Saturday, October 3, 2015

Open Banned Websites With Proxy Sites

There are many sites which are blocked by government because of breaking laws of their country. People download many software to open these sites but end up being infected by malware, virus. Today i will share a trick with you which can help you easily open banned sites without downloading anything.

Visit List of Proxy

How To Open Banned Site ? 

1. Open any proxy site from list.

2. Enter the URL of the site which you want to open like below.

3. click the Go button and enjoy.

Friday, October 2, 2015

Enabling Command Prompt disabled by Administrator or Virus [Trick: Windows]

If you run the command prompt (cmd.exe), and getting error saying "The command prompt has been disabled by your Administrator". Then it is blocked by Administrator or could be virus infection.

There are ways using which you can re-enable it.

Using the Group Policy Editor

1) Click on Start. Go to Run. Users running Widndows 10, Windows 8/8.1, Windows 7 or Vista, go to Search.
2) Type gpedit.msc and press Enter.
3) Navigate to User Configuration/ Administrative Templates / System.
4) In the work area on the right side, double click on "Prevent access to the command prompt".
5) In the popup dialog, encircle Disabled and click OK.
6) You should be able to immediately use the command prompt. If you still cannot access it, restart your computer.

*Home editions of Windows do not contain the Group Policy Editor.

Using Registry Editor

Registry Editor is an in-built tool in Windows. You can use it to easily enable the command prompt by simply modifying a registry key. To do so, follow these steps.

1) Users running Windows 10, Windows 8/8.1, Windows 7 and Windows Vista, go to Start>Search. Users of Windows XP, got to Start>Run.
2) Type regedit and press Enter.
3) Registry Editor will start. If it is disabled, you will need to enable Registry Editor first.
4) Navigate to HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System. If the Windows key is not there, you will need to create a new key called Windows. Also, if the System key is not there, you will need to create it.
5) In the work area on right side, double click on DisableCMD and set its value to 0. If you cannot locate DisableCMD, you will need to create a new DWORD value called DisableCMD and set its value to 0.
6) Close the Registry Editor.

The command prompt should immediately be accessible. If it isn't, restart your computer.

The methods mentioned works on Windows 10, Windows 8/8.1, Windows 7, Windows Vista and Windows XP.

Thursday, October 1, 2015

View Passwords hidden under Asterisks/Stars [Trick]

Most browsers offer the capability of remembering usernames and passwords. Most of us use this feature to automatically save our usernames and passwords in order to log in more quickly. What if you forget the saved username and password?

As web browsers hide passwords using stars/asterisks/dots there is no way in which a user can recover his password by simply looking at what browser shows. Here are some tips and tricks that you can use to reveal your password for a website when you have forgotten but your browser remembered.

Use Developer Options to show password

Open the website for which your browser has the saved password, then right click on the password box and click Inspect Element.

A code like this would be displayed:-

<input type="password" class="inputtext" name="pass" id="pass">

Change the type from password to text so that the code looks like:-

<input type="text" class="inputtext" name="pass" id="pass">

Your password would be immediately visible.

Mozilla Firefox Add-on

Show My Password is a Firefox Add-on which automatically converts hidden passwords into human readable form. To use this add-on, just open the webpage with the hidden password and click in the field containing the hidden password. This add-on will automatically reveal the password to you.

Software to reveal hidden passwords behind stars

There are free software that you can use to recover forgotten passwords. Some of them are:-

Password Viewer:Password Viewer by IT Samples is another application that can be used to unmask passwords hidden behind stars. It allows you to view passwords not only in web browsers but also in any program.

Asterisk Logger:Asterisk Logger from Nirsoft is one such software. It automatically displays the hidden password whenever a window containing a hidden password is detected.

Note : These tools are browser independent. These software will not be able to show User Account Control /Windows logon password.

Wednesday, September 30, 2015

Destroy Your Confidential Data to Unrecoverable Level

Every business has some documents that need to be kept confidential. They can be anything from financial records to sensitive personal information to national data. Sometimes data needs to be destroyed because there is no physical or digital space to store it, and it cannot be thrown away in a random place. Here are some ways in which anyone can dispose confidential data.

Confidential Paper Documents

The simplest way to destroy confidential paper documents is to put them through a shredder. All confidential files can be shredded with little or no effort. Depending on how confidential your data is, you can choose the right kind of shredding process. Shredding services will also shred your documents for you, at a fee. If you are an individual and cannot afford a shredder , you can burn the paperwork in a safe place to destroy them completely.

Confidential Data on Your Computer

If you use computer, you would have important data and files on it which you might not prefer others to have a look at.
Q. What is the best method of getting rid of your confidential data so that no one can access it?
Most of us think that the delete key (or shift+delete combination) will help to get rid of these from the system forever, but that is not exactly the truth. Any file that has been deleted from the hard disk can be retrieved by anyone, who knows how to recover deleted documents.

Erasing the Hard Drive

Erasing hard drive clean all data, This is one of the ways in which you can remove the confidential information. There are programs that overwrite storage with random data so that the original files cannot be retrieved. You can also try Guttmann Method, in which the files are overwritten 35 times. CDs, Hard Drives and other disks must be destroyed to prevent information from being accessed.

 Hard Drive Shredding

Programs that erase files and write over them can make your files nearly impossible to retrieve. However, in some cases, it is still possible that data is recovered by an expert. To avoid this, the hard drive can be shredded entirely. CDs and drives can be destroyed by breaking and drilling holes. The greater the number of holes you drill in the drive, the less likely it is that the data can be retrieved, even by an expert.

All memory chips, hard drives and other similar devices can be shredded by a digital shredder, which destroyed devices completely. This makes it impossible to recover any information from the drive.

Tuesday, September 29, 2015

Matrix Code Effect [Notepad-CMD Tricks]

Have you watched “The Matrix”? Of course, you have. You can make matrix type running codes just by using notepad and Command Prompt. Just copy and paste the code given below in Notepad and save the file as "a.bat" or *.bat.

@echo off
color 02
echo %random%%random%%random%%random%%random%%random%%random%%random%
goto loop

Upon running the bat file, you will see the Matrix type code effect.

Monday, September 28, 2015

Convert Videos using VLC Media Player

VLC is free and open source media player, great at playing media of many formats. Also It can be used to easily convert videos from one format to other. Converting videos with VLC media player is fast. It can also be used to resize videos from one size to other for when you need to shrink videos to fit in your mobile devices. It can also used as video cutting tool.

Convert Videos with VLC Media Player

To convert videos with VLC media player, follow the steps given below:-

1) Open VLC media player.
2) Click on Media in the Menu bar.
3) In the dropdown menu, click on Convert/Save. Alternatively, you can press Ctrl+R to directly reach media options.

4) Click on the Add button on the right of the File selection box to load the video whose format you want to change.
5) In the following dialog box, click on browse to select the destination where your converted video will be.

6) In the profile selection option, select from a pre-configured profile of the output or customize it by clicking on the Settings icon on its right. You can select from a range of encapsulation, video and audio formats in the following dialog box if you wish to customize the output.
7) Click on Start to begin conversion.
8) VLC's progress bar will show progress. Do not close the player when it is converting videos as it will result in output video getting corrupted.

Sunday, September 27, 2015

Check if someone is hacking your computer/ Trace a Hacker

Do you want to know if someone is hacking your computer?

Command Prompt can help you to find if someone you don't know is connected to your computer stealing private data. Just execute netstat -a and the command prompt will return a list of computers that your computer is connected to. In the results returned, Proto column gives the type of data transmission taking place (TCP or UDP) , Local address column gives the port with which your computer is connected to an external computer and the Foreign Address column gives the external computer you are connected to along with the port being used for the connection. State gives the state of the connection (whether a connection is actually established, or waiting for transmission or is “Timed Out”).

These tricks work on Windows 10, Windows 8/8.1, Windows 7, Windows Vista, Windows XP and all previous versions of Windows.