Tuesday 30 July 2013

Hack Remote Computer Via IP and open Port

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.

You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.

Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.

Well, both of the hacking has the same process. Let’s summarize what we must do.

1. Confirm the website or a computer you want to hack.
2. Find or trace their IP address.
3. Make sure that IP address is online
4. Scan for open ports
5. Check for venerable ports
6. Access through the port
7. Brute-force username and password

Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com

will fetch the IP address of Google.com
This is how we can get the IP address of the victims website.

How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.

One of the widely used method to detect IP address of your friend is by chatting with him.
You might find this article helpful
How to get the IP address using MSN/Yahoo/Pidgin messenger

Now you got the IP address right? Is it online?
To know the online status just ping the IP address, if it is online it will reply.

If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.

Use Advanced Port Scanner to scan all open and venerable ports.
 Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.

Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.

You’ll be asked to input login information.


If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one: Brutus, THC Hydra...

- THC Hydra
In this way you’ll able to hack remove computer using only IP address

                                                                                                                    
 education purpose only

 

Sunday 28 July 2013

Window XP /7 / 8 Login Password Hack





Hi Guys.Today i tell you how to hack window 7 login password.With the help of this trick you hack your frind computer password And Some time you forget your password and you don’t have any idea what can you do.There is many ways to recover your password.Some time we can go to a forget window password to recover the old password but its lit bit difficult.It’s working on the all kind of the window’s operating system like Vista, XP,window 7 and window 8.Today i tell you very easy and fast way to recover your password.so let’s start with the just simple tricks and there are some following steps below.
1. Download koon Boot Software From Here



2. You can enter a USB into your computer USB HUB then format it with the fat32 option and ticked quick format during the format.Like shown below


3.  Enter the USB thumb device and the open Directory 1. Konbot 1.1/ Konbot 1.1/konusb like below and then you can see in the image like shown below run the file 2. konbootinstall   then finally command prompt open . Then Give your usb disk drive like shown below is 3


4. Then open your USB and check that the software is installing or not like shown below .


5.  Now finally shutdowns the computer you want to bypass the login password and then open a boot option on a startup with USB.

6. Then you will be sending the by computer to the login page where user put the password and username its bypass easily and finally you done.

 
 

Friday 12 July 2013

How To Download Youtube Videos by VLC

How To Download Youtube Videos by VLC   => 


First grab the URL of the YouTube video page. 

Now click on Media –>Open Network stream. 

Paste the URL and click Play.
 

Once VLC starts streaming the video, 

click Tools –>Codec Information and at the bottom of the window you will see a Location box. 

Copy the URL and paste it on your browser’s address bar. 
The browser will now download the file which you can save it to your hard disk. Alternatively, you can record the video.

How To Make Windows 7 Genuine

1. Firstly Open Command Prompt 
Press Windows + R then Run Box Will Appear type cmd in it and click on ok .

2. Then Command Prompt Will Appear
In CMD Type :
SLMGR - REARM
and Hit Enter 

3. Wait for sometime (approx 5 - 10 seconds)
Now A Message Will Appear That Your Windows 7 is Genuine

Sunday 7 July 2013

Top 5 Computer Programmers

Here is a list of world's best programmers around the world who changed computer era by developing computer software, programs and also operating system.

#1.  Dennis Ritchie


Dennis Ritchie (1941-2011) was an American Computer Programmer. Sir. Ritchie developed "C" programming language and co-developer of Unix Operating system. Dennis Ritchie worked for Alcatel-Lucent and for Bell labs.

Dennis Ritchie changed digital era by creating "C" programming language. Lisp, Visual Basic, Pascal, COBOL, Turbo pascal 7.0, PL/1, ADA, these are the programming languages are written in C programming language.  "C" is a best programming language for newbie programmers, Who are interested in learning codes.

Dennis Ritchie and his colleague Ken Thompson received the Turing award for implementing and developing UNIX operating system in the year 1983. 


#2.  Mark Zuckerberg

Mark_zuckerberg

Mark Zuckerberg created Facebook.com when he was 20 years old, Mark and his Harward university friends helped to build Facebook. When Facebook started it was only available for Hardward students. Facebook website is mainly written in C++ and PHP programming language.

Mark is very passionate about programming and codes, In his early age he created a messenger called "Zucknet" that allowed to chat with all computers. In 2003 Mark created Facemash, the website is all about comparing two Harward university students side by side "Hot or Not" contest.
Some developers re-created Facemash (check here)

In last year Mark Zuckerberg earned more than $2 billion worth stock. And worth $15B according to report of usnews. 



#3.  Steve Wozniak  

Steve_wozniak
              The Brain behind Apple Inc. -Steve Wozniak is an Computer scientist and Programmer

Steve Woz is well known for developing Apple-1 and Apple-2 :

In early 1976 Woz and Jobs developed a Hardware ,Circuit Board design and Operating system for
Apple- 1 . Apple 1 priced around $666, And sold 50 system boards to Paul Terrell (Computer shop owner) . After Apple-1, Woz developed first Color graphics personal computer with Integer BASIC programming language and they named it as a Apple-2.

For sometime  Steve Wozniak was teaching elementary school students about computer. In 2006 Steve Woz published his autobiography iWoz: From Computer Geek to Cult Icon. Now Steve Woz is working for Fusion-io as a Chief Scientist.

#4.  Bill Gates

Bill+Gates+Programmer

Bill Gates: Founder of world's largest software company Microsoft, And also Co-chairman of Gates Foundation.  Also Bill gates is one of the world's richest man in the world. 

Bill started working with computer when he was 13 years old. When he was 17 Bill Gates formed a company called Traf-o-data. And In the age of 20 Bill Gates founded Microsoft Inc. Bill Gates also created MS-DOS Operating system and Windows OS. Currently Microsoft is one of the valuable company in the world. In 2012 Microsoft earns $73.72 Billion.



"Measuring programming progress by lines of code is like measuring aircraft building progress by weight" - Bill Gates  



#5.  Linus Torvalds

Linus Torvalds is a software engineer, hacker and project coordinator. 

In 1991 Linus Torvalds released Linux 0.11 which is written in C programming language. Linux supports more than 20+ platforms. And Linux is a free and open source operating system, Open source means that you can get the source code of the operating system for free.

"Most good programmers do programming not because they expect to get paid or get adulation by the public, but because it is fun to program" - Linus Torvalds 


The Top 5 Programmers lists ends here according to me but there are thousands of best programmers are there Larry page, Brin sergy, Bjarne Stroustrup.

Tuesday 2 July 2013

hack window 7 /xp

Hack Windows 7 / XP logon password.
 

Image

Sometimes when you forget your windows logon password or simply want to hack into another computer, here is an easy method to bypass or change the password. The method is very easy and straightforward. In addition you don't need to download any software to do this. You only need a windows installation DVD.
Step 1: Boot from your windows installation DVD. If you don't know how to do this you shouldn't be reading this instructable.
Step 2: You will see a window like the one below. Click Repair your computer.

Image


Step 3: Choose the operating system and click Next.

Image


Step 5: After a while a screen like the one shown below will be displayed. Click on Command prompt link. This will open a command prompt window.

Image


Step 6: Execute the two commands below in order:
  • ren sethc.exe sethc_back.exe
  • copy cmd.exe sethc.exe


  • Image


    Step 7: Restart your computer. After restarting press the Shift key five times quickly while in the logon screen.
    Step 8: This will pop up a CMD window with the administrator privileges. Now execute the command: net user xbyte password Replace the xbyte in the command with the username you want to hack and replace password with any password you want. This will change the password of the user you specified.
    Step 9: Now you can logon using the password you specified in the previous step.
    How does this work? The answer is simple. Windows has a feature which will open a feature called Sticky keys when the Shift key is pressed five times quickly. We are just replacing the program which starts on pressing Shift key five times with CMD. So when you press Shift key five times even on the logon screen, a Command prompt window will pop up with administrator privileges instead of the sticky key feature. Then we are using the command prompt to change the password of the user.
    Remember to leave your ratings and share! Leave any questions or problems in the comments. Keep tuned!

    C++ Interview Questions


    1. Explain Copy Constructor.

    It is a constructore which initializes it's object member variable with another object of the same class. If you don't implement a copy constructor in your class, the compiler automatically does it.

    2. When do you call copy constructors?

    Copy constructors are called in these situations:
    i.)when compiler generates a temporary object
    ii.)when a function returns an object of that class by value
    iii.)when the object of that class is passed by value as an argument to a function
    iv.)when you construct an object based on another object of the same class

    3. Name the implicit member functions of a class.

    i.) default ctor
    ii.) copy ctor
    iii.) assignment operator
    iv.) default destructor
    v.) address operator

    4. Explain storage qualifiers in C++.

    i.) Const - This variable means that if the memory is initialised once, it should not be altered by a program.
    ii.) Volatile - This variable means that the value in the memory location can be altered even though nothing in the program code modifies the contents.
    iii.) Mutable - This variable means that a particular member of a structure or class can be altered even if a particular structure variable, class, or class member function is constant.

    5. Explain dangling pointer.

    When the address of an object is used after its lifetime is over, dangling pointer comes into existence. Some examples of such situations are: Returning the addresses of the automatic variables from a function or using the address of the memory block after it is freed.

    6. In what situations do you have to use initialization list rather than assignment in constructors.

    When you want to use non-static const data members and reference data members you should use initialization list to initialize them.

    7. When does a class need a virtual destructor?

    If your class has at least one virtual function, you should have a virtual destructor. This allows you to delete a dynamic object through a baller to a base class object. In absence of this, the wrong destructor will be invoked during deletion of the dynamic object.

    8. What is the type of “this” pointer? When does it get created?

    It is a constant pointer type. It gets created when a non-static member function of a class is called.

    9. How would you differentiate between a pre and post increment operators while overloading?

    Mentioning the keyword int as the second parameter in the post increment form of the operator++() helps distinguish between the two forms.

    10. What is a pdb file?

    A program database (PDB) file contains debugging and project state information that allows incremental linking of a Debug configuration of the program. This file is created when you compile a C/C++ program with /ZI or /Zi or a Visual Basic/C#/JScript .NET program with /debug.

    11. You run a shell on UNIX system. How would you tell which shell are you running?

    To check this you can simply do the Echo $RANDOM.
    The results will be:
    - Undefined variable if you are from the C-Shell,
    - A return prompt if you are from the Bourne shell,
    - A 5 digit random number if you are from the Korn shell. You could also do a ps -l and look for the shell with the highest PID.

    12.What are Stacks? Give an example where they are useful. 

    A Stack is a linear structure in which insertions and deletions are always made at one end i.e the top - this is termed as last in, first out (LIFO). Stacks are useful when we need to check some syntex errors like missing parentheses.

    13. Differentiate between an external iterator and an internal iterator? What is the advantage of an external iterator. 

    An external iterator is implemented as a separate class that can be "attach" to the object that has items to step through while an internal iterator is implemented with member functions of the class that has items to step through. With an external iterator many different iterators can be active simultaneously on the same object - this is its basic advantage.

    14. Do you think the following code is fine? If not, what is the problem? 

    T *p = 0;
    delete p;
    No, the code has a problem. The program will crash in an attempt to delete a null pointer.

    15. In a function declaration, what does extern mean?

    The extern here tells the compiler about the existence of a variable or a function, even though the compiler hasn’t yet seen it in the file currently being compiled. This variable or function may be defined in another file or further down in the current file.

    16. You want to link a C++ program to C functions. How would you do it?

    This can be done by using the extern "C" linkage specification around the C function declarations.

    17. Exlpain STL.

    STL stands for Standard Template Library. It is a library of container templates approved by the ANSI committee for inclusion in the standard C++ specification.

    18. What are the different types of STL containers?

    Following are the 3 types of STL containers:
    1. Adaptive containers - for e.g. queue, stack
    2. Associative containers - for e.g. set, map
    3. Sequence containers - for e.g. vector, deque

    19. Explain Stack unwinding

    Stack unwinding is a process during exception handling when the destructor is called for all local objects between the place where the exception was thrown and where it is caught.

    20. How would you find out if a linked-list is a cycle or not?

    We can find out if the linked-list is not a cycle by using two pointers. One of them goes 2 nodes every time while the second one goes at 1 node each time. If there is a cycle, the one that goes 2 nodes each time will meet the one that goes slower. If this happens, you can say that the linked-list is a cycle else not.