send money to world



03 May 2010

23 hidden windows apps

23 hidden windows apps To run any of these apps go to Start > Run and type the executable name: 1) Character Map = charmap.exe (very useful for finding unusual characters) 2) Disk Cleanup = cleanmgr.exe 3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard) 4) Dr Watson = drwtsn32.exe (Troubleshooting tool) 5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards) 6) Private character editor = eudcedit.exe (allows creation or modification of characters) 7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package) 8 Mcft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented). 9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic). 10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases) 11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files). 12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only ) 13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell). 14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant). 15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry). 16) Network shared folder wizard = shrpubw.exe (creates shared folders on network). 17) File siganture verification tool = sigverif.exe 18 Volume Contro = sndvol32.exe (I've included this for those people that lose it from the System Notification area). 19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ). 20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications). 21) Mcft Telnet Client = telnet.exe 22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented). 23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available). Note:- Some of them might not run in Windows XP Home edition

lock ur pc

lock ur pc.. open notepad copy and paste the script below and save it .VBS extention This wil create a shortcut.. run(click) it set WshShell = WScript.CreateObject("WScript.Shell") set oShellLink = WshShell.CreateShortcut(wshShell.SpecialFolders("D esktop") & "\LockWorkstation.lnk") oShellLink.TargetPath = "%windir%\system32\rundll32.exe" oShellLink.Arguments = "user32.dll,LockWorkStation" oShellLink.Save

paper hacking

1. You go to your computer and you find your hard disk is empty 2. You go to your computer and you find a file called "I was here" or similar. 3. You find on your web page another one 4. You find on your web page, which looks very familiar to you the phone number of the competior instead of yours. 5. You find that your password suddenly does not work 6. Your personal account does not allow you anymore to su, sudo 7. Everybody logging is member of the group 0, maybe they do not even need a password. You find also neew accounts, prefered as "shutup" (next to shutdown in the password file), somewhere a name like "toor" (which just tell you, that the hacker might come from a FreeBSD box). 8. You try to find out what is going on, by examin the log files, but they have only entries of the last minute. 9. You type ps -ax and you find a lots of people there. You kick them out, they are still here and delete the log files all the time. You turn off every service, but they are still there. You check the login binary and it has another length but still the same date/time. 10. Somebody tries to use talk to you and offered you to help you on your system, he even mention the price for this service, and emphesize that he has nothing to do with the case. You pull out the Router, the Ethernet cable, and make the only trust full action: format the harddisk and re-install the system. Almost all about happened to me in just 6 hours on 30th September 1997. The University in Estland, from where the hacker came, did not show any responisbility, even when you showed them the fragments of the logfile. Why?? because hacking is free, is not a crime, not covered by the law, .... What have I changed since then? 1. I look at each logfile very often 2. Installed tripwire 3. Installed modified shells, which log everything what root is doing extra in a hidden file, somewhere on the local harddisk, as well as on a extra machine, which is only for logging anymore. From there we save it to a one-time write able media. 4. No shells for anybody, except 2 people 5. Every service turned off that is not necessary 6. Upgraded to the newest version of software 7. subscribe to several security lists and study the messages carefully.