Posts

Showing posts from 2010

How to Reset BIOS password

Image
Bios password are used to secure your desktop and latop computer by preventing user from changing your bios setting or acessing to your computer while u are away.there is too type of password protection  the first one is bios setup protection:to prevent user from changing bios setting thesecond one  system proetction:to make the system unbootable intel entring the password. but sometime user can forget their password or even wrose they can get infected by bios Backdoor verus.so sending back the unit for reset bios is expensive here is some why how to recover or remove u lost bios password

Emotion for Facebook, Hidden Shortcut Keys

Image
How to use Emoticons in Twitter and Facebook Status? Its been quite a while that I used Orkut now a days. From Orkut I remember how people used to use some Ascii emotions in their profile, nicknames and later in their status message. So I just tried it over facebook and twitter and it worked there too. In addition to text-based IM, Facebook Chat's simple, embedded IM client also offers users a library of cute emoticons to help share your emotions. There are some special UTF compatible characters that can be used on a website just like a text. To create any of these emoticons, locate the symbols on your keyboard and enter them in the text field of your Facebook Chat IM window.

How to Change Windows Welcome (Login) Screen

Image
Seeing the same old blue screen each time you login to Windows XP can get quite boring for you with passing time. Probably the best way to get rid of this blue screen is to use the direct login feature and not see the welcome screen at all but for multi user computers the welcome screen acts as a login portal and you can not disable it whatsoever. However there is a simple trick to change the welcome screen which I will be teaching you.

How Long Has Your System Been Running?

Image
Here's how you verify system uptime: Click Start | Run and type cmd to open a command prompt. At the prompt, type systeminfo Scroll down the list of information to the line that says System Up Time. This will tell you in days, hours, minutes and seconds how long the system has been up. Note that this command only works in XP Pro, not in XP Home. You can, however, type net statistics workstation at the prompt in Home. The first line will tell you the day and time that the system came online.

How to hack using USB Pendrive

Image
Have you ever thought that a Simple USB Drive can be used as a Destructive Tool for Hacking Passwords? I found in the internet how to use pendrive for steal password. I would like to share with you. But remember, you are playing with fire if you start messing round with this stuff, you could mess up your own computer, you could be arrested if you do something illegal with any of this stuff, so its' your choice. This is a relatively new lot of exe files along similar lines to USB Switchblade, not sure who should get credit for this as they are arguing over it on hackforums.net, so let the credit go to them all.

Javascript Tricks!

Image
Note: These codes are entirely legal and I cannot be held responsible for any illegal actions used with these codes! JavaScript is a simple programming languageused to make web pages more interactive. Once known as LiveScript,JavaScript's name was changed as part of a marketing deal betweenNetscape and Sun. People talk about Java and JavaScript as if they were interchangeable, but they are completely different things. You do not need a Java runtime environmentin order to use a JavaScript-enabled web page.  

Privacy and removal tips (Spyware, adware, and internet cookies)

Image
What is spyware? What is adware? Spyware is simply a program (or multiple programs) that run on your pc and spy on your activities,most often displaying you advertisements based on your activities. This is also known as adware. Many timesyou will see popups, or ads on webpages that are really only displayed to you because you have been browsingthese types of items and they are now displaying ads related to this. Many ads are just random ads alsofrom the adware, as you may think a site is full of popups or that a site is slow loading, but its really justyour pc and all the spyware and adware programs running on it.

Cara untuk Enable Regedit

Image
Many times when working on a computer that has been infected with a virus, trojan, or piece of spyware I find myself with my most important command, Regedit, the Windows Registry Editor being disabled. Virus creators like to disable the Registry Editor so it makes solving the problem and removing the issue difficult. Sometimes administrators in IT departments may place restrictions on using the regedit command to keep employees from changes things on company computers, but viruses and other issues may also try to disable it. Listed below you will find the different ways to enable regedit, the Registry Editor.

Cara buang file "undeletable"

Buka Window Command Prompt. Padam semua program kecuali Command Prompt. Klik Start => Run dan taip TASKMGR.EXE Pergi ke  Processes tab dan End Process pada  Explorer.exe. Biar Task Manager terbuka. Kembali ke Command Prompt window dan tukar  directory the AVI (or atau fail yang yang tidak dapat dibuang). Pada  command prompt taip DEL xxxx (fail yang ingin dibuang). Kembali ke Task Manager, klik fail, New Task dan enter EXPLORER.EXE untuk restart GUI shell. tutup Task Manager.

Bermain dengan JavaScript (Deface Mode OFF)

Image
1. Buka mana-mana website. i.e ------> http://www.marine.gov.my/ Ini hanya untuk pembelajaran sahaja

Encrypt-Decrypt menggunakan Capicom Pada Visual Basic 6.0

Kepada semua pembaca, saya akan berkongsi tentang ecrypt & decrypt menggunakan Capicom. Sebelum kita memulakan bahagian coding, say akan menerangkan apakah ia Capicom. Capicom adalah ActiveX control yang dibuat oleh Microsoft untuk membantu mengetahui fungsi set yang telah dipilih dari Microsoft Cryptographic Application Programming Interface (CryptoAPI) melalui Microsoft Component Object Model (COM). Ia untuk enable semua persekitaran yang boleh support ActiveX untuk guna Microsoft Cryptographic technologies, ia termasuklah web pages yang dibuka dengan Microsoft Internet Explorer atau dari web browser yang menygokong ActiveX.

Penutupan Google di China?

Image
Mundurnya Google dari China menunjukkan dahsyatnya komuniti hacker di negara tersebut Xiao Tian, pemimpin kelompok hacker bagi wanita (baidu.com) Google baru-baru ini menyatakan akan mengundurkan diri dari China dan menutup seluruh operasinya di sana. Alasannya, sudah tidak tahan dengan gelombang serangan yang dilancarkan para hacker asal negera tersebut.

WebSite Malaysia Kena Hack???

Image
KE MANA PERGINYA WEBMASTER KERAJAAN ????? Apa dah jadi? dah bermacam site kena deface..hack! Kejam ke mereka ni? entah..tak tahulah.. agak2 korang ? Cuba klik pada gambar tu.. korang akan dapat paparan yang jelas. Mesti ramai pemegang CEH  “Certified Ethical Hacker” Website: Laman Web Politeknik URL: http://www.politeknik.edu.my/index.asp Website: Masjid AnNur - Kotaraya URL: http://www.masjidannur.com.my/Default.php Website: OROGENIC Group of Companies - Capable Reliable Global URL: http://orogenicgroup.com/ Website: OROGENIC Group of Companies - Capable Reliable Global URL: http://orogenic.com.my/   Website: Kedai Rakyat ® - Tempat Rakyat Berjual Beli URL: http://www.kedairakyat.com/08/.~/ Website: andamanseripengantin.com URL: http://andamansetipengantin.com Website: KLSE URL: http://klse.info/.~x/ Website: kedah.edu.my - Laman Utama URL: http://www.kedah.edu.my/ Website: Portal Rasmi Sektor Pengurusan Maklumat Dan ICT - Laman Utama URL: http://ict.kedah.edu.my/ Website: http

Cara menghilangkan Virus Trojan:VBS/Agent.T (Powerpoint STIKOM Bali)

Virus ini membolehkan autorun pada usb flash, ciri-cirinya: * Autorun.inf * Sexy_bo.vbs (PowerPoint icon) * Permainan_ketangkasan.vbs (PowerPoint icon) * Skripsi.vbs (PowerPoint icon) * Stikom_Bali.vbs (PowerPoint icon) * C:\Documents and Settings \%user%\Application Data\svchost.vbs * C:\Documents and Settings \%user%\Desktop\STIKOM BALI.vbs * C:\Documents and Settings \%user%\Favorites\svchost.lnk

Cara menghilangkan Virus Hokage

Hokage ketua kepada Konoha ninja pada cerita kartun Naruto. Mungkin pembuat virus ini meminati cerita naruto. Ciri-ciri yang paling mudah untuk dikenalpasti adalah menukarkan ikon flash dan fail winamp dengan .exe. Virus ini membuat fail utama adalah:

Cara menghilangkan Virus Fujack

Virus ini menjangkiti fail aplikasi dengan  xxx.exe dan mengguna ikon carian. Ini akan menambah fail virus exe kepada 10.960 bytes dan ia mempunyai kebolehan untuk update dengan sendiri menggunakan internet. Ciri-ciri virus ini adalah:

Cara menghilangkan Virus Sohanad

Virus ini berasal dari vietnam, penyebaran menggunakan yahoo messenger. Selain itu, virus ini tersebar melalui  flashdisk dengan file autorun.inf dan new folder.exe . Ciri-ciri virus adalah:

Cara Menambah Kelajuan Windows XP

Image
Kita boleh menambah kelajuan Windows XP dengan memperbaiki registry di windows XP . Sebagai langkah berjaga-jaga, copy registry dari folder ke mana-mana folder windows. Buka " run " command, tulis " regedit " dan tekan enter. Selepas membuka registry, cari : \HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters. Pilih parameter " EnablePrefetcher " dan klik kanan. Kemudian pilih  ' Modify ' . Tukar nilai data dari 3 to 5 dan Restart komputer untuk melihat efek.

IN-TEAM (English Version)

Image
                                                                                                 Select Language English Melayu Entering millennium era, in year 2000, the group which formed on mutual interest embarks a new phase in local nasyeed industry. Inteam made a massive impact!! No more underground!! Inteam has illuminates their destiny to be one of the best nasyeed group in . In short period, Inteam became well-known and paves their way ahead into nasyeed scenes. Besides being prominent figures, they kept low profile with down to earth characteristics whilst uphold their original concept - nasyeed is one means of conveying Tauhidic message and Islamic propagation.        Flash back : Inteam originally founded before millennium where Hazamin, Syahril, Suhaimie & Hisyam were studying at IIUM Matriculation Center , Petaling Jaya, which traced back in Januari 1998. In d

Guns N' Roses

Image
At a time when pop was dominated by dance music and pop-metal, Guns N' Roses brought raw, ugly rock & roll crashing back into the charts. They were not nice boys; nice boys don't play rock & roll. They were ugly, misogynist, and violent; they were also funny, vulnerable, and occasionally sensitive, as their breakthrough hit, "Sweet Child O' Mine," showed. While Slash and Izzy Stradlin ferociously spit out dueling guitar riffs worthy of Aerosmith or the Stones, Axl Rose screeched out his tales of sex, drugs, and apathy in the big city. Meanwhile, bassist Duff McKagan and drummer Steven Adler were a limber rhythm section who kept the music loose and powerful. Guns N' Roses' music was basic and gritty, with a solid hard, bluesy base; they were dark, sleazy, dirty, and honest -- everything that good hard rock and heavy metal should be. There was something refreshing about a band who could provoke everything from devotion to hatred, especia

Windows XP Run Commands and Shortcuts

Click Start, Click Run and enter the command Click OK Run commands * Calc : Calculator * Cfgwiz32 : ISDN Configuration Wizard * Charmap : Character Map * Chkdisk : Repair damaged files * Cleanmgr : Cleans up hard drives * Clipbrd : Windows Clipboard viewer * Cmd : Opens a new Command Window (cmd.exe) * Control : Displays Control Panel * Dcomcnfg : DCOM user security * Debug : Assembly language programming tool * Defrag : Defragmentation tool * Drwatson : Records programs crash & snapshots * Dxdiag : DirectX Diagnostic Utility * Explorer : Windows Explorer * Fontview : Graphical font viewer * Ftp : ftp.exe program * Hostname : Returns Computer's name * Ipconfig : Displays IP configuration for all network adapters * Jview : Microsoft Command-line Loader for Java classes * MMC : Microsoft Management Console * Msconfig : Configuration to edit startup files * Msinfo32 : Microsoft System Information Utility * Nbtstat : Displays stats and current connections using NetBios over TCP/I

Richard Marx

Image
For over 20 years, Richard Marx has consistently and powerfully made his mark on the music industry. His debut single “Don’t Mean Nothing” and self-titled debut album kicked off his career as a solo artist in 1987 and went on to sell 3 million copies. His 1989 follow-up CD, “Repeat Offender,” became even more successful, selling over 7 million copies worldwide. From 1987 to 1990, he became the first male solo artist in history to have his first 7 singles reach the top 5 on Billboard’s singles chart, including the 1 hits “Hold On to the Nights,” “Satisfied” and the worldwide classic, “Right Here Waiting.” This feat remains unchallenged. He was nominated for Grammy awards 3 times and received an American Music Award nomination for favorite male singer. In 1992, he was awarded Best Selling Adult Contemporary Artist at the Billboard Music awards, and received the International Song of the Year Award at the Australian Music awards for his song, “Hazard,” from his double platin