Tuesday, 28 May 2013

Chat with friends using CMD

Well as the name suggests, using this trick you can chat with your friends using CMD.

1.Open notepad and paste the following code:
 
    echo off
    :start
    cls
    echo MESSENGER
    set /p n=User:
    set /p m=Message:
    net send %n% %m%
    pause
    goto start

2. Save this as chat.bat
3. Now open this file.
4. You will see something like this.

5. Now type the IP address of the person you want to chat with in front of 'User'. Hit enter
6. Now you are ready. Start chatting!!!


         

Wednesday, 22 May 2013

Password Cracking


In this post I am going to tell you how passwords are cracked using softwares.
Password cracking softwares use the hit-and-trial method. These softwares use every key combination available and try out that password. Although this takes a very long time this is very effective. This is why it is recommended to use both upper and lower case in your password as these passwords can be rarely cracked using these softwares.

It is also recommended not to use personal details like name, mobile numbers, birth dates etc. as passwords as these can be easily cracked and sometimes without using password cracking softwares.



Thursday, 16 May 2013

How to create an excellent password

 



Now a days ids with simple passwords can be hacked very easily. So to keep your ids secure you should have a very good password that cannot be cracked easily.
These are a few steps to create an excellent password:

1.Try to use both letters and numbers.                                                                                                    These type of passwords can be cracked but not easily. For example kooltrix007
2.Use both upper and lower case                                                                                                     These passwords are the most difficult to crack as they have both upper and lower case. For example    
KoOLTriX007
3.Don't use your name or mobile number as password                                                                       This is a very common thing among people. They keep their name or number as their passwords. These ids 
  can easily be cracked especially by close people. Instead you can use dates as your passwords, such as  
  your birth date or any other important date.
P.S: Don't create such a password that even you forget it!! :P

Python Program for Calculating Area Of Triangle



I have just started learning this new programming language called Python, and this is my first program.
This program calculates the area of a triangle.
You can download the software from here.
The code is as follows:


p=input ('Enter height of triangle(in cm)')
h=input ('Enter base of triangle(in cm)')
area=(p*h)/2
print ('area of triangle='),area,('sq.cm')


Copy this in Notepad and save it as area.py.
Now it is ready.



Saturday, 11 May 2013

Rookits


Once a malicious program is installed on a system, it is essential that it stay concealed, to avoid detection. Techniques known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read.

Hide the items in a folder!!

Well...., using this trick you can hide the items in a folder.
Related: LOCK FOLDER WITHOUT ANY SOFTWARE

1.First, go to the start menu and type 'cmd' and open it.


2.Then type 'cd..' and press enter key till only C:\ is left.

3.Now type 'cd' and the folder's path in front of it.
Ex. if the folder (KOOLTRIX) is on the desktop the the path would be Users\Admin\Desktop\KOOLTRIX
4.Hit enter.

5.Now type 'attrib +R +S +H' in front of it.
6.Hit enter now anything in your folder will be hidden.

7.To bring back the items follow the same procedure above, but instead of +R +S +H you have to use           -R -S -H
This trick has a few disadvantages. Every time you put anything in this folder you will have to follow this procedure and you cannot hide any subfolders using this trick.

Saturday, 4 May 2013

Worms

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.


See also: