Latest Notepad Tricks 2016

Posted by Unknown On Thursday, 21 January 2016 0 comments
By these Latest Notepad Tricks 2015  you will be having great fun. You just need is to copy the code from here and paste in the notepad and save it with extension .bat . 
NOTEPAD


1 Notepad trick to Test Antivirus :-

By using these trick you can easily test your antivirus working perfectly or not.
X5O!P%@AP[4PZX54(P^) 7CC)7}$EICAR-STANDARD- ANTIVIRUS-TEST-FILE!$H+H*
save it as test.exe and run the file and check if your antivirus detects it then your antivirus working perfectly otherwise change your antivirus.

2 Make A Personal Log-Book or A Diary :-

Copy the below code and paste it in notepad and save it as “log.txt”.
.LOG
Now every time you open this log file you will have all the log details with date and time.

3 Constantly Repeat Any Messages :- 

This is one of the Latest Notepad tricks that will repeat any of messages on computer screen repeatedly.Just copy the below code and paste in the notepad and save it as “message.bat”.
@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN


4 Continually pop out CD Drive Using Notepad :- 

This is my favorite trick as this trick continually pop out the cd drive whenever you try to close it. Just copy the below code and paste in the notepad and save it as “cd.vbs”.
Set oWMP = CreateObject(“WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000

6 Notepad Trick to type slowly

This trick will let you to type slowly on the screen and to do so just copy the below code and save it with “anyname.vbs” name.


WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject (“WScript.Shell”)
WshShell.Run “notepad”
WScript.Sleep 100
WshShell.AppActivate Notepad“”
WScript.Sleep 500
WshShell.SendKeys “Hel”
WScript.Sleep 500
WshShell.SendKeys “lo ”
WScript.Sleep 500
WshShell.SendKeys “, ho”
WScript.Sleep 500
WshShell.SendKeys “w a”
WScript.Sleep 500
WshShell.SendKeys “re ”
WScript.Sleep 500
WshShell.SendKeys “you”
WScript.Sleep 500
WshShell.SendKeys “? ”
WScript.Sleep 500
WshShell.SendKeys “I a”
WScript.Sleep 500
WshShell.SendKeys “m g”
WScript.Sleep 500
WshShell.SendKeys “ood”
WScript.Sleep 500
WshShell.SendKeys ” th”
WScript.Sleep 500
WshShell.SendKeys “ank”
WScript.Sleep 500 
WshShell.SendKeys “s! “ 
 So above are the Latest Notepad Tricks. By using these notepad tricks you can easily prank with your friends and have lots of fun with them and have a great experience with the notepad. 
READ MORE

Track Your Facebook Login Location

Posted by Unknown On 2 comments

Steps To Track Facebook Login Location Of Your Account

  1. First of all login in your facebook account in browser of your computer system.
  2. Now click on the arrow sign at the right side and a drop down menu will get open.
  3. Click on the settings option from there.
  4. Now click on security section at right menu there.
  5.  Now click on edit at the right of  Where You’re Logged in.
  6. Now there you will see all the location of your previous login and you can easily check that the login location is your or not. And you will check if you was there are not and if not then you
By using these method you can make sure that your facebook account is not getting access by any other unauthorized person and by which you can ensure your account security
READ MORE

Commands That Every Windows User Should Know

Posted by Unknown On 1 comments
commands That Every Windows User Should Know 2015


When you enter “services.msc” and press the Enter button, it will open up the Windows Services app where you can easily start, stop and configure other settings for each and every service individually. It’s quite helpful when you want to toggle a service.
run-commands-services
Entering “mstsc” into the Run dialog box opens the Remote Desktop Connection app which allows you to connect to another Windows computer over the local network or through the Internet. This helps you to use the host computer as if your own.
run-commands-remote-connection

If you want to quickly get your system information, then the “msinfo32″ command is the way to go. At a glance, it will display all the system details including the hardware resources and software environment.
run-commands-sys-info
This command opens the Backup and Restore window which allows you to quickly set a backup schedule or restore any of your previous backups.
The Computer Management app is where you can access almost all the advanced Windows modules like Event Viewer, Shared Folder, System Tools, etc.
run-commands-computer-management
This command allows you to open the Windows Disk Cleanup utility. Once opened, simply select the drive your want to clean up and click on the “Ok” button.
run-commands-disk-cleanup
Windows Event Viewer is where Windows stores all the monitoring and troubleshooting messages. You can use this command to quickly access the Event Viewer application.
Every Windows user knows a thing or two about the Windows Control Panel, and using this command, you can quickly access the Control Panel with some stumbling around.
Microsoft Management Console (MMC) is an advanced Windows module which is mainly aimed at system administrators and power users as it sports all the tools required for configuring and monitoring a Windows system.
Whenever you want to check how your system resources are being utilized, simply use this run command, and it displays everything from your CPU to Dist to Network.
run-commands-resource-monitor
Want to quickly change your screen resolution? Simply enter this command in the Run dialog box and you are good to go.
Snipping tool is a very useful tool if you want to take quick snapshots. This lightweight tool even comes with its own basic image editor so that you can make necessary modifications to the snapshot.
Access the Windows Task Manager by right-clicking on the taskbar and selecting the option “Task Manager.” But another quick way is to type this command in the Run Dialog box.
Mouse properties are generally buried deep inside the Windows Control Panel, but you can easily access the same using this Run command.
run-commands-mouse
Problem Steps Recorder (PSR) is a great utility to record and show a certain problem in Windows. Just use this simple command to access the tool.
run-commands-psr
If you’ve installed Chrome or Firefox, you can easily launch those programs by entering these commands. Of course, you can launch any registered Windows program this way (ex: notepad).
Using this simple Run command, you can access the Windows Action Center without stumbling around or messing with the Windows Control Panel.
That’s all for now, and hopefully that helps. Do comment below sharing or discussing your favorite Windows Run commands.
READ MORE

Hijacking WhatsApp Account in a Seconds 2015

Posted by Unknown On 0 comments
This trick lets anyone surrounds you to get effectively control over your WhatsApp account. The attacker needs nothing more than a phone number of the target person and access to the target mobile phone for a few seconds, even if it is locked.
211634106_WhatsAppSniffer


Hacking Whatsapp account in such scenario is not hard for your friends and colleagues.

Here’s How to Hijack someone else’s WhatsApp Account?


Only For Educatioal Purpose

Below are the clear steps to hack the WhatsApp account on any Smartphones:
  • Begin by setting up a WhatsApp account on a new mobile phone using the phone number of your target.
  • During the setup process, WhatsApp will call the target’s phone number and will provide a PIN that needs to be entered for the authentication of the account.
  • If you already have access to the victim’s phone, you can just answer the phone call and grab the code with no efforts. Even if the victim has a lock screen enabled on the phone, you can receive the phone call to get the secret PIN.

Using this known and simple trick your colleagues can hijack your WhatsApp Account easily.

The worst case is with iPhones:


Things get even worse on iPhone if the users have configured their iPhones with Siri authentication for the lock screen, because all the contact details are available to access the Siri’s settings, effectively giving everyone access to their phone number without the need for a PIN.

Thus, if you try to steal the account information of WhatsApp, without even having the phone number of the target user, you can just call your number from target’s phone using Siri.
READ MORE

How to Hack AppLock in Android

Posted by Unknown On Wednesday, 20 January 2016 3 comments
No need to uninstall the app or no root is required. well! let us see how to bypass AppLock android app without knowing password.
applock


Note: This trick will not work if the settings is locked by the admin.
To hack AppLock just follow these simple steps.
1. Take the target phone in which you want to hack AppLock.
2. Now go to settings and then tap on Apps or Applications.
3. You will see AppLock app under downloaded section and tap on it.


4. After that tap on Force stop option.
With this AppLock application is currently in idle state. You can open locked apps with out entering password.

I hope you’ve have understood How to bypass AppLock application in android devices. If you have any doubts, comment below in the comment section and feel free to share this trick with others. 
Enjoy !!
READ MORE

Biggest Hacker In The World

Posted by Unknown On 0 comments

Biggest Hacker In The World

Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files. All the efforts to satisfy his curiosity, but, alas, curiosity killed the cat. It was soon found that McKinnon was guilty of having hacked the military and NASA websites from his girlfriend’s aunt’s house in London. While entering and deleting the files from these websites wasn’t enough, McKinnon thought of shaming the security forces by putting out a notice on the website that said, “Your security is crap.” Well, looks like McKinnon was something, if he could shut down the US Military’s Washington Network of about 2000 computers for 24 hours, making the hack, the biggest military computer hack of all time!



11406572_935328909839908_2071147367517139501_n
READ MORE

How To Change Windows password wihout knowing current password

Posted by Unknown On 0 comments
Hello guys, you know that User and Administrator password in widows are protecting your computer from any unauthorized access. So that chooses a strong password and safe your computer or system files from unauthorized access. But  if you forget your windows login password, or  want to change your password without knowing current or old password ,then don’t worry , In this we are telling about  to  change windows login password with a some simple method, which you can do easily perform.  
Change-windows-password-without-knowing-current-password1

Method -1 

Step-1  Select “My computer” and press Right click on it and chose a “Manage” options. or Press Windows+R Key and type compmgmt.msc in Run Box and hit enter.

Step-2 "Computer Management windows" will open, and Select System Tools from Right window pane and after that Go to "Local Users and Groups" and double click on it.

Step-3 Now Click on "Users" and you will see all the login accounts of  your computer. And after that select your account.

Step-4 After selecting your login Account press Right Click on it. And then choose "Set Password" option.After that one pop-up box will open and click on "Proceed".

Step-5 Enter the New Password and conform them, then click on "OK" Button.

Step-6 Now your login Password has been successfully changed .you can restart your system and check with your new password. 

Method -2

Change password with "Command Prompt"

Step-1 Firstly go to windows start menu and type "cmd" in search box . Then select cmd and Run as Administrator.

Step-2  After that  type below command in cmd  

  net user %username% EthicalHackingTricks
         you can change "EthicalHackingTricks"  to with your choice password and after that hit enter.

Now your password have been successfully changed . and enjoy !!
READ MORE
In order to get into your email account, an attacker does not need any coding or technical skills. All an attacker needs your email address in question and your cell phone number.
hack-email-account



Here's How the Scam Works:


Send a text from an unknown number to the victim’s phone, asking them to verify their account by replying with the verification code they are about to receive in order to ensure their Google account is secure, but in real the code is a password resets code.
  • Send another text message containing an unlock code to the registered phone.
  • The victim receives the code with a text something like this: "This is Google. There has been unauthorized activity on your account. Please reply with your verification code.
  • As soon as victim responds with the verification code, the email address is forfeited, and the attacker can log into victim’s Gmail account without detection.
  • This social engineering trick sounds so easy and requires almost no technical skills to get into anyone’s email account.

    Most of us reply to the unknown phone calls and messages thinking it is from the company, as receiving messages and phone calls from companies is not something uncommon.

    Always be Defensive to such Scams


    Before watching the video, someone would have never thought of such a method to hack someone’s account.

    Of course, the untrained mind could easily fall victim to the text asking for a response. But, asSymantec says, "Legitimate messages from password recovery services will only tell you the verification code and will not ask you to respond in any way."

    The workaround is not to fall victim for such kinds of scams and always examine the messages you receive.
READ MORE

Malicious Gaming App Infects More than 1 Million Android Users 2015

Posted by Unknown On 0 comments

Hacking News Of 2015

 
android-malware-game
It's not at all surprising that the Google Play Store is surrounded by a number of malicious applications that may gain users' attention to fall victim for one, but this time it might be even worse than you thought.

Threat researchers from security firm ESET have discovered a malicious Facebook-Credentials-Stealing Trojan masquerading as an Android game that has been downloaded by more than a Million Android users.

Malicious Android Apps downloaded 50,000-1,000,000 times


The Android game, dubbed "Cowboy Adventure," and another malicious game, dubbed "Jump Chess" – downloaded up to 50,000 times, have since been removed from Google Play Store.
However, before taking them off from the app store, the creepy game apps may have compromised anunknown number of victims' Facebook credentials.

Both the games were created by the same software developer, Tinker Studio and both were used to gather social media credentials from unsuspecting users.

How Cowboy Adventure victimizes Android users?


Once installed, Cowboy Adventure produced a fake Facebook login window that prompted users to enter their Facebook usernames along with their passwords. A practice known as OAuth in which a 3rd party asks your Facebook login.

However, if users provide their credentials to Cowboy Adventure app, the malicious code within the game app allegedly sent their credentials to the attacker's server.
android-malware-game-app
Therefore, If you have downloaded Cowboy Adventure or Jump Chess, you should immediately change not alone your Facebook password, but any service that uses the same combination of username and password as your Facebook account.

ESET senior security researcher Robert Lipovsky believes that the app malicious behavior is not just a careless mistake of the game developer, but the developer is actually a criminal minded.

Take Away


A few basic tips that you should always keep in your mind are:
  • Always download apps from official sources, such as Google Play Store or Apple's App Store.
  • Read reviews from other users before downloading an app (Many users complained about "Cowboy Adventure" that the game locked them out of Facebook accounts).
  • Always use two-factor authentication on services that makes it harder for hackers to access your accounts with just your password.
  • Always keep a malware scanning software from trusted vendors like Avast, AVG, ESET, Kaspersky and Bitdefender, on your smartphone.
READ MORE