Thursday, 26 December 2013

hacking windows - How to add more option in "Send to"

  Generally there are only few options in “Send to” option when you select and right click on any file or folder. There is no option of the file or folder in which you have to send particular file or folder. So we will provide you a method to add new and more options in “Send to” option. By adding more options in “Send to” option your work will be more easy and you can complete the task of sending an item at your destination in less time.

Follow the given below steps for Adding option in “Send to”

Step 1: Open “run” and type “shell:sendto” and hit enter.
How To Add More Options In “Send To” In Windows
Step 2: Now just drag and drop the file or folder which you have to add to “Send to” option to the ‘Send to’ folder that had opened with the help of step 1.
How To Add More Options In “Send To” In Windows
That’s it. Its time to check your added files or folders to “Send to” option, you have to just select any file or folder, right click and move cursor to “Send to” option.
How To Add More Options In “Send To” In Windows

Note : You can add many options as you want to “Send to” option using this method.

Video will be soon...
want any help contact us ..

Note: the above post are perfectly blogger by www.techreviewpoint.com

Friday, 29 November 2013

How to write blue text on Facebook


Hi, Hello if you  do some smartness in computing then all will assume u as a computer genuis.so learn all the tips and hacks in this blog . 
*Copy the following code and Paste this on your status or in your comment :

@@[0:[165125763534994:0: "YOUR TEXT" ]]

Replace "YOUR TEXT" with whatever you want to write in "BLUE"... " .

NOTE : Works Only On Profile Walls & Comment Not in Groups.

Hacking Beginner's Guide


Q: What is hacking?

A: The terms In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.  "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime.

  • Hacking can be classified into 
  1. White hat
  2. Black hat
  3. Grey hat
  4. Elite hacker
  5. Script kiddie
  6. Neophyte
  7. Blue hat
  8.  Hacktivist
  9.  Nation state
  10.  Organized criminal gangs
  11.  Bots


                      Q: What is cracking?
                      A: Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: (copy protection, protection against the manipulation of software), trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware.

                      Q: What is a virus/trojan/malicious script?
                      A: A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer..computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into othercomputer programs, data files, or the boot sector of the hard drive

                      Q: What is a stealer?
                      A: A stealer is a software designed to create viruses. This virus is called as a server. You send the server to the victim and if they open it all their passes (according to how the stealer is built) will be sent to you via email, or ftp or a php webhost.

                      Q: What is a RAT?
                      A: A Rat is a software created that created similar servers (virus). If the victim opens it they will be your RAT. You can have a complete access to their system. There are hundereds of features.
                      RAT - Remote Administration Tool.

                      Q: What is a keylogger?
                      A: A keylogger is a software designed to create servers. You send the server to the victim and if they open it all their keystrokes would be sent you via email, ftp, php webhost etc.

                      Q: What is BOT?
                      A: A bot is a malicious program which has several purposes. They are usually told what to do by a botnet admin although many of the features now are automated.

                      Q: What is a BOTNET?
                      A: A botnet is a network of infected computers that all connect to one area where they are commanded by the botnet admin.

                      Q: What is a crypter?
                      A: All your servers that you create of a keylogger, stealer, RATs etc. are detected by antivirus. So inorder to make it FUD (Fully UnDetectable) we use a crypter and crypt your infected server.

                      Q: How does a crypter work?
                      A: A crypter has a built in or external file called stub. This stub is based on common encryptions like rc4, xor, tweafish, blowfish etc. When you crypt your infected file the crypter embeds the stub onto your server and covers the server. Just like how you paint your rusted metals. And makes it undetectable from anti-virus.

                      Q: What is reverting?
                      A: Reverting is a technique used to obtain forgotten passwords. But a hacker uses this method to access the victims account.

                      Q: What is social engineering?
                      A: It is a psychological approach, where you manipulate people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques (essentially a fancier, more technical way of lying).

                      Q: What is DDos?
                      A: DOS - Denial Of Service.
                      This is using bots. If you have a large number of bots you make them send packets to the target site and make them break down.

                      Q: How is website and forum hack possible?
                      A: There are lots of methods. The most basic one is you find exploits on a webserver and use them to gain access and deface it. Sql, XSS, LFI, RFI, DNS poisoning etc.

                      Q: Can everyone be Hacker?
                      A: Yes, but u have a brain and common sense.
                      Subscribe to RSS Feed Follow me on Twitter!