How to Booting Xp With A Pen Drive ?

Booting Xp With A Pen Drive

There are times when a minor error in the Windows Registry or a Virus Infection, can make your system unbootable. In such a condition a properly configured USB drive on hand with Bart Lagerweij's free utility (BartPE), is a handy replacement for windows operating system.

How to Run multiple yahoo messengers ?

Running Multiple Yahoo Messengers

It is possible to run multiple Yahoo Messenger simultaneously right after installing the official version of Yahoo Messenger.

You will need to apply a simple windows registry patch to enable this feature.

>>Follow these simple steps :

Different methods for hacking Password

Password Hacking




Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques : 

FolderLock Without any Software.....

Folder Lock With Password Without Any Software


Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do. 
Then you see a batch file. Double click on this batch file to create a folder locker. 
New folder named 'Locker' would be formed at the same location. 

How to hide .exe file into a JPEG image ?

Hide EXE files into JPEG


This is a good trick to hide your exe files into a jpg file..!

How about sending a trojan or a keylogger into your victim using this trick..??

1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

How to Hide Data in Image, Audio & Video Files: Steganography ?

Hide Data in Image, Audio & Video Files: Steganograph

Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

Proxies for Windows

Use Proxies in Windows

 100%  Working......

Go to control panel
1)phone modem options
2)advanced
3)In Providers, click Microsoft H.323 Telephony Service Provider, and then click Configure.
4)In Configure H.323 Service Provider
5)To specify an H.323 proxy, select the Use H.323 proxy, and then type the server name or IP address for the proxy.

Google Security

Google Security
 
Google is always adding new products and features. One of these is the Personalized Google Homepage. You can customize it with news, movies, weather, stock market reports and more. How convenient. But there is a dark side.

How to Close your non-responsive programs automatically ?

Close your non-responsive programs automatically


Normally you end tasks the non-responsive programs manually using windows task manager with (CTRL + ALT +DELETE) keys. Sometimes these non-responsive programs creates problem to run windows and others programs properly.  You can configure your computer to manage these non-responsive programs automatically. Windows has a feature that will close all non responding program automatically. If you have little knowledge about editing windows registry then you can configure your computer for this purpose.

How to use Bluetooth technology to connect laptop and cell phone?



 Bluetooth technology to connect laptop and cell phone

 




We can use Bluetooth technology to connect laptop and cell phone. We can move videos, images, photos etc from  desktop computer or a laptop to our cell phones. In order to use Bluetooth technology to connect laptop and cell phone we need a laptop and a cell phone which support this technology. Try webhosting
If the laptop doesn't support it, we can use a USB Bluetooth dongle.  Just plug it into the USB port of the desktop computer or laptop. Leave the rest to Microsoft Windows. It will find the driver and install it itself.  If it is not supported, we can manually install it via the manufacturer's compact disk. Follow these simple steps in order to use Bluetooth technology to connect laptop and cell phone: (In this example, we are using Windows Vista.)

How to improve your Wireless internet and network connection?

 Improve your Wireless internet and network connection

Microsoft Windows gives you a notification whenever your wireless network has a weak signal. This is a sign that you should improve your wireless network. When you get this notification, it means that the wireless connection is not as reliable or high-speed as it's supposed to be. In fact, the wireless connection signal may be completely lost in certain areas of the house. If you would like to improve your wireless network signal, you should carry out a few of these tips. These tips will extend the wireless range. They will also improve the overall performance as well as reliability of the wireless network.

How to Secure a Wireless Network from Hackers?

Secure a Wireless Network from Hackers



The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks.

How To Make A Fake Virus ?

Make A Fake Virus



This is an interesting tutorial in which we will create a fake “virus” which can shutdown, restart and log off your pc(Can also write a message and specify the countdown time). This is actually a faster way to turn off your pc, ’cause it doesn’t require clicking START>TURNOFF button etc…
.And you can always do a little mischief by sending it to your friends ;)

Hide IP Address from ISP Service Provider

How to Hide IP Address from ISP Service Provider ?
 
HackGalleryTips
 
“Can I hide my IP address from my ISP (Internet Service Provider)?”.

First of all, why would you be interested in doing this? ISP usually
logs your online activities and can even ban or warn you if you perform
certain activities (e.g. download copyrighted movies form torrents).

Make Folders Invisible

It is Eassy to Make Folders Invisible
HackGalleryTips
 
 
Hiding folders is an easy to do task inMicrosoft Windows XP. This is a great way to keep all your personal files un-findable.
To do this, create a new folder some where. Then ‘Right Click’ and select

Android Tips

Do you want to take control of your Android phone?
HackGalleryTips
Do you want to take control of your Android phone? By "rooting" your device, a process similar to jailbreaking an iPhone, you can install custom ROMs (images), which add stability and speed improvements to Google's mobile operating system, as well as install new features developed by the hacker community themselves. The procedure involves running commands that enable total access to the device. For non-developer types, hacks like these sound scary, but by following the instructions below, you can take control of your Android phone in only a matter of minutes. The end result is a truly open device which you can modify to your heart's content.

SQL Injection Scanners

Latest Top 15 SQL Injection Scanners
HackGalleryTips


While the adoption of web applications for conducting online business has enabled companies to connect seamlessly with their customers, it has also exposed a number of security concerns stemming from improper coding. Vulnerabilities in web applications allow hackers to gain direct and public access to sensitive information (e.g. personal data, login credentials).

How To Delete an UnDeletable File ?


Eassy way To Delete an “UnDeletable” File 
HackGalleryTips

  Hello Friends, this Tutorial is for all those who want to delete some files but they cannot delete them due to some reasons.  Well this is a Full Proof way of deleting any Damn File. After Deleting the File in this way there won’t be any trace of that File on your computer.

Notepad Hack Trick

How To hack by Notepad trick  ?
HackGalleryTips


Well quite old but here is d complete collection
Step 1: Open Notepad
Step 2: Write following line in the notepad.
this app can break
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.



How to send a Fake E-mail ?

Learn how to send your fake email HAckZ


For the purpose of this tutorial, 
we’ll be sending from bush@whitehouse.gov to dummy@anysite.com.
Second, you’ll need to find out the mail server that your recipient is using.
Click Start, Run, enter “CMD”, then presss OK. In the window that comes up, type nslookup -q=MX anysite.com
Go to Applications, Utilities, and choose Terminal. In the window that comes up, type nslookup -q=MX anysite.com
Bring up your favourite shell, and type nslookup -q=MX anysite.com

Download Youtube videos : Eassy way

How To Downloading YOUTUBE VIDEOS
HackGalleryTips






Many of my friends ask me about how to find or download videos online...

And i also know that most of you know about it tooo
  • Alright  now follow these steps....

How to make a Keylogger ?


It is Easy to make a Keylogger.....
Wanna learn how to make your own keylogger ? Here is step by step tuorial that will help you to make a keylogger in C++ using dev-c++, it can also be done in codegear c++ builder, Visual studio and similar. 
Keylogger is simple stealth software that sits between keyboard hardware and the operating system, so that it can record every key stroke

VoIP Hopper – VoIP VLAN Hopping Tool


VoIP Hopper – VoIP VLAN Hopping Tool


       
  VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop into the Voice VLAN on specific ethernet switches. VoIP Hopper does this by mimicking the behavior of an IP Phone, in Cisco, Avaya, and Nortel environments.  This requires two important steps in order for the tool to traverse VLANs for unauthorized access.

Fix Windows Error using Registry Cleaner


Fix your windows errors with registry cleaner


HackGalleryTips

WIndows is the most used operating system of the world. But most of the virus and malwares harms windows. And each time a person is forced to re install windows because of virus effects. 

But you can also recovers and fix your windows errors without re-installing windows.

Joomla Vulnerability Scanner


Joomla security scanner – JoomScan


                    Joomscan is a nice vulnerability scanner for the popular content management platform Joomla. It detects more than 550 vulnerabilities in the website based on the Joomla which includes file inclusion, sql injection, command execution.

PHP Vulnerability Finder


PHP Vulnerability Hunter v.1.1.4.6


            PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool which detects almost ll of the web application vulnerabilities listed on the advisories page. PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool capable of triggering a wide range of exploitable faults in PHP web applications.

Secure From Android Hackes

Best 6 ways to Beat Android Hackes

Hackgallerytips.blogspot.com
                      Be afraid! Be extremely afraid! A whole host of hackers are out there waiting to harness your Android for their own devices and according to experts, the data theft problem is only going to worsen. Whether it’s a rogue app which installs itself with a Trojan virus to boot or an unscrupulous soul hacking into your voicemail, your personal details are hot property should someone be able to harvest them. Follow our top tips to steer clear of the dodgy Android operators however, and you’ll be able to swat them away like the pesky critters they are.

Hackers Targeting IPv6 : As websites scramble


Hackers Turn Attention to IPv6


                   Hackers are targeting the IPv6 protocol as websites scramble to switch over to the new Internet Protocol platform from its predecessor, IPv4.
According to CIO, Cisco engineer and security expert Eric Vyncke believes that the stateless auto-configuration feature that comes with IPv6 poses a huge threat to organisations.

Windows Phone 7 Tips & Trickes


Tips and Tricks for Windows Phone 7

                   In the first of a new regular feature on ITProPortal we are offering tips and tricks about mobile phones and their operating system that you may, or may not, know about.
ITPP is now covering aspects of the Microsoft Windows Phone 7 operating system, which will help in getting the best out of a handset and the platform as a whole.

Windows 8 On XP Machines


Windows 8 On XP Machines? Microsoft Says Yes





                 Many older PCs have enough horsepower for the upcoming OS, says the software maker, which also pledges to simplify setup and installation this time around.

Hack Android Password


Do you know where the Android Password is Placed ?

"Android Password are stored in text files on Device"




       There  has  been  a new  discussion  that  has  been  triggered  by  a  user  over  secuity  of  passwords  stored  in  Android  devices.  The  argument  says  that  passwords  aren’t  stored  in  any  form  of  encryption,  and  if  anyone  has  access  to  root  of  the  device,  you  could  be  seriously  compromised.

How to secure from backdoor programs ?

Most used backdoor programs






               There is a general misconception about security today. Most people would love to believe that their firewalls are completely capable to protect them from anything indecent. 


The sad part, they could not be more wrong. Avitricks aim to prove it with three separate programs that can compromise the security of computers you have the opportunity to say “What’s a backdoor?” Yes, these programs were created in 1990, but still pose a real threat today. It is the first two that are still being developed.

How to Protect your Password from Keylogger ?



Fool keylogger and protect yourself from hackers




when you surf net at public computers or net cafes…maybe it can be even at your friends house..etc.. there is a danger that a possible key logger software can steal your password, so i have come up with a simple and effective way to counter it…at least 50% …

lets see how simply you can fool a key logger,

WANT TO KNOW WHO USED YOUR PC IN YOUR ABSENCE



Who Used Your Pc In Your Absence


Who Used Your Pc In Your Absence,what Did He Do?
first you should go


start > run > eventvwr.msc


Events are stored in three log files: Application, Security, and System.

Create Fake Login Page Inorder To Hack others Account

How to create your own Fake Login Page.. ?


hackgallerytips.blogspot.com
This goes into more detail on how to create a fake page to login, and get redirected while it is sending a email of the password and username to your inbox. If you found this easy, then try out the post, “How to Hack Gmail, Yahoo, Hotmail, Orkut or Any Other”

Fake login page is a fake page which you can use to hack others username and password. Fake login page looks exactly like the original page and if someone login in your page using his original username and password, the username and password will be mailed to you The process of Hacking anyone’s id using fake login pages is known as Phishing

Increase system speed by increasing virtual memory...

Guys Now get your computer to be really fast..



" All u need is a High GB Pendrive "


Inoder to increase Virtual memory you must follow certain  steps..


Here your Pen Drive act as as a virtual memory media... 




Facebook hacked, users seeing images of porn and violence


Facebook scare: 2 lakh accounts hacked in Bangalore



hackgallerytips.blogspot.com

The recent Facebook hack has reportedly claimed over 2 lakh victims in Bangalore. According to a news report in Mid Day, some two lakh Facebook users in Bangalore had their accounts hacked and weblinks to their morphed pornographic pictures sent as feeds to friends and family.
Quoting social networking analysts, the report says that more than 2 lakh Bangalore Facebook accounts were hacked. The cybercrime department too is reported to have received calls and complaints regarding the mass hacking.
According to the report, there are around 50 posts on Facebook stating that the users are quitting the social networking site forever after being embarrassed before friends and family.

Add Special Symbols in Facebook Chat/Scraps

Adding Special Symbols in Scraps !!!!!!!!!!!!!!!

hackgallerytips.blogspot.com


This is a much awaited trick on FaceBook & Orkut ,
very less users know about it
be d one n Impress your friends !!




here it is:-------

Improve Windows Xp Boot Speed Upto 60%

How To Increase Windows Xp Speed Upto 60% ?





                                                     Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly. In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the bootup speed you want. This chapter explores how to put these techniques to work.

Some of the things may already have been discussed in some threads earlier