Wednesday, 27 November 2013

Password Protect Any Folder Without Any Software

 1. Open Notepad and Copy code given below into it.


cls
@ECHO OFF
title coolhacking-tricks.blogspot.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== coolhacks goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End


 2. Save the notepad file as lock.bat (.bat is must)

 3. Now double click on lock.bat and a new folder will be created with name MyFolder

 4. Copy all your data you want to protect in that New folder

 5. Now double click on lock.bat and when command promp appears Type Y and press enter.

 6. Now MyFolder will be hidden from you view, to access that folde double click on lock.bat

 7. It will ask for password enter your password and done. (Default password is coolhacks)

To change the password replace coolhacks with  new password in the above code
How To Further Secure ?

You might be thinking that anyone can access the password by opening that lock.bat file in Notepad or any other text editor. To make it more secure hide lock.bat in some secure location after following the above tutorial To access the secured file double click on lock.bat. I would suggest copying lock.bat file into Pendrive and copying it into your computer whenever you required to access to your protected files.


Dont for to subscribe to get some cool hidden trick to ur mail.. post ur comment to get some more cool trick if u liked it..

How to copy you program in Lab Exam through Steganography

Well today we are making the first post of “LEARN HACKING LEVEL 2″.
The First topic we are going to discuss today is “STEGANOGRAPHY”.
So what is Steganography?
Before coming to the point let me tell you its history.
You might have seen in old chinese movies that the monks used to safeguard secrets by hiding those secrets on their body parts so that no one else can see them but them.
This concept was developed further and it was implemented in computers as well.
This is called Steganography.
Now coming to its implementation in Computers.
By the use of Steganography you can Hide one type of file behind other keeping the format of file same.
I personally find it very useful because it helps me hide my important information easily.
So do you want to try Steganography on your machine ?
Lets get started.
NOTE:- The files and folder names I am going to use are just for reference. You may use different if you want to. But for beginning I would suggest to follow along. Later on you can try it with different file names.
Setup:-

1) Create a new folder named test in any drive (say C: Drive)
2) In  the test folderCreate a text file in it named – hi.txt
3) Copy any default windows picture from my pictures say – desert.jpg in the test folder

Now the game begins.
Type anything you want to in the  Text file and make its font big so that its easily readable
1) Open command prompt
2) Open the test folder.
      You may use the following commands to do that
    2.1)   C:
    2.2)   cd test
3) Now use the following command
      COPY /B desert.jpg+hi.txt new.jpg
       ie… the syntax is
      Copy /B name of file in which you want to embedded the content+ name of file which you want to embedded name of new file
And that’s it. You are done.
Open the test folder and you will see a new image named new.jpg.
When you preview it you will see the normal image but now right click it and open the image with notepad. At the end of the file you can see the text that you wrote in the document.
Remaining you need to think by yourself ,,,,, if yet u didnt understand post a comment I will let you know

Monday, 3 June 2013

WiFi Password Decryptor version 1.0

wifi password cracker

SecurityXploded team has released a free WiFi Password Decryptor that instantly recover Wireless account passwords stored on your system.

It automatically recovers all type of Wireless Keys/Passwords (WEP/WPA/WPA2 etc) stored by Windows Wireless Configuration Manager.

After the successful recovery you can save the password list to HTML/XML/TEXT file. You can also right click on any of the displayed account and quickly copy the password.

Under the hood, 'WiFi Password Decryptor' uses System Service method (instead of injecting into LSASS.exe) to decrypt the WiFi passwords. This makes it more safer and reliable. Also it makes us to have just single EXE to work on both 32-bit & 64-bit platforms.

It has been successfully tested on Windows Vista and higher operating systems including Windows 8.

Features & Benefits

  • Instantly decrypt and recover stored WiFi account passwords
  • Recovers all type of Wireless Keys/Passwords (WEP/WPA/WPA2 etc)
  • Simple & elegant GUI interface makes it easy to use.
  • Right click context menu to quickly copy the Password
  • Sort feature to arrange the displayed passwords
  • Save the recovered WiFi password list to HTML/XML/TEXT file.
  • Integrated Installer for assisting you in local Installation & Uninstallation.

Download WiFi password decryptor

How to enable Two-Factor authentication in Linkedin?

Are you searching for the guide to configure the 2-step authentication? You are at right place.  Here isthe guide that will help you to configure the linkedin two-step verification .

Before getting into the actual steps, let me explain what 2-step auth is.

Two-Step Verification:
A security feature that prompts you to enter a temporary secret number sent to your phone whenever you log into your account.

Why you should enable this feature?
I believe this is best security feature.  Let us assume, someone has stolen your login credentials via keylogger or phishing or any other method.  If the hacker try to log into the website with your credentials, he will asked to provide the secret number sent to your mobile.  Fortunately, you have your mobile with you ;) .  So hacker can't log in to your account.  Also you will come to know that someone is trying to access your account.  
  
How to configure the Linkedin Two-factor authentication?

Step1: 
Login to your account and go to the settings page:

https://www.linkedin.com/settings/ 

Step 2:
select the "Account" tab and click the " Manage security settings " option.


Step 3: 
Now Here , you can see the "Two-step verification for sign in " option and it displays the feature is currently "off".  To turn on the feature , simply click the "Turn on" link.



In next step, you will be asked to enter your phone number.



Step4 : 



Once you enter the phone number, you will receive a security code.  After entering the security code sent to your mobile number, the feature will be turned on.  Hurrah, Now you are protected :)


Next time, when you try to log in, you will be asked to provide the secret code :)


Thursday, 30 May 2013

What is Steganography | Ethical Hacking

Well today we are making the first post of “LEARN HACKING LEVEL 2″.
The First topic we are going to discuss today is “STEGANOGRAPHY”.
So what is Steganography?
Before coming to the point let me tell you its history.
You might have seen in old chinese movies that the monks used to safeguard secrets by hiding those secrets on their body parts so that no one else can see them but them.
This concept was developed further and it was implemented in computers as well.
This is called Steganography.
Now coming to its implementation in Computers.
By the use of Steganography you can Hide one type of file behind other keeping the format of file same.
I personally find it very useful because it helps me hide my important information easily.
So do you want to try Steganography on your machine ?
Lets get started.
NOTE:- The files and folder names I am going to use are just for reference. You may use different if you want to. But for beginning I would suggest to follow along. Later on you can try it with different file names.
Setup:-

1) Create a new folder named test in any drive (say C: Drive)
2) In  the test folderCreate a text file in it named – hi.txt
3) Copy any default windows picture from my pictures say – desert.jpg in the test folder

Now the game begins.
Type anything you want to in the  Text file and make its font big so that its easily readable
1) Open command prompt
2) Open the test folder.
      You may use the following commands to do that
    2.1)   C:
    2.2)   cd test
3) Now use the following command
      COPY /B desert.jpg+hi.txt new.jpg
       ie… the syntax is
      Copy /B name of file in which you want to embedded the content+ name of file which you want to embedded name of new file
And that’s it. You are done.
Open the test folder and you will see a new image named new.jpg.
When you preview it you will see the normal image but now right click it and open the image with notepad. At the end of the file you can see the text that you wrote in the document.



How to Become a Hacker

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a similar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me ”How to Become a Hacker”.In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basic.

What Skills do I Need to Become a Hacker?

In simple words, there is no magic to become a  Hacker. But like anything else that is worthwhile, it takes dedication and willingness to learn. It is most important to have a basic knowledge of topics such as operating system basics and it’s working, computer networks, computer security and of course programming. However, you need not be the expert in each or any of those topics mentioned. As you gain the basic knowledge of various branches of computer, you can choose any one as your favorite and advance in it. 

What is the Best Way to Become a Hacker?

As said earlier, the best way to become a hacker is to start from the basics. You will have to master the basics to build a strong foundation. And once this is done, you’ll be in a position to explore new ideas and start thinking like a Hacker.
There exists tons of books on the market that will teach you hacking, but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in the book. Also, most of them are not suitable for the beginners who doesn’t know anything about hacking.
Anyhow, I have found an excellent Book for the Beginners that will teach you hacking from the basics. This book is the first step to fulfil your dream of becoming a hacker. When I first read this book, I myself was surprised at how simple and easy it was laid out. I decided to introduce this book for all those enthusiasts as it can be the right source for the beginners who are interested to learn hacking from the basics. The good thing about this book is that, any one can understand the concepts presented here, without the need for any prior knowledge. This book is called
Become a Hacker

This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything in this book is presented in a simple and effective manner. It is a great source for the beginner who would like to become a hacker. This will install a Hacker’s Mindseton you.
The following skills are uncovered in this book
1. You will learn all the hacker underground tricks and learn to apply them in real world situations.
2. You will be put into a hacker mindset so that you will learn to think like a Hacker.
3. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
4. You will acquire knowledge nonexistent to 99.9% of the people in the world!
5. This underground handbook may get you interested in pursuing a career as an Ethical Hacker.
This book is of great value for all those who have a dream to become a Hacker.

TO GET THIS BOOK .. FOLLOW BLOG N COMMENT HERE...