background preloader


Related:  Hacks

www.howtogeek If you’re planning on doing a reinstall of Windows but can’t find your product key, you’re in luck because it’s stored in the Windows Registry… it’s just not easy to find, and it’s impossible to read without some help. Luckily, we’re here to help. As you can see in the screenshot above, the product ID is stored in the registry but is in a binary format that can’t be read by humans unless you are some sort of Cylon. You aren’t, are you? We’re not really sure why Microsoft went to great lengths to make it difficult to see the product keys for their software, especially since they are stored right in there in the registry and can be read by software, if not by humans. The great thing is that you can even recover a key from a computer that won’t boot anymore. Note: the NirSoft keyfinder won’t always work for OEM computers, depending on how they decided to activate the licenses they might have used a single license for all computers. Three Places You Might Find the Key

geekyprojects If you are reading this article you are probably desperate, but before you panic let me tell you that there is hope, and there is probably more hope than you think…. Even if your hard drive has an internal mechanical malfunction, data can be recovered without having to send the hard drive to a data recovery service. Yes! you heard right, I’m sure you have come across articles that will tell you how to recover data from a damaged partition, you will find a ton of those on the web, but when your hard drive starts malfunctioning none of those articles are going to help you solve your problem, This article will. Corrupted file system If the hard drive gets detected by Windows and can be accessed but you do not see any data inside, or you get a message saying that the drive needs to be formatted. The software does have its drawbacks. Clicking noise of death If your hard drive is making the common “clung… clung… clung…” sound your head are having trouble reading the contents of the drive.

fakena www.howtogeek Photo by Benjamin Gustafsson Anytime you’re making connections to anything outside of your network, security should be a concern, and this is doubly true for users of BitTorrent, who are getting data from all sorts of unknown sources. Here’s how to protect yourself. Note: This is the third part in our series explaining BitTorrent—be sure and read the first part of the series, where we explained what BitTorrent is and how it works, and then the second part, where we explained how to create your own torrents. Security Threats It’s important to understand what types of threats are out there in order to effectively block them, so let’s take a look. Viruses and other forms of malware are the most basic of threats. Photo by fitbloggersguide On the more serious side, it shouldn’t be any surprise that your IP address is very easy to trace. Encryption One way to help alleviate these problems is to enable encryption for your connections. This is not a perfect solution, however. IP Blockers

wpengine Who is the first superhero that comes to mind? What about a number between one and 10? And finally, a vibrant color? Quickly think of each of those things if you haven’t already, and then combine all three into a single phrase. Now, it’s time for us to guess it. Is it Superman7red? Passwords are so often easy to guess because many of us think of obvious words and numbers and combine them in simple ways. We began by choosing two data sets to analyze.​ Two Data Sets, Several Caveats

password_sniffer Related Links Windows Password Recovery ToolsSmartSniff - Monitoring TCP/IP packets on your network adapter Mail PassView - Recover POP3/IMAP/SMTP email passwords. Dialupass - Recover VPN/RAS/Dialup passwords Search for other utilities in NirSoft Description SniffPass is small password monitoring software that listens to your network, capture the passwords that pass through your network adapter, and display them on the screen instantly. Versions History Version 1.13: Fixed bug: When opening the 'Capture Options' dialog-box after Network Monitor Driver 3.x was previously selected, SniffPass switched back to Raw Sockets mode. System Requirements SniffPass can capture passwords on any 32-bit Windows operating system (Windows 98/ME/NT/2000/XP/2003/Vista) as long as WinPcap capture driver is installed and works properly with your network adapter. On Windows XP/SP1 passwords cannot be captured at all - Thanks to Microsoft's bug that appeared in SP1 update... Using SniffPass Command-Line Options

www.howtogeek Just about any self respecting geek always has a flash drive handy. Whether it is on your key ring on in your purse, having the ability to access certain files and utilities anywhere can really come in handy at times. However, if you were to lose or have this flash drive stolen, depending on what is stored on the drive, you could be setting yourself up for a completely preventable disaster. With the help of TrueCrypt, you can easily protect the data stored your flash drive so that if it is lost or stolen, nobody will be able to get to your sensitive files. Image via LadiesGadgets Creating a TrueCrypt Volume Plug in the flash drive you want to protect data on copy any data you want to protect onto a folder on your hard disk. The process of creating an encrypted file container for a flash drive is no different from the normal TrueCrypt process. From the Tools menu, select Volume Creation Wizard. Select the option to Create an encrypted file container. Set your encryption options.

null-byte.wonderhowto Hack Like a Pro: How to Spy on Anyone, Part 1 (Hacking Computers) Welcome back, my rookie hackers! Now that nearly everyone and everyplace has a computer, you can use those remote computers for some good old "cloak and dagger" spying. In this brand new series, we will explore how we can use the ubiquity of the computer to peek in on just about anyone and anyplace. We will examine how to turn that commonplace computer into our own bug to listen in on conversations, use as a spy camera, track Internet searches, and more. In this first part, I will show you how to convert any computer, anywhere, into a listening device. Step 1: Fire Up Kali The first step, of course, is to fire up Kali Linux. Step 2: Compromise the Remote Computer Probably the best way to compromise your target's computer is to use a carefully crafted email that will get the target to click on a document or link. This becomes an exercise in social engineering at this point. I hope you get the point. Step 3: Find an Exploit

4 Ways to Crack a Facebook Password and How to Protect Yourself from Them Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over 1.94 billion monthly active users, as of March 2017 — and around 1.28 billion daily active users. We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. But we sometimes forget who's watching. We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. The scariest part is that as we get more comfortable with advances in technology, we actually become more susceptible to hacking. In fact, you don't even have to be a professional hacker to get into someone's Facebook account. It can be as easy as running Firesheep on your computer for a few minutes. Method 1Reset the Password How to Protect Yourself Method 2Use a Keylogger

www.howtogeek There’s a good chance you already use the VLC media player. But VLC isn’t just a media player — it’s a complete Swiss Army Knife for digital videos and music, filled with useful and fun features you haven’t found yet. If you’re just using VLC to play back local media files, you’re only using a tiny fraction of VLC’s capabilities. There’s so much more you can do with VLC, whether you’re using it on Windows, Mac, or Linux. Convert Media Files VLC can convert media files between the formats it supports. To do this, click the Media menu and select Convert / Save. Stream Media Over the Network or Internet VLC can stream media across the Internet or on your local network. Of course, if you want to stream over the Internet, you’ll probably need to forward ports on your router. Record Your Desktop VLC can load your desktop as an input device. Remotely Control Playback From a Browser VLC has an integrated HTTP server you can enable. Watch YouTube Videos Play Internet Radio

merabheja Below is a list of one of the best hidden 101 Computer tips and tricks to impress your friends which you have been unaware of so far in life. Here you go. You can search Google timer in Google for a timer with alarm Search This in Google for Direct Mp3 Links intitle:index.of? Use your Chrome Browser as Notepad quickly. Just copy the text below to the address Bar. data:text/html, <html contenteditable> Note: You can also bookmark this to use it anytime. View Hidden Password in Browser Visit to see How Google View You Read: 50 more Google search Tricks Rename Subtitle File same as movie name and VLC will load subtitle automatically every time you open Movie Rename the subtitle file same as movie name (Kept in same folder) and you do not need to load subtitle everytime you play the movie. In your PC just create a folder with the name given below and access everything GodMode. To Undo an Undo Just press CTRL+Y Bored !

6-links-that-will-show-you-what-google Want to find out all the things Google knows about you? Here are 6 links that will show you some of the data Google has about you. 1. Find out how Google sees you Google attempts to create a basic profile of you, your age, gender, interests. 2. If you use Android, your mobile device may be sending your location as well as velocity data to Google. 3. Google saves every single search you have ever done. 4. If you worry that someone else might be using your account, you can find a list of all devices that have accessed your Google account, their IP address and approximate location here: 5. This is a list of all the apps that have any type of access to your data. 6. Google let’s you export all your data: bookmarks, emails, contacts, drive files, profile info, your youtube videos, photos and more here:

login2 It's simple! This service is made for you to save your time on registration for many sites. You can not register at all sites, so just type the name of site for which you need to enter login and password and click «Get». Tips: Our project is constantly developing and we try to keep our database in actual state, use more of our services. So, we will try to find for you the latest logins to any site!