Tuesday, 19 February 2013

tasklist and taskkill in cmd

If you work with Task Manager (ctrl+alt+del) ,you can easily understand this.  Task list is list of task which are running on windows currently.  If you open any application,it will be added to task.


To List the Tasks type in cmd as :
  tasklist
          tasklist
 This will show the list of task which are running as shown in the picture



To stop the Process or task ,there is two methods :
Using Image Name:
   We can kill the task using its Image Name as follows:
                       tasklist /im notepad.exe



Make your Computer Welcome You


Make your Computer Welcome You


Do you watch movies? Have you always loved the way how Computers in movies welcome their users by calling out their names? I bet that you too would want to know how you can achieve similar results on your PC and have a computer said welcome. 

Then you are at the right place, this article describes exactly how you can make your computer welcome you like this.

With this trick, you can make your Computer welcome you in its computerized voice. You can make your Windows based computer say "Welcome to your PC, Username."

Make Windows Greet you with a Custom Voice Message at Startup

To use this trick, follow the instructions given below:-

  1. Click on Start. Navigate to All Programs, Accessories and Notepad.
  2. Copy and paste the exact code given below.
Dim speaks, speech
speaks="Welcome to your PC, Username"
Set speech=CreateObject("sapi.spvoice")
speech.Speak speaks
     3.  Replace Username with your own name
     4.  Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Welcome.vbs or "*.vbs".
     5.  Copy the saved file. 
     6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) and to C:\Users\ {User-Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista) if C: is your System drive. AppData is a hidden folder. So, you will need to select showing hidden folders in Folder options to locate it.
     7.  Paste the file.



Now when the next time you start your computer, Windows will welcome you in its own computerized voice. 

Note: For best results, it is recommended to change sound scheme to No Sounds.
You can change the sound scheme to No Sounds by following the steps given below:-

  1. Go to Control Panel.
  2. Then click on Switch to Classic View.
  3. Then Click on Sounds and Audio Devices.
  4. Then Click on the Sounds Tab.
  5. Select No Sounds from the Sound Scheme option.
  6. If you wish to save your Previous Sound Scheme, you can save it by clicking Yes in the popup menu.
  7. Click on OK.



Try it yourself to see how it works. In my personal opinion, this is an excellent trick. Whenever I start my PC in front of anybody and the PC welcomes me, the fellow is left wondering how brilliant a computer do I have.














Create a Harmless Funny Virus with Notepad-Continuously eject CD/DVD drives


Create a Harmless Funny Virus with Notepad-Continuously eject CD/DVD drives


This VBS trick will create a code which will continuously eject all your connected Optical drives. If you put them back in, it will pop them out again. Copy this code and paste it in Notepad as Virus.vbs or *.vbs.

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Double click to open this file and you will be impressed by this awesome trick.

ipconfig

This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system name in DNS..  This will most useful tool for viewing and troubleshooting TCP/IP problem.



  • To view ip ,subnet mask address : ipconfig
  • To view all TCP/IP information, use: ipconfig /all
  • To view the local DNS cache, use: ipconfig /displaydns
  • To delete the contents in the local DNS cache, use: ipconfig /flushdns 
  • Trace a Hacker

    Want to know if someone is hacking your computer? Command Prompt can help you find if someone you don't know is connected to your computer stealing private data. Just execute netstat -a and the command prompt will return a list of computers that your computer is connected to. In the results returned, Proto column gives the type of data transmission taking place (TCP or UDP) , Local address column gives the port with which your computer is connected to an external computer and the Foreign Address column gives the external computer you are connected to along with the port being used for the connection. State gives the state of the connection (whether a connection is actually established, or waiting for transmission or is “Timed Out”).

    TO stop stealing your Wifi connection

    Command Prompt can let you know if someone is connected to your Local Area Connection and using it. Just follow the steps:- 
    1) Open your browser and visit http://192.168.1.1 or http://192.168.0.1 depending on your router. 
    2) Find the tab that mentions “Attached Devices” or something similar.
    3) Find the computer name, IP address and MAC Address (sometimes called Physical Address or Hardware Address) of your computer using the previous trick.
    4 )Compare it with those displayed by your router in Step 2. If you notice some strange devices, then your neighbour has been sneaking in on your internet connection and it is best to set a password.

    Know your IP address, DNS Server's address and a lot more about your Internet Connection

    Command Prompt can even let you know your IP address. Just type ipconfig/ all in the command prompt and press Enter. Along with your IP address and DNS servers, command prompt will also return a ton of information like your host name, primary DNS suffix, node type, whether IP Routing ,Wins Proxy, and DHCP are enabled, your network adapter's description, your physical (MAC) address etc . 

    Shutdown Your Computer or a Remote PC via Command Prompt


    Shutdown Your Computer or a Remote PC via Command Prompt

    Most of us shutdown our computers using the power button given in the Start menu. Some of us use the physical power button on our machines. Very few people actually use other means of shutting down a computer and even less is the number of people who use the command prompt to shutdown a computer.

    A reason for this is that most of us don't know that the command prompt can be used to not only shutdown, restart or log off our computer instantly but also to shutdown a remote computer provided you have administrative access. It can also be used to hibernate a computer and give a comment containing the reason for shutdown. This post will show you how to do all this.


    Required

    A computer running Windows (XP, Vista, 7 or 8) with the command prompt working perfectly, i.e. not disabled by a virus.

    Initial Steps 
    1) Press Windows Key + R.
    2) Enter CMD and press Enter.

    This will start the command prompt. Follow the instructions below depending on what you want to do.

    Shutdown Local Machine (Your Computer)
    Type "shutdown -s" without the quotes in the command prompt and press Enter. Shutdown is the command being executed and the switch -s tells the computer to shutdown.

    Restart your Local Computer 
    Type "shutdown -r" in the command prompt and press Enter. In this case, the command switch -r is telling the computer to restart after shutdown.

    Log Off the Current User
    Type "shutdown -l" in the command prompt and press Enter. The -l command switch tells the computer to log off.

    Shutdown a Remote Computer
    Type "shutdown -s -m \\name of the computer" in the command prompt and press Enter. Replace \\name of the computer with the actual name of the remote computer you are trying to shutdown. As mentioned earlier, you must have administrative access to the computer you are trying to shutdown. To know if you have administrative access, press Windows key + R and then type the name of the computer and press Enter.

    Note: If you don't remember the name of the remote computer, you can look for it by opening a list of all the computers you are connected to by executing "net view" in command prompt.

    If you can connect to the computer, you will be asked to login with your username and password. Upon entering them, a window will display the list of all the directories available to you. This should help you know whether you can or cannot shutdown the remote computer.

    Hibernate a Local Computer
    Type in "Rundll32.exe Powrprof.dll,SetSuspendState" without the quotes and press Enter. Your computer should hibernate, if it does not, then you must enable hibernation to do this.

    Shutdown your or a remote computer after a specific time
    Type "shutdown -s -t 60" to shutdown your computer after 60 seconds. Upon executing this, a countdown timer displaying a warning message will be shown. This command uses the -t command switch followed by a variable (which is 60 in this case) which represents the number of seconds after which the computer will shutdown.

    Display a Message containing the reason for shutdown
    Type shutdown -s  -t 500 -c "I am tired. I don't want to work anymore." (with the quotes) in the Command Prompt and press Enter. The -c switch is used in the code to give the reason for shutting down and what is followed in quotes will be displayed in the dialog box as the reason. This can be used to display all sorts of funny messages. One example :-

    Skynet has become self aware. John Connor did not stop me. You can not use your PC anymore.

    Stop a System Shutdown
    Type "shutdown -a" and press Enter. This will stop the system from shutting down if the countdown to shut down has not reached 0.

    Make Undeletable, Unrenamable Folders


    Make Undeletable, Unrenamable Folders


    Have you ever wondered how you can make a folder which neither can be deleted nor be renamed. Well, if you have, then you have come to the right place. With this trick, you will be able to create folders in Windows which cannot be renamed or deleted.

    Basic Concept
    The basic concept behind this trick is the use of Keywords. Keywords are reserved words in any programming language that cannot be used as names of variables. Windows also uses certain keywords in its programming. Some of them are con, aux, lpt1, lpt2, lpt3, lpt4, lpt5, lpt6, lpt7, lpt8 and lpt9.

    A Test
    To test this concept, make a new folder in Windows and try to give it a name same as any keyword suggested above.

    Result
    Windows will not rename your folder to any of the keyword given above.

    Trick
    So the question arises, how can we make a folder with a keyword as its name? The solution to this problem is included in Windows itself. As we know that Windows has evolved from D.O.S.(Disk Operating System), its commands can be used in Windows. You can use D.O.S. Programming in Windows to create a folder with a keyword as its name using the steps given below:-
    1. Click on Start.
    2. Click on Run. Type in "cmd" without quotes.
    3. In the Command Prompt Window that opens, type the name of the drive you wish to create your folder in the format <drive-name>: and press Enter. e.g. If you wish to create the undeletable folder in D drive, type "D:" without the quotes. Note that the folder cannot be created in the root of C:/ drive (if C: is your system drive).
    4. Type this command- "md con\" or "md lpt1\" without the quotes and press Enter. You can choose any of the keywords given above as the name of your folder.

    Now Windows will create an undeletable, unrenamable folder in the drive you entered in Step 3. However the folder can be renamed to another keyword using Windows Explorer.

    Deleting the Folder 


    Although it is not possible to manually delete the folder, you can delete the folder by typing "rd con\" or "rd lpt1\" in Step 4 instead of "md con\" or "md lpt1\". 

    Windows Compatibility: This works on Windows XP, Windows Vista, Windows 7 and Windows 8.

    Try it yourself to create one such folder which can neither be deleted nor be renamed.

    Sunday, 10 February 2013

    The NetBus Trojan:

    The NetBus Trojan:
       

     NetBus was written in Delphi by Carl-Fredrik Neikter, a Swedish programmer in March 1998.

    It is capable of :--
    • Open/Close CD-ROM
    • Show optional BMP/JPG image
    • Swap mouse buttons
    • Start optional application
    • Play a wav file
    • Control mouse
    • Show different kind's of messages
    • Shut down Windows
    • Download/Upload/Delete files
    • Go to an optional URL
    • Send keystrokes and disable keys
    • Listen for and send keystrokes
    • Take a screendump
    • Increase and decrease the sound-volume
    • Record sounds from the microphone
    • Make click sounds every time a key is pressed
    This utility also has the ability to scan "Class C" addresses by adding "+Number of ports" to the end of the target address. Example: 255.255.255.1+254 will scan 255.255.255.1 through 255.

    NetBus 2.0 Pro :- It was completely re-written and re-designed. It now has increased features such as improved GUI for client and server, improved file manager, windows manager, registry manager, plugin manager, capture of web cam images, n...more............!

    Following is the stepwise procedure for installation and configuration of NetBus 2.0 Pro (server and client).

    1) Download NetBus 2.0 Pro. from here - Description: http://www.insecure.in/images/bullet.gif 
    NB2ProBeta.zip

    2) Extract and install properly on your system.

    3) After installation you will find the two shortcuts in the NetBus installation directory.

    This is to be executed on victim's system.

    This is to be executed on your system.


    4) By Executing the 'NetBus Server' (on victim's computer), you will be greeted by a window as shown 
    in figure (left). Click on 'Settings' button.
    Here you can configure server settings such as port no, password, visibility, auto/manual start, etc. as shown in figure (right). 



             










                   

                          
           






    Click on 'OK' button to finish NetBus Server settings.
    Then close the NetBus Server window.
    5) By executing 'NetBus' (i.e. client)(on your system), you will be greeted by a window as shown below




    6) To add a new host go to the menu 'Host' and then click 'New'. This is as shown in figure (left).
    Here you should enter the proper Destination(e.g. 'My Computer'), IP Address(eg. 72.232.50.186), TCP Port(by default 20034), Username/Password(exactly same as that of 'NetBus Server') for target computer







    Click on 'OK' to finish the addition of new host.

    7) Now you are ready to connect with target(victim's) computer.
    To do so, select the host from main window then go to 'Host' menu and then click 'Connect'.

    8) After client get connected with server(target computer), you can use any of the features of 'NetBus Trojan' as listed above. You can see all these tools on 'Toolbar' of NetBus Client. 



                 

    Friday, 1 February 2013

    to find friends ip address

    It is easy to find one's ip address,  u just compose a mail and  open www.spypig.com, SPYPIG-Free email tracking system that sends notification email when the recipient opens and reads your email.

    Description

    • SpyPig lets you create an image to be used for tracking an email.
    • You copy the image to your message. When the recipient opens your email, it is downloaded from SpyPig and you are notified.
    • SpyPig offers a number of designs to choose (including a transparent image).
    • You can assign each image (and thus message) a title to identify it.
    step 1: GO to www.spypig.com,
    step 2: u have to fill this form

    step 3: u have to insert the spy pig image into the mail and send to your target friend

    step 4:if he opens that mail means you will recieve notification about him like
    then enjoy with his ip :)