Showing posts with label Hacking Tricks. Show all posts

How to make FireFox faster

Steps:

1) Type "about:config" into the address bar and press enter.

2)Scroll down and look for the following: network.http.pipelining network.http.proxy.pipelining network.http.pipelining.maxrequests
Your browser normally will make one request to a web page at a time. By enabling pipelining it will make several at once, causing it to really speed up your page loading.

3) Now make these changes: Set "network.http.pipelining" to "true" Set "network.http.proxy.pipelining" to "true" Set "network.http.pipelining.maxrequests" to some number like 25. Which causes it to make 25 requests at once.

4) Now right click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set the value to "0". This value is the amount of time the browser waits before it acts on information it recieves.

This will make you browser load 2-30 times faster than normal.

How to make FireFox 30 times fasterWatch Video If You Don't Understand Click Here

Lock your PC Temporarily when someone Enters Wrong Password

May be sometime You are out of your desk and someone Tries to log in in your PC by Guessing and he got Success after some tries but what if there is a limit of tries let see how to lock a PC in Windows 7 After some tries.

STEPS :-

1.First Go to Local security Policy.
2.Now From the Left Panel select account Lockout Policy .
3.Now select Account Lockout Threshold from the above Image after that you will see below image now you can chose how many times it should ask before Lockout the PC

Click on Apply button and a window will be open telling you Account will lock down for 30 minutes. You can also change the time settings by clicking on the Reset account lockout counter according to your need.

How to See if Your Hard Drive is Dying

How to See if Your Hard Drive is Dying
Hard drives use S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) to gauge their own reliability and determine if they’re failing. You can view your hard drive’s S.M.A.R.T. data and see if it has started to develop problems.

Unfortunately, Windows doesn’t have an easy-to-use built-in tool that shows your hard disk’s S.M.A.R.T. data. We will need a third-party tool to view this information, though there is a way to check your S.M.A.R.T. status from the command prompt.


Use CrystalDiskInfo

CrystalDiskInfo is an easy-to-use, open-source program that can quickly display the S.M.A.R.T. status reported by your hard drive in Windows. You can download it for free – however, be sure to uncheck the browser widget when installing it.



Once it is installed, all you have to do is launch the CrystalDiskInfo application to view the S.M.A.R.T. status information for your hard drives. If everything is working properly, you should see the status Good displayed.

CrystalDiskInfo also displays other information about your hard drive, including its current temperature and hardware specifications. If there is a problem, you can identify what exactly is wrong with the hard drive.


If you are particularly paranoid, you can enable the Function –> Resident (to keep CrystalDiskInfo running in your system tray) and Function –> Startup (to have CrystalDiskInfo automatically start with your computer) options to leave CrystalDiskInfo always running in the background. If your S.M.A.R.T. status changes, CrystalDiskInfo will pop up and alert you.

Checking S.M.A.R.T. Without Third-Party Tools

To do a quick S.M.A.R.T. check without installing any third-party software, you can use a few commands included with Windows. First, open a Command Prompt window. (Press the Windows key, type Command Prompt, and press Enter.)

In the Command Prompt window, type the following commands, pressing Enter after each:

Code:
wmic

diskdrive get status




If everything is working properly, you should see the status OK displayed. Other statuses can indicate problems or errors retrieving S.M.A.R.T. information.

Help, My Hard Drive Is Dying!

If you have used either of these tools – or another reputable program – and have seen an error, this does not mean your hard drive is going to fail immediately. However, if there’s a S.M.A.R.T. error, you should assume that your hard drive is in the process of failing. A complete failure could come in a few minutes, a few months, or – in some cases — even a few years. However long it takes, you should not trust the hard drive with your data in the meantime.

Ensure you have up-to-date backups of all your files stored on another media, such as an external hard drive or burned discs. You should always have up-to-date backups anyway, as hard drives can fail at any time.

With your files properly backed up, you should look into replacing your hard drive as soon as possible. A hard drive that fails a S.M.A.R.T. test should not be considered reliable. Even if your hard drive doesn’t die completely, it could corrupt portions of your data.

Of course, hardware isn’t perfect – hard drives can fail without any S.M.A.R.T. warnings. However, S.M.A.R.T. often gives you some advance warning when your hard drive is starting to fail.

How to bypass phone verification

Hey guys, today im going to show you how to bypass the phone verification that sites like G-mail or Facebook asks for. 

steps
1- signup here http://voicemail.k7.net/signup/
2- choose fax and voice-mail
3- they will email you your phone number
4- Now just put that number in the site. 

enjoy!!!

How to set picture password in windows 8

Hi friends! You all know that Windows 8 is going to come with its many of the awesome apps. One of its awesome apps is its picture password. It can be used to fully protect your PC without any fear of cracking your password. When you are using picture password, the image which you have selected will appear after booting your window. You have to drag your cursor in that way three times which you have set as password. Without matching all three innings, your PC will not log on. Isn't it interesting? So, come on let’s do it.


Follow these steps
to set your picture password—

(Note:— You can directly go to the control panel in the start button and skip the First and Second step.)

1. Go to the ‘Control Panel’, and click on the ‘User Accounts and Family Safety’.

2. Now, go to the ‘User accounts’ and click on ‘Make changes to my account in the Settings App’.

3. Click on the ‘Users’ on the left pane and click on ‘create a picture password’ below the ‘Picture password’.

4. It will ask your current password if created, provide your current password and press ‘OK’.

5. Now, click on ‘Choose picture’.

6. Select the picture you want to set as your password and press ‘Open’.

7. For your confirmation, it will ask again that choose this picture or any other. So, click on ‘Use this picture’.

8. Now, it will ask you the method in which way you want to set. There are three ways to set as password, choose one of them and repeat it three times.

9. Then again, for your sake it will ask to repeat your way to set as password, repeat the same act which you have chosen as password.


10. Finally, click on ‘OK’ and your password has been created.


Activate your Window 8 without any Crack/patch

* Open up command prompt as
administrator (Windows button + X)
* Type each line one by one and press
enter once you type one 

slmgr /upk

slmgr /ipk NG4HW-VH26C-733KW-K6F98-J8CK4
slmgr /skms
lunar21.no-ip.org:80
slmgr.vbs -ato
Done!, enjoy your new activated
Windows 8. 

Functions of commands: 

2.slmgr /upk - deletes the current serial
key you entered 
3. slmgr /ipk SERIAL KEY - add the specific
serial you typed
4. /skms lunar21... - Connect to that kms
server 
5. slmgr.vbs -ato - Activates the serial key
you entered before. 

tested on Windows 8 Professional Retail

build 9200 system operator

How to fix Hidden extensions

Explorer's default settings in Windows 7 hide file extensions, as well as system files and folders.

To fix this, launch Explorer and click Tools > Folder Options > View.

Clear the "Hide extensions for known file types" to show file extensions, reducing the likelihood that you'll accidentally double-click on virus.txt.exe in future.

And as long as there are no novice users on your system who might go poking around in Explorer, I'd also choose to "Show hidden files and folders" as well as clear the "Hide protected operating system files" box. It's often important to see these files when you're troubleshooting, or following problem-solving instructions from someone else.

Free Download : Windows7 Loader V1.8.5 Full Version




Windows Loader Tools Is this one to solve a Windows seven not genuine Windows seven genuine. For my friend all of a sudden windowsnya walpapernya black, and each in the locker wallpaper after restart walpapernya back to black and there is writing on the bottom right corner “WINDOWS NOT GENUINE”. Now, it can be solved with tools that one’s Windows Loader Windows seven Loader v 1.8.5.

Tools Loader aplication that is widely used by millions of people worldwide. Windows 7 1.8.5 is capable of passing / passing Microsoft's WAT (Windows Activation Technologies) and is arguably the tools applications of the safest Windows Activation ever made. How does Windows 7 Loader v1.8.5 is doing injects a SLIC (System Licensed Internal Code) into the system before booting Windows melaukan.



Well for all who need a friend's update crack or activator - loader windows 7, can try this one application, Windows 7 Loader 1.8.5. Update Windows Activator - Windows 7 loader.

This Windows Loader 1.8.5 suppot with multiple Operating Systems, including:

Windows 7 Ultimate
Windows 7 Ultimate E
Windows 7 Professional
Windows 7 Professional E
Windows 7 Home Premium
Windows 7 Home Premium E
Windows 7 Home Basic
Windows 7 Starter
Windows 7 Starter E

Some of the advantages of Windows Loader:
Work on the 32-bit and 64-bit systems, Compatible with Windows 7 SP1 and all system updates, compatible with all system languages​​, can be used to pre-activate Windows, can be installed with a custom install OEM information, has application integrity checking feature, supports hidden partitions and some complex setups, can work alongside Linux’s GRUB boot manager or some laiinya, and much more.

Go to this link for download--Click here

Hack Remote Computer Using IP Address

Hacking a remote
computer is always a hot topic among hackers and crackers, a newbie hacker or someone who wants to learn hacking always ask these questions that how to hack into a computer by just knowing the IP address of victim computer. Today in this article I am going to explain step by step procedure to hack computer using IP address. But this tutorial is possible only when your friend’s / victim computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.

Step 1: First you need to download Metasploit. The most up-to-date version is FREE at www.metasploit.com

Step 2: You need PostgrSQL for your database. Download here:  www.postgresql.org Make sure you use all the defaults or Metasploit woun't work!


Step 3: Now lets get down to business... After installing both tools, open up the 
PostgrSQL admin gui (start - all programs- PostgreSQL 9.0 -pgAdmin III). Then right- click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass. you chose to use in step 5

Step 4: Time for somehacking! Go to start - allprograms - Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this : http://adf.ly/bBzoD


Step 5: Now, in the window type: db_connectpostgres:ThePassYouChose@localhost:5432 The first time you do this you will see lots of text flash buy. Don't worry, this is normal.


Step 6: Type db_host to make sure you are connected correctly.


Step 7: Now type this: db_nmap 000.000.000.000 Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...


Step 8: Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s - b , watch the auto- exploitation start, go play Halo for a while, and then come back.


Step 9: After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.


Step 10: Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this: sessions -i ExploitNumber The features of Metasploit are much like a rat. Once you get into someone's computer, you can see their screen, control their mouse, see what they type, see them, etc.


So friends, I hope this How To Hack A Remote Computer Using IP Address tutorial will be useful for you. If you have any problem in this How To Hack A Remote Computer Using IP Address tutorial, please mention it in comments.