Posts

HIDE DATA IN PICTURE

Image
HIDE DATA IN PICTURE Hello friends, Today in this post I'll tell you how can you hide your data in a picture. This is an easy technique to secure your data from misuse. Everyone wish to place there sensitive data in a secure manner, so there is an alternative to hide your data in a picture without uploading any additional software in your system, before explaining I'll introduce you with this technique this is called Stegnography. What is Stegnography ? Stegnography is defined as the art of hiding information, data or messages in an image. Even the different file formats can be used for the purpose of hiding the information like for example the video or audio etc. The purpose is to pass on the information with out any regard or knowledge of others safely to the destination. The advantage of stegnography is that those who are outside the party even do not realize that some sort of communication is being done.   Follow these steps to hide data in picture : Copy your data

SHUTDOWN YOUR SYSYRTEM WITH TIMER

Image
SHUTDOWN YOUR SYSYRTEM WITH TIMER Today in this post I'll tell you how can you TURN OFF your system with timer of 60sec. Some time we wish to shutdown system automatically but after some time, so there is an easy method to do this without installing any additional software or no need to make any batch file for this, windows inbuilt file is used in this method to perfome this operation. This operation is done by a system file name tsshutdn.exe.  What is tsshutdn.exe doing on computer? tsshutdn.exe is a process associated with Microsoft® Windows® Operating System from Microsoft Corporation. Non-system processes like tsshutdn.exe originate from software you installed on your system. As most applications store data in your system's registry, it is likely that your registry has suffered fragmentation and accumulated harmful errors.    To shutdown system with timer Step1.  Open My Computer > c: drive > windows > system32 Step2.  Find    tsshutdn.exe  file, Right click

TRACING E-MAIL

Image
TRACING E-MAIL Hello friends today in my article I'll tell you how can you you trace your e-Mail's on Internet but before starting i Just want to ask something from you.... Are you receiving abusive e-mails from unknown people? Are you being blackmailed or threatened through e-mail? Are your children receiving e-mails filled with adult contents? Now you can solve all these questions with little understanding of E-MAIL tracing. Most modern day Internet user uses standard e-mail clients like Opera, Microsoft outlook, Outlook Express etc to send or receive e-mail messaging on the Internet. It is extremely important for Internet users to understand how e-mail travel on the Internet. All e-mails communications on the Internet is governed by rules or regulation, which is sub divided into two different protocols: SMTP (SIMPLE MAIL TRANSFER PROTOCOL)  (Port 25) POP (POST OFFICE PROTOCOL) (Port 110) The SMTP protocol is used to send e-mails, while POP protocol is used t

HOW TO HACK WINDOWS ADMINISTRATOR PASSWORD

Image
HOW TO HACK WINDOWS ADMINISTRATOR PASSWORD Hello friends today in my article I'll tell you how can you hack admin password manually. This hack don’t need any software or live cd. This hack can be performed manually. This is one of the best and unrevealed truth of hacking, We always find number of software to hack admin password of any system but the main problem these software are not working properly some time, if you want to hack ADMINISTRATOR password  follow these steps. NOTE  : Backup your files which we are going to use here. Follow these steps to hack  ADMINISTRATOR  password  Go to  C:/windows/system32   Copy cmd.exe and paste it on desktop Rename  cmd.exe  to  sethc.exe Copy the new  sethc.exe to system 32 ,when windows asks for overwriting the file,then click yes. Now Log out from your account and at the login screen,press  shift key 5 times. You will get command prompt. Now type "  NET USER ADMINISTRATOR *  "    Type password

HOW TO RESTRICT LOGIN HOUR

Image
HOW TO RESTRICT LOGIN HOUR Today in this post I'll tell you how can you restrict the log in hours of  users. If your system is used by multiple users or if you want restrict the log in hours of each user then this post is for you to fix it. This is a simple hack which  allow you to restrict user for specific time and disallow user to access system without permission. Follow these simple steps :  Click on Start Button, then Run. Type CMD.(It will open command prompt) Type NET USER. Multiple user displayed on screens. Select user, which you want to restrict log in hours. Lets us example with USER : JACK, SCOTT, BILL, these are three user accounts in a system. type 1 - net user JACK /times :M-S,08:00-17:00 2 - net user SCOTT /times :M-S,8am-5pm 3 - net user BILL /times :all (this one means this user can always log on at any time)   Note :You can only restrict when a user can log on to the system. On a stand by computer, there is no way to force a user to log off when th

INTRODUCTION TO TROJAN

Image
INTRODUCTION TO TROJAN What is a Trojan? A Trojan horse could be either: a) Unauthorized instructions contained within a legitimate program. These instructions perform functions unknown to (and probably unwanted by) the user. b) A legitimate program that has been altered by the placement of unauthorized instructions within it. These  instructions perform functions unknown to (and probably unwanted by) the user. c) Any program that appears to perform a desirable and necessary function but that (because of unauthorized instructions within it) performs functions unknown to (and probably unwanted by) the user.  Under a restricted environment (a restricted Unix shell or a restricted Windows computer), malicious Trojans can't do much, since they are restricted in their actions. But on a home PC, Trojans can be lethal and quite destructive.  Remote Administration Trojans These Trojans are the most popular Trojans now. Everyone wants to have them Trojan because they let you have acc

HOW TO TRACE MOBILE NUMBER , IP ADDRESS , BULK SMS SENDER , LANDLINE NUMBER ???

Image
HOW TO TRACE MOBILE NUMBER , IP ADDRESS , BULK SMS SENDER , LANDLINE NUMBER ??? Today in this post I'll tell you how can you trace   Mobile numbers, Bulk SMS sender, Pin code, Vehicle number Land  line number etc. Many of people always waste lots of time to find all these information on Internet but its worthless and time consuming,  Your Solution is  INDIA TRACE, it is a   fantastic & All in one website to trace all your needs within few seconds.    http://www.indiatrace.com/