thumbnail

Ways to attack a network and sniff


Download
Ways to attack a network
Ping
The IP address gives the attacker’s Internet address. The numerical address like 212.214.172.81 does not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name. PING stands for “Packet Internet Groper” and is delivered with practically every
Internet compatible system, including all current Windows versions.
Make sure you are logged on to the net. Open the DOS shell and enter
the following PING command:
Ping –a 123.123.12.1
Ping will search the domain name and reveal it. You will often have information on the provider the attacker uses e.g.:
dialup21982.gateway123.provider.com
Pinging is normally the first step involved in hacking the target. Ping uses
ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMP
Echo reply packets.
All the versions of Windows also contain the ping tool. To ping a remote host follow the procedure below.
Click Start and then click Run. Now type ping <ip address or hostname>
(For example: ping yahoo.com)
This means that the attacker logged on using “provider.com”.
Unfortunately, there are several IP addresses that cannot be converted
into domain names.
For more parameter that could be used with the ping command, go to
DOS prompt and type ping /?.
Ping Sweep
If you are undetermined about your target and just want a live system, ping sweep is the solution for you. Ping sweep also uses ICMP to scan for live systems in the specified range of IP addresses. Though Ping sweep is similar to ping but reduces the time involved in pinging a range of IP addresses. Nmap (http://www.insecure.org) also contains an option
to perform ping sweeps.
Tracert:
Tracert is another interesting tool available to find more interesting information about a remote host. Tracert also uses ICMP.
Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination. To perform a tracert follow the procedure below.
Tracer connects to the computer whose IP has been entered and reveals all stations starting from your Internet connection. Both the IP address as well as the domain name (if available) is displayed.
If PING cannot reveal a name, Traceroute will possibly deliver the name of the last or second last station to the attacker, which may enable conclusions concerning the name of the provider used by the attacker and the region from which the attacks are coming.
Go to DOS prompt and type tracert <destination address>
(For example: tracert yahoo.com).
But there are some tools available like Visual Traceroute which help you
even to find the geographical location of the routers involved.
http://www.visualware.com/visualroute
Port Scanning:-
After you have determined that your target system is alive the next important step would be to perform a port scan on the target system.
There are a wide range of port scanners available for free. But many of them uses outdated techniques for port scanning which could be easily recognized by the network administrator. Personally I like to use Nmap (http://www.insecure.org) which has a wide range of options. You can download the NmapWin and its source code from:
http://www.sourceforge.net/projects/nmapwin.
Apart from port scanning Nmap is capable of identifying the Operating system being used, Version numbers of various services running,
firewalls being used and a lot more.
Common ports:
Below is a list of some common ports and the respective services
running on the ports.
20 FTP data (File Transfer Protocol)
21 FTP (File Transfer Protocol)
22 SSH
23 Telnet
25 SMTP (Simple Mail Transfer Protocol)
53 DNS (Domain Name Service)
68 DHCP (Dynamic host Configuration Protocol)
79 Finger
80 HTTP
110 POP3 (Post Office Protocol, version 3)
137 NetBIOS-ns
138 NetBIOS-dgm
139 NetBIOS
143 IMAP (Internet Message Access Protocol)
161 SNMP (Simple Network Management Protocol)
194 IRC (Internet Relay Chat)
220 IMAP3 (Internet Message Access Protocol 3)
389 LDAP
443 SSL (Secure Socket Layer)
445 SMB (NetBIOS over TCP)
Besides the above ports they are even some ports known as Trojan
ports used by Trojans that allow remote access to that system.
Vulnerability Scanning:
Every operating system or the services will have some vulnerabilities due to the
programming errors. These vulnerabilities are crucial for a successful hack. Bugtraq is
an excellent mailing list discussing the vulnerabilities in the various system. The
exploit code writers write exploit codes to exploit these vulnerabilities existing in a system.
There are a number of vulnerability scanners available to scan the host for known vulnerabilities. These vulnerability scanners are very important for a network administrator to audit the network security.
Some of such vulnerability scanners include Shadow Security Scanner,Stealth HTTP Scanner, Nessus, etc. Visit
http://www.securityfocus.com vulnerabilities and exploit codes of various
operating systems. Packet storm security
(http://www.packetstormsecurity.com) is also a nice pick.
Tools Descriptions:
1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (Network Mapper) is a free open source utility for network exploration
or security auditing. It was designed to rapidly scan large networks, although
it works fine against single hosts. Nmap uses raw IP packets in novel ways to
determine what hosts are available on the network, what services (application
name and version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are in use,
and dozens of other characteristics. Nmap runs on most types of computers and
both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (packet_trace). A very
versatile tool, once you fully understand the results.
2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-
server framework.
Nessus is the worlds most popular vulnerability scanner used in over 75,000
organizations world-wide. Many of the worlds largest organizations are
realizing significant cost savings by using Nessus to audit business-critical
enterprise devices and applications.
3. John the Ripper
Yes, JTR 1.7 was recently released!
John the Ripper is a fast password cracker, currently available for many
flavors of Unix (11 are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect
weak Unix passwords. Besides several crypt(3) password hash types most commonly
found on various Unix flavors, supported out of the box are Kerberos AFS and
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
You can get JTR Here -http://www.openwall.com/john/
4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive
tests against web servers for multiple items, including over 3200 potentially
dangerous files/CGIs, versions on over 625 servers, and version specific
problems on over 230 servers. Scan items and plugins are frequently updated and
can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto
(focus on http fingerprinting or Google hacking/info gathering etc, another
article for just those).
5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the
highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I
suggest you check this out, it’s pretty nice.
Get SuperScan Here -http://www.foundstone.com/index.htm
subnav=resources/navigation.htm&subcontent=/resources/proddesc/superscan4.htm
6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the
operating system on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY
active connections to the target machine.
7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you
capture and interactively browse the contents of network frames. The goal of
the project is to create a commercial-quality analyzer for Unix and to give
Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can
reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Get Wireshark Here - http://www.wireshark.org/
8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in
different Layer 2 protocols. It pretends to be a solid framework for analyzing
and testing the deployed networks and systems. Currently, the following network
protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery
Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration
Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch
Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.
9. Eraser
Eraser is an advanced security tool (for Windows), which allows you to
completely remove sensitive data from your hard drive by overwriting it several
times with carefully selected patterns. Works with Windows 95, 98, ME, NT,
2000, XP and DOS. Eraser is Free software and its source code is released under
GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make
sure it’s really gone, you don’t want it hanging around to bite you in the ass.
10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms,
along with an xterm terminal emulator. A must have for any h4. 0r wanting to
telnet or SSH from Windows without having to use the crappy default MS command
line clients.
11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in
Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute
force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack
article.
12. Cain and Abel
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It
allows easy recovery of various kind of passwords by sniffing the network,
cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis
attacks, recording VoIP conversations, decoding scrambled passwords, revealing
password boxes, uncovering cached passwords and analyzing routing protocols.
The program does not exploit any software vulnerabilities or bugs that could
not be fixed with little effort.
Get Cain and Abel Here -http://www.oxid.it/cain.html
13. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion
detection system. Kismet will work with any wireless card which supports raw
monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco
gold).
14. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux
counterparts, but it’s easy to use and has a nice interface, good for the
basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area
Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized rogue access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.
Get NetStumbler Here - http://www.stumbler.net/
15. Hping
To finish off, something a little more advanced if you want to test your TCP/IP
packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The
interface is inspired to the ping unix command, but hping isn’t only able to
send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a
traceroute mode, the ability to send files between a covered channel, and many
other features.
Get hping Here - http://www.hping.org/
thumbnail

Nokia Universal Secret Codes


Download

Nokia Universal Secret Codes
Note: All codes donot work for all models.

Code Description :

 These Nokia codes will work on most Nokia Mobile Phones

(1) *3370# Activate Enhanced Full Rate Codec (EFR) – Your phone uses the best sound quality but talktime is reduced my approx. 5%

(2) #3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )

(3) *#4720# Activate Half Rate Codec – Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.

(4) *#4720# Deactivate Half Rate Codec.

(5) *#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )

(6) *#9999# Phones software version if *#0000# does not work.

(7) *#06# For checking the International Mobile Equipment Identity (IMEI Number). ( Favourite )

(8) #pw+1234567890+1# Provider Lock Status. (use the “*” button to obtain the “p,w”
and “+” symbols).

(9) #pw+1234567890+2# Network Lock Status. (use the “*” button to obtain the “p,w”
and “+” symbols).

(10) #pw+1234567890+3# Country Lock Status. (use the “*” button to obtain the “p,w”
and “+” symbols).

(11) #pw+1234567890+4# SIM Card Lock Status. (use the “*” button to obtain the “p,w”
and “+” symbols).

(12) *#147# (vodafone) this lets you know who called you last.

(13) *#1471# Last call (Only vodofone).

(14) *#21# Allows you to check the number that “All Calls” are diverted to

(15) *#2640# Displays security code in use.

(16) *#30# Lets you see the private number.

(17) *#43# Allows you to check the “Call Waiting” status of your phone.

(18) *#61# Allows you to check the number that “On No Reply” calls are diverted to.

(19) *#62# Allows you to check the number that “Divert If Unreachable (no service)” calls
are diverted to.

(20) *#67# Allows you to check the number that “On Busy Calls” are diverted to.

(21) *#67705646# Removes operator logo on 3310 & 3330.

(22) *#73# Reset phone timers and game scores.

(23) *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible.

(24) *#7760# Manufactures code.

(25) *#7780# Restore factory settings.

(26) *#8110# Software version for the nokia 8110.

(27) *#92702689# Displays – 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again. ( Favourite )

(28) *#94870345123456789# Deactivate the PWM-Mem.

(29) **21*number# Turn on “All Calls” diverting to the phone number entered.

(30) **61*number# Turn on “No Reply” diverting to the phone number entered.

(31) **67*number# Turn on “On Busy” diverting to the phone number entered.

(32) 12345 This is the default security code.

Other Codes:

press and hold # Lets you switch between lines NOKIA 5110/5120/5130/5190 IMEI number: * # 0 6 #

Software version: * # 0 0 0 0 #

Simlock info: * # 9 2 7 0 2 6 8 9 #

Enhanced Full Rate: * 3 3 7 0 # [ # 3 3 7 0 # off]

Half Rate: * 4 7 2 0 #

Provider lock status: #pw+1234567890+1

Network lock status #pw+1234567890+2

Provider lock status: #pw+1234567890+3

SimCard lock status: #pw+1234567890+4 NOKIA 6110/6120/6130/6150/6190

IMEI number: * # 0 6 #

Half Rate: * 4 7 2 0 #

Software version: * # 0 0 0 0 # or * # 9 9 9 9 # or * # 3 1 1 0 #

Simlock info: * # 9 2 7 0 2 6 8 9 # NOKIA 3330 *#06#

*#0000# Shows your software version

*#746025625#This shows if your phone will allow sim clock stoppage


To Restore Factory Settings:
To do this simply use this code *#7780#

Manufacturer Info:
Date of Manufacturing *#3283#

*3001#12345# (TDMA phones only) This will put your phone into programming mode, and you’ll be presented with the programming menu.

1) Select “NAM1″
2) Select “PSID/RSID”
3) Select “P/RSID 1″
Note: Any of the P/RSIDs will work
4) Select “System Type” and set it to Private
5) Select “PSID/RSID” and set it to 1
6) Select “Connected System ID”
Note: Enter your System ID for Cantel, which is 16401 or 16423. If you don’t know yours,
ask your local dealer for it.
7) Select “Alpha Tag”
8) Enter a new tag, then press OK
9) Select “Operator Code (SOC)” and set it to 2050
10) Select “Country Code” and set it to 302 for Canada, and 310 for the US.
11) Power down the phone and power it back on again

ISDN Code:
To check the ISDN number on your Nokia use this code *#92772689#

What Is IMEI Number:

To check IMEI (International Mobile Equipment Identity) for any mobile or cellular phone.
On the main screen type *#06#
Information you get from the IMEI (International Mobile Equipment Identity)
XXXXXX     XX     XXXXXX    X
     TAC        FAC       SNR        SP
TAC = Type approval code of your Nokia Mobile
FAC = Final assembly code of your cell phone
SNR = Serial number of your Nokia Phone
SP = Spare
thumbnail

Rohos Logon Key 3.2 DC 29.01.2016 + Crack [Lock PC With USB]


Download



Rohos Logon Key 3.2 DC 29.01.2016 | 5.66 Mb

Rohos Logon Key - the program offers a convenient way to protect access to a computer using a USB key instead of the usual password. It's convenient - access is performed quickly and automatically - although Windows is still protected by a strong password.

Your Computer security benefits:
• Replaces weak password based login with a hardware USB key (USB flash drive or memory card)
• Uses big password, without the need for remembering it
• Login with a USB Key is fully automatic and fast!
• The system is password protected but you don’t need to enter it manually each time you log in or unlock Windows
• Secure 2-factor login: Your USB Key + PIN code password
• Use a single USB Key to log into your Home, laptop and office computer
• Access restriction to computer based on USB Key
• Windows is protected even in Safe Mode
• Assigning a password to your user account allows to set a better protection for hibernated computer.

No risk because of:
• Emergency Logon that helps to access your system in case you lost USB drive or forgot PIN code
• PIN code to protect USB Key against unauthorized usage for login (with limited attempts to enter)
• Safe Mode guard - no chance for Bad Guy to bypass USB Key security by loading Windows in Safe Mode
• Rohos uses NIST approved data-security principles: password is not stored on the USB Key in open form. USB Key copy protection does not allow to create unauthorized Key duplicates. All data on the Key are encrypted with AES-256 bit key length.
• Rohos Logon Key is considered to be the most convenient, user-friendly and smart password replacement application on the market. Personal vs PRO license

Authentication tokens variety:
• any USB flash drive
• USB tokens/smart cards like Aladdin eToken PRO, Futako HiToken v22, Aktiv ruToken, uaToken, Crypto Identity 5,etc
• YubiKey and Swekey - One Time-Password tokens
• Fingerprint USB flash drive, e.g. Transcend, Apacer, LG, TakeMS, etc.
• Wireless devices that are Bluetooth enabled, e.g. Pocket PC, Mobile.
• RFID tags


Updates: official site does not provide any info about changes in this version

Download Links - Download From Here
thumbnail

Sticky Password Premium 8.0.6.151 With Patch Free Download


Download



Sticky Password Premium 8.0.6.151 Multilingual | 28.73 Mb

Sticky Password is a professional security tool with rich features for storing passwords to online accounts, applications and identity information in a single place. It facilitates quick access from any location, thanks to Cloud-based technology.

Features:

Fill Out Forms Instantly
Sticky Password completes even the longest forms for you - automatically. No need to register every time you shop or download – once you’ve stored your information in the password manager, you can recall it instantly on any device whenever you need it

Log In Automatically
With all that you do online, it’s a challenge to create and remember passwords for your favorite sites and apps – whether it be email, social networks, shopping, banking, magazines and other subscriptions, or school and community.

Only One Password to Remember
Your master password is the only one you need to remember - Sticky Password does the rest. If you have passwords set up already, just import them when you install the software. And whenever you need a new password, Sticky Password creates one for you - automatically.

Unbeatable Security
Sticky Password creates the strongest possible passwords and stores them behind multiple layers of protection. Your password manager database is encrypted with powerful encryption algorithms, including military-grade AES encryption.

Support For All Your Devices
Sticky Password supports Windows, iPhones, iPads, and Android devices; support for Mac is also being considered. So no matter where you are or what device you use all your passwords and personal form-filling information are just a click or tap away.

What Are You Waiting For?
Download a 30-day full-function trial version of Sticky Password today. We guarantee you’ll be so impressed, you’ll want it on hand in your browser for ever! After 30 days, the synchronization goes away, and you’ll be restricted to 15 accounts, so keep that in mind!


What's new:
stability improvements and bug fixes for Firefox, IE and Chrome browsers
fixed synchronization problem with portable installation

Download Links:

DOWNLOAD NOW
thumbnail

Avast Internet Security 2016 11.1 incl Key Files Full Version


Download

Avast Internet Security 2016 11.1 incl Key Files Full Version

Avast Internet Security 2016 : is powered with numerous tools to protect your PC. it includes a firewall, vpn secure line, antivirus, anti-phishing tool, and smart scan tools.

How to Crack Register Or Activate Avast Pro Antivirus 2016 ?

  • Install Avast Internet Security 2016 Trial Setup.exe
  • Run > blockhosts.bat “file” > (as Administrator).
  • After that “double click” any provided License file > click Yes > click OK!
  • All Done! Enjoy, Avast Internet Security 2016 Full Version For Free… :)
(You can update virus signature definations but you cannot update program to upcomming builds).

Avast Internet Security 2016 11.1 incl Crack Download Links!

( Installer / Setup)
( Crack / License Key )

Tags : Avast Internet Security 2016 11.1 License KeyAvast Internet Security 2016 Crack, Avast Internet Security 2016 Full Version, Avast Internet Security Patch, Avast Internet Security 2016 Key Generator, Avast Internet Security 2016 Crack till 2050, Avast Internet Security Universal Activator, Avast Internet Security 2016 11.1.2241 Activation Code
thumbnail

Ardamax Keylogger 4.5 Full Version Cracked


Download

Ardamax Keylogger 4.5 Full Version Cracked

Ardamax Keylogger : is a complete spying and keylogging tool, which is really useful find out what is happening on your computer while you are away, it can also be remotely installed on another computer. detailed features are as follow.
Ardamax Keylogger 4.5 Features :
  • Invisible mode : Makes it absolutely invisible to anyone.
  • Keystroke logging : Records all typed keystrokes, passwords and hidden characters.
  • Browsers capturing : Records a log of all websites visited for all browsers.
  • Webcam recording : Periodically makes webcam pictures and stores them to log.
  • FTP delivery : Ardamax Keylogger can upload recorded logs through FTP delivery.
  • Microphone recording : Record voice from the microphone with real-time compression.
  • Network delivery : Sends recorded logs through via LAN.
  • Clipboard logging : Capture all text copied to the Windows Clipboard.
  • Visual surveillance : Periodically makes screenshots and stores the compressed images to log.
  • Email log delivery : Keylogger can send you recorded logs through e-mail delivery at set times – perfect for remote monitoring!

How To Activate Register Or Crack Ardamax Keylogger ?

  • Install Ardamax Keylogger 4.5 Setup.exe
  • After Installation Do Not Run Ardamax Keylogger (Close If Running)
  • Copy “URR.00” file from Crack folder to Following Directory.
For Windows Vista, 7, 8, 8.1, 10 : C:\ProgramData\URR
For Windows XP : C:\Documents and Settings\All Users\Application Data\URR
 That’s All Enjoy! Ardamax Keylogger 4.5 Full Version For Free… :)

Ardamax Keylogger 4.5 incl Crack Download Links !

.
Tags : Ardamax Keylogger 4.5 Registration Code, Ardamax Keylogger 4.5 Crack, Ardamax Keylogger 4.5 Serial Key, Ardamax Keylogger 4.X Universal Patch, Ardamax Keylogger 4.5 License Code, Ardamax Keylogger 4.5 Preactivated Version, Ardamax Keylogger Crack, Ardamax Keylogger 4.5 Full Version, Ardamax Keylogger Keygen
thumbnail

Super Hide IP 3.5.3.8 With Patch Free Download


Download



Super Hide IP 3.5.3.8 | 2.5 MB


Do you know what your IP address means? Are you aware that your IP address is exposed every time you visit a website? Many websites and hackers use IP address to monitor your home address and other personal information. Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Super Hide IP allows you to surf anonymously, keep your IP address hidden, protect your personal information against hackers and provide full encryption of your online activity, all with a simple click of a button.

Key Features:

* Anonymous Web Surfing
Click Hide IP button and you will be assigned fake IP addresses, preventing others from getting your true IP when surfing the Internet.
* Protect Your Identity
Surf anonymously to prevent hackers or identity thieves from monitoring your web activity or intercepting your personal information such as your financial information.
* Choose IP Country
You can select to use fake IP from different countries via "Choose IP Country" option and can Check IP directly.
* Send Anonymous E-mails
Hide your IP in E-mail headers. Be protected while sending e-mails via Yahoo!, Hotmail, GMail.
* Un-ban Yourself from Forums and Restricted Websites
Use Super Hide IP to change your IP which allows you to access any forums or websites that has ever banned you.
* Platform

Whats New :

Updates: official site does not provide any info about changes in this version

How to Download???

1. Click on Below download links
2. Wait for few seconds and then click on

------------------------

Download SectionDownload Now
thumbnail

Advanced SystemCare Ultimate 9


Download

Advanced SystemCare Ultimate 9
It is an all-in-one suite based on #1 ranked BitDefender antivirus technology and IObit anti-malware engine providing superior protection against all kinds of security threats, system slowdowns, freezes and crashes without slowing down your system. This suite will provide you with the ultimate protection against viruses, malware, and cyber threats without impacting your PCs’ performance. What’s more, with newly added Speed Up feature and over 10 rebuilt useful tools, it will greatly accelerate and maximize the overall performance of your system, disks and browsers.
What’s new in v9 ?
  • Security:
    + New Generation Engine – Remove more latest threats powerfully and thoroughly with new Bitdefender antivirus engine.
    + Fully Supported Windows 10 – Protect Windows 10 system against various threats proactively and in real-time.
    + Enhanced Protect – Added DNS Protect & Win 10 Reinforce, and enhanced Browser Anti-Tracking to better protect your system and browser.
  • Performance
    + New Speed Up – Deeply optimize system, startups, disks and browsers for faster PC and browser.
    + Windows 10 Compatible – Support cleaning and optimization of Windows 10, Microsoft Edge, Modern Apps, etc.
    + New Auto RAM Clean – Free up RAM automatically for a higher performance PC.
    + Crafted New UI – More user friendly and support large Font Size and high resolution screen.
    + Enhanced Startup Manager – Not only boost your PC boot time, but also speed up your browsers.
    + Improved Default Program – Added support for Microsoft Edge. Set default browser and other programs with 1-click in Win 10 / 8 / 7 / Vista / XP.
    + Redesigned Toolbox – Added customizable My Favorite Tools, rebuilt Large Files Finder and Auto Shutdown, improved Win Fix and other 10+ tools for deeper clean and optimization.
    + Larger Database – Expanded database for Spyware Removal, Registry Fix, Privacy Sweep, Junk Files Clean, Surfing Protection for a cleaner and more secure PC.
How to Crack & Activate  ?
1. Install Advanced SystemCare Ultimate 9
2. Run Advanced SystemCare Ultimate 9 Crack
3. Click on Crack button
4. Wait till a message pops & then click on OK
5. Run Advanced SystemCare Ultimate 9 & click on Activate Now
6. Enter the serial key given & click on Register
7. That’s all :)

Screenshots

How to Download???

1. Click on Below download links
2. Wait for few seconds and then click on

------------------------

Download SectionDownload Now
thumbnail

Automatically and Silently Copy Files From USB Drive to Hard Disk


Download
Recently i came across a problem of usb attacks and many other incidents which made me present this article before you. I had also another wish to secretly copy the teachers usb pen drive contents so that i  can get every slide which it is very difficult to obtain.
It might be possible to accomplish this using a simple file backup program that periodically checks the USB drive for new files, and if found, copies it to a directory on your hard drive. But it’s not foolproof. Today, I discovered a better solution – using a free program called USB Spy.
USB Spy is a spying program that automatically and silently copies the content of a USB Flash drive to the hard disk when it attached to the computer. The file copying begins soon after the Flash drive is inserted. No further coaxing or button click or any user interaction is required. There is also no notification of any kind when the copying operation starts and completes. The entire thing is stealthy and very sneaky.
usbspy
To make this work, you have to make sure that USB Spy is running before the thumb/pen drive is inserted, and that you have specified where you want the contents to be copied in your hard drive.
You can then hide your program which will remove the program icon from the taskbar. You can still see it running using Task Manager or any other process viewer. There is also a hotkey combination to bring up the program window but I didn’t have any luck with that one.
The contents of the USB drives are copied to the target directory and neatly organized into folders with date and size stamp. Here is the how the target directory might appear after 4 different thumb drives were connected at different times.
Alternatively,
New Version of USB Hidden Copier has been released. Please see here for the latest features.
This software will copy all the contents of all the USB drives that have been inserted in your computer and will save it to your hard drive.
Features:
1. It is totally invisible and masked enough in order not to be detected easily.
2. It will copy only a maximum of 8GB that is enough space  and information will not fill out all hard drive space if you can not monitor it for a long time.
3. Content is saved in a folder named as the USB Drive name so you can find easily who is the owner of USB copied.
4. It starts at computer startup.
5. First copy is made 3 minutes after computer starts and then every 10 minutes the content will be overwritten, so you will have always lastet content of that USB.
6. With it’s Control Panel you can easily manage it.
7. Content copied is saved in the directory: “C:WINDOWSsysbackup”
8. The copier program is called “systemidle.exe” in order to mask it.
9. In order not to copy you own USB Drive you can create a file named “friendflag.winxp” and put it directly on your USB (this file can be also with hidden and system attributes so you will not delete it accidentally). So when the program finds this file it will not copy the drive when it is located (your USB).
Author: ALTIN INFOMASTER
Download:USB Hidden File Copier v1.1 (617.9 KiB, 80,996 hits)
NOTE: You can modify the source code if you want.
Please let me know about your modifies, fixes or ideas how to improve this program by commenting here.
thumbnail

Hack any Windows vista, xp, 7, 8 With Live USB | Open Windows Admin Account Without Password


Download

Hello Friends here, I am going to describe you on how to hack any windows ( whether Xp, Vista or 7, many more) password wihout being logged into the account. This is the very easiest way which I regularly use myself to hack and break into my friends Computers. I will show you on how to change Windows User Password (Administrator, Guest, User, many more) from a bootable USB drive or a CD.

The software which I will use is Active@ Password Changer. You can download it from here. (Serial Number is Already Included in the package so that you can use this utility for free)

What is Active@ Password Changer?
Active@ Password Changer lets you reset local user passwords and change Windows login security restrictions on Windows NT / 2000 / XP / 2003 / Vista/ 7 systems: this is useful when the Administrator’s password is forgotten or lost, or when the Administrator’s user account has been disabled or locked out.


How to Create a bootable USB Drive to hack Windows Admin Password?
You must first install this software on your own system and make a bootable disk from it. I will show you how to make a bootable disk:

After the installation finishes, click on Start->All Programs->Active@ Password Changer->Bootable DOS disk creator.
Insert any USB drive and click on Start!

This will start the writing process after it finishes, then boot your system from that USB disk (You may have to press F12 or F8 or someother key for boot options when computer/laptop is just started as it depends on the computer and bios version you are using, You can look for it in computer bios setup, If there isn't any option of USB booting then rather make bootable CD from the program).

Changing/Hacking Password Using Active@ Password Changer:Once you boot from that USB drive you must see a screen like this:



Choose any desired option. It is recommended to choose 2
After choosing you will see a list of logical drives



Choose any particular drive and press Enter
After it you will see the MS-SAM Database files



Press Enter
Then you will see the list of Users and Description



Select the user of which you want to change or clear the password. After you will select you will see something like this:



If you want to clear the password then press Y and hit Enter. You may also choose to change the option, you can do this by using Space key to enable or disable it.

You can also create a bootable CD/DVD ROM if you don't have other option as i told you above!
Thankyou For Reading Happy Hacking .................:)

How to Download???

1. Click on Below download links
2. Wait for few seconds and then click on

------------------------

Download SectionDownload Now
thumbnail

AVG Internet Security 2016 16.0.7134 (x86 – x64) + Serials


Download

AVG Internet Security 2016 16.0.7134 (x86 – x64) + Serials


AVG continues to deliver advanced antivirus protection with the launch of AVG Internet Security 2015. It goes beyond simply detecting and removing viruses on your PC by blocking infected links as you browse, checking files before they’re downloaded, and helping protect your personal data online and on your PC with enhanced privacy features. With 2015, we’ve improved our core engine and its accuracy, and included a new cloud-based detection method. And because we know that security is just as important as usability, Internet Security 2015 features a revamped, easier-to-use design.

Weve been hard at work optimizing our core engine to increase its detection accuracy. That includes better detection of screen-locker ransomware and improved scanning of all downloadable files to keep you safe from an exponentially expanding pool of threats.

And when a new online threat breaks out and spreads, the key to keeping you protected is the speed with which we can react. Our new Outbreak Detection gives us the tools to act immediately and curtail their spread. With Internet Security 2015, you don’t have to wait until the next virus-definition package is ready to be protected: the moment we know a threat’s there, you’re covered.

Finally, we believe security should be clean and simple to be effective, and we’ve put a lot of work in making sure Internet Security 2015 is intuitive to use. Our new simplified design makes sure you know what needs your attention at a glance. Combined with our free comprehensive online support, you can be sure you’re getting our best protection.

Key Features:


Antivirus

Blocks viruses, spyware, & other malware

Link Protection

Scans web, Twitter®, & Facebook® links

File Shredder

Securely deletes files to prevent snooping

Online Shield

Protects you from harmful downloads

Data Safe

Encrypts & password-protects private files

Anti-Spam

Stops spammers and scammers

Enhanced Firewall

Blocks hackers so you can shop safely

AVG Internet Security 2015:


– For users of the paid version, the virus database update period was shortened to 2 hours.

– Introducing new graphics of AVG main user interface.

– All Data Safe user settings will be preserved after program upgrade to version 2015.

– Suppressed display of a button with no assigned functionality in the detection dialog.

– Improved security of Firewall rule verification process.

– Fixed issue with different detection count displayed in the scan report and the history log.

– Fixed issue with possible corruption of data transferred over network.

Whats New


* A completely new installer

* Improve: Cloud-based security in real time (Real-Time Cloud Detection), which makes it easier to identify the latest threats and to better protect against malicious websites

* Other improvements

Download SectionDownload Now
thumbnail

virus solution :- Currupted Whole Hard disk data by virus.


Download
These days virus problem is very common problem. Actually virus is a bad programs. These bad program in running on our system silently. And they can affected our PC . our PC data can be corrupted by virus. Some virus may not detected by antivirus.

Here is the best place you can get solution.

We can clean  your PC from virus.

We can repairs your Hard disk data which are corrupted by virus.

we can find virus and protect your pc from virus.

 This service is chargeable. I will charge you few cost.



Download SectionContact Us

thumbnail

NAT (Network Address Translation)


Download

NAT (Network Address Translation)

Primarily NAT was introduced to the world of IT and networking due to the lack of IP addresses, or looking at it from another view, due to the vast amount of growing IT technology relying on IP addresses. To add to this, NAT adds a layer of security, by hiding computers, servers and other IT equipment from the outside world.

How NAT works

When computers and servers within a network communicate, they need to be identified to each other by a unique address, in which resulted in the creation of a 32 bit number, and the combinations of these 32 bits would accommodate for over 4 billion unique addresses, known as IP address. This was named IPv4, and although over 4 billion addresses sounds a lot, it really is not considering how fast the world of computers and the internet has grown.
To circumvent this problem, a temporary solution was produced known as NAT. NAT resulted in two types of IP addresses, public and private. A range of private addresses were introduced, which anyone could use, as long as these were kept private within the network and not routed on the internet. The range of private addresses known as RFC 1918 are;
Class A 10.0.0.0 - 10.255.255.255
Class B 172.16.0.0 - 172.31.255.255
Class C 192.168.0.0 - 192.168.255.255
NAT allows you to use these private IP address on the internal network. So within your private network you would assign a unique IP address to all your computers, servers and other IP driven resources, usually done via DHCP. Another company can use the same private IP addresses as well, as long as they are kept internal to their network. So two companies maybe using the same range of IP addresses but because they are private to their network, they are not conflicting with each other.
However when internal hosts do need to communicate to the public network (Internet) then this is where a public address comes into the equation. This address usually purchased from an ISP is a routable public address everyone can see, which would represent your network gateway. This public address would be unique, no one else would use this address.
Now getting to the point; When a host on the internal network with an internal IP address does need to communicate outside it's private network, it would use the public IP address on the network's gateway to identify itself to the rest of the world, and this translation of converting a private IP address to public is done by NAT. For example a computer on an internal address of 192.168.1.10 wanted to communicate with a web server somewhere on the internet, NAT would translate the address 192.168.1.10 to the company's public address, lets call this 1.1.1.1 for example. so that the internal address is identified as the public address when communicating with the outside world. This has to be done because when the web server somewhere on the internet was to reply to this internal computer, it needs to send this to a unique and routable address on the internet, the public address. It can not use the original address of 192.168.1.10, as this is private, none routable and hidden from the outside world. This address, of 1.1.1.1 would be the address of the public address for that company and can be seen by everyone. Now the web server would reply to that public address, 1.1.1.1. NAT would then use its records to translate the packets received from the web server that was destined to 1.1.1.1 back to the internal network address of 192.168.1.10, and though the computer who requested the original info, will receive the requested packets.
Now you can obviously see the two benefits of NAT. Firstly it would save on the IP addresses we use, as every single computer does not need a public address, and also it would hide these private computers from the outside world. Everyone can only see the public address, the rest is hidden behind this public address. So from the internet only the public address on the external interface of the firewall or router can be seen, and nothing beyond it.

Types of NAT

Three main types of NAT rules are used today depending on what needs to be accomplished;
Static NAT
A pool of public IP addresses are assigned to the NAT device. A private IP address can then be statically mapped to anyone of these public addresses. This type of NATTING scheme is usually used for servers requiring the same IP address always, hence the name "static", so server 1 will always have the same IP address assigned to it, server 2 will have a different public IP address assigned to it and so on.
Dynamic NAT
Again the NAT device will consist of a pool of IP addresses. This time though the pool of IP addresses will be used when needed and then given back to the pool. So if computer A needed a public address, it would take one from the pool, then hand it back when done. The next time the same computer wanted an IP address it may be assigned a different public address from the pool, because the one used previously may be in use by another computer, hence the name "dynamic". So users who want to communicate on the internet at any one time will be limited by how many public IP addresses are available in the NAT pool. A company would purchase a number of public IP's depending on their need.
Port Address Translation (PAT)
In this type of setup, a company would only have one public IP address assigned to their network, and so everyone would share this one public address when using the internet, browsing the web for example. Yes, you may be asking how can everyone share one address, well the clue lies within the name, Port address translation. When a computer wants to use the internet, the NAT device, using the PAT method will remember the IP address and source port of the internal host. For example 192.168.1.10 with a source port of 55331 wanted to browse Amazon.com. The NAT device will keep a note of this, and when Amazon replies to the public address and the port number of 55331, the NAT device will use the PAT method and look up the port information which maps to the internal computer requesting it. So it would be saying, this information Amazon has sent back to the public address and port number 55331, maps to the IP address 192.168.1.10 who originally requested it, though the information is for that computer. So the connections are uniquely identified by a source port, all using the same public IP but with unique source ports to identify who requested what information.
A company would save a reasonable amount of money and IP addresses using this method because it is only using one IP address. This has been a major factor to why IPv6 has been mentioned for some years now but still not required in most countries.
NAT is also implemented in home based routers and hardware firewalls such as the Netgear's and the Linksys of this world as well as the high end hardware firewalls such as the likes of Cisco and Juniper.
This has proved a valuable feature on hardware firewalls for saving public IP addresses and also a countermeasure for some types of attacks such as a reconnaissance attack.

Disadvantages of NAT

As with everything, NAT does have it's drawbacks. Some applications and services such as VPN and video conferencing struggle to process via NAT (Not entirely true as you can most of the time get them configured to work with NAT, but can get a little messy when setting rules up in applications,, routers and firewalls).

IPv6

However to circumvent the above issue a few extra public IP addresses can be purchased for these dedicated services. For the long run however, IPv6 is already being rolled out in some technologies and some parts of the world. This addressing scheme uses 128bit numbering scheme as opposed to IPv4's 32bits used for addresses. IPv6 supports 2 to the power of 128 addresses, compared to IPv4's 2 to the power of 32, now that is a massively huge increase of IP addresses, though future proofing the growth of IP addressing using IPv6.
thumbnail

COMPLETE REGISTRY LEARN


Download
To Backup/Restore the Windows Registry: Windows 9x For XP 2000 click here
  1. If you are in MSDOS, at the C:\Windows prompt type
  2. Attrib -s -r -h C:\Windows\System.dat (press Enter)
  3. Attrib -s -r -h C:\Windows\User.dat (press Enter)
To make the backup copies type:
  1. copy C:\Windows\System.dat C:\Windows\System.000 (press Enter)
  2. copy C:\Windows\User.dat C:\Windows\user.000 (press Enter)
To Restore the Registry
  1. copy C:\Windows\System.000 C:\Windows\System.dat (press Enter)
  2. copy C:\Windows\User.000 C:\Windows\user.dat (press Enter)
You can add "Open With..." to the Right click context menu of all files.This is great for when you have several programs you want to open the same file types with. I use three different text editors so I added it to the ".txt" key.
1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\*\Shell
3. Add a new Key named "OpenWith" by right clicking the "Shell" Key and selecting new
4. Set the (Default) to "Op&en With..."
5. Add a new Key named "Command" by right clicking the "OpenWith" Key and selecting new
6. Set the (Default) to "C:\Windows\rundll32.exe shell32.dll,OpenAs_RunDLL %1", C:\ being your Windows drive. You must enter the "OpenAs_RunDLL %1" exactly this way.
You can add your name or anything you like that consists of 8 characters or less. This will replace the AM or PM next to the system time. But you can corrupt some trial licenses of software that you may have downloaded.
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Control Panel\International
3. Add two new String values, "s1159" and "s2359"
4. Right click the new value name and modify. Enter anything you like up to 8 characters.
If you enter two different values when modifying, you can have the system tray display the two different values in the AM and PM.
Want to keep people from accessing Windows, even as the default user? If you do not have a domain do not attempt this.
1. Open RegEdit
2. Go to HKEY_LOCAL_MACHINE\Network\Logon
3. Create a dword value "MustBeValidated"
4. Set the value to 1
This forced logon can be bypassed in Safe Mode on Windows 9x
You can make OutLook Express load quicker by disabling the splash screen:
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Software\Microsoft\OutLook Express
3. Add a string value "NoSplash"
4. Set the value data to 1 as a Dword value
To make Windows use multiple Start Menu Columns instead of a single scrolling column, like Windows 9x had, Also if you are using Classic Mode in XP
1. Open RegEdit
2. Go to the key
HKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Advanced
3. Create a string value "StartMenuScrollPrograms"
4. Right click the new string value and select modify
5. Set the value to "FALSE"




Changing Windows' Icons
You can change the Icons Windows uses for folders, the Start Menu, opened and closed folder in the Explorer, and many more.
1. Open RegEdit
2. Go to
HKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Shell Icons
3. Add a string value for each Icon you wish to change.
Example: "3" ="C:\Windows\Icons\MyIcon.ico,0" This will change the closed folders in the Explorer to "MyIcon.ico". Here is a complete list for each value.
0= Unknown file type
1= MSN file types
2= Applications Generic
3= Closed Folder
4= Open Folder
5= 5.25" Drive
6= 3.25" Drive
7= Removable Drive
8= Hard Drive
9= NetWork Drive
10= Network Drive Offline
11= CD-ROM Drive
12= RAM Drive
13= Entire Network
14= Network Hub
15= My Computer
16= Printer
17= Network Neighborhood
18= Network Workgroup
19= Start Menu's Program Folders
20= Start Menu's Documents
21= Start Menu's Setting
22= Start Menu's Find
23= Start Menu's Help
24= Start Menu's Run
25= Start Menu's Suspend
26= Start Menu's PC Undock
27= Start Menu's Shutdown
28= Shared
29= Shortcut Arrow
30= (Unknown Overlay)
31= Recycle Bin Empty
32= Recycle Bin Full
33= Dial-up Network
34= DeskTop
35= Control Panel
36= Start Menu's Programs
37= Printer Folder
38= Fonts Folder
39= Taskbar Icon
40= Audio CD
You need to reboot after making changes. You may need to delete the hidden file ShellIconCache if after rebooting the desired Icons are not displayed.




Change Default Folder Locations
You can change or delete the Windows mandatory locations of folder like My Documents:
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Shell Folders
3. Change the desired folder location, My Documents is normally list as "Personal"
4. Open the Explorer and rename or create the folder you wish.
To change the desired location of the Program Files folder
1. Go to
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
2. Change the value of "ProgramFiles", or "ProgramFilesDir"
Now when you install a new program it will default to the new location you have selected.





Change the Registered Change the User Information
You can change the Registered Owner or Registered Organization to anything you want even after Windows is installed.
1) Open RegEdit
2) Got to
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion.
3) Change the value of "RegisteredOrganization" or "RegisteredOwner", to what ever you want





Opening a DOS Window to either the Drive or Directory in Explorer
Add the following Registry Keys for a Directory:
HKEY_CLASSES_ROOT\Directory\shell\opennew
@="Dos Prompt in that Directory"
HKEY_CLASSES_ROOT\Directory\shell\opennew\command
@="command.com /k cd %1"
Add or Edit the following Registry Keys for a Drive:
HKEY_CLASSES_ROOT\Drive\shell\opennew
@="Dos Prompt in that Drive"
HKEY_CLASSES_ROOT\Drive\shell\opennew\command
@="command.com /k cd %1"
These will allow you to right click on either the drive or the directory and the option of starting the dos prompt will pop up.





Changing Exchange/Outlook Mailbox Location
To change the location of your mailbox for Exchange:
1. Open RegEdit
2. Go to
HKEY_CURRENT_USER\Software\ Microsoft\Windows Messaging Subsystem\ Profiles
3. Go to the profile you want to change
4. Go to the value name that has the file location for your mailbox (*.PST) file
5. Make the change to file location or name
To change the location of your mailbox for Outlook
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Software\Microsoft\Outlook (or Outlook Express if Outlook Express)
3. Go to the section "Store Root"
4. Make the change to file location




Add/Remove Sound Events from Control Panel
You can Add and delete sounds events in the Control Panel. In order to do that:
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\AppEvents\Schemes\Apps and HKEY_CURRENT_USER\AppEvents\Schemes\Eventlabels. If this key does not exist you can create it and add events.
3. You can add/delete any items you want to or delete the ones you no longer want.






Adding an Application to the Right Click on Every Folder
Here is how to add any application to the Context Menu when you right click on any Folder. This way you do not have to always go to the Start Menu. When you right click on any folder, you can have access to that application, the same as using Sent To.
1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key to the "Shell" Key and name it anything you like.
4. Give it a default value that will appear when you right click a folder, i.e. NewKey (use an "&" without the quotes, in front of any character and it will allow you to use the keyboard)
5. Click on the Key HKEY_CLASSES_ROOT\Folder\shell\NewKey
6. Add a New Key named Command
7. Set the (Default) value of the application you want to run
8. For example: c:\program files\internet explorer\iexplore.exe (Include the full path and parameters if you need them)




Adding Explore From Here to Every Folder
When you want to right click on any folder and want to open up an Explorer window of that folder.
1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key "RootExplore " under the "Shell" Key
4. Set the (Default) value to "E&xplore From Here "
5. Right Click the "RootExplore " Key and add a new Key "Command"to the RootExplore
6. Set the (Default) value of Explorer.exe /e,/root,/idlist,%i




Changing the Location of Windows' Installation Files
If you need to change the drive and or path where Windows looks for its installation files:
1.Open RegEdit
2.Go to
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Setup
3.Edit the value next to SourcePath



Creating a Logon Banner
If you want to create a  Logon Banner: A message box to appear below your logon on.
1.Open RegEdit
2.Go To
For Windows 9x and ME -
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Winlogon
For Windows 2000 XP 2003 Vista -
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Winlogon

3.Create a new String value"LegalNoticeCaption "
4. Enter the Title of the window. What is displayed in the Title Bar.
5. Create a new string value "LegalNoticeText"
6. Enter the text for your message box that will appear even before the Logon window.



Creating a Default File Opener
If you have a un-registered file type and want to view it instead of having to select Open With. Use Explorer's Right-click and add your program to the right-click options by:
1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Unknown\Shell
3. Right click on "Shell" and create a New Key and name it "Open "
4. Create a New Key under the "Open" key you just created and name it "Command"
5. Set the (Default) value to the path and filename of the program you want to use to open the file type
6. For example: C:\Windows\NOTEPAD.EXE %1
You must use the "%1" for this to work.and a space between the exe and the %1




Deleting Registry Keys from the Command Line
There are two ways to delete a key from the Registry from the Command line. At the Windows Command line:
RegEdit /l location of System.dat /R location of User.dat /D Registry key to delete
You cannot be in Windows at the time you use this switch.
Or you can create a reg file as such:
REGEDIT4
[-HKEY_LOCAL_MACHINE\the key you want to delete]
Note the negative sign just behind the[
Then at the Command line type:
1. RegEdit C:\Windows\(name of the regfile).




Change/Add Restrictions And Features
If you want to make restrictions to what users can do or use on their computer without having to run Poledit, you can edit the Registry. You can add and delete Windows features in this Key shown below.
Zero is Off and the value 1 is On. Example: to Save Windows settings add or modify the value name NoSaveSettings to 0, if set to1 Windows will not save settings. And NoDeletePrinter set to 1 will prevent the user from deleting a printer.
The same key shows up at:
HKEY_USERS\(yourprofilename)\ Software\ Microsoft\ Windows\ CurrentVersion\ Policies\ Explorer so change it there also if you are using different profiles.
1.Open RegEdit
2.Go to
HKEY_CURRENT_USER\Software\Microsoft\ CurrentVersion\ Policies
3.Go to the Explorer Key (Additional keys that can be created under Policies are System, Explorer, Network   and WinOldApp )
4.You can then add DWORD or binary values set to 1 in the appropriate keys for ON and 0 for off.
NoDeletePrinter - Disables Deletion of Printers
NoAddPrinter - Disables Addition of Printers
NoRun - Disables Run Command
NoSetFolders - Removes Folders from Settings on Start Menu
NoSetTaskbar - Removes Taskbar from Settings on Start Menu
NoFind - Removes the Find Command
NoDrives - Hides Drives in My Computers
NoNetHood - Hides the Network Neighborhood
NoDesktop - Hides all icons on the Desktop
NoClose - Disables Shutdown
NoSaveSettings - Don't save settings on exit
DisableRegistryTools - Disable Registry Editing Tools
NoRecentDocsMenu - Hides the Documents shortcut at the Start button
NoRecentDocsHistory- Clears history of Documents
NoFileMenu _ Hides the Files Menu in Explorer
NoActiveDesktop - No Active Desktop
NoActiveDesktopChanges- No changes allowed
NoInternetIcon - No Internet Explorer Icon on the Desktop
NoFavoritesMenu - Hides the Favorites menu
NoChangeStartMenu _ Disables changes to the Start Menu
NoFolderOptions _ Hides the Folder Options in the Explorer
ClearRecentDocsOnExit - Empty the recent Docs folder on reboot
NoLogoff - Hides the Log Off .... in the Start Menu
And here are a few more you can play with
ShowInfoTip
NoTrayContextMenu
NoStartMenuSubFolders
NoWindowsUpdate
NoViewContextMenu
EnforceShellExtensionSecurity
LinkResolveIgnoreLinkInfo
NoDriveTypeAutoRun
NoStartBanner
NoSetActiveDesktop
EditLevel
NoNetConnectDisconnect
RestrictRun - Disables all exe programs except those listed in the RestrictRun subkey
This key has many other available keys, there is one to even hide the taskbar, one to hide the control panel and more. I'm not telling you how, as someone may want to play a trick on you. The policies key has a great deal of control over how and what program can run and how one can access what feature.
In the System key you can enter:
NoDispCPL - Disable Display Control Panel
NoDispBackgroundPage - Hide Background Page
NoDispScrSavPage - Hide Screen Saver Page
NoDispAppearancePage - Hide Appearance Page
NoDispSettingsPage - Hide Settings Page
NoSecCPL - Disable Password Control Panel
NoPwdPage - Hide Password Change Page
NoAdminPage - Hide Remote Administration Page
NoProfilePage - Hide User Profiles Page
NoDevMgrPage - Hide Device Manager Page
NoConfigPage - Hide Hardware Profiles Page
NoFileSysPage - Hide File System Button
NoVirtMemPage - Hide Virtual Memory Button
In the Network key you can enter:
NoNetSetup - Disable the Network Control Panel
NoNetSetupIDPage - Hide Identification Page
NoNetSetupSecurityPage - Hide Access Control Page
NoFileSharingControl - Disable File Sharing Controls
NoPrintSharing - Disable Print Sharing Controls
In the WinOldApp key you can enter:
Disabled - Disable MS-DOS Prompt
NoRealMode - Disables Single-Mode MS-DOS





Automatic Screen Refresh
When you make changes to your file system and use Explorer, the changes are not usually displayed until you press the F5 key
To refresh automatically:
1. Open RegEdit
2. Go to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Update
3. Set the value name "UpdateMode" to 1




Disable Password Caching
To disable password caching, which allows for the single Network login and eliminates the secondary Windows logon screen. Either use the same password or:
1. Open RegEdit
2. Go to the key
HKEY_LOCAL_MACHINE\SOFTWARE \Microsoft\ Windows\ CurrentVersion\ Policies\ Network
3. Add a Dword value "DisablePwdCaching" and set the value to 1



Changing the MaxMTU for faster Downloads
There are four Internet settings that can be configured, you can get greater throughput (faster Internet downloads) by modifying a few settings.
They are the MaxMTU, MaxMSS and DefaultRcvWindow, and DefaultTTL
1.Open RegEdit
2.Go to
HKEY_LOCAL_MACHINE\System\CurrentControlset\ Services\ Class\ net\ 000x
(where x is your particular network adapter binding.)
3.Right click on the right panel
4.Select New\String Value and create the value name IPMTU
5.Double click on it and enter then the number you want. The usual change is to 576
6.Similarly, you can add IPMSS and give it a value of 536
(Windows 9X)You can set DefaultRcvWindow, and DefaultTTL by adding these string values to HKEY_LOCAL_MACHINE\ System\ CurrentControlset\ Services\ VXD\ MSTCP
Set the DefaultRcvWindow to"5840"and the DefaultTTL to "128"
Note: These settings will slow down your network access speed slightly, but you will probably not even see the difference if you are using a network card. If you are using Direct Cable you should see a sight difference.




Adding Items to the Start Button
To add items when you right-click on the Start Button:
1.Open RegEdit
2.Go to HKEY_CLASSES_ROOT\Directory\Shell
3.Right-click on Shell and select New Key
4.Type in the name of the key and press the Enter key
5.In the Default name that shows in the right hand panel, you can add a title with a "&" character in front of the letter for a shortcut
6.Right-click on the key you just created and create another key under it called command
7.For the value of this command, enter the full path and program you want to execute
8.Now when you right click on the Start Button, your new program will be there.
9.For example, if you want Word to be added, you would add that as the first key, the default in the right panel would be &Word so when you right click on the Start Button, the W would be the Hot Key on your keyboard. The value of the key would be C:\Program Files\Office\Winword\Winword.exe





Remove Open, Explore & Find from Start Button
When you right click on the Start Button, you can select Open, Explore or Find.
Open shows your Programs folder. Explore starts the Explorer and allows access to all drives.
Find allows you to search and then run programs. In certain situations you might want to disable this feature.
To remove them:
1.Open RegEdit
2.Go to HKEY_CLASSES_ROOT\Directory\Shell\Find
3.Delete Find
4.Scroll down below Directory to Folder
5.Expand this section under shell
6.Delete Explore and Open
Caution: - When you remove Open, you cannot open any folders.




Removing Items from NEW Context Menu
When you right-click on the desktop and select New, or use the File Menu item in the Explore and select New a list of default templates you can open up are listed.
To remove items from that list:
1. Open RegEdit
2. Do a Search for the string ShellNew in the HKEY_CLASSES_ROOT Hive
3. Delete the ShellNew command key for the items you want to remove.




Changing Telnet Window
You can view more data if you increase the line count of Telnet. By Default it has a window size of 25 lines. To increase this so you can scroll back and look at a larger number on lines:
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Software\Microsoft\Telnet
3. Modify the value data of "Rows"




 Changing the Tips of the Day
You can edit the Tips of the day in the Registry by going to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\ CurrentVersion\ explorer\ Tips

Disabling Drives in My Computer
To turn off the display of local or networked drives when you click on My Computer:
1.Open RegEdit
2.Go to
HKEY_CURRENT_USER\Software\ Microsoft\ Windows\ CurrentVersion\ Policies\ Explorer
3.Add a New DWORD item and name it NoDrives
4.Give it a value of 3FFFFFF
5.Now when you click on My Computer, none of your drives will show.
Change the Caption on the Title Bar for OutLook Express or the Internet Explorer:
For Outlook Express:
1. Open RegEdit
2. Go to
HKEY_CURRENT_USER\Software\Microsoft\OutLook Express
For IE5 and up use:
HKEY_CURRENT_USER\IDENTITIES \{9DDDACCO-38F2-11D6-93CA-812B1F3493B}\ SOFTWARE\ MICROSOFT\ OUTLOOK EXPRESS\5.0
3. Add a string value "WindowTitle" (no space)
4. Modify the value to what ever you like.
For no splash screen, add a dword value "NoSplash" set to 1
The Key {9DDDACCO-38F2-11D6-93CA-812B1F3493B} can be any key you find here. Each user has his own Key number.
The Key 5.0 is whatever version of IE you have

For Internet Explorer:
1. Open RegEdit
2. Go to HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main
3. Add a string value "Window Title" (use a space)
4. Modify the value to what ever you like.



Disabling the Right-Click on the Start Button
Normally, when you right button click on the Start button, it allows you to open your programs folder, the Explorer and run Find.
In situations where you don't want to allow users to be able to do this in order to secure your computer.
1.Open RegEdit
2.Search for Desktop
3.This should bring you to HKEY_CLASSES_ROOT\Directory
4.Expand this section
5.Under Shell is Find
6.Delete Find
7.Move down a little in the Registry to Folder
8.Expand this section and remove Explore and Open
Now when you right click on the Start button, nothing should happen.
You can delete only those items that you need.
Note: - On Microsoft keyboards, this also disables the Window-E (for Explorer) and Window-F
(for Find) keys.
See the section on Installation in the RESKIT to see how to do this automatically during an install.
In areas where you are trying to restrict what users can do on the computer, it might be beneficial to disable the ability to click on My Computer and have access to the drives, control panel etc.
To disable this:
1.Open RegEdit
2.Search for 20D04FE0-3AEA-1069-A2D8-08002B30309D
3.This should bring you to the HKEY_CLASSES_ROOT\CLSID section
4.Delete the entire section.
Now when you click on My Computer, nothing will happen.
You might want to export this section to a Registry file before deleting it just in case you want to enable it again. Or you can rename it to 20D0HideMyComputer4FE0-3AEA-1069-A2D8-08002B30309D. You can also hide all the Desktop Icons, see Change/Add restrictions.
By default, when you click on the My Computer icon, you get a display of all your drives, the Control Panel etc. If you would like to have this open the Explorer:
1. Open RegEdit
2. Go to
HKEY_CLASSES_ROOT\CLSID\ {20D04FE0-3AEA-1069-A2D8-08002B30309D}\ Shell
3 . Add a new Key named "Open" if it does not exists by right clicking "Shell" and selecting new.
4. . Add a new Key named "Command" by right clicking "Open" and selecting new
5. Set the (Default) value for the Command Key to "Explorer.exe" or "C:\Windows\Explorer.exe"
Fooling with the recycle bin. Why not make the icon context menu act like other icon context menus.
Add rename to the menu:
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}\ ShellFolder
"Attributes"=hex:50,01,00,20
Add delete to the menu:
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}\ ShellFolder
"Attributes"=hex:60,01,00,20
Add rename and delete to the menu:
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E} \ShellFolder
"Attributes"=hex:70,01,00,20
Restore the recycle bin to Windows defaults including un-deleting the icon after deletion:
Restore the icon.
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows \CurrentVersion\ explorer\
Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E}
@="Recycle Bin"
Reset Windows defaults.
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E} \ShellFolder
"Attributes"=hex:40,01,00,20
Other edits to the recycle bin icon:
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}\ ShellFolder
"Attributes"=hex:40,01,01,20 ... standard shortcut arrow
"Attributes"=hex:40,01,02,20 ... a different shortcut arrow
"Attributes"=hex:40,01,04,20 ... and still another shortcut arrow
"Attributes"=hex:40,01,08,20 ... make it look disabled (like it's been cut) 
For Windows XP and 2000 also edit HKEY_CURRENT_USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}
For Windows ME also edit HKEY_CURRENT_USER \Software\ Classes\ CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}

1.Open RegEdit
2.Go to
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Policies\ Network
3. Now, choose the Edit/New/Binary value command and call the new value MinPwdLen. Press Enter twice and Assign it a value equal to your minimum password length.
You can start or stop programs from executing at boot up by adding or deleting them to/from the run Keys in the Registry. Windows loads programs to start in the following order; Program listed in the Local Machine hive, then the Current User hive, then theWin.ini Run= and Load = lines. then finally programs in your Start Up folder.
To add or remove programs in the Registry
1.Open RegEdit
2.Go to the desired Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVersion \Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVersion \RunServices
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows \CurrentVersion \Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows \CurrentVersion \RunServices
3. Add a new String Value and name it anything you like
4. For the value data, enter the path and executable for the program you want to run.
By adding the value to the HKEY_CURRENT_USER hive instead allows the program to start only when that user is logged on.
If you add the value to the RunOnce key the program will run once and be removed from the key by Windows.
1.Open RegEdit
2.Open the Key HKEY_CLASSES_ROOT
3.Open the Key LNKFILE
4.Delete the value IsShortcut
5.Open the next Key PIFFILE
6.Delete the value IsShortcut
7.Restart the Windows
You can shut off the animation displayed when you minimize and maximize Windows.
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Control panel \Desktop\ WindowMetrics
3. Create a new string value "MinAnimate".
4. Set the value data of 0 for Off or 1 for On
1.Open RegEdit
2.Go to
HKEY_LOCAL_MACHINE\System\CurrentControlSet \Services \Class \Modem \0000 \Init
3.Change the settings to the new values
If your modem it is timing out during file transfers or loading Web Pages, you might try increasing the timeout period. To change the Time Out::
1.Open RegEdit
2.Go to HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Services\ Class\ Modem\ XXXX\ Settings Where XXXX is the number of your modem
3. In the right panel and double click on Inactivity Timeout
4.The number of minutes for a timeout should be entered between the brackets.
5.For example, a setting could have S19=<10> to set it to 10 minutes.
If you uninstalled a program by deleting the files, it may still show up in the Add/Remove programs list in the Control Panel.
In order to remove it from the list.
1.Open RegEdit
2.Go to HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Uninstall
3.Delete any programs here.
If you have a problem locating the desired program open each key and view the DisplayName value
The File Types tab in Explorer's View / Options menu lets you edit most of your file types, but certain settings cannot be changed. The default action for a batch file, for instance, runs the batch file instead of opening it via Notepad or Wordpad. Thus, when you double-click on AUTOEXEC.BAT, a DOS window opens, and the file executes. If you want to change this default action and edit a batch file when you double-click on it, however, the File Types tab does not let you do so; the Set Default button for the file type called MS-DOS Batch File is always grayed out.
The button is grayed out because HKEY_CLASSES_ROOT's batfile key contains an EditFlag value entry. Such entries are used throughout the Registry to prevent novice users from altering certain system settings. The binary data in batfile's EditFlag reads d0 04 00 00. If you change this value to 00 00 00 00, you can then change any of the batch file settings. Do not, however, indiscriminately zero out EditFlag; if you do so in a system ProgID such as Drive or AudioCD, it completely disappears from the File Types list. For ProgIDs that are linked to extensions, set all EditFlags to 00 00 00 00. For system ProgIDs, replace EditFlag data with 02 00 00 00.
If you wish to have access to some buttons while leaving others grayed out, you must know the function of each EditFlag bit. The last two bytes of data are always zero, but most bits within the first two bytes have a specific effect:
  • Byte 1, bit 1: Removes the file type from the master list in the File Types tab (select View / Options under Explorer) if it has an associated extension.
  • Byte 1, bit 2: Adds the file type to the File Types tab if it does not have an associated extension.
  • Byte 1, bit 3: Identifies a type with no associated extension.
  • Byte 1, bit 4: Grays out the Edit button in the File Types tab.
  • Byte 1, bit 5: Grays out the Remove button in the File Types tab.
  • Byte 1, bit 6: Grays out the New button in the Edit File Type dialog (select the Edit button in the File Types tab).
  • Byte 1, bit 7: Grays out the Edit button in the Edit File Type dialog.
  • Byte 1, bit 8: Grays out the Remove button in the Edit File Type dialog.
  • Byte 2, bit 1: Prevents you from editing a file type's description in the Edit File Type dialog.
  • Byte 2, bit 2: Grays out the Change Icon button in the Edit File Type dialog.
  • Byte 2, bit 3: Grays out the SetDefault button in the Edit File Type dialog.
  • Byte 2, bit 4: Prevents you from editing an action's description in the Edit Action dialog (select the Edit button in the Edit File Type dialog).
  • Byte 2, bit 5: Prevents you from editing the command line in the Edit Action dialog.
  • Byte 2, bit 6: Prevents you from setting DDE (Dynamic Data Exchange) fields in the Edit Action dialog.
The EditFlags value for Drive, for instance, is d2 01 00 00 in Hex (1101 0010 0000 0001 in binary). Bits 2, 5, 7, and 8 are on in byte 1, and bit 1 is on in byte 2. The EditFlag for batfile is d0 04 00 00 in Hex or 1101 0000 0000 0100 in binary. In this case, bits 5, 7, and 8 are on in byte 1, and bit 3 is on in byte 2.
Bits 4, 5, and 6 of byte 2 apply only to actions that are protected. EditFlags with action keys (such as HKEY_CLASSES_ROOT\batfile\shell\open) determine protection. If byte 1, bit 1 of such an EditFlag is 0 (or if there is no EditFlag), then the action is protected. If byte 1, bit 1 is 1, then the action is unprotected.
To enable protection on system files such as the KnownDLLs list, add the  following value;
1. Open RegEdit
2. HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Control\ SessionManager
3. Create the a Dword value and name it "ProtectionMode "
4. Set the Value to1