September 30, 2007

Email Forging - Fun Mailer

All Email communication on the Internet is governed by rules and regulations laid by 2 different protocols:
(1) Simple Mail Transfer Protocol (SMTP)
(2) Post Office Protocol (POP)

Email is widely use Internet features. So, anyone uses it for malicious purpose with variety basis like:
(1) Abusive Email
(2) Email Forging
(3) Spam Email

Out of above, Email Forging is widely use for malicious purpose. It allows anyone to disguise the source of an Email and send it to the victim. It is the art of sending an Email from the victim's Email account without knowing the password.

For example: If you know your friend's Email ID then you can Email and inform his girl friend that he hates her and will break up them relationship. Or, If you know your Principle's Email ID then you can Email and inform your entire college that it will be holiday on tomorrow. Or, If you know your Boss/CEO's Email ID then you can Email on behalf of your CEO and inform entire office staff whatever you want. (all these are malicious activities so I myself don't allow)

But you can use it for Fun and just fool your friend using this tricks. Just fill out following Form and send Email. (I am not liable for anything so be careful while using this trick)


September 29, 2007

Change Caption of Internet Explorer

Some cyber cafes or companies use this kind of settings/trick like "Microsoft Internet Explorer by {company name}" or anything whatever they want to display on Internet Explorer's Title Bar. You can also change Caption of Internet Explorer. From this trick, you can create your own caption of Internet Explorer as per following simple steps.

Default Caption:



Change Caption:
You just need to add a String Value named "Window Title"(without quotation) under following registry branches;

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main

After creating "Window Title" string, type whatever you want to display as its value.

OR

Open notepad and copy-paste following text then save it as .reg extension. After then, simply run/merge it.

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Window Title"="Microsoft Internet Explorer by ASHISH JANSARI"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"Window Title"="Microsoft Internet Explorer by ASHISH JANSARI"

Note: Please don't forget to replace text as per your caption in place of "Microsoft Internet Explorer by ASHISH JANSARI".


September 22, 2007

Free POP3 Yahoo! Mail




It is not easy all time to open Internet, log in and check email. You can get emails through POP3 service and it is so easy to check emails via Outlook or Outlook Express. But, there is a condition that your email client offer this kind of service then you can enable it on your home/office computer with few settings. Mostly we are all using Yahoo! mail. Yahoo! mail don't offer this kind of facility with .com, .co.in etc. But, there is a trick from where you make Yahoo! Mail account and get free POP3 facility. Just open an account on Yahoo! Mail-UK & Ireland and get free POP3 facility.

Once you got an account on Yahoo! Mail-UK & Ireland then go to mail options click on 'POP Access and Forwarding'. Then select 'Web and POP Access'. Once you enabled this option you can get mails from Outlook or Outlook Express. Please refer following real screen shots.




After done above task now you just need to configure Outlook or Outlook Express with following settings.

Incoming Mail Server (POP3): pop.mail.yahoo.co.uk(Port: 995)


Outgoing Mail Server (SMTP): smtp.mail.yahoo.co.uk (Port: 465)


September 19, 2007

Auto Image Resize in Internet Explorer

Sometimes, we really don't know little but useful option. Auto Image Resize is just like that. One of my colleague complaint me that his Internet Explorer doesn't set image size automatically. When he browses with maximize window of Internet Explorer then it is fine with image size but when he Restore Internet Explorer then the image size doesn't set/follow to Internet Explorer. If you can enable Auto Image Resize in Internet Explorer then image size always follow to your Internet Explorer window size. Mostly, it is enable. But if it is disable then you can enable it with simple following steps.

Copy-paste following text in notepad and save it with .reg extension, then just merge/run it.

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Enable AutoImageResize"="yes"



Enable Auto Image Resize:


Disable Auto Image Resize:


September 16, 2007

SPYWARE



We’ve heard this word “Spyware” either directly or indirectly. And we are using anti-spyware software to protect/prevent. I have tried to explain about “Spyware” here. Maybe it will useful to you.

What is Spyware?

As like its name, Spy+(soft)ware=Spyware. It has spying properties in it.

Any software that covertly gathers user information without user’s knowledge for advertising, marketing, malicious or any other purposes is known as “Spyware”. You can get spyware absolutely free with freeware or shareware programs. Spyware monitors your net surfing habits, collects information and sends same to the creator of the spaware.

It is not Virus or Worm

Spyware does not directly spread in the manner of a computer virus or worm: generally, an infected system does not attempt to transmit the infection to other computers. It does not usually self-replicate like viruses or worms.

Location of Installed Spyware:

You can manually find installed spyware on your computer. You should check the following registry entries.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\ CurrentVersion\Run

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\ CurrentVersion\RunOnce

HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run

HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\RunOnce

Spyware at Startup:

As like as run it modifies windows Winlogon. It adds an ADDITIONAL shell(default explorer application) a spyware program can get itself loaded on windows startup. The registry key is located:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Shell

Anti-Spyware:

There are many programs which prevent spyware and its activities. They remove/block them too. You can choose any one out of them and stop spyware easily.


September 15, 2007

Set "Edit" as default Action



You always get a lot files from internet or other sources. If they are in .vbs or .reg extension and you make double click on them then they will simply modify your settings which may be harmful because you have “open” or "Merge" as default action. You don’t have chance to check on it. There is a trick where you can set “Edit” as your default action so when you make double click on .vbs or .reg extension files, they will open in edit view. So, you can check what is story inside those files and then you can open them with help of right click.


Copy-paste following text in notepad and save it with .reg extension. Then just merge/run it.

For .reg file extension:

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\regfile\Shell]
@="Edit"

For .vbs file extension:

Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\VBSFile\Shell]
@="Edit"


September 09, 2007

Administrator Account in Windows XP


In every installation of Windows XP, there are built-in and default accounts like Guest, HelpAssistant and Administrator. The Administrator account is equivalent to super user. If you have set up another user account in Windows XP as Administrator then default Administrator account will be hidden and invisible.

Unhide Administrator Account:

To see the Administrator account, you have to boot the Windows in Safe Mode or you can modify the Windows registry so that the Administrator account will be shown at Windows Welcome screen.

  • Launch Registry Editor.
  • Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ WindowsNT\CurrentVersion\Winlogon\SpecialAccounts \UserList in the Registry Editor.
  • Double-click the Administrator key in the right pane.
  • If the Administrator key doesn’t exist, right-click on the above tree in the pane, choose New, DWORD Value, name it Administrator.
  • Type 1 in the “Value data” box for unhide Administrator account. (set 0 to make Administrator hidden)

On the next boot, the Administrator account will be visible on the Welcome screen, along with all of the computer’s user accounts.

Back door login through default Administrator account:

Suppose you’ve an account with administrator rights and assigned a Password for same but, you missed/forgot its Password or there is a computer with Password protected user account and you want unauthorized login on same. Then just boot that computer and wait Windows XP welcome login screen. Now just hit Ctrl+Alt+Del twice and you will get a new window named “Log on to Windows” with Username and Password option. Type ‘Administrator’ as Username and leave blank as Password and hit enter. You can log on to anyone’s Password protected computer with this trick.

Change Password without knowing old password:

You can make fool/worry to your friend through this trick. Suppose you’re logged in your friend’s computer with his/her Password protected account which Password is hidden for you and you don’t know real Password. Just make a trick to erase or reset that Password with following simple steps in MS-DOS prompt.

Open Windows command prompt then type “net user (account name) *” without quotation marks then hit enter key. It will ask ‘Type a password for the user’ leave it blank or type a new Password then press enter. It will ask ‘Retype the password to confirm’, just repeat what you typed as ‘Type a password for the user’ and hit enter key. Well, you can successfully change Password with this trick without knowing old password. Please refer following real screen shot.


September 06, 2007

Add "Copy to" & "Move to" on Right Click(WinXP)



It is hard to move or copy a file/s or folder/s to specific location. There is a option called "Send to" on context menu but it has some limitation. You can send content through it just few locations like.. My Documents, Floppy Disk etc. If You can add "Copy to" and "Move to" options on Right click(context menu) then it will increase your file/folder transfer facility. You can Copy and Move your content anywhere on your machine through Right click(context menu). I have described a registry trick following here.

Copy-paste following text in notepad and save it with .reg extension. Then just merge/run it. You will get 2 new options on your Right click(context menu).


Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex \ContextMenuHandlers]

[HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex \ContextMenuHandlers\Copy To] @="{C2FBB630-2971-11D1-A18C-00C04FD75D13}"

[HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex \ContextMenuHandlers\Move To] @="{C2FBB631-2971-11D1-A18C-00C04FD75D13}"

September 04, 2007

Access Blocked Website


We have faced this trouble at college, office, organization, Institute etc. They blocked interesting websites like Yahoo!, Orkut etc and we cannot access what we want.

What is story behind website blocking?

There are number of Employees and students access interesting websites at office and college respectively and waste important office/college time. So, organization and institute block few websites and stop them to surf. Where, System Administrator makes a database on server level with installed filtering mechanism. So, when you type URL in your address bar and hit enter. The entire request passes through server. At that time, that filtering mechanism match you’re request and check whether it is blocked or not. If it is not blocked then you’ll get request back and display you’re requested site in your browser. But, if it is blocked then it will display modified error message and stop you to surf. Here, you just need to make fool you’re system administrator as well as installed filtering mechanism. There’s more than one way you gain access blocked website. I have described few ways here. Are you ready??!!!

(1) Use IP address instead of URL:

We use to type www.yahoo.com, www.hotmail.com which is just URL (Unique Resource Locator) and it is easy to remember, easy to type etc. But, actually every URL has an IP address. Please check older posts named IP Address and DNS Lookup. Still, some system administrators use only URL based blocking activities. So if you type URL then it will block your request but if you use IP address in different forms like dotted, dword, hexed or octal then you’ll get access of requested site. So, you can access blocked sites thru its IP address.

(2) Web-based Anonymous surf:

There is a lot websites which provides this kind of surfing and keep your identity hide. It’s called Anonymous Surfing. In this case, you just need to find an anonymous site which provides you a separate address bar on it where you can type blocked site’s URL and will gain access same. I myself also posted some anonymous sites’ addresses at Anonymous Surfing link. You can access blocked websites through this kind of anonymous website.

(3) Machine-based Anonymous Surfing:

It is also known as 'HTTP Tunnel'. As described above, there are few software are available in market for Anonymous Surfing. You can download them and install it in you computer so it is known as Machined-based Anonymous Surfing. I have picked few software like The Privacy Guard, Hide My IP, Hide IP Platinum, Invisible Browsing etc. The Privacy Guard is my favorite one. Just download any Anonymous Software, install it and start surfing blocked website.

(4) Manually Proxy Setup:

This is another very good trick against blocked website. Every Internet browser has inbuilt proxy setting facility. You just need to go there and set Anonymous IP with its port number at appropriate space. There are thousands of Proxy server’s IP available on Internet. You can find and test from www.samair.ru/proxy. Just pick up one IP with its relative port number and define it as your proxy. For proxy settings in Internet Explorer just go to ‘Tools’ menu then goes to ‘Internet options’. You will get window of ‘Internet options’. Now please check following real screen shot and set proxy as per your Internet connection type.

You can set proxy on Mozilla Firefox browser and other browser as like as Internet Explorer.