What Are KeyLoggers

Key-Logger ! Hope you heard of it. If not then just go down this article. 
  
So, What is Key-Logger? 
Key-Logger = Keys + Log. Such a thing which keeps the log of keys pressed from the keyboard.


It is software/hardware that do keystroke logging. Keystroke logging is the action of tracking/logging all keys strokes pressed from keyboard without the knowledge of user. Means user is not aware of that his data like credit card number and password is being traced by the hacker.

Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke. When ever you press a key on keyboard, keyboard  interface tells processor that a key is pressed and it needs to be displayed on a screen/monitor. So processor puts key and give command to display on screen. But in the meantime only these Key-loggers do their work, as soon as key is displayed on the screen they record it. And this Key-logger program it runs in the background and record all records. It remain untraceable even by firewall and anti-viruses. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. Now these hidden logged keystrokes can be send to the user's Mail ID or copied to the specific path depending upon the settings and software. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a Key-logger will reveal the contents of all e-mail composed by the user. Sometimes if you are able to track them also, you can't uninstall them. Then only choice you are left with is to format the system. These are very very powerful tools.


Uses:


  •   Key-loggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only.
  • With the help of Key-loggers you can monitor your computer as you can view the log of keys pressed in your absence or what someone is doing on your computer.
  •  On the other side you can call it a hacking device. hacker can install in the targets computer to get his/her private data like credit card info and other passwords and all.
  • Key-loggers can also be used by a family (or business) to monitor the network usage of people without their direct knowledge.
Advanced Key-loggers:
          In previous days Key-loggers are only able to record the keys pressed by the victim. But now you can record videos of what your victim is doing on his computer, even you can get live telecast of it if user is connected to Internet. They can take the snapshots of screen they used to help us mainly in web field, like which sites victim is visiting. They can send you the pressed keys and snapped shots to your mail from victims system, provided he is connected to Internet.


Key-logger Must Have:
          A Key-logger must have an .exe and .dll file. A .dll which does all the work and an .exe which loads the .dll and sets the hook, like record them or send them to user and all. So these both files .dll and .exe must be on the same directory mainly on C. A Key-loggers might be as simple as an exe and a dll that are placed on a machine and they are invoked at the time of boot just like entries of OS registery are invoked. 
A Key-loggers could be which boasts these features:

  • Stealth: invisible in process list/Task Manager.
  • Includes kernel Key-logger driver that captures keystrokes even when user is logged off (To trace Log In passwords).
  • ProBot program files(Used for invoking key-logger at time of booting) and registry entries are hidden.
  • Includes Remote Deployment wizard(insatlling and unistalling remotely).
  • Active window titles and process names logging.
  • Keystroke / password logging.
  • Regional keyboard support.
  • Launched applications list.
  • Text snapshots of active applications.
  • Visited Internet URL logger.
  • Capture HTTP POST data (including logins/passwords)
  • File and Folder creation/removal logging.
  • Log file archiving, separate log files for each user.(as on same system many users can work mainly in organisation)
  • Log file secure encryption.(so only specified person can read them and save them from being open for all)
  • Password authentication.
  • Invisible operation
  • Native GUI session log presentation
  • HTML and Text log file export
  • Automatic E-mail log file delivery
  • Easy setup & uninstall wizards
  • Support for Windows all versions.

Types:
  • Software Based: These are the programs/applications which can be installed in the victims system to get log of his keys.
  • Hardware Based: It is a small device which is placed between keyboard and CPU interface. It normally have USB connector. And connects at the end of keyboard wire to CPU. In laptops it can be directly inserted like a USB.

Software-based key-loggers:


A logfile from a software-based keylogger.
These are software programs designed to work on the target computer’s operating system. From a technical perspective there are five categories:
  • Hypervisor-based: The keylogger can theoretically reside in a malware running underneath the operating system, which remains untouched. You can think like a virtual machine as they resides beneath the OS. Blue Pill is a conceptual example.
  • Kernel-based: This method is difficult both to write and to combat. Such keyloggers reside at the kernel level. So these are most difficult to detect.  They can implemented as rootkits that harm the operating system kernel and gain unauthorized access to the hardware, making them very powerful. A keylogger using this method can act as a keyboard device driver for example, and thus gain access to any information typed on the keyboard as it goes to the operating system.
  • API-based: These keyloggers hook keyboard APIs; the operating system then notifies the keylogger each time a key is pressed and the keylogger simply records it. Windows APIs such as GetAsyncKeyState()GetForegroundWindow(), etc. are used to poll the state of the keyboard or to subscribe to keyboard events. These types of keyloggers are the easiest to write, but where constant polling of each key is required, they can cause a noticeable increase in CPU usage, and can also miss the occasional key.
  • Form grabbing based: Form grabbing-based keyloggers log web form submissions by recording the web browsing onsubmit event functions. This records form data before it is passed over the Internet and bypasses HTTPS encryption.
  • Memory injection based: Memory Injection -based keyloggers alter memory tables associated with the browser and other system functions to perform their logging functions. By patching the memory tables or injecting directly into memory, this technique can be used by malware authors who are looking to bypass Windows UAC (User Account Control). The Zeus and Spyeye Trojans use this method exclusively.
  • Packet analyzers: This involves capturing network traffic associated with HTTP POST events to retrieve unencrypted passwords.
  • Remote access software keyloggers: These are local software keyloggers with an added feature that allows access to the locally recorded data from a remote location. Remote communication may be achieved using one of these methods:
  • Data is uploaded to a website, database or an FTP server.
  • Data is periodically emailed to a pre-defined email address.
  • Data is wirelessly transmitted by means of an attached hardware system.
The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed.                                                                                                           

Related features
Software Key-loggers may be augmented with features that capture user information without relying on keyboard key presses as the sole input. Some of these features include:
  • Clipboard logging. Anything that has been copied to the clipboard can be captured by the program.
  • Screen logging. Screenshots are taken in order to capture graphics-based information. Applications with screen logging abilities may take screenshots of the whole screen. They may take these screenshots periodically or in response to user behaviours (for example, when a user has clicked the mouse). 
  • The Microsoft Windows API allows programs to request the text 'value' in some controls. This means that some passwords may be captured, even if they are hidden behind password masks.


Hardware-based keyloggers

A hardware-based keylogger.

A connected hardware-based keylogger.
Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system.
  • Firmware-based: BIOS-level firmware that handles keyboard events can be modified to record these events as they are processed. Physical and/or root-level access is required to the machine, and the software loaded into the BIOS needs to be created for the specific hardware that it will be running on.
  • Keyboard hardware: Hardware keyloggers are used for keystroke logging by means of a hardware circuit that is attached somewhere in between the computer keyboard and the computer, typically inline with the keyboard's cable connector. More stealthy implementations can be installed or built into standard keyboards, so that no device is visible on the external cable. Both types log all keyboard activity to their internal memory, which can be subsequently accessed, for example, by typing in a secret key sequence. A hardware keylogger has an advantage over a software solution: it is not dependent on being installed on the target computer's operating system and therefore will not interfere with any program running on the target machine or be detected by any software.
  • Wireless keyboard sniffers: These passive sniffers collect packets of data being transferred from a wireless keyboard and its receiver. As encryption may be used to secure the wireless communications between the two devices, this may need to be cracked beforehand if the transmissions are to be read.
  • Keyboard overlays: Criminals have been known to use keyboard overlays on ATMs to capture people's PINs. Each keypress is registered by the keyboard of the ATM as well as the criminal's keypad that is placed over it. The device is designed to look like an integrated part of the machine so that bank customers are unaware of its presence.
  • Acoustic keyloggers: Acoustic cryptanalysis can be used to monitor the sound created by someone typing on a computer. Each key on the keyboard makes a subtly different acoustic signature when struck. It is then possible to identify which keystroke signature relates to which keyboard character via statistical methods such as frequency analysis. 
  • Electromagnetic emissions: It is possible to capture the electromagnetic emissions of a wired keyboard from up to 20 metres (66 ft) away, without being physically wired to it. In 2009, Swiss researches tested 11 different USB, PS/2 and laptop keyboards in a semi-anechoic chamber and found them all vulnerable, primarily because of the prohibitive cost of adding shielding during manufacture.The researchers used a wide-band receiver to tune into the specific frequency of the emissions radiated from the keyboards.
  • Optical surveillance: Optical surveillance, while not a keylogger in the classical sense, is nonetheless an approach that can be used to capture passwords or PINs. A strategically placed camera, such as a hidden surveillance camera at an ATM, can allow a criminal to watch a PIN or password being entered.
  • Physical evidence: For a keypad that is used only to enter a security code, the keys which are in actual use will have evidence of use from many fingerprints. 






  If You are having any query, then mail me or comment here! 
  Keep Enjoying!

Produce Different Frequencies Sound in C/C++





 You can produce sound in programming languages by many ways. But there is a function "Beep()" in Win API for C and C++ programming languages, with help of this function we can produce sound for different durations and of different frequencies.



To use the Beep( ) function you have to include the <Windows.h> header file. This the header file which is used for windows programming. It is an window API. The beep() function is included in this header file only, so you have to use it. By using this function you can create great apps related to music instruments. Just track my articles because in coming days I will tell you how to make Piano program/application by using this function. Beep( ) is a two parametrized function. It takes two parameters they can be float, double or int type. First parameter is for frequency in Hz and second Parameter for duration in milliseconds. Beep(frequency in Hz, duration in milliseconds).

Now go through the codes given below, it will produce the sound with different frequencies and for different durations.

This is the sample program for producing beep of  50000 Hz and for duration of 1 sec in C++ :

#include<windows.h> 
#include<iostream>
using namespace std;
main()
{
Beep(50000,1000); 
}


This is the sample program for producing beep of  20000 Hz and for duration of 5 sec in C++ :

#include<windows.h> 
#include<iostream>
using namespace std;
main()
{
Beep(20000,5000); 
}

This is the sample program for producing beep of  50000 Hz and for duration of 1 sec in C :
#include<stdio.h>
#include<windows.h> 
#include<conio.h>
main()
{
Beep(50000,1000);
getch(); 
}

This is the sample program for producing beep of  20000 Hz and for duration of 5 sec in C :

#include<stdio.h>
#include<windows.h> 
#include<conio.h>
main()
{
Beep(20000,5000);
getch(); 
}


If You are having any query, then mail me or comment here

Keep Enjoying!

Basics Of Cryptography

In this post I will teach you the basics of Cryptography.




Basic terminology

Encryption: Its an art, algorithm, process of changing/transforming your "Required Data" into other form called Cipher, explained below. So no one, except you or some Eligible person, cannot be able to identify. he will wonder, what's the meaning? or what is the use of  the given data?  Encryption is also known as Encoder or Encipher. It is done to secure the data from insecure channels.
 Example: when sender sends data to the to the receiver, this data reaches the receiver after passing through many insecure channels. So with the help of encryption we protect our data from being hacked.
* Required data can be any thing like Message, file, document, etc.


Decryption: Its the reverse of Encryption. It is the process of changing the Cipher into the understandable form, so that the proper meaning or proper use of the Data can be attained. Its output is the previous Data which was changed into the Cipher. Decryption is sometimes called as Dicipher or Decoder. Decryption is done mainly by the receiver to understand the actual text send by the sender.


Cryptography: When both the process, Encryption & Decryption, are combine the entire process is called Cryptography. Cryptography is seen as "Black Art" but of-course this is not the case. Its is mainly used as the science of communication.


Cipher: When you encrypt the Data using any encryption process, your data is converted into mysterious Data called cipher. Its meaning cannot be directly interpreted. To reveal the true meaning of the cipher we have to decrypt it. After Decryption the give cipher is converted into original or understandable form.


Uses of Cryptography:

Cryptography is mainly used as the "science of communication". Lets say a person . Say John, want to communicate with other person, say Sarah. But John want to communicate privately with the Sarah only. So what he can do is, he can encrypt his message and sends it to Sarah, if any-person in-between John and Sarah reads the message, he/ she does not know what is meaning.
Cryptography is also used to protect the Data which is present on the Disk or any other storage device. Cryptography is also used to Authenticate or to check the Message Integrity.
**Message Integrity : As the word 'message integrity' signifies, it checks the Integrity of the message, whether message sent or received was correct or not.

Types of Cryptography:

  • Shared key cryptography
  • Public key cryptography
  • Modern Cryptography


Shared key Cryptography:

In Cryptography  key is used to encrypt or decrypt the data. When use the same/common key to encrypt or decrypt, it is called Shared key cryptography.
Example :
John want to send a message to Sarah saying " I love you " but at the same time he want only Sarah to understand the message. Now see what they have done is they agree made an algorithm write the message.
They shifted the all the alphabets of English by 4 alphabetically i.e.  A with D,  B with E, X with A, Z with C etc. So the message "I LOVE YOU " changed to " L  ORYH  BRX ". Now both the John and Sarah can read the message and understand but unwanted person cannot understand the message.
Note:  Key was same here. Shared key cryptography is also called as Symmetric key Cryptography.


Public Key Cryptography:

In this cryptography, different keys are use to encrypt and decrypt the data. As we have two keys , we have freedom here i.e. we can share our encryption key to anyone, means we can make it public, so that anyone can use this public key to encrypt the data. This is key is also called as public key.
But only the owner of the decryption key can decrypt the message. This key is called as private key.

Some Modern Cryptographic Algorithms:

Following are some modern cryptographic algorithms which are widely used in many domains like WEP, HTTP, SSL, etc.
  • RC4 - symmetric algorithm
  • RC2 - symmetric algorithm
  • DES - symmetric algorithm
  • 3DES - symmetric algorithm
  • AES - symmetric algorithm
  • RSA - public key algorithm



So subscribe our Blog to kick off your day with our free stuff.

Now Do Google Search Via Sms

In this tech era, you have to we need internet every time and everywhere. Most the time on internet either we do social networking or searching through search engines. Now we didn't put pressure on our minds to think we simply google everything. But it is not every time and everywhere we can use google. But now It is possible you can also search anything, anytime, anywhere on Google without a internet connection. Google on your mobile either it’s a Smartphone or low cost phone it will help you with his SMS service. Your phone should have only sms service, I hope nowadays even cheapest phone is having this service. You don’t need to buy a expensive phone’s out of your budget to just surf for internet on the go.

Please follow the following step:-

1.  You have to just type your keywords (You want to search) in your phone message box (create message).


2.Then add receipt send it to 9773300000. And it will comeback you the answer within a few seconds.


3.  You will  feel like you are surfing Google on the Internet.


Note: This no. "9773300000" used is for India. For other countries, you have to search the respective number for your country.

 If You are having any query, then mail me or comment here!
 Keep Enjoying!

Crack The Internet Download Manager Now!!!


As you all know, Internet Download Manager is the best download manager. It can use to download you tube videos, other web videos, other files and nowadays you can download torrent also. Believe me, it will increase your downloading speed to double. Here in my college I used to download files @ 40 kbps but now after usinng IDM I can download @ 90 kbps. But the main thing we all face it is not a freeware. We can use it free only till Trail version, after its trail version ends you have to register and pay for it. But now I will give you the solutionn for it, you can use the any version of IDM for your full lifetime.  So follow the simple steps to crack your Internet Download Manager manually.

Follow the simple steps to crack Internet Download Manager


1. Download the files from here.

2. Go to  C:\Windows\System32\drivers\etc and replace that old hosts file with new one.
OR
You can do aone thing instead of step 2, just go to Start->Run->notepad %windir%\system32\drivers\etc\hosts.

If it not opens, then do the following steps:

First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on applyand then click on Ok, now u will be able to edit the hosts file and save changes in it. 
Now after opening the hosts file you will be able to see the notepad, in note pad copy the below lines of code and then save it.
127.0.0.1    tonec.com
127.0.0.1    www.tonec.com
127.0.0.1    registeridm.com
127.0.0.1    www.registeridm.com
127.0.0.1    secure.registeridm.com
127.0.0.1    internetdownloadmanager.com
127.0.0.1    www.internetdownloadmanager.com
127.0.0.1    secure.internetdownloadmanager.com
127.0.0.1    mirror.internetdownloadmanager.com
127.0.0.1    mirror2.internetdownloadmanager.com

3. Now open IDM and go to registration > registration.
4. Now enter your name,email etc and add this key HUDWE-UO689-6D27B-YM28M and hit okay
and you have done ! after this your IDM will never ask for the serial key :)



If You are having any query, then mail me or comment here!

 Keep Enjoying!

Now Browse Everything In 3D



Everyone wishes to see the 2D images of this world in 3D. But now thier wishes comes into reality, as “Ivan Kutil” has created an 3D web browsing extension for chrome that simply converts any website and image into 3D. But to view it you will definately need any sort of  3D glasses. The extension 3Dnator! adds another status bar and context menu option for converting any image on the web into 3D image. So by installing  it you got the option to convert any of the pic present on the net into 3D.

So just take a look of given below pictures, how they look into 3D using the 3Dnator.



Just click on the button below to install this extension.

                                                         

After installing this extension into your browser, you can see the glasses icon in top left hand side corner that simply converts any website with lots of images into 3D when activated. Beside this you can even convert any single image on the web into 3D, There is option available that the right click context menu option that you can use on any image present on the web. You just right click on that image and then click on 3Dnator! option like in the image.

So obviously it’s a fun app to try out but you will need 3D glasses to view then otherwise you will get things blurred and reddish.




So subscribe our Blog to kick off your day with our free stuff.

Dos Commands Every Geek Should Know

Hello !!
Today I'm posting out some useful commands that every geek should know. So just go through it or save them for your future use. You can do lot with the help of these commands and with the faster speed if compared with Softwares. Some of these commands may not work on your windows because they might be blocked in your OS version.
If you don't know how to open the CMD Prompt or DOS window, then all you have to do is click on the Start menu, and in the “Search programs and files” field, just type “cmd” and press enter. Voila – there’s your DOS window.So know try out the given below useful commands.

Assoc: Associated Extension

Not sure what default program you have set up to handle ZIP, MP3,HTML files, wmv,excel files, etc?
 A quick and easy way to check for your default file associations is the “assoc” command. Just open a command prompt and type “assoc” followed by the file extension. If you want to know all the default programs for all file types, then simply type "assoc" and hit enter.
dos commands
Like if u type "assoc .zip". The response is the installed application that is currently configured to handle that file type. As you can see above, WinRAR is my ZIP file handler, MS Word handles doc files, and Chrome is set up as the default for HTML files.

Tree: View Directory Structure

If you’ve created a virtual spiderweb of files and directories on your computer, it can get pretty confusing to remember where everything is. Sometimes it would be nice to have a diagram showing directories and sub-directories. Using the Tree command, you can do just that.
First, navigate to the directory you want to get the file structure of, and then type “tree > myfile.txt“. This "myfile.txt" can be of any name. in this file all your directories tree structure will be written.
ms dos commands
The command writes the entire directory structure, completed with all folders, into the text file, which you can print out for easy viewing.
ms dos commands
The formatting may look a little bit funky, but if you look closely you’ll see that the directories are all there, they just might be prefaced with some weird symbols. A with two dots on head symbolise space.

File Search & Comparison

If you ever have two text files – particularly two very large text files – the file compare (fc) command is all you need to identify and synchronize file differences.
The usage is about as easy as it can get. Just typefcfollowed by the names of the two files.
ms dos commands
The system will respond by showing the lines from both files where there are differences.  This command can become pretty handy when you’re collaborating with people and trying to sync up differences between files that several people are working on.
If you only need to find a file on your system, and you know the name of the file, the “find” command is far faster than any point and click operation you can do. Just do a “dir” command to the directory you want to search, and then “|” followed by the name of the file.
dos prompt commands
The system will respond with the directory where the file is stored.

Network Commands

I really don’t think there are easier ways available to do network troubleshooting than the sort of tools you get in DOS commands. For example, if you want to know your basic network setup, just do a quick “ipconfig” and you will get details like your computer IP and the default gateway (which is typically your home router IP address).

If you’re not sure you have a good network connection, try doing a “ping” to a known IP address or a website. Like if you want to do ping test on facebook.com then in cmd box just type "ping www.facebook.com" if u see the packets sent =4 and packets recieved = 4 and lost =0% , then it means your connection is working well.




 If you want to see all network connections currently active from your PC, type “netstat“. It will dispaly all the protocols you are using currently like http, https, ftp,smtp and the TCP/IP of all current connections you are having.
It may be a good idea to search through these carefully to make sure that there’s no surprises in the form of malware or a virus hijacking your bandwidth.

Windows Utilities

Finally, there are a multitude of DOS commands that are invaluable as system troubleshooting tools. For example, to view a list of active processes, just open up a command prompt and type “tasklist“. It's like bringing task manager in the cmd prompt.
dos prompt commands
If you see any process you want to kill, just type “taskkill” followed by the image name. Like if you want to kill the application notepad.exe then type taskkill /IM notepad.exe . Hence the syntax is taskkill /IM "process name". If you want to kill all the instances of the process then use "taskkill /PID "process ID" " all things are without quotes. Now if you want to kill  all the process of a user then you have to write the command as given below taskkill /F /FI "USERNAME eq name of the user". In this you have to apply the quotes as specified and instead of line name of the user just type the username whose all process you wanna to kill.
Nervous about whether a particular system file became corrupted after a recent virus infection? Just type “sfc /VERIFYFILE=” followed by the full path of the file. But remember you must be an administrator to do this.
dos prompt commands
Windows will check to be sure it is the original. You can also scan all system files like this at once by typing “sfc /scannow

Now one of the basic thing is how to come out of the directory/folder or how to change the directory. for that one of the simple thing is just type "cd..". each type you type cd.. you will come out of the innermost folder and after coming to drive like "c:\>" you can change your drive. for it type simply "drive name :" and hit enter. Like "d:", it will change drive to d.
Finally, probably one of the most useful DOS commands available – the AT command. With “AT”, you have the ability to schedule tasks to run on a regular routine, all from a simple command prompt.
dos commands
Setting up the AT commands can be a little tricky, so type “at help” if you need parameter help. In the command above I set up the computer to automatically archive all files in the temp directory to the archive folder. You could do similar jobs to routinely back up important files on your computer to a mapped external drive.

If you don't know how to use a command then type "command_name \?" and hit enter. TO know all the useful commands type "help " and hit enter.

type - open text files sans Notepad
Similar to Unix cat command, Type is my favorite DOS command for displaying the contents of a text files without modifying them. When used in combination with more switch, type splits the contents of lengthy text files into multiple pages. Avoid using the type command with binary files or you'll hear alien PC beeps and see some greek characters on your PC. for example just type in cmd "type  "filepathfollowed by filename.extension"", remember you have to use it without quotes.

attrib - make hidden files visible
Attrib lets you change attributes of System files and even hidden files. This is great for troubleshooting Windows XP. Say your XP doesn't boot ever since you edited that startup boot.ini file (Hidden), use attrib to remove the Hidden attibute and edit the file using EDIT dos command. You can edit even the files which are automatically hidden and private. But remember its risky to edit the hidden files like boot and all.

move - more flexible than copy-paste
Say you got a lot of XLS and DOC files in you MyDocuments folder and want to move only those XLS files that have their name ending with 2006. In XP Explorer, you have to manually select each file and then cut-paste to another folder. However, the DOS move command make things much simpler. Just type the following at the command prompt:
move *2006.xls c:\2006Reports\. Here it will move all the files ending with 2006.xls to folder 2006 reports in c drive.

find - advanced file search with filter
Find is the most powerful DOS command and even more useful than the Windows Desktop Search tool or the Windows Find Wizard. The find command searches for a specific string of text in a file or files. After searching the specified file or files, find displays any lines of text that contain the specified string.

To search your hard disk to find and display the file names on drive C: that contain the string "Google" use the pipe (|) to direct the results of a dir command to find as follows:
dir c:\ /s /b | find "Google" . In this you have to specify the directory like here it is "c". remember to put the string to be searched in the double quotes. It will search much fast than windows find wizard.

Quick Tip - Drag to avoid typing: When your command acts on a file or folder, you must type the path to that folder after the command. You can save typing time by dragging the file or folder from Windows Explorer into the command window. It will automatically writes the path of the file in cmd box.

Quick Tip- If you want to open/play any file you can also do by just dragging into cmd window and hit enter. It will automatically get opened in the default program.

To view help at the command-line, at the command prompt, type the following:
CommandName /?

Remaining useful commands are stated below, these are simple i hope these are need not to be explained.

ARP — Address Resolution Protocol.
BOOTCFG — Edit Windows boot settings.
BROWSTAT — Get domain, browser and PDC info.
CACLS — Change file permissions
CALL — Call one batch program from another.
CHKDSK — Check Disk – check and repair disk problems. Required to be an administrator.
CHKNTFS — Check the NTFS file system.
CHOICE — Accept keyboard input to a batch file.
CIPHER — Encrypt or Decrypt files/folders.
CleanMgr — Automated cleanup of Temp files, recycle bin. If you are in the c directory then it it will ask for drive to clean, and after selecting the drive it will clean it. But if you are using it as a user means "c:/users/leroy" then it will delete the temp files and recycle bin.
CLIP — Copy STDIN to the Windows clipboard. Places the copy of a file on the windows clipboard.
CLS — Clear the screen.
CLUSTER — Windows Clustering. It may not work in windows.
COLOR — Change colors of the CMD window. command is  color "code". to get to know all the available colour codes just type color /? and press enter.
COMPACT — Compress files or folders on an NTFS partition.
COMPRESS — Compress individual files on an NTFS partition.
CON2PRT — Connect or disconnect a Printer.
CONVERT — Convert a FAT drive to NTFS.
DATE — Display or set the date.
Dcomcnfg — DCOM Configuration Utility.
DEFRAG — Defragment hard drive.
DEL — Delete one or more files.
DELPROF — Delete NT user profiles.
DELTREE — Delete a folder and all subfolders.
DevCon — Device Manager Command Line Utility.
DIR — Display a list of files and folders.
DIRUSE — Display disk usage.
DISKCOMP — Compare the contents of two floppy disks
DISKCOPY — Copy the contents of one floppy disk to another
DNSSTAT — DNS Statistics.


So subscribe our Blog to kick off your day with our free stuff.

Ways To Enable USB ports



You can be Enable or Disable USB  by many ways like using Registry Edit, Device Manager, using C/C++, or Softwares. Below are the options explained to enable/disable USB.

Enable Usb which is blocked from registry settings: 
Registry details will be discussed and explain later. Follow the path, press Windows key + R or press start button + R  than write "regedit"->HKEY_LOCAL_MACHINE->SYSTEM ->CurrentControlSet->Services->USBSTOR ->from right panel double click on "Start"->change value to "3". This will enable your USB if it is blocked from registory editor, remember to login as administor.
Here are some snapshots:




How to enable/ disable USB using Device Manager

  • Open Control panel , and select Device Manager
  • Select the Universal Bus Controller
  • Choose appropriate option from the list , than Right Click and select Enable or Disable


Enable/Disable USB  using BIOS
  • Switch on your Computer
  • As soon as your booting start, go to BIOS settings.
  • Look for USB option and Select Enable/ Disable, as per your requirement.

Remember to put BIOS password to prevent further change in setting by unknown person.


Enable/Disable USB  using Software

 Although if you don't want to mess around and feels that editing Registry or Changing device setting is not tough for you than you can use free software. Some of the Free Software are listed below.

  • USB Port Locked( UPL ) .;
  • USB Drive Disabler. 

So subscribe our Blog to kick off your day with our free stuff.

How To Create A Software To Block USB Ports


Virus is a program which infects computer and malfunctions it. Here I'm going to tell you about the program of c/c++ which will block all the USB ports of a computer. When we run .exe file of this program,then all the USB ports will stop responding/blocked. Whenever we connect pen drive with our computer USB, it will not be connected. Your OS will not be able to detect the Pen Drive.
Code is written to directly change the USB registry option and change its key. Not going to explain about registry in detail now, later will explain. You can do this by registery also by following the path, press start button + R->type "regedit"->HKEY_LOCAL_MACHINE->SYSTEM ->CurrentControlSet->Services->USBSTOR ->from right panel double click on "Start"->change value to "4".
Creating usb pendrive Virus :-
  • Install Turbo C or C++ or any other c/c++ compiler.
  •  Open compiler->new file->there write the coding
#include<stdlib.h>
void main()
{
system(“reg add HKEY_LOCAL_MACHINE\\SYSTEM \\CurrentControlSet
\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 4 \/f”);

}
  • Type the system and it's below line in one line.
  • Save The Above Program as usb.c or any other name. Compile and Run the above Program.
  • Congratulation! you are successful to create the usb-pendrive Virus.
  • Now a usb will be created where you saved this program. Get that .exe.
  • Run that usb.exe in your computer to test. Attach Pen drive to your computer usb ….u would say "shit it's not working."


So subscribe our Blog to kick off your day with our free stuff.

Find The Manufacturer Of Unknown Device And Get The Corresponding Drivers

Sometimes we have to install the drivers of the device but due to manufacturer is not known to us, so we end up with the wrong drivers. So to check out the manufactures of any unknown device and get the right drivers go through the post given below.


  • First of all you have to open the device manager. you can do this by right click on my computer->manage->device manager on left hand panel. or open run command ant type "devmgmt.msc" without quotes.
  • Now select the device whose manufacturer you want to know or whose device driver you want to know.
  • Know right click on it and select properties.
  • Know a window will be poped out. in it select the details tab.
  • In that choose from "Property" ->hardware ids.
  • Now in the detail which is opened in the value box. Note down the string which is of format VEN_xxxx&DEV_yyyy. Where xxxx is the Vendor id which is used to find the manufacturer and yyyy is the device id which is used to find the particular device made by that manufacturer.
  • Now open web browser and go to the link  www.pcidatabase.com.
  • Now if you want to find the Manufacturer of Device. Type Vendor ID “xxxx” in Vendor Search and click search. Manufacturer name will be displayed.
  • Similarly you can type the Device Id “yyyy” in Device Search on the www.pcidatabse.com . It will display the exact Device and Manufacturer.
  • Now with this information download the correct driver.
Hope you will like it.

So subscribe our blog to kick off your day with our free stuff.

Silence for Solutions

P1.
#include <stdio.h>
#include <conio.h>
void main()
{
printf("\n Welcome");
getch();
}

P2.
#include <stdio.h>
#include <conio.h>
void main()
{
int a,b,c;
printf("Enter First no.\n");
scanf("%d",&a);
printf("Enter second no.\n");
scanf("%d",&b);
c=a+b;
printf("\n Sum= %d",c);
getch();
}

P3.
#include <stdio.h>
#include <conio.h>
void main()
{
int a,b,c;
printf("Enter First no.\n");
scanf("%d",&a);
printf("Enter second no.\n");
scanf("%d",&b);
c=a-b;

printf("\n Difference= %d",c);
getch();
}

P4.
#include <stdio.h>
#include <conio.h>
void main()
{
int a,b,c;
printf("Enter First no.\n");
scanf("%d",&a);
printf("Enter second no.\n");
scanf("%d",&b);
c=a*b;

printf("\n Product= %d",c);
getch();
}

P5.
#include <stdio.h>
#include <conio.h>
void main()
{
int a,b,c;
printf("Enter First no.\n");
scanf("%d",&a);
printf("Enter second no.\n");
scanf("%d",&b);
c=(int)(a/b);

printf("\n Quotient= %d",c);
getch();
}

P6.
#include <stdio.h>
#include <conio.h>
void main()
{
int a,b,c;
printf("Enter First no.\n");
scanf("%d",&a);
printf("Enter second no.\n");
scanf("%d",&b);
c=a%b;

printf("\n Modulus= %d",c);
getch();
}



P7.
#include <stdio.h>
#include <conio.h>
void main()
{
char x;
printf("Enter your gender\n");
x=getchar();
printf("\n\n Gender = ");
putchar(x);
getch();
}

P8. (Also given under the head "A little more of 'C'")
#include <stdio.h>
#include <conio.h>
void main()
{ char a, int p;
printf("Press 1 to convert from lower to upper OR 2 to convert from upper to lower\n");
scanf("%d",&p);
switch(p)
{case 1: printf("Enter any lowercase character\n");
a=getchar();
if(a<=122&&a>=97)
{a-=32;
putchar(a);}
else
printf("Entered character is not a lowercase character\n");
break;
case 2: printf("Enter any uppercase character\n");
a=getchar();
if(a<=90&&a>=65)
{a+=32;
putchar(a);}
else
printf("Entered character is not an uppercase character\n");
break;
default: printf("Entered choice is wrong\n");
}
getch();
}