Monday, October 31, 2011

*** Edit PDF files directly - download pdfpen ***

Edit PDF files directly - download pdfpen





Pdf files are read only files and editing those is not an easy task. You have to covert it in some other form to edit. PDF is Portable Document Format which is a non editable document format.

If you want to edit PDF files and do not want to waste your time in converting this in some editable format and then edit and then convert to PDF, you need to download pdfpen which is a nice tool for pdf editing.

First of all, it lets you easily edit PDF files, which is great, when you have to frequently work with this type of files and you don't want to spend too much time with converting them all the time.

In addition to the fact that it lets you edit PDF files in different ways, PDFpen also provides you a lot of fancy features, such as Evernote integration or AppleScript support. Not to mention the fact that it uses the OCR technology beautifully.

Download Here:

http://mac.softpedia.com/progDownload/PDFpen-Download-981.html

Thursday, October 13, 2011

How to hack with Trojan | Prorat tutorial



How to hack with Trojan | Prorat tutorial


Prorat a famous trojan for hacking system, facebook, gmail, yahoo, twitter and other accounts. Today i wil show you step by step guide to hack with Prorat.


First of download Prorat from the given link
http://www.prorat.net/downloads.php


Then disable your antivirus. It is necessary other wise your downloaded trojan will be detected and deleted. Don't worry, it will not harm your system at this stage.


Now run Prorat.exe
You will see the prorat window. There are so many options but you have to create a server first. 


So click on create server.
There will be 3 options

  1. Create Prorat server
  2. Create Downloader Server
  3. Create Cgi Victim List & usage



now click on create prorat server


A new window will popup. which will have a lots of options in side bar.

  • Notifications
  • General settings
  • Bind with Files
  • Server extnsions
  • Server Icons



You have to use all options one by one to create a server.
Now in Notofication. Mark on Use Mail Notification and enter your email id. there will be a default id. Erase it and enter your. Then Test. It will send a testing mail to your email. Check your spam too.


Then Go to general settings and select all the options which you want to have in your trojan.


Then go to Bind with file and select file to bind your trojan with.
At last select your server extension and icon. Then click on Create server.
Now you have created a server.


Send this server file to the victim you want to hack, but before sending this file to victim make it FUD (Fully UnDetectable) with FUD cryptors. Search for this website for FUD articles. 
after creating server FUD, it is ready to send to the victim.


Send this file to the victim. If the victim will run the server in the system, Trojan server will send you the notification email with the IP address of the victim. Use this ip and run your prorat.


At the top there is an option for IP and port. Enter thr IP and port and click on connect.
wait to connect.
After getting connected to the victim's system.. you can use any of the options available on the prorat to hack the user's system

***Cryptography***

Cryptography

If you are familiar with hacking, you know the name of MD5 or Digital signature. These are parts of cryptography. I am writing this post because today i have my semester exam of cryptography, and i think as a hacker you must know about cryptography. Cryptography is a science and art of securing data by changing it in a coded form by some encoding method.
ex-

When Julius Caesar sent messages to his generals, he didn’t trust his messengers. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabet. Only someone who knew the “shift by 3” rule could decode his messages.



 this was an practical example of cryptography. This is also use in securing data on the network. Cryptography is the science of information security.



Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient.


Plain text: Message in it's original form 
Cipher Text: Encoded message
Key: a sequence of bit used in encryption and decryption
Encryption: Algorithm of encoding Plain text to cipher text using key.
Decryption: Algorithm of decoding Cipher text to Plain text using key.

A cryptographic algorithm works in combination with a keyr to encrypt the plaintext. The same plaintext encrypts to different ciphertext with different keys. The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key.

Types of Cryptography:

Symmetric key cryptography or Secret key Cryptography: In a symmetric cipher, both parties must use the same key for encryption and decryption.  This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems.


Asymmetric key cryptography or public key Cryptography: In an asymmetric cipher, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is shared publicly. The second key, the private key, should never be shared with anyone. When you send a message using asymmetric cryptography, you encrypt the message using the recipients public key. The recipient then decrypts the message using his private key. That is why the system is called asymmetric.

This was the simple introduction of cryptography. I will write more on various cryptographic algorithms and hash functions used in cryptography.

Hash algorithms:  Hash algorithms are based upon one way hash function.
y=f(x) is said to be one way if for every x it is easy to find y but for a given y it is computationally infeasible to get x.
Cryptographic hash function is a mathematical transformation that takes a message m of any length and produce a corresponding message digest (a number of fixed length) of fixed length.
for any two messages m1 and m2:
h(m1) != h(m2) NOT EQUAL

Friday, October 7, 2011

****Download Torrents using IDM****

•Go to Torrific.com
•Sign UP with your Email there and you will have a free access to that site.
•Just grab that torrent that you want to download with IDM or any of your installed download Accelerator
... ...
When you have selected the torrent that you want to download that is grabbed the torrent that you want to download with IDM or any of your installed Download Accelerator, reach to the last step where the option comes to download. Yes, come to that torrent’s page where the Download button Occurs. Right click on that download button and copy link location.

Create Download Torrents link for IDM
•Now you have the download link of that torrent. Now you have to copy/paste that download link on the torrific site.

•After pasting the link,click on GET.

•After clicking on GET, you will be redirected to a page saying initiate bittorent transmission.

Click that button and that torrent will start Caching and it will take time to complete caching. When this procedure gets over that means your torrent is ready to download, it will turn it into blue colour and then just after that click on that download link and your Download will start with IDM or any of the installed Download Accelerators.

Wednesday, October 5, 2011

How to Update Your Computer's BIOS


A computer's Basic Input-Output System (BIOS) is embedded software on a motherboard that will control attached hardware. It provides an operating system with information about hardware, and is designed to support a specific range of components. The BIOS itself is typically an EEPROM, or Electronically Erasable Programmable Read-Only Memory, that is programmed with "firmware" and has the ability to save small amounts of information specific to user configurations. BIOS components are often soldered to the motherboard and therefore not serviceable by the user. Still some of these can be inserted into a socket, allowing its replacement.


All BIOS components are serviceable via a firmware upgrade that is known as "flashing" this process is called "updating the BIOS". The process itself is fragile since any power fluctuation during a flash may irrevocably corrupt a BIOS' firmware. Great care will need to be taken in order to safely accomplish this.

This guide will help you flash your BIOS by taking precautions and walking you through each step. Not all computers will have the same BIOS manufacturer, let alone the same process, but many have similar steps and precautions.

Steps :

1 :Determine your needs. Did someone help you update the BIOS last month? Maybe the BIOS has never been updated since you purchased your PC years ago. Will an updated version fix a problem you are experiencing? Answers to these questions will help determine if you need to verify version numbers and whether an update is necessary. Not all BIOS updates are necessary, but for the hardware enthusiast, obtaining the latest BIOS may equate to better performance.

 
2:  Determine your system's origins. This is an important first step to determine where to locate and download the correct BIOS update version.

 
For Desktops, did you purchase this computer as a bundled, pre-built system, or was it assembled from purchased components? The larger, more popular manufacturers and builders include companies such as Dell/Alienware, HP/Compaq, IBM, Lenovo, Sun, Gateway,Acer, etc. For these, visit the manufacturer's site. For a custom system built from purchased components, visit the motherboard manufacturer's website.
For laptops, visit the laptop manufacturer's site, such as Dell/Alienware, HP/Compaq, Acer, Toshiba, etc.

3:  Discover what update methods are available.Discover what update methods are available. Not all BIOS updates are performed in the same manner. The desktop or laptop system or motherboard manufacturer determined in the steps above provide support information about BIOS update methods they offer. Some motherboards can be updated by executing a program from the operating system level after booting from the hard disk. In other cases the system must be booted from a floppy disk; CD or USB thumb drive (using software supplied by the system or motherboard vendor). Some manufacturers will use their own custom application to update the BIOS, others will use a third party utility to update the BIOS while booted from the legacy DOS operating system. The latter may be split into two different files, or bundled together as a CD or floppy image with an extracting application. Download the appropriate updating software and BIOS from your manufacturer's website.

4 : Backup your existing BIOS first! If using BIOS update software executed from Windows or another operating system, backup the existing BIOS image first. Some BIOS update software versions have this functionality built-in (e.g., "Save" or "Backup"), and will advise you to perform a backup first.

5 : Perform the update. Run the downloaded installer or application executable for the BIOS updating software. If the software prompts you for a floppy, use a formatted 1.44MB 3.5" floppy disk. It doesn't matter if the floppy is blank or not because the data will be overwritten if you don't mind wiping the disk.

  • a.) .If using a floppy, insert it into the drive and restart the system to boot from it. Some floppy images contain an "autoexec.bat" file to automatically run the BIOS update. Others will just have the update software, the updated BIOS image, and possibly a 'readme' text file containing directions. If there are no directions, but there are at least two files (ie: "A06_123.bin" and "awflash.exe"), follow this example: Enter a command such as "awflash A06_123.bin" and press enter. This will execute the update software and specify the A06_123.bin file to flash the BIOS.
  • b).Compare the two versions. Most BIOS update software will read the existing BIOS image and determine its version, then compare this to the downloaded BIOS image. If the system's existing BIOS version is older, perform the update. The user interface of BIOS software may vary greatly, yet typically menu buttons or selections such as "Write", "Update", or "Confirm" will perform the BIOS update.

6 Power cycle the computer after the update is completed. Many update programs will automatically power cycle the computer. Some will request your permission to do so while others will warn about this before starting the update. A few will prompt you to power cycle the system yourself. If you're forced to handle this yourself:
  • 1.Completely power down the PC by either pressing the power button or initiating the power off sequence from the operating system.
  • 2.Flip the master power switch on the back of your PC to the off position, if applicable.
  • 3.Wait a minute.
  • 4.Flip the master power switch back into the on position, if applicable.
  • 5.Power up the PC.

7 : Clear the existing BIOS settings.Clear the existing BIOS settings. Only clear the BIOS if recommended. This is not always necessary, depending on what features have changed between the existing version and the updated version. When the PC is powering up, immediately initiate execution of the BIOS utility. For most systems, this is done by pressing DEL

 
on the keyboard within the first 2 - 10 seconds of turning the computer on. Other systems might use other keys such as

 F2
 
F10
 
CTRL
 
ENTER
 
, etc. If you don't know the keystroke sequence for entering the BIOS utility, watch the monitor to see if the computer displays it. To clear the BIOS settings, look for an option to "Restore Defaults" or "Load Fail-Safe Defaults". This may be on the main page of the BIOS utility or on the last page of a tabbed menu. Use the arrow keys to navigate, and follow the on-screen instructions. When complete, save the settings and exit the BIOS utility.

8 : Configure the BIOS. If you know the settings you want, change them now. If you have never changed BIOS settings before, it is not required to do so. Most PCs will function just fine using the default BIOS settings.


TIPS :

Edit TipsBIOS updates may be released to fix existing bugs, add support for new hardware and standards or add functionality. Read the release notes or other documentation for the BIOS update you're considering to see if the update will benefit your PC.

 
If your system is currently working well, perform a BIOS update only if you're willing to part with it (for an extended period of time) in the event of a critical failure. System builders and motherboard manufacturers will often repair systems and motherboards that failed to take a BIOS update, provided they are still under warranty. Yet, this process is a lengthy one, often involving the following steps:
  • Contact technical support and verify the problem is related to the BIOS update.
  • Obtain a Return Merchandise Authorization (RMA) or similar tracking number.
  • Ship the product back to the builder or manufacturer
  • Wait for approval (testing) and repair or replacement. 
  • Wait to receive the product shipped back to you.

 
If the BIOS firmware has become corrupted and you have a similar motherboard with the same CPU socket and a BIOS chip of the same type, you may be able to recover your corrupt BIOS if you are willing to risk the other BIOS chip. See How to Repair Corrupted BIOS Firmware

 

 

Warnings:
 
  • Make sure to obtain the BIOS upgrade software from a reliable source. Downloading a BIOS from sources other than the manufacturer's web site is risky. For example, versions from the same BIOS software developer for one manufacturer's motherboard may not work on a different manufacturer's motherboard. Using the wrong BIOS or version might "brick" the board, thereby requiring either a BIOS replacement or reprogramming of the BIOS by the manufacturer and rendering the computer unable to boot until that is done.
  • Make sure the electrical power source is reliable when flashing a BIOS. Any sizable fluctuation or loss of power during a flash process can corrupt the BIOS. Therefore, never power down or reset a PC when flashing the BIOS. If flashing the BIOS from a booted OS, first disable all unnecessary applications and background processes.
Avoid updating the BIOS unless you know exactly what you are doing. Failure to follow a manufacturer's directions and precautions may corrupt the BIOS as well.

How To Repair the Master Boot Record In Windows XP

Repairing the master boot record on your Windows XP system is accomplished using the fixmbr command, available in Recovery Console. This is necessary when the master boot record has become corrupt due to a virus or some kind of damage.
Follow these easy steps to repair a damaged master boot record in Windows XP.

Time Required: Repairing the master boot record on a Windows XP system takes less than 15 minutes

Here's How:


1.Enter Windows XP Recovery Console.
2.When you reach the command prompt (detailed in Step 6 in the link above), type the following and then press Enter.
fixmbr

3.The fixmbr utility will write a master boot record to the hard drive that you're currently using to boot into Windows XP. This will repair any corruption or damage that the master boot record may have.

4.Take out the Windows XP CD, type exit and then press Enter to restart your PC.
Assuming that a corrupt master boot record was your only issue, Windows XP should now start


How To Restore NTLDR and Ntdetect.com From the Windows XP CD

The NTLDR and Ntdetect.com files are important system files that are used by your computer to start the Windows XP operating system. These files can become damaged, corrupted or deleted for a number of reasons and are usually brought to your attention by the "NTLDR is Missing" error message.

Follow these easy steps to restore the damaged/corrupted or missing NTLDR and Ntdetect.com files from the Windows XP CD using the Recovery Console.

Time Required: Restoring the NTLDR and Ntdetect.com files from the Windows XP CD usually takes less than 15 minutes


Here's How:

1.Enter Windows XP Recovery Console.
2.When you reach the command prompt (detailed in Step 6 in the link above), type the following two commands, pressing Enter after each one:
copy d:\i386\ntldr c:\copy d:\i386\ntdetect.com c:\In the command listed above, d represents the drive letter assigned to the optical drive that your Windows XP CD is currently in. While this is most often d, your system could assign a different letter. Also, c:\ represents the root folder of the partition that Windows XP is currently installed on. Again, this is most often the case but your system could be different.
3.If you're prompted to overwrite either of the two files, press Y.

4.Take out the Windows XP CD, type exit and then press Enter to restart your PC.

Assuming that missing or corrupt versions of the NTLDR and/or Ntdetect.com files were your only issues, Windows XP should now start normally.

How To Repair or Replace Boot.ini in Windows XP

The boot.ini file is a hidden file that is used to identify in what folder on which partition and on which hard drive Windows XP is located. Boot.ini can become damaged, corrupted or deleted for a number of reasons and is usually brought to your attention by an error message.


Follow these easy steps to repair the damaged/corrupted boot.ini file or replace it if it has been deleted.


Time Required: Repairing or replacing the boot.ini file usually takes less than 10 minutes


Here's How:

1.Enter Windows XP Recovery Console. The Recovery Console is an advanced diagnostic mode of Windows XP with special tools that will allow you to restore the boot.ini file.

2.When you reach the command line (detailed in Step 6 in the link above), type the following command and then press Enter.

bootcfg /rebuild

3.The bootcfg utility will scan your hard drives for any Windows XP installations and then display the results. Follow the remaining steps to add your Windows XP installation to the boot.ini file.

4.The first prompt asks Add installation to boot list? (Yes/No/All).

Type Y in response to this question and press Enter.

5.The next prompt asks you to Enter Load Identifier:.

This is the name of the operating system. For example, type Windows XP Professional or Windows XP Home Edition and press Enter.

6.The final prompt asks you to Enter OS Load options:.

Type /Fastdetect here and press Enter.

7.Take out the Windows XP CD, type exit and then press Enter to restart your PC.


Assuming that a missing or corrupt boot.ini file was your only issue, Windows XP should now start normally.

How To Restore Hal.dll From the Windows XP CD

The hal.dll file is a hidden file that is used by Windows XP to communicate with your computer's hardware. Hal.dll can become damaged, corrupted or deleted for a number of reasons and is usually brought to your attention by the "missing or corrupt hal.dll" error message.

Follow these easy steps to restore the damaged/corrupted or missing hal.dll file from the Windows XP CD using the Recovery Console.

Time Required: Restoring hal.dll from the Windows XP CD usually takes less than 15 minutes


Here's How:

1.Enter Windows XP Recovery Console.

2.When you reach the command line prompt (detailed in Step 6 in the link above), type the following and then press Enter:

expand d:\i386\hal.dl_ c:\windows\system32

Using the expand command as shown above, d represents the drive letter assigned to the optical drive that your Windows XP CD is currently in. While this is most often d, your system could assign a different letter. Also, c:\windows represents the drive and folder that Windows XP is currently installed on. Again, this is most often the case but your system could be different.

3.If you're prompted to overwrite the file, press Y.

4.Take out the Windows XP CD, type exit and then press Enter to restart your PC.

Assuming that a missing or corrupt hal.dll file was your only issue, Windows XP should now start normally.