COMPUTER TRICKS & TIPS
VISIT THIS SITE FOR PC TIPS,TRICKS,free 3G,free internet,free gprs,hackers,facebbok,twitter,google plus tricks,
COMPUTER SECURITY & SO MUCH OTHER THINGS.
https://johnplayerstricksandtips.blogspot.com
homepage
MICROSOFT-WORD2003- VOICE ANNOTATIONS
15/06/2011 12:04
MICROSOFT-WORD2003- VOICE ANNOTATIONS
Hi friends,MICROSOFT-WORD allows us toeasily add text annotations to your document.an annotation is a note or a special instruction that is added along with the document.
MICROSOFT-WORD2003 offers you an option to add annotations in the form of audio file.this file may be prerecoarded file,or a new recording.
here is i m gonna show you how to easily add a voice...
SET UP YOUR OWN PROXY SERVER
15/06/2011 10:03
Set up your own proxy server
so many people complain that webproxys are not working at their works / schools computer because they have been banned by administrators. A way around this would be to setup your very own proxy server that is being hosted a) by a free webhosting service that supports either php or cgi or b) your own website that is being hosted by a webhosting company.
Both methods should...
INSTALL TOR IN BACKTRACK4
15/06/2011 10:02
First, you need to add noreply.org repositories to your sources.list. These are the official tor repositories for debian-based Linux distrobutions. Open up a terminal and type:
Code:
nano /etc/apt/sources.list
At the bottom of this file, add these two lines:
Code:
deb https://mirror.noreply.org/pub/tor intrepid main
deb-src https://mirror.noreply.org/pub/tor intrepid main
Save the file. Now download...
GOOGLE HACKING
14/06/2011 09:52
Google query operators
Operator Description Sample query
site restricts results to sites within the
specified domain
site:google.com fox will find all sites containing the
word fox, located within the *.google.com domain
intitle restricts results to documents whose
title contains the specified phrase
intitle:fox fire will find all sites with the word fox in the
title and fire in the text
allintitle...
HOW TO HACK A WEBPAGE?
14/06/2011 09:46
Well Psychotic wrote one of the most helpful unix text files in cyberspace but with the mail that we
recieved after the release of our famous 36 page Unix Bible we realised that unix isn't for everybody so
we decided that we should write on another aspect of hacking..... Virtual Circuit and Psychotic is proud to
release, "Hacking Webpages With a few Other Techniques." We will discuss a...
How to Hack Yahoo/gmail/orkut any Password?
11/06/2011 18:44
Requirement:
Just purchase hosting from any company and the domain will be similar to yahoomail.com
like yahooomail.com after upload 3 files.
1. index.html (same clone of the yahoo.com)—just change method
2. info.pl (used to send passwords to our email address)
3. thankyou.htm file to redirect phishing page to orginal yahoomail.com .
open yahoomail.com and save as file index.html open this file in...
How to Hack and Spy on a Webcam
11/06/2011 18:31
How to Hack and Spy on a Webcam
I get a lot of emails where my readers are asking for help to find out if his/her partner is cheating on them, chatting to someone she/he shouldn't be, etc. So here i decided to answer this question, and to get it clear once for all.
Today there are softwares called RATs (Remote Administrator Tools) that are mostly used for malicious purposes, such as controlling PC’s,...
HOW TO MAKE FASTER YOUR FLASH DRIVE?
11/06/2011 18:28
HOW TO MAKE FASTER YOUR FLASH DRIVE?
Guys,its so simple to make your usb flash drive make faster
just follow these steps to do so:
plug in your pen drive
open the properties
now click on hardware.
select your flash disk drive.
click on properties.
click on policies
now click on better performace & apply.
thats it.you have done.
Types of Web application vulnerability
09/06/2011 21:56
1. XSS (Cross Site Scripting)
2. SQL Injection
3. RFI
4. etc
1.) XSS
XSS is a type of computer security vulnerability typically found in web applications
which allow code injection by malicious web users into the web pages viewed by
other users.
Websites today are more complex than ever, containing a lot of dynamic content
making the experience for the user more enjoyable. Dynamic content is...
How to Prevent Email Password Hacking?
09/06/2011 21:49
Don't use the links in an email, instant message, or chat to get to any web page if you
suspect the message might not be authentic or you don't know the sender or user's handle
Instead, call the company on the telephone, or log onto the website directly by
typing in the Web adress in your browser
Avoid filling out forms in email messages that ask for personal financial information
You...
How To Disable Writing to USB Drives
09/06/2011 21:45
A major concern at organizations is allowing users to plug in a usb flash drive, because they could so
easily copy corporate data. Since Windows XP SP2, you can disable writing to USB devices
altogether using a simple registry hack. However one should also note that if you are using
this trick, you should make sure that the users are not administrators on the computer, because
they could easily change this...
HOW TO RESTORE YOUR LOST BOOKMARK LIST
07/06/2011 13:17
HOW TO RESTORE YOUR LOST BOOKMARK LIST?
we always face a problem that system goes crash or your mozila firefox goes crash.when one thing happened with you from both of them.you lost your total bookmarkerd list.
so how to restore it.
well,lets try to restore it.
when this thing happens with you.just give me favour.
install firefox again.go to firefox profile.
here search the bookmarkbackups folderclick on...
HOW TO BYPASS THE RECYCLE BIN?
07/06/2011 13:15
HOW TO BYPASS THE RECYCLE BIN
bypass the recycle bin,you have to change the some configurations.
go to the recyble bin properties by clicking righ click on recycle bin icon on desktop.
in the properties of recycle bin,you have to select the check box against "do not move to files recycle bin.remove files immidiately when deleted.
here is one another way to bypass it.
when you choose a file to delete.keep...
HOW TO VIEW THE TITLE BAR IN WINDOWS VISTA
07/06/2011 08:59
FRIENDS,ONE COULD VIEW THE WINDOWS TITLE IN XP & its predecessors.
BUT NOT IN VISTA.UPON pressing the win+E key.you would notice that windows doesn't include any title.TItle can be viewed in only IE 7 that comes in deafault with vista.you can solve this problem by downloading
a small exe.file known as aerobarfrom the site-https://www.psscript.net/AeroBar.exe.
after the downloading of this file just give...
A TRICK TO HACK INTO COMPUTERS THROUGH WIRELESS FIDILITY
06/06/2011 19:36
A TRICK TO HACK INTO COMPUTERS THROUGH WIRELESS FIDILITY
Hello friends wana this hack?
ok.allright,lets go for it.
to do so,we have to need first of all browser mozila firefox,then an extension called FIRESHEEP thatdemonstrates HTTP session hijacking attacks.
WinPcap - WinPcap is an open source library for packet capture and network analysis for the Win32 platforms. It includes a kernel-level packet...
HOW TO REWRITE YOUR CD/DVD/BLUE-RAY RECORDABLE DISC?
06/06/2011 08:59
HOW TO REWRITE YOUR CD/DVD/BLUE-RAY RECORDABLE DISC
Guys its a very simple trick to write again to a unrewritable disk.
we all very oftenly get that the disc we have burn,its has lots of space free,
want to use this free space?
ok.lets start.
first insert the disk into your bd/dvd/cd rom.
now launch the nero software & choose make data dvd.
now you will found that your disk is already written.
select...
How to Encode Normal Virus into Undectable Virus
05/06/2011 22:28
How to Encode Normal Virus into Undectable Virus
#./msfencode –h (for Help)
# ./msfencode x86/shikata_ga_nai –I mk.exe –t exe>newencode.exe
CRASH DOWN WINDOWS Xp
05/06/2011 22:25
now here is Virus to delete Windows..
its very simple.
Open Notepad
& jst copy below code nd past it on notepad
01001011000111110010010101010101010000011111100000
save it as ***.exe and send it to victim..
don;t run dis file on ur system..... please be careful
NOTE: this is for information purpose only please don't ever try on your or your friend's pc.
creating a virus to delete my documents
OPEN...
MAKE YOUR XP TALK
05/06/2011 22:24
MAKE YOUR XP TALK
Open a text file in notepad and write:
;copy from here--------------
Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg
;----------to here
Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text, input the text and press ok."
How To Block Websties Without Software
05/06/2011 22:23
1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!
-So-
127.0.0.1 localhost
127.0.0.2 www.blockedsite.com
-->www.blockedsite.com is now unaccessable.
ONLINE RAPIDSHARE PREMIUM LINK GENERATOR
05/06/2011 22:22
https://rapid8.com
https://www.hellorapid.com
https://www.nbe-media.com/rapidshare/index.php
https://www.rapidpid.net
https://www.rapiddownloader.info/
https://rsplg.com
https://rapidhard.pl/index.php
https://www.rsfox.com/generator.php
HOW TO MAKE FOOL TO SOMEBODY BY USING THIS BATCH CODE
05/06/2011 22:19
OPEN NOTEPAD & WRITE.
@echo off
start iexplore
start notepad
start firefox
save it as anyname.bat
contact[@]promoddl.com
change [@] TO @
HOW TO REDUCE DISK USAGE SPACE
05/06/2011 22:12
REDUCE DISK USAGE SPACE
System restore is a prominet utility in windows operating system that canrecover files & settings in case of system crash.
its a must to turn on this feature.but at the same time,it usage lots of disk space as well.you can limit the amountof disk space system restore users by excuting
some commands in the command prompt.
just follow these steps:
1-click on start & type cmd...
access your mobile remotely?
04/06/2011 15:18
Signup with www.mymobilesite.net and install a application (.sis ) file on nokia phone to
access mobile from computer(internet).
We can access:
Guest and friend user accounts
Calendar - manage your calendar, and share your availability for others too
Messaging - SMS inbox/outbox and SMS sending
Phone log - view missed calls
Contacts - manage your contacts easily
Blog - tell...
Google hacking to find out any software within just a minute
04/06/2011 15:09
Google hacking is a term that refers to the act of creating complex search engine queries in order
to filter through large amounts of search results for information related to computer security. In
its malicious format it can be used to detect websites that are vulnerable to numerous exploits
and vulnerabilities as well as locate private, sensitive information about others, such as credit
card numbers,...
How to get victim IP address
04/06/2011 15:04
To get victim ip address we have following options:
1 Php Notify Script
2 Send RCPT Email (Readnotify)
3 Personal website
4 Sniffer
1. PHP Notify script:
Upload the file "index.php" and "ip.html" to an free webspace account which supports php !
say victim to visit your site www.yoursite.com you willget his ip www.yoursite/ip.html
2. Send RCPT Email:
Sign up with www.readnotify.com , lets you know when...
Domain Hacking
04/06/2011 14:59
A Domain hacking is a process to transfer domain(yahoo.com) without owner permission
with help of phishing, sniffing,spoofing.
A domain hack is an unconventional domain name that combines domain levels,
especially the top-level domain (TLD), to spell out the full "name" or title of the domain,
making a kind of fun.
Domain Hacking process:
1. See who.is record of victim(kulhari.net) DNS record and note...
What is Website Defacement?
04/06/2011 14:56
A website defacement is an attack on a website that changes the visual
appearance of the site. These are typically the work of system crackers, who break
into a web server and replace the hosted website with one of their own.
• A high-profile website defacement was carried out on the website of the company
SCO Group following its assertion that Linux contained stolen code. The title of
the page was changed...
How to Hack Email Passwords
04/06/2011 14:48
The other most commonly used trick to hack email password is using Fake Login Pages.
[phishing] Today, Fake login pages are the most widely used techniques to hack an email
account. A Fake Login page is a page that appears exactly as a Login page but once we
enter our password there, we end up loosing it.
Fake login pages are created by many hackers on their sites which appear exactly as
Gmail or Yahoo...
Free Calling to Any US Phone From Your iPhone
04/06/2011 14:43
This method REQUIRES a WiFi connection and jailbroken iPhone!!!
Thanks goes to Unique311 at internettablettalk for first showing me how to do this on the Nokia N800/N810 Internet Tablets. Iâ?™m sure others came before him on the PC method. Whatâ?™s new is it now works on the iPhone.
You need 3 accounts:
1) grandcentral at www.grandcentral.com (Edit: This should be your first check – they look to be...
Items: 241 - 270 of 310