How to secure your PC in 11 steps


So you have just bought a new personal computer for your home (rather than for a workplace or as a server)and want  to secure it (including protecting it from viruses and spyware). Privacy (including encryption, cryptography and  anonymity) is a part of security but broad enough to need covering separately. Think of Privacy as the flipside of the coin. Making backups of data, defragging, system restore points are only indirectly related. Backups can actually make your data easier to steal and retrieve.
This article assumes you wish to use a network (such as the internet), share files on pendrives and that your PC might be physically accessible to others. If none of those apply, then your many of these steps may be redundant as your PC will already be quite secure.

Scan files online using 40+ antivirus software at Virustotal

Ever wanted to scan a suspicious looking file using multiple antivirus software ? This happened to me recently, as I stated in my last post that I upgraded my   Ubuntu linux to Lucid Lynxand installed Oracle Virtual Box over it. I later installed Windows XP as a virtual operating system and thought it might be better if I would install an antivirus program on it. However, as I moved my antivirus program and some other files from my USB drive, I had a gut feeling that things are just not right. So..a bit of googling landed me at Virustotal.com which allows to scan a file using multiple antivirus software, and it does what it says perfectly :)

Top reasons Why PC’s Crash – Curing Blue Screen of Death

“Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications." 
You have just been struck by the Blue Screen of Death.

Unlock Yahoo when Account is Blocked


I found this whilst stumbling through net,It seemed to me a very useful known trick but still worthwhile to post ithere.When you or someone else enters an incorrect login multiple times then Yahoo! locks the account for "security reasons" and you are unable to access your chat names. Cool thing is that, these are a piece of cake to unlock. All you need is a list of Yahoo servers to log in with. Every time you login, you are using what's called a server to access yahoo. You login with a cookie, which is sort of like an information packet or ID proving that you are who you claim to be, and the account is yours. 

Debug Dos Command Tutorial


Debug is a program that comes with modern versions of DOS (I do not know when It started shipping out with DOS). Anyway, all Windows users should have it already. It's a great tool for debugging programs, de-assembling and cracking, and reading "hidden" memory areas like the boot sector, and much more. The following was copied from an assembly tutorial who's author we cannot credit, because we have no idea who he is.
Get into DOS and type "
debug", you will get a prompt like this:

Shell Packs & Other Tools


Its been a long time since I have posted the hacking tools,I m using one of the posts I found in forums months ago which I downloaded and used and found that it was really useful for budding hackers out there. Although script kiddies may utilize them for malicious purposes and I m not responsible for any kind of damage done.
You have Been Warned.






Training Finished,Damn College Started

First of all Hi Folks Wishing you a Very happy Independence Day.





As you all know training halt me to continue blogging now as soon as I finished  my training,damn college started from tomorrow onwards.
But believe me I m promise to you I’ll continue to blogging asap… till then stay tune with cool articles of The Protech
 You can always support me by buying me a cup of coffee.


Protect your Pendrive and surfing using Democrakey

Hi friends.. what I m going to discuss here might be of your interest because almost everyone of us is pesked nowdays with viruses,in our pendrives/usb flash drives.Yep..this is the hard reality,you happily go to your friends home to take those legally downloaded movies (*ahem),software and more stuff and get back to your PC with your antivirus screaming “Caution!!! A virus has been detected”.

Nmap 5.20 released !!

Nmap is of course of the most famous port scanners and hacking tools of all time, the last stable release was back in July 2009.For those that may not know, Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
Nmap 5.20 offers more than 150 significant improvements, including:

John the Ripper – Password cracking at its best


If you are into password cracking then you probably know about it,John the Ripper is one of the most popular password testing and breaking program available. JTR, as its fondly called ,combines multiple password cracking packages into one package,includes auto detection of hashes and is a fast password cracker. It is currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS and supports 15 different platforms . Its primary purpose is to detect weak Unix passwords ( no..I m kidding,Its primary purpose is to break passwords :P ).It can natively detect and crack various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and WindowsNT/2000/XP/2003 LM hash. JTR has an active community and multiple third party patches have been added to increase its functionality to include MD4-based password hashes and passwords stored in LDAP, MySQL and others unsupported hashes. JTR is the penultimate when it comes to password cracking in windows (Cain and Abel is the ultimate :P), but for Linux and open source,its the best you can get your hands on.Fire it up with a wordlist and you are good to go
Here is a sample output of JTR in Debian environment (shamelessly taken from Wikipedia)
root@0[john-1.6.37]# cat wpass.txt
user:AZl.zWwxIh15Q
root@0[john-1.6.37]# john -w:password.lst wpass.txt
Loaded 1 password hash (Traditional DES [24/32 4K])
example         (user)

guesses: 1  time: 0:00:00:00 100%  c/s: 752  trying: 12345 - pookie
You can download JTR from here
 Like this article ? You can always support me by buying me a cup of coffee




Cools Tricks

Disabling Recent Documents History
The bad thing about Recent Documents History is that Windows XP has to calculate
what should be put there each time you boot Windows, which can slow things down.
1. Open the Registry Editor (select Start/Run, type regedit, and click OK).
2. Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\
CurrentVersion\Policies\Explorer.
3. Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it
once it is created.
4. Set the Data Value to 1 to enable the restriction.
5. Click OK and close the Registry Editor. You'll need to restart the computer for the
change to take effect
Lock ur folder widout any software
Suppose you want to lock the folder movies in d: which has the path D:\movies.In the same drive create a text file and type
ren movies movies.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Now save this text file as loc.bat
Create another text file and type in it
ren movies.{21EC2020-3AEA-1069-A2DD-08002B30309D} movies
Now save this text file as key.bat

Advanced PC Tips and Tricks

Change Logon Wallpaper-Windows XP
Logon wallpaper is the wallpaper or image that windows xp shows on screen when windows logs on (before it asks for username & password) . It’s usually set to the image-logo of the brand(manufacturer) of our computer (e.g. in compaq laptops). Now we can set it to our own image or any other image(any bmp file) by following trick.

Open Startmenu->Run type regedit and press ok to open registry editor.(shows a tree like structure of directories at left)

In that hierarchical structure in left, navigate to registry entry
HKEY_USERS\.DEFAULT\Control Panel\Desktop




Changing the MAC address in XP

Method 1:
This is depending on the type of Network Interface Card (NIC) you have.  If you have a card that doesn’t support Clone MAC address, then you have to go to second method.
a.      Go to Start->Settings->Control Panel and double click on Network and Dial-up Connections.
b.     Right click on the NIC you want to change the MAC address and click on properties.
c.      Under “General” tab, click on the “Configure” button
d.     Click on “Advanced” tab
e.      Under “Property section”, you should see an item called “Network Address” or "Locally Administered Address", click on it.
f.       On the right side, under “Value”, type in the New MAC address you want to assign to your NIC.  Usually this value is entered without the “-“ between the MAC address numbers.
g.     Goto command prompt and type in “ipconfig /all” or “net config rdr” to verify the changes.  If the changes are not materialized, then use the second method.
h.     If successful, reboot your systems.

Our Cyber Cops always have an eye on illegal works or Cyber Crime

A team of Cyber investigation including DSP of patiala probe for  cyber crime in all cyber cafe's and note/tracked IP address of all cyber cafe near Punjabi University(patiala) (As Seen by me in my friend cyber cafe)
  • 26/11 Mumbai terror Attack Email sent from a cyber cafe-Rajkot
  • Email threatens to blow up BSE and NSE-Mumbai
  • Police  get email on terrorist striked-Delhi

  • E-mail threat to PM bounces back on cyber cafe owner-Kochi

  • Jaipur Blasts Email traced to UP cafe,jaipur cops say holes in video clip-Lucknow

  • Hoax email threat:cyber cafĂ© owner remanded-kolkatta

  • Lashkar-e-Toiba operatives use Cyber cafes –Hyderabad

  • Cops identify cyber cafe from where email threat to advani was sent-shilong
  • Conspiracy to trigger blasts in Tn hatched in prison-chennai

Be-care of Yourself  and Do such things at your own risk or with complete security.

 
Design by gitstein | Bloggerized by Kuldeep