Posts

Showing posts with the label PC

NETWORK HACKING

Image
NETWORK HACKING Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc. It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools. Ping :-  Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not. To ping a particular host the syntax is (at command prompt)-- c:/>ping hostname.com example:- c:/>ping www.google.com Various attributes used with 'Ping' command and their usage can be viewed by just typing  c:/>ping  at the command prompt. Netstat :-  It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc. It's syntax is (at command prompt)-- c:/>netstat -n Telnet :-  Telnet is a program which runs on TCP/IP. Using it we can connect to the remot...

How to remove autorun.inf virus from drives using notepad

Image
How to remove autorun.inf virus from drives using notepad                 Remove autorun.inf virus from drives using notepad Most of the people have autorun issues with their flash/hard drives it is because of the modification of the autorun.inf file in the root directory which is in most cases hidden and cant be seen so you just have to create a bat file with the following syntax as mentioned below Copy and paste this into Notepad and save it as antivirus.bat or whatever.bat (any name u like) tskill  ctfmon attrib -s -h -r c:\autorun.inf attrib -s -h -r  D:\autorun.inf attrib -s -h -r E:\autorun.inf attrib -s -h -r  F:\autorun.inf attrib -s -h -r G:\autorun.inf attrib -s -h -r  H:\autorun.inf attrib -s -h -r I:\autorun.inf attrib -s -h -r  J:\autorun.inf del c:\autorun.inf del d:\autorun.inf del  e:\autorun.inf del f:\autorun.inf del g:\autorun.inf del  h:\autorun.inf del I:\autorun.inf del J:\autorun.inf attrib...

Cannot open user default database. Login failed. Microsoft SQL Server, Error:4064[Solved]

Image
Cannot open user default database. Login failed. Microsoft SQL Server, Error:4064[Solved] Yesterday When I was trying to connect to Microsoft SQL Server database, I got an error like this –  Cannot open user default database. Login failed. Login failed for user. (Microsoft SQL Server,error:4064) . I did not made any changes in configuration or settings of SQL server, but still was not able to open SQL server databases due to this error. This error shows up due to some deleted database which was mapped as default database to my username. When you try to access that default database, the SQL server does not able find that database. The solution of this problem is very simple. You need to set  master  as your default database. Here is how to do it: Cannot open user default database. Login failed. – Fix Click on the  Options  button in the  Connect to Server  window.     Under the  Connection Properties  tab, Change the  Conne...

Shutdown Command Via Command Prompt

The 'Shutdown' Command                                                                    Becomes More Flexible and Automated when used from the Command Prompt. To Run the 'Shutdown' command from the command prompt, go to 'Start > Run', type 'cmd', and press 'Enter'. In the black box (the command prompt) type 'Shutdown' and the Switches you want to use with the 'Shutdown' command. You have to use at least one switch for the shutdown command to work. The Switches :- The 'Shutdown' command has a few options called Switches. You can always see them by typing 'shutdown -?' in the command prompt if you forget any of them. -i : Display GUI interface, must be the first option -l : Log off (cannot be used with -m option) -s : Shutdown the computer -r : Shutdown and restart the computer -a : Abort a system shutdown -m \\compu...

WiFi Password - Fast Automated Phishing Attack Tool

Image
Fast Automated Phishing Attack Tool for WiFi Networks Wifiphisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining WPA credentials. From the victim’s perspective, the attack makes use in three phases: 1] Victim is being deauthenticated from her access point:  Wifiphisher continuously jams all of the target access point’s wifi devices within range by sending deauth packets to the client from the access point, to the access point from the client, and to the broadcast address as well. 2] Victim joins a rogue access point:  Wifiphisher sniffs the area and copies the target access point’s settings. It then creates a rogue wireless access point that is modeled on the target. It also sets up a NAT/DHCP server and forwards the right ports. Consequently, because of the jamming, cli...

Control PC from Android phone using Chrome Remote Desktop

Image
Control PC from Android phone using Chrome Remote Desktop A Google Chrome app  Remote Desktop  allows you to control PC from android phone. It enables you to remotely access your Windows PC Desktop and thus you can perform any function of your PC from your Android smartphone. Accessing your PC from a phone can be helpful in many scenarios. This functionality also come in handy when you need to provide someone technical assistance over the Internet. You can access their desktop right from your Android phone and troubleshoot their system for any problems. So you no longer need to always sit on the front of your PC to access a remote Desktop. How to Control PC from android phone You need to run  Chrome Remote Desktop  app on both PC and Android phone in order to control PC from Android phone. Here is the step by step guide to access your PC from Android smartphone. First, install the Chrome Remote desktop app on your PC system from here –  Chrome.google.com/remoted...

Exchange links and text between phone and PC using WhatsApp

Image
Exchange links and text between phone and PC using WhatsApp  There are numerous times when we have some web link on our phone and we want to open it in our PC browser. Sometimes we need to send the copied text from PC to our mobile phone or vice versa. A small WhatsApp hack lets you  exchange links and text between phone and PC without the need of any browser extension or third party mobile app. You just need to add your own number in WhatsApp contacts and make use of WhatsApp Web feature. Exchange links and text between phone and PC First of all you need to add your own WhatsApp number in your contact list. For detailed instructions on how to add yourself in WhatsApp contacts, refer my this guide – Use WhatsApp as your personal note making and bookmarking app . When you add yourself in whatsApp contacts, you get an unlimited storage to save notes and web links inside whatsApp. Whenever you need to save something, just share it with yourself and you can ac...

How to Uninstall Windows 8, Install Windows 7 on Your PC

Image
How to Uninstall Windows 8, Install Windows 7 on Your PC Has Windows 8 got you down? It's not easy, but you can switch your new PC back to Windows 7. We show you the step-by-step (and the pitfalls). CONTENTS If you're fed up with the Windows 8 operating system that came on your new laptop, and just want to switch back to Windows 7, I've got good news, and bad news. The good news is that it is possible. You  can  remove Windows 8, install Windows 7, and go about your life as if Windows 8 never happened. The bad news is that it's a complicated endeavor. In addition to the expected BIOS wrangling, drive formatting, and reinstalling device drivers, Microsoft has actually added extra layers of complexity. The BIOS has the added obstacle of the Unified Extensible Firmware Interface (UEFI). Drives are partitioned and protected so that it's difficult to reclaim all of the space on your hard drive. And finally, manufacturers are spotty at best when it comes ...