New Post

Rss

Monday, May 17, 2010
How to make an AutoRun File for USB drives

How to make an AutoRun File for USB drives

Creating a simple or complex autorun file for your thumbdrive.


You can also follow these instructions when making a CD. You just have to burn it on the cd.


When you plug a  USB drive in, you might be interested in making a program, or other things happen as soon as you plug in. The way you accomplish this is through the Autorun.inf file. The autorun.inf file is located in the root of the usb drive and tells Windows what to do automatically.
This autorun can be used to make good, or bad USB’s depending on what you like.

This tutorial covers:


Creating a USB Autorun.inf
Changing label\icon of thumbdrive
Making a new option appear in the autorun menu
Making programs automatically run when plugged in

So Read On...




Creating a USB Autorun.inf :



To create an autorun file, open Notepad and save ‘autorun.inf’’ (with quotes) and save it to the root of the drive. All it needs to have is in the first line;


[autorun]

Done!

Changing label\icon of thumbdrive:

Follow the steps in Creating a USB Autorun.inf. Before you save it, type this in in this order!

[autorun]

icon=myicon.ico


label=MyLabel


And save. Make sure the icon file is in the root of your drive.

Making a new option appear in the autorun menu:

Right, so make your autorun file and type this into Notepad:


[autorun]
icon=default
label=[yourlabelhere]

action=programname.exe
Open Program



Save it and exit. Once again, the program has to be in the root. Now, when you plug it in, the option should appear in the menu.

Making programs automatically run when the USB is plugged in:

Follow the same instructions, blah blah blah;


[autorun]
Icon=default
label=YourLabelHere
open=programname.exe



And that’s it for this tutorial!

Any questions, please ask,a nd I’ll try to answer it as quickly as possible.
no image

How To Test Your Security Against Ddos (Noob Friendly)

Ok so you want to test the security of your site against DDoS's.

TOOLS REQUIRED :


>>Port Scanner<<
>>rDos<<
(click on them to Download)


Step One: First we need to find the websites IP Adress. This is very easy todo.

Ok so say they URL is 
http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type ping http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST REMOVE HTTP:// AND ANY /'s).


EXAMPLE:







Step Two: Now we must test to see if port 80 is open (it usually is).

This is very easy todo to Ok open up the port scanner you downloaded.
Once in the port scanner type in your Victims ip that you got from step 1.
It will ask you to do a range scan or a full scan (SELECT REANGE SCAN!) It will ask for conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and 81 for highest hit enter than hit cap Y.


[X] = Closed
[X] Vulnerable = Open


EXAMPLE:







Step Three:

The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!)
If port 80 is open your on your way to crashing!!

Ok open Up rDos that you download.
Enter the ip that we got from step 1.
It will ask you for the port to attack use port 80 that is why we scaned to make sure 80 was open! If it is closed it will not work.
Hit enter.. *=Flooding -=Crashed Or didn't connect!


EXAMPLE:







The site won't be directly offline!!
it starts with ***********
be patiend.. after some time it will go like this: **********-----------

that means the site crashed.

Thanks for reading i hope this helps. IF you have Any Queries Ask Them.
Sunday, May 9, 2010
Anti Tracks 7.2.1 - Remove your Tracks with Ease

Anti Tracks 7.2.1 - Remove your Tracks with Ease


Anti Tracks 7.2.1


Anti Tracks 7.2.1 | 7.81 MB

Anti Tracks is a complete solution to protect your privacy and enhance your PC performance. With a simple click Anti Tracks securely erase your internet tracks, computer activities and programs history information stored in many hidden files on your computer. Anti Tracks support Internet Explorer, AOL, Netscape, Mozilla FireFox and Opera browsers. It also include more than 100 free plug-ins to extend erasing features to support popular programs such as ACDSee, Acrobat Reader, KaZaA, PowerDVD, WinZip, iMesh, Winamp and much more.

Features:

Browser Cleaning
No matter which Internet browser you use...Internet Explorer, Firefox, Google Chrome, Safari, AOL, Netscape, Mozilla, or Opera...your worries about Internet surfing "trails" are over: Anti Tracks' Browser Cleaning feature will safely and securely erase your browser tracks, leaving no traces behind


Windows Cleaning
You do a lot of things every day with Windows: open documents, make spreadsheets, download songs, watch movies, and more, and Windows keeps track of all those activities. Anti Tracks' Windows Cleaning feature securely erases all your Windows usage tracks...histories of your recent documents, your network cache, Windows registry streams, searches, and much more. They're gone forever, leaving no trail behind you of your Windows usage habits


File Shredding
Shredding isn't just for hard copy anymore! With Anti Tracks' File Shredding, you can permanently overwrite and securely erase any file or folder on your computer, making them unrecoverable by even sophisticated file recovery tools. Anti Tracks users know permanent file shredding means that material is out of sight for good


File and Folder Locking
Have some documents, spreedsheets, images that you worry about being seen by the wrong eyes? Anti Tracks' File and Folder locking feature allows you to securly lock your files and folders using 10+ of the best, strongest and most sophisticated encryption algorithms. Seal your folders, lock them, and make them almost impossible to break into by even the most advanced hackers


File and Folder Hiding
Hide important files, documents and spreedsheets in any picture or audio file steganographically. Pictures and audio files used to hide your important files and folders will appear as regular pictures and audio files so that no one will ever suspect that there is anything hidden inside them.


"Incognito" IP Hiding
For all the good websites you can visit, there are always a few bad ones in there as well, malicious websites that capture your machine's IP and can use it against you. Anti Tracks' IP Hider feature helps keep your real IP address from those pirates and prying eyes! You could be in the U.S., with a masked IP that places you in Japan, Europe, or any other place in the world. Safely and securely surf the Net, without worrying about malicious pirates, with Anti Tracks' IP Hider


E-Mail and News Management
You read and delete a lot of e-mail; some of it's important, some of it's not. But chances are if an e-mail is important, you've backed it up or printed it, then deleted it; you do the same thing with very old e-mail you don't need anymore, just to keep your inbox in good shape. Delete it, and it's gone, right?


Not necessarily. Sending an email to trash, even "permanently deleting" it, doesn't get rid of it forever. It's still recoverable. But with Anti Tracks' E-Mail and News Management, you have a solution. Whether you use MS Outlook, Outlook Express, Thunderbird, or Eudora mail, Anti Tracks' E-Mail and News feature will securely erase those unwanted e-mails and render them unrecoverable, keeping sensitive information and private correspondence away from those who have no business seeing it


Junk and Obsolete Files Cleaner
While your system needs certain files in order to operate correctly, over time, a system can accumulate lots of "junk" files. These are not only unnecessary; they can waste hard drive space and cause impaired system performance. Anti Tracks' Junk and Obsolete File cleaner safely scans your system for all occurrences of junk and obsolete files and helps you safely and securely erase them, thus removing all the clutter that gets in the way of peak system performance...leaving your PC healthier, faster, and with more space available to you!


Removing Duplicate Files
More than one copy of the same file can be useful on a temporary basis; keeping multiple copies of the same files can clutter your hard drive and actually make file management more difficult. Anti Tracks' Duplicate Fles Cleaner scans your computer for duplicate files and pinpoints their location for you. Then, you choose which copies to keep and let Anti Tracks safely dispose of the rest. Uncertain about which files to save and which to toss? Anti Tracks gives you the option of backing up deleted files in a "compressed" archive. Should you need to reverse the deletion, it's easy to do so without compromising disk space and performance, since the backup takes up far less space


Disk Wiping
You can manually delete files and folders by sending them to the recycling bin, then emptying the bin...but that doesn't mean they're gone! They're still on your hard disk, just waiting to be recovered by file recovery tools. Anti Tracks' Disk Wiper scans your hard drive(s) for previously deleted files and folders, then securely erases them. With Anti Tracks' Disk Wiping, your deleted files and folders are unrecoverable, with no chance of restoration even by users with the most sophisticated file recovery tools!


Secure Erasing
Erase your "tracks" unwanted folders, and unnecessary files safely, to U.S. DOD (Department of Defense) DOD 5220.22-M, Gutmann, and NSA clearing and sanitizing standards. These protocols means your erased files stay erased; even with the most cutting-edge file recovery software, when it's gone it's gone!


Third-Party Application
Usage tracks from programs like WinZip, RealPlayer, Windows Media Player, bitTorrent, and others, can reveal your usage habits and other valuable information to anyone. Anti Tracks' Third-Party application thwarts that by enabling you to erase your third-party applications usage "tracks." With 100+ FREE preconfigured plug-ins, you can rest assured that your third-party applications usage tracks are erased securely and permanently. What's more, if you'd like to create your own plug-in, Anti Tracks' Plugins Wizard will help you do that in a matter of a few clicks


Fixing Broken Shortcuts
Shortcuts...they're great, when they work. But they only do their job when the files to which they link stay in the same place on your computer. If you move those files, the shortcut link can get corrupted, rendering the shortcut useless. Anti Tracks' Broken Shortcuts Cleaner help you fix that problem by scanning your system and safely removing all those broken shortcuts from wherever they happen your Start menu, recent documents, and Desktop


Automatic Erasing
Manually loading Anti Tracks to erase your Windows tracks, browser history, or third-party applications usage history every day or every time you finish browsing, turn off your Windows can be a hassle. Fortunately, it's one you won't have to worry about with Anti Tracks' Automatic Erasing! With varied choice settings, Anti Tracks' Automatic Erasing allows you to schedule the erasing to be done automatically at your convenience...in connection with key events such as Windows startup or shutdown, or on specific days, dates, and times when you want the process to occur


Managing Cookies
Cookies can be great conveniences for day-to-day business: your bank account cookies, your social network (Facebook, MySpace, etc.) cookies, cookies that enable that quick weather forecast on your desktop--some of them are fine. Others are not so fine, and you don't want them hanging around. Anti Tracks allows you to make those choices easily and quickly. With Anti Tracks' Cookies Manager, you can easily keep the cookies you want, erase the ones you don't


Home Page Protection
Malicious websites can't get at your Internet Explorer home page with Anti Tracks. With Anti Tracks' IE Home Page Protector, your browser settings and home page address are protected from modification or tampering by malicious websites or phishing pirates that try to get control of your browser without your knowledge or permission


Managing Windows Startup
Too many applications opening up automatically whenever you start your Windows? Use Anti Tracks' Startup Manager to remove that extra clutter. Works easily with your Start menu to streamline startup and get you working faster!


Password Protection
It goes without saying that software that protects you from unauthorized users, pirates, hackers, and prying eyes will, of course, use the best password protection. With this extra level of safety, no one can ever access or change any of your settings or information; your Anti Tracks settings are secure


Detailed Reporting
Anti Tracks users know they don't have to rely on their memory to recall which files were deleted or changed during a cleaning process...or worry that something important was inadvertently erased from their computers. Anti Tracks' Detailed Reporting feature enables you to optionally log track-erasing operations. You'll be able to see, quickly and easily, which files were erased when erasing your browsers, Windows usage tracks, or third-party applications tracks


Home Page - http://www.giantmatrix.com/


Download links:



Classroom Spy Professional Edition 3.4.2

Classroom Spy Professional Edition 3.4.2


Classroom Spy Professional Edition 3.4.2

Classroom Spy Professional Edition 3.4.2 | 11.02 Mb

It is hard to teach a group of people how to use a PC, or even how to use a specific program on a PC or the internet. Yes, PC or web training isn't easy. For someone who's doing something right, there are probably two others doing it wrong, playing games, checking email, shopping...
Classroom Spy lets you see what everyone's doing - without leaving your desk. You can monitor the activity of all the PCs in your classroom remotely. Plus, you can share your screen with your students' PCs, making demos and presentations much easier.

Top Features :


What is it useful for? 



  • For monitoring and recording your students activities on a remote computers 
  • For preventing internet browsing on remote computers 
  • For starting and stopping applications and processes on remote computers. 
  • For monitoring students in the classroom to achieve better discipline or, just to assist them when they are in trouble (by using the remote control feature). 
  • For administrating all computers just from one location – your computer. 
  • For presenting your screen to students. 
  • For locking students computers while they are waiting for further instructions or assignments. 
  • Helping your students by showing your desktop to them. 
  • Turning off, restarting, .... remote computers with one click. 


What are the major benefits of using Classroom Spy Professional?



  • Installation and use of the application is very easy since all of the functions can be accessed with a few mouse clicks. 
  • You have complete control over what remote users are doing. 
  • This application provides you with a live picture of the remote computer screens. The live screen (due to some optimizations) does not use a high bandwidth, but even when the lower network bandwidth is required the refresh interval can be enlarged using one mouse click. 
  • You can make the presentation by showing your live screen to students 
  • Application allows you to take over the remote computer by controlling its mouse and keyboard. 
  • The remote computersґ screens are represented in the table with a customizable number of rows as thumbnails. 
  • Using this application, you can always see which user is actually logged on to the remote computer. 
  • Schedule remote computers desktop recording to AVI files 
  • Execute several actions on all remote computers with on click 
  • Block internet access 

Main Features:
  • Displaying a live picture of a remote computer. 
  • You can take control of a remote computer by controlling its mouse and keyboard. 
  • More remote screens can be displayed in a table. 
  • Computers can be organized in computer groups (e.g. classrooms) 
  • A remote screen can be zoomed to an actual size. 
  • The name of the connected user is displayed. 
  • Record remote computers screens to AVI files. 
  • Show your desktop to students 
  • Power off, restart, hibernate, suspend remote computers 
  • Log off desktop users 
  • Lock workstation 
  • Control screensaver 
  • Block internet 
  • Multi monitor support 
  • Control over running processes 
  • You can lock selected remote computers 
  • You can display a message on selected remote computers. 
  • When lower bandwidth is required, the refresh interval can be enlarged. 
  • Automatic connection to a remote computer is optional. 
  • Settings for the agent are encrypted and password protected. 
  • Connection to a remote computer is password protected. 
  • Access to monitoring the console is password protected. If more users use the same computer, different profiles and access passwords can be set. 
  • More monitoring consoles can be connected to the same remote computer - you can monitor your students from different locations. 
  • Application can optionally use encrypted communication. 
  • Agent can be remotely installed. 
  • Fast users switching is supported.

Home page - http://www.classroomspy.com/




Download links:



Wednesday, May 5, 2010
Craagle V3.0 Final - Cracks - Keygen Search Engine

Craagle V3.0 Final - Cracks - Keygen Search Engine


  • Craagle V3.0 Final (25.04.2010)





    Craagle V3.0 Final | 6.27 Mb



    Craagle 3.0 Final - Now you can search every sort of cracks, serials and covers,without falling into crap like toolbars, popups, spyware, adware, malware.

    Crack Sites Supported :
    Cracks.Am, KeyGen.Us, AllCracks.Net, Andr.Net, Crack.Ms,Crackz.Ws, CrackArchive.Com, CrackDb.Com, CrackzPlanet.Com,CrackWay.Com, MsCracks.Com, CrackPortal.Com, TheCracks.Us,KeyGen.Ru

    Serial Sites Supported :
    Seriall.Com, FreeSerials.Com, SerialSite.Com, Serials.Ws, Andr.Net, SerialKey.Net, SerialArchive.Com, CrackzPlanet.Com,MsCracks.Com, CrackPortal.Com, KeyGen.Name, TheKeys.Ws,FreeSerials.Ws, FreeSerials.Spb.Ru, Serial.220volt.Info,SerialCodes.Net

    Cover Site Supported :
    CoverTarget.Com, CoverAll.Come.To, CoverIsland.Com

    You can also use a proxy to bypass Day Limit for some sites.

    Exhibitor Information:
    *Updated database of sites with ??????? and seriynikami.


    System requirements:

    *Pentium II 300 or higher

    *Windows XP / Vista

    *RAM 16 Mb

    *10 Mb of free space on HDD
Designed by Hackingloops.