JDownloader.
Keychain RecoveryKeychain Recovery is a free tool to recover the lost password of a keychain file of a Mac operating system.
Mail Password DecryptorMail Password Decryptor is the FREE software to instantly recover Mail Account passwords from popular email clients and other associated applications.
Meebo Password DecryptorMeebo Password Decryptor is the FREE software to instantly recover all the messenger account passwords stored by Meebo Notifier.
Messenger Password DecryptorMessenger Password Decryptor is the FREE all-in-one software to instantly recover passwords from popular Messengers including GTalk, MSN, Trillian, Pidgin, Digsby etc.
Miranda Password DecryptorMiranda Password Decryptor is the FREE software to instantly recover account passwords stored by Miranda.
MSN Live Password DecryptorMSN Live Password Decryptor is the FREE software to instantly recover MSN/Hotmail/Windows Live Messenger passwords stored by applications such as MSN, Windows Live Messenger, Hotmail, web browsers and other messengers.
Myspace Password DecryptorMySpace Password Decryptor is the FREE software to instantly recover MySpace Account passwords stored by MySpace IM, popular web browsers and other instant messengers.
Mysql Password AuditorMysql Password Auditor is the FREE Mysql password recovery and auditing software.
Network Password DecryptorNetwork Password Decryptor is the free tool to instantly recover network passwords stored in the ‘Credential Store’ of Windows.
Opera Password DecryptorOpera Password Decryptor is the FREE tool to instantly recover the passwords stored by all versions of Opera.
Oracle Password AuditorOracle Password Auditor is the FREE Oracle database password recovery and auditing software.
Orbit Password DecryptorOrbit Password Decryptor is the FREE software to instantly recover premium account passwords from Orbit Downloader.
Outlook Password DecryptorOutlook Password Decryptor is the FREE tool to instantly recover lost password for all versions of Outlook Application.
Paltalk Password DecryptorPaltalk Password Decryptor is the FREE software to instantly recover all stored account passwords by PaltalkScene.
Appnimi Password UnlockerAppnimi Password Unlocker is a All-in-one free tool to recover password of different type of protected files including ZIP, RAR, PDF, XLS, XLSX etc.
PcproxRFIDReaderPcproxRFIDReader is the FREE tool for reading RFID/HID card ID using pcProx USB readers.
PDF LockerPDF Locker is a FREE tool designed to protect your PDF files. It can provide multi-level protection by helping you to set both user & owner password for your private PDF documents.
Appnimi PDF Password RecoveryAppnimi PDF Password Recovery is the FREE software to recover the password of protected PDF documents.
Pidgin Password DecryptorPidgin Password Decryptor is the FREE software to instantly recover account passwords stored by Pidgin Messenger.
Safari Password DecryptorSafari Password Decryptor is the FREE software to instantly recover website login passwords stored by Safari web browser.
Smart ftp Password Decryptor
Smart ftp Password Decryptor is the FREE software to instantly recover FTP login passwords stored by SmartFTP.
Thunderbird Pass Decryptor
Thunderbird Pass Decryptor is the FREE software to instantly recover the stored mail account password by Thunderbird.
Trillian Password Decryptor
Trillian Password Decryptor is the FREE software to instantly recover account passwords stored by Trillian or Trillian Astra
Twitter Password Decryptor
Twitter Password Decryptor is the FREE software to instantly recover Twitter account passwords stored by popular web browsers.
Word Password Recovery
Appnimi Word Password Recovery is the FREE software to recover the password of protected Word documents.
WS_FTP Password Decryptor
WS_FTP Password Decryptor is the FREE software to instantly recover FTP login passwords stored by WS_FTP.
Xfire Password Decryptor
Xfire Password Decryptor is the FREE software to instantly recover login passwords from Xfire.
Yahoo Password Decryptor
Yahoo Password Decryptor is the FREE software to instantly recover Yahoo Login passwords stored by popular web browsers and instant messengers.
Appnimi Zip Password Unlocker
Appnimi Zip Password Unlocker is the FREE software to recover the password of protected Zip files.
no image
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
In this tutorial I'm going to teach you how to create a Task Manager disabling virus. This virus will disable Task Manager using Registry Editor i.e. regedit.
Read this post and share it with your friends help us grow!!



In this tutorial we are going to create a virus .bat file which will disable Registry Editor, and I'll give you full explanation of the code.

So lets start,


Steps:  

  1.  Copy the following code:
@echo off
REG add HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem /v DisableTaskMgr /t REG_DWORD /d 1 /f

   2. Save it as anyname.bat 


Explanation: 

1) REG add -it used to add registry to the windows.

2) HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem :- path of the registry

3) REG_DWORD :- data type

4) 0: it is default value and means fasle. 1 stands for true.if the dword value is 0 the registry DisableTaskMgr is false and task manager will work. if the dword value is 1 the registry DisableTaskMgr is true and task managaer will be blocked.

5)So just change 0 and 1 to enable/disable the task manager.

NOTE:-This tutorial is for educational purposes only,Use at your own risk.

Tips&101Tricks is not responsible for any type of loss caused due to this information!!
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
Hackers Who are Supporters of Narendra Modi Hacked and Defaced Anti-Narendra Modi Websites. 

Narendra Modi is the current chief Minister of Gujrat(India) and Prime Ministerial Condidate of BJP-led National Democratic Alliance for the upcoming 2014 Indian general elections.

The Hacked websites was defaced and showing the deface page as shown in the ScreenShot Below


tip101tricks/images



Few websites against Narendra Modi has been breached by hackers. The list of hacked websites:


http://www.fekuexpress.com/
http://www.thekalyugtimes.com/
http://www.fekuneeds.com/
http://feku.me/
http://www.fekuonsale.com/


The hackers defaced the home page with a picture of Narendra modi and a message saying “Narendra Modi Fan is here”.

“we are the person of him, nobody can rule on us)
sun rises from the hopes everywhere
intention are steely courage of everystep
we are today going to write destiny by our hand
MODIJI NEXT PM
Narendra Modi Zindabad” The defacement reads(translated).

The first 3 website is still showing the deface page, whereas the last two have been restored now.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
Tips101tricks.com/images

In this hacking Tutorial I'm going tell you something about Batch files and how to Create .bat Viruses, which can harm anyone's Computer.


What is Batch file?

Batch file is the name given to a type of script file, a text file containing a series of commands to be executed by the command interpreter. A Batch file may contain any command the interpreter accepts interactively at the command prompt. A Batch File may also have constructs (IF, GOTO, Labels, CALL, etc.) that enable conditional branching and looping within the batch file.

Batch File usually have extensions: ABC.bat,
They can be easily created in any word editor like notepad,wordpad etc.

How to Create Batch Files?

In this tutorial you will learn how to create one of the simplest yet deadliest virus programs in the form of batch file. 

This six line piece of code given (below) is so devastating, it can bring down a computer in a matter of seconds.

Explanation: This batch file creates another batch file in the same directory, then copies itself into each of these new created files. These files are then started up. Of course, they are identical so both of them start up again and repeat the process until the computer runs out of memory and crashes(or the antivirus catches it.)

What this will do, if you leave it on long enough(about a couple of minutes), is it will create so many copies of itself on the hard drive that all the empty space will get filled with these bats. Also it will use it up all the computer's RAM as it is being told to run an ever increasing number of the same processes, which over time gets too much for it to handle.

Depending on what runs out first hard drive disk space or RAM, the batch file may or may not cause permanent damage. 

In both the cases, however, the computer will almost definitely crash, the operating system may corrupted and on the next start up, you will be greeted by the well-known "Blue Screen of Death". The only way to get rid of it will be to format the operating system.

Further, we can have this beautiful file executed at startup, as a surprise for the unfortunate user who will happen to start the next time. 

Ok now time to get serious, this tutorial is very dangerous and for your own sake should never be performed.

On execution, the computer will stop responding immediately and if the plug is not pulled off within 4-5 seconds, there are chances of total data loss and corruption of the hard drive. with that out of the way, Here's how to do it.



How to Write and Run Batch File?

Step#1: Open word editor like notepad.

Step#2: Type the following code:

 @echo off  
 :A  
 SET /A  
 X=%RANDOM%%%1999999999%  
 type damage.bat >> %x%.bat  
 start %x%.bat  
 goto:A  

 Step#3: Save the file as "damage.bat". And we're done!!

Step#4: (Optional) To make this file execute automatically at Startup. Do the following, create a shortcut of the damage.bat file by right clicking on it.
Open the start menu, In programs open startup folder and simply drag or cut-paste the shortcut into this folder. The virus will break loose the next time the computer is started up.

If that sounded too easy to be true, it is. The thing is, this example is so basic it is known to 100% of all the antivirus softwares. Chances are if you do have even a really bad and outdated antivirus, it will most probably not even let you create this file or immediately delete it, as I experienced with my AVAST antivirus. But there are ways to get around this, which we'll look in my next post.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.

tip101tricks.blogspot.com/images

What is Social Engineering?

Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.

"Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.

Why Social Engineering Matters?

Many people think that social engineering is worth less, However I beg to differ. There are some systems in which they are very much secure and various exploits (buffer overflows, etc) are patched and very strongly protected. With this case, these systems are extremely hard to break into without having some sort of physical access to these systems. With Social Engineering you will be able to break into these systems by obtaining various information that only company insiders have, making it seem like you are part of the corperation and are privy to top secret information shared on their systems.


Some Examples
Example 1: You receive an e-mail where the sender and the manager or someone on behalf of the support department of your bank.

In the message he says that the Internet Banking service is presenting a problem and that this problem can be corrected if you run the application attached to this message.

The implementation of this application presents a screen similar the one you use to access bank account, waiting for you to type your password. In fact, this application is prepared to steal your password to access the bank account and sends it to the attacker

Example 2: You receive an e-mail saying that your computer is infected by a virus. The message suggests that you install a tool available on an Internet site, to eliminate the virus from your computer.

The real function of this tool and does not eliminate a virus, but I give someone access to your computer and all data stored on it.

Example 3: a stranger calls your house and says it is the technical support of your ISP.
In this connection he says that his connection to the Internet is presenting a problem and then, ask your password to fix it. If you give your password, this so-called technical can perform a multitude of malicious activities, using your access account
Internet and therefore such activities relating to its name.


Practical Examples:


Retail Paging Systems
---------------------
Wal-Mart store phones have clearly marked buttons for the paging system. Wal-Mart is
the exception, not the rule. So how do you get on the paging system to have a little fun when you're bored out of your mind shopping with your girlfriend? Social
engineering, my whipped friend. Find a phone and dial an extension, preferably the
tore op. The key here is to become a harried employee, saying something similar
to..."This is Bill in shoes. What's the paging extension?" More often than not,
you'll get the extension without another word. Now, get some by saying something
sweet over the intercom.

Airport White Courtesy Phones
-----------------------------
Imagine you've already been stripped searched and you're waiting for your delayed
flight. Naturally, you gravitate to a phone. Is it white? Then you've got a free
call right in front of you. Just pick up to get the op. "This is Bill at Southwest,
Gate A5. We're swamped and our phones are tied. Can I get an outside line?" If the phone does not have DTMF, or the op wants to dial the call for you, do not call
a number related to you.

Hotels
------
Hotels hold such promise. Some hotels have voice mail for each room, guests
receiving a PIN when they check in. Hotels also have "guest" phones; phones outside
of rooms that connect only to rooms or the front desk. Pick up a guest phone, make
like a friendly guest and say, "I forgot my PIN. Could I get it again? Room XXX."
Knowing the registered name of the target room helps, for the Hotel and Restaurant
Management Degree Program graduate may ask for it.

Do not follow through with the next social engineering example. Or, like the author,
try it on a friend. Go to the front desk and tell the attendant that you've locked
your key (card) in the laundromat, in your room, lost it, etc. Do not try this with
the attendant that checked you in. And again, do not enter someone's room without
permission.


Calling Technical Support
-------------------------
So you've found a new-fangled computerized phone and you want to learn more about it.
Do the same thing you do when you have trouble with your AOL - call tech support.
First, do a little planning (after getting the tech support number off of the phone
or the web). Get some info on the phone, like phone number, model number, other
identifying numbers, etc. Also, know the name of the facility in which the phone is
located. Now that you've got some ammo, you're ready to make the call. Posing as an
employee of the facility, call tech support and make up a problem for the phone
you've identified. Act a little dumb and be apologetic, acting like you don't want
to waste their time. All the while, pumping them for information - "I hate to bug
you for this, but <insert problem here>." <You'll get some info from tech support
here.> <Build on what you've learned and curiously ask another question.> And so
on until you reach the point where you can feel that it's time to end the call.
Occasionally acting amazed at their knowledge may be helpful.

Methods of Social Engineering

Phishing

Phishing is a technique of fraudulently obtaining private information. Typically, the phisher sends an e-mail that appears to come from a legitimate business — a bank, or credit card company — requesting "verification" of information and warning of some dire consequence if it is not provided. The e-mail usually contains a link to a fraudulent web page that seems legitimate — with company logos and content — and has a form requesting everything from a home address to an ATM card's PIN.

For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user's account was about to be suspended unless a link provided was clicked to update a credit card (information that the genuine eBay already had). Because it is relatively simple to make a Web site resemble a legitimate organization's site by mimicking the HTML code, the scam counted on people being tricked into thinking they were being contacted by eBay and subsequently, were going to eBay's site to update their account information. By spamming large groups of people, the "phisher" counted on the e-mail being read by a percentage of people who already had listed credit card numbers with eBay legitimately, who might respond.

Vishing or Phone Phishing:

This technique uses an Interactive Voice Response (IVR) system to recreate a legit sounding copy of a bank or other institution's IVR system. The slave is prompted to call in to the "bank" via a phone number provided in order to "verify" information.

Baiting

Baiting is like the real-world Trojan Horse that uses physical media and relies on the curiosity or greed of the slave. In this attack, the attacker leaves a malware infected floppy disc, CD ROM, or USB flash drive in a location sure to be found, gives it a legitimate looking and curiosity-piquing label, and simply waits for the slave to use the device.

Quid pro quo

Quid pro quo means something for something:

* An attacker calls random numbers at a company claiming to be calling back from technical support. Eventually they will hit someone with a legitimate problem, grateful that someone is calling back to help them. The attacker will "help" solve the problem and in the process have the user type commands that give the attacker access or launch malware.

* In a 2003 information security survey, 90% of office workers gave researchers what they claimed was their password in answer to a survey question in exchange for a cheap pen. Similar surveys in later years obtained similar results using chocolates and other cheap lures, although they made no attempt to validate the passwords.

If you liked our article share it with your friends and Subscribe to Our Daily Updates!!!!

Stay Connected for More Updates...
Thank You!!!