Wednesday, July 13, 2011

Cracking Bios Passwords




Follow the steps below:

1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.

3) type the command at the prompt: "debug" (without quotes)
4) type the following lines now exactly as given.......
o 70 10
o 71 20
quit
exit

4) exit from the dos prompt and restart the machine


password protection gone!!!!!!!!!!!!!
EnjoYYYYYYYYYY

How To Hack Images On Friends Computer

Image hack has been the missing part of this blog. So, I am posting Image Worm software developed by Nathan which you can use to hack images on remote computer. You can also use Winspy Keylogger to hack images on remote computer.



1. Download Image Worm software to hack images on friend’s computer.
Password: techotoys.net

2. Run the Image Worm software to see:

Hack image Worm
3. Now, select any image on your computer. This image will be used to replace all the images on victim computer i.e. all the images on your friend’s computer will be changed to your selected image.

4. After selecting the image, hit on “Build Worm” and Image worm will create a server.exe file in current directory.

Note: Do not run this server.exe file on your own computer. I don’t know how to nullify the changes done by this image hack. If you want to try out on your computer, make sure you use Deep Freeze 6 software before running server.exe file.

5. Now, bind the server.exe file with any other .exe file using FUD binder software. Send this binded file to your friend and ask him to run it on his computer. After running, our server.exe file will silently install itself on victim computer and all his images will be changed to your image selected in Step 3.

6.a. Images before Image hack:
Hack image worm 1

6.b Images after Image hack:
Hack image worm 2
Thus, now you can see this image hacking software changes all images on victim computer. You are able to hack images on your friend’s computer thanks to Image Worm software.

Note: The server.exe file may take some time to hack images on remote computer. Also, on some computers, Image Worm is able to hack images present in “Pictures” folder. So, the working of Image worm to hack images varies according to computer.

Enjoy Image Worm software to hack images on your friend’s computer…

What Are Torrents and How Does It Works?


Torrents have become very popular way to download everything for free of cost like Movies, Games, Software, Music, Scripts etc. Torrents are everywhere on the internet with some advantages and disadvantages, here we will briefly try to explain what actually torrents are and how they work.
Torrent actually itself is a small file having *.torrent extension, that you can say it contains a link to the file to be downloaded. But here in this case, files to be downloaded are not hosted on web servers instead these files are downloaded from other computers (just like yours) connected with internet.
In simpler words, if you have downloading a file from torrent, same you are providing to download for other downloader and similarly you can download files shared by other internet users.

Key terms of this service are Seeder, Leecher, Peer, Tracker, Open Tracker, and Private Tracker etc.
Seeder is actually the first person who shares the file for download and Leecher is one who downloads the file. While combining both the terms is named as a peer. As leecher gets his downloading completed he also becomes a seeder and starts uploading the same file whenever it is requested by any other leecher, while he also uploads when he is downloading but as that time he is a peer.

Tracker is the soul of Bit Torrent protocol. A tracker is actually a server which monitors the data to be transferred between peers. It has nothing to do with what they are uploading and downloading because those files are not hosted on that server but still it is a counter plus link between peers. Another difference is that it uses a principal called tit-for-tat. This means that in order to receive files, you have to give them.

Counter in a sense that it measures how much data a user has downloaded and uploaded. On the other hand it is a link, as these days almost all sites have developed their own trackers. When a torrent is uploaded on some site, and user download torrent file to download the original torrent content, tracker automatically adds a Tracker URL also known as Passkey in that file, which is used to track the data transferred. This passkey is unique for each user so tracker individually monitors each and every user’s stats.

One of the most effective feature of a torrent is that, if there are 10 seeders for the same file, worldwide, you can download from all of them at the same time, meaning that you will get one part of the file from one seeder and the other one from someone else. This goes on and when you are completed you get the original file.

It follows a different method of sharing files known as Peer-Peer Sharing Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers. The process works like this:




• You run peer-to-peer file-sharing software (for example, a Gnutella program) on your computer and send out a request for the file you want to download.
• To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software.
• When the software finds a computer that has the file you want on its hard drive, the download begins.
• Others using the file-sharing software can obtain files they want from your computer’s hard drive.
The file-transfer load is distributed between the computers exchanging files, but file searches and transfers from your computer to others can cause bottlenecks. Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called leeching. This limits the number of computers the software can search for the requested file.

Open and Private trackers are also very important these days, on some sites they have set RATIO RESTRICTIONS. Ratio restrictions are actually to force the user to upload for others as he has downloaded something for himself.

Private trackers are for this purpose, most of the sites have private trackers and user needs to register there, to download. While in case of open tracker, you just download the torrent and your files, they do not force you to maintain the download/upload ratio.

One of the popular Open trackers is that of ThePirateBay.org, they have millions and millions of seeders and leechers and they count download upload but still you can download torrent even without registration so they count stats on their own. While that of Private Tracker is IPTorrent.com. There are a lot of popular torrent sites which have huge amount of torrents, some of them are open and most are private ones:

• MiniNova.org
• Demonoid.com
• IsoHunt.com
• YouTorrent.com
• SumoTorrent.com
• BwTorrents.com

In a nut shell, main difference between and open and private tracker is that, to download a torrent from a site having private tracker, you need to be registered there and in case of open tracker that is not needed. And Private Tracker sites force you to maintain the ratio by uploading too otherwise they ban your account and in open tracker you are not asked to upload and to maintain your ratio.

But, private trackers are more reliable and effective as they are being run on big servers with constant monitoring. Most of the private trackers have faster speeds and safer downloads. Private trackers implement a strict set of rules, so generally files containing malware are extremely uncommon. Many private trackers keep in close contact with each other, so bad users (who trade invites or attempt to fake their ratio) can be quickly blacklisted. Almost all private trackers implement a passkey system, which is a key tool to measure stats of a user as well as to point out him in case of any wrong attempt made by him.

At the moment one can say that you can find everything on torrents, even those which are impossible to find as direct downloads. Torrents are becoming very popular day by day but still they are marked as illegal. Even though this service itself is not illegal but the content shared is illegal.

Torrent itself is not illegal, File sharing is not a crime, but its use makes it illegal because of piracy issues.

How To find serial numbers Easily On Google

let's pretend you need a serial number for windows xp pro.

in the search bar type in just like this - "Windows XP Professional" 94FBR

the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.

or if you want to find the serial for winzip 8.1 - "Winzip 8.1" 94FBR

just try it out, it's very quick and it works nicely..

-----------------------------------------------------------

here is another trick that works fairly decent for finding mp3's on the web (which is hard to do normally, to say the least)



say you want to get, for example, a Garth Brooks song. type this in the search bar - "index of/" "garth brooks" .mp3 the ones you want to check out first are the ones that say "Index of/" in the title of the search result. this technique allows you to easily pull up web folders with direct downloads. it will look the same as if you were logging into a ftp url.. i'm sure you can be pretty flexible on how you type that in, so long as you include "index of/"

i'm sure you can use this for more than just mp3's (it's not perfect but it has worked for me on a few occasions)

always make sure to use the quotations where i placed them. they help pinpoint the correct search results more accurately. just try it out, also if you want to learn how to do more with google look up "google hacks"

GooGle Secrets





method 1--


put this string in google search:

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums




"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that i am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

voila!

method 2--


put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson

10 Cool Google Tricks

Today I am going to discuss about 10 really cool and funny google tricks...

1. Google gravity
Open google.co.in, Type Google Gravity in the search box and click on I’m feeling Lucky button.Feel the effect of gravity on google. All page components will fall down due to gravity.


2. Epic Google
Open google.co.in, Type Epic Google in the search box and click on I’m feeling Lucky button. Each component on the page will start growing bigger and bigger.


3. Google Hacker
Open google.co.in, Type Google Hacker in the search box and click on I’m feeling Lucky button. How google will look if it was made by a hacker.


4. Annoying Google
Open google.co.in, Type Annoying Google in the search box and click on I’m feeling Lucky button.


5. Meaning Of Search For Google
Open google.co.in, Type search in the search box and click on I’m feeling Lucky button.


6. Loneliest Number
Open google.com, Type loneliest number in the search box and click on Search button. Find out which number is the loneliest number according to google.


7. Meaning Of Recursion
Open google.co.in, Type Recursion in the search box and click on search button. You can notice Did You Mean: Recursion text on top of results and it is recursively linked to the same page.


8. Google Loco
Open google.co.in, Type Google loco in the search box and click on I’m feeling Lucky button.


9. The number of horns on a unicorn
Open google.co.in, Type number of horns on a unicorn in the search box and click on search button.


10. Chuck Norris
Open google.co.in, Type Find Chuck Norris in the search box and click on I’m feeling Lucky button. Google won’t search for Chuck Norris because it knows you don’t find Chuck Norris, he finds you.

Free Google E-Book Downloader


Google Book Downloader


Google Book Downloader is small utility which allows you to save book as PDF from Google to your local filesystem.

Features:
  1. Download any book from Google Books marked as ‘Full view’
  2. Partially download any book from Google Books marked as ‘Limited preview’
  3. Access to any book available only for US citizens
  4. Searching for hidden pages (not shown by Google Books)
  5. Requirements: Microsoft .Net Framework 3.5 SP1.

Download Link

Twenty Amazing Facts about GooGle

Google is not just another search engine, which makes the information universally accessible to all. There are a lot on interesting facts about Google, which makes this search engine brilliant.

Google  Facts
Here are some Interesting Facts about Google
1. Google got its name accidentally, Google’s name is a play on the word googol, which refers to the number 1 followed by one hundred zeroes. The term was coined by Milton Sirotta, nephew of American mathematician Edward Kasner, and was popularized in the book, “Mathematics and the Imagination” by Kasner and James Newman. Google’s play on the term reflects the company’s mission to organize the immense amount of information available on the web. Also the company that gave them their first Paycheck spelled it incorrectly and hence they had to register on the name which then went on to become ‘Google’

2. Google started as a research project at Stanford University, created by Ph.D. candidates Larry Page and Sergey Brin when they were 24 years old and 23 years old respectivel

3. Google home page is so bare is due to the fact that the founders didn’t know HTML

4. Google consists of over 450,000 servers, racked up in clusters located in data centers around the world

5. The Google search engine receives about a billion search requests per day.


6. Google receives daily search requests from all over the world, including Antarctica.

7. Google’s Home Page Has 63 Validation Errors. Don’t believe me?: Check Google Validation

8. Number of languages in which you can have the Google home page set up, including Urdu, Latin and
Klingon: 88



9. Google employees are encouraged to use 20% of their time working on their own projects. Google News, Orkut are both examples of projects that grew from this working model.

10. Google’s index of web pages is the largest in the world, comprising of billions of web pages. Google searches this immense collection of web pages often in less than half a second.

11. They use the 20% / 5% rules. If at least 20% of people use a feature, then it will be included. At least 5% of people need to use a particular search preference before it will make it into the ‘Advanced Preferences’.

12. Google earns around 20 million dollars per day from Adwords alone.

13 .There are no restrictions on Googler’s dress code in the office, in which pajama, ugly sweater and even super hero costume were on the records.

14. Google indexes more than 3 billion webpages .

15. Google just takes 0.5 seconds to search from its arge database of billions of records .
Controversial facts about Google

16. For all searches Google record the cookie ID, your Internet IP address, the time and date, your search terms, and your browser configuration. Increasingly, Google is customizing results based on your IP number. This is referred to in the industry as “IP delivery based on geolocation.”

17. Google has no data retention policies. There is evidence that they are able to easily access all the user information they collect and save.

18.Google’s toolbar is spyware:With the advanced features enabled, Google’s free toolbar for Explorer phones home with every page you surf, and yes, it reads your cookie too. Their privacy policy confesses this, but that’s only because Alexa lost a class-action lawsuit when their toolbar did the same thing, and their privacy policy failed to explain this. Worse yet, Google’s toolbar updates to new versions quietly, and without asking. This means that if you have the toolbar installed, Google essentially has complete access to your hard disk every time you connect to Google (which is many times a day).

19 Google indexes everything about a website ,. even some passwords files . That’s why it is considered as a useful tool by hackers

20 Google always leaves a cookie on your hard drive . Which is used to gather information about you.

Hack Facebooks Passwords By Adding Them To Your Friends List



(THE METHOD NO LONGER WORKS)

You can easily gain access to a your friends Facebook account through a collusion approach. You have to use Facebook’s password recovery feature, which is accessible through the “Forgot your password?” link on the Facebook login page.


Once identified the Friend, Facebook suggested to recover the password via the existing email address. However, you can bypass this hurdle by clicking the “No longer have access to these?” link. In that case, Facebook asks for a new email address. In the following step, Facebook presents the security question tied to the account. However, you can also to bypass the question by typing wrong answers three times in a row. After that, Facebook provides a rather surprising way to get your account back – via the support of three friends.
1. First, you select three friends “you trust”. These three friends then receive a code, which is required to change the account password.

2. Select yourself and immediately received a code from Facebook. With those three codes, you can easily change the password for the targeted account.

3. The problem clearly is that three friends you do not really know and cannot trust could potentially gain access to the victim Facebook account – through the standard password recovery feature.

4. To bypass problem mentioned in step 3... Create your own 2 more fake profiles and add the victim as a friend on facebook. Now get all the 3 codes and you are done.

NOTE: The targeted account will be locked for 24 hours after this password change and the user’s old email address receives a notification of the password change as well as the names of the three friends who were given the codes. However, if these are friends with fake names, it doesn’t quite matter that you now know their names.

Now if a Facebook user could in fact be in a situation when a Facebook account is not checked within a 24-hour period, particularly since we enjoy to flaunt our activities through Facebook status messages. And if the account is checked frequently, the account depends on Facebook’s response time, which can easily stretch to a number of days.
Bottom line is You don’t expose yourself to people you don’t know.

Make 2 Free Calls per Day Anywhere in The World

Now you can Make 2 Free Calls Per Day Anywhere in The World. Yes you read it correct! 2 Free calls per day anywhere in the world. You can do this by using EvaPhone. EvaPhone provides Internet telephone calls for free. They let you make PC-to-phone free international calls. All you need is a computer to start making free VoIP calls using Internet to phone.


Free Call Worldwide

You Can Use these Free calls to call any number around the world but for just 1minute. Although Time duration is just 1 minute per call but I guess its good opportunity for people who want to call others by some international numbers and play a prank on their friends. Share your views about it. Also share about any pranks you plan to play with your friends

Write Bold And Underline In Facebook Chat


Now here are the facebook codes for sending bold and underlined text in facebook chat.


For Sending Bold Text
  • whatever you type between * *(two stars ) will automatically turns into bold.
  • Example : You write I *love* you.
  • Turns to
  • I love you
For sending underlined Text
  • Whatever you type between _ _(two underscores) will automatically turns into underlined text
  • Example: You write
  • I really _love_ you
  • Turns to
  • I really love you
For writing Bold+Underline
  • Whatever you type between *_ _* will automatically turns into Bold+Underline
  • Example:
You *_love_* it?
Turns to
You love it?

if you like this post please comment..
:)

Whatch Live Tv For Free

Now you can watch free Tv on your pc by just using a VLC player. So lets keep it short, just follow the steps given below to watch free tv on pc.

Step 1 : First of all you need to have VLC player, if you don’t have vlc player kindly download it from here. After Downloading the vlc player, install it.

Step 2 : Now open Vlc Player, and select streaming option from the media menu present in the menu bar.
Steaming in vlc player

Step 3 : Select network option and enter the url of the streaming channel. For example if you want to view Aaj Tak you need to add url rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_4.sdp in the url field and den select play option from the stream drop down menu.
play a channel
Step 4 : After you click play in the above step, the channel will start streaming and you can watch your favorite channels.
watch free tv on pc
Here is the List of many other channels which you can watch in the similar way :
Channel Name
Link


Aaj Tak rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_4.sdp
CNBC Aawaz rtsp://ss1c6.idc.mundu.tv:554/prf1/cid_34.sdp
CNBC TV 18 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_35.sdp
Headlines Today rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_7.sdp
NDTV 24×7 rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_29.sdp
NDTV rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_33.sdp
NDTV Profit rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_31.sdp
Times Now rtsp://ss1c6.idc.mundu.tv:554/prf0/cid_2.sdp
NK News rtsp://94.75.250.53:554/rtplive/rknews.sdp
RAJ News rtsp://94.75.250.220:1935/live/rajnews2.sdp

ETV rtsp://94.75.250.53/rtplive/etv2low.sdp
Studio N rtsp://94.75.250.220:1935/live/studion2
SVBC rtsp://94.75.250.220/rtplive/svbclow
Zee Tamil rtsp://121.244.145.226:554/prf1/cid_54.sdp
Zee Kannad rtsp://121.244.145.226:554/prf1/cid_55.sdp
Zee Bangla rtsp://121.244.145.226:554/prf1/cid_52.sdp
Music Box rtsp://stream.the.sk/live/musicbox/musicbox-3m.3gp
Zoo Vision rtsp://stream.zoovision.com/live.sdp
B4u Music rtsp://217.146.95.166:554/playlist/ch12zqcif.3gp
iMusic rtsp://217.146.95.166:554/playlist/ch26yqcif.3gp
Adventure rtsp://video3.multicasttech.com/AFTVAdventure3GPP296.sdp
Horror rtsp://video2.multicasttech.com/AFTVHorror3GPP296.sdp
Comedy rtsp://video3.multicasttech.com/AFTVComedy3GPP96.sdp
Classic rtsp://video3.multicasttech.com/AFTVClassics3GPP296.sdp
Crime rtsp://video2.multicasttech.com/AFTVCrime3GPP296.sdp
Mystery rtsp://video2.multicasttech.com/AFTVMystery3GPP296.sdp
Clubbing Tv rtsp://217.146.95.166:554/playlist/ch21yqcif.3gp
Bella Tv rtsp://217.146.95.166:554/playlist/ch29yqcif.3gp
Fashion Tv rtsp://217.146.95.166:554/playlist/ch27yqcif.3gp

How To Trace Mobile Number Location with Google Latitude

The one drawback of being so heavily into both the latest technologies and cool Internet applications is that when the two seamlessly combine to form the ultimate, ultra-useful application with unlimited potential – it causes you to break into a cold sweat from just the excitement alone. Once I realized that someone can trace a mobile phone location with Google Latitude was possible, I had to run around the block a few times to burn off my excitement before sitting down to write this article.

How Tracing a Mobile Phone Location Wi

th Google Latitude Works

radar

The cool thing about Google Latitude is that there are really no fancy, expensive gadgets requ
ired. All you need is a mobile phone and you can build what’s essentially a GPS network of friends, without the need for GPS technology. Wondering whether your buddy Jim is still at work? Just log onto Google Latitude, or check Google Maps on your phone, and sure enough, Jim’s icon shows up on the map where he works. Did your best friend go missing after her date the other night? If she left her phone on, all of her friends can check out where she’s currently located.
The potential uses of this technology are amazing, and Google is just getting started by integrated it’s cellular triangulation technology with Google Maps. MakeUseOf authors previously covered similar applications, such as NavXS and BuddyWay. However, BuddyWay requires that the phone or PDA is GPS enabled. The convenience of Google Latitude is that you don’t need GPS, and it’ll work on almost any mobile phone that can use Google Maps. According to Google, these include Android-powered devices, iPhone, BlackBerry, Windows Mobile 5.0+ and Symbian.

tracing a mobile phone location
Setting it up is as easy as typing your phone number into the entry field on the Google Latitude main page, or you can visit “google.com/latitude” with your mobile device and install it directly. It’s basically the latest version of Google Maps with Latitude embedded. Once you’ve installed this version on your phone, you’re good to go – just click on “Menu” and then “Latitude.”


Setting Up Google Latitude With a Network of Friends

Setting up the application on your mobile device is a piece of cake. Once you open Latitude on your phone, you can immediately start adding friends with their email address. If none of your friends have Latitude installed on their phones yet, forward them this article and tell them to install it!
trace mobile number location
When you first fire up the map after you’ve enabled Latitude with your profile, you’ll immediately see your regular Google map pointer replaced by your picture icon, email address and your location the last time your device was polled.
trace your cell phone
Application does a great job keeping the map updated with your status within a certain radius, depending on where the nearest cell towers are. However, while keeping track of yourself on the map while you’re driving or walking around town is fun, it can get pretty boring when you’re doing it alone. Latitude lets you have a little bit of fun with your network of friends by letting you add each of them to your Latitude “friends” list so that you can see their locations too. To test this feature, I called up a friend of mine with a Blackberry down in Derry, New Hampshire, and asked him to fire up Latitude and add me as a friend. Once we confirmed each other as friends, I instantly showed up on his map and he showed up on mine!
added friend
When you click on your friend’s icon, you can see their contact and location information, or you can choose how you want to share your own information with this specific friend. This means that you can pick and choose the level of privacy that you want for your own status updates based on individual friends. You can provide your exact location to your best friend, while keeping your details somewhat vague for your parents. Also, within the Latitude menu, you can set your privacy level for everyone across the board.
privacy
You can toggle your privacy settings back and forth, so that when you’re somewhere that you don’t want anyone to know about, you just flip your status to “Hide your location.” When you’re back where you’re supposed to be, you just flip your privacy back to “Detect your location.” If you want to fool your friends (or your boss) into thinking that you’re somewhere you’re not, you can manually set your location.

Using Google Latitude Online

Of course, tracing a mobile phone location isn’t enough for Google. This is the part that really made me raise my eyebrows. Google has incorporated this mobile technology into an online gadget that you can view and manipulate from your iGoogle page.
igoogle5
This means that even if you don’t have your mobile phone with you, but you have access to the Internet, you can check out where all of your friends are at the moment, or update your own location on Latitude so that they know where you are. This whole concept takes the whole architecture and intent of Twitter and adds another entire level of graphical interactivity to it, with visual, real-time status updates for your friends. The next evolution of this technology that I envision is the ability to embed a Google Latitude widget in your blog or web page that allows you to share your own Latitude location information with your readers. Since the status bar already exists for short text updates, this feature would turn Google Latitude into a more graphical version of Twitter.
Have you ever used any of the latest “friend tracking” mobile phone technologies for tracing a mobile phone location? Which one is your favorite? Share your opinion in the comments section below.


How To Create a CON Folder In Windows

Can you create a folder named "CON” in windows?

The Answer is NO and YES!

Why the answer is NO.
NO because when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to "New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message "The specified device name is invalid”.

Why it is not possible to create a folder names CON?

Before we proceed further, let me tell you a small secret you can’t even create a folder named

CON, PRN, AUX, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5,
LPT6, LPT7, LPT8
, and LPT9.and many others.

YES the reason you can’t create a folder with these names is because these are reserved keywords used by DOS. The below list is taken from Microsoft’s website shows a list of reserved keywords in DOS.

NAME - FUNCTION
CON - Key board and display.
PRN - System list device, usually a parallel port.
AUX - Auxiliary Device, usually a serial port.
CLOCK$ - System real-time clock.
NUL - Bit-bucket device.
A: - Z: - Drive letters.
COM1 - First serial communication port.
LPT1 - First parallel printer port.
LPT2 - Second Parallel printer port.
LPT3 - Third Parallel printer port.
COM2 - Second serial communication port.
COM3 - Third serial communication port.
COM4 - Fourth serial communication port.


If you try creating a folder with any of these names, the name automatically changes back to the default "New Folder”.
And this is what has caused the confusion. Instead of automatically renaming the folder, had an explanatory warning message popped up.

Yes we can create a folder named CON.


There is actually a way to create a folder named CON, or any other name from the above list of reserved keywords. This can be done through command prompt. But it is advisable not to do so, as it might result in your system becoming unstable.
To create a folder named CON, go to command prompt and type "MD \\.\D:\CON” (without quotes). This will create a folder named CON in D:. See the screen-shot below.(see the folder at the bottom)




You cannot delete this folder by normal delete. To delete the folder, again go to command prompt and type

"RD \\.\D:\CON” without quotes. See the screen-shot below.(see the folder is gone now)


I’ll again recommend you not to try this on your system, as it might become unstable. In case
you can’t stop yourself, don’t do it on a drive on which Windows is installed (generally C:).
So next time if any one tells you that we cannot rename a folder to con the create it and show
them.

How to Create Your Own Customized Run Commands

Submitted by Ankit on Tuesday, 19 April 2011

Run commandThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.

1. Right click on your Desktop and select New -> Shortcut.

2. You will see a “Create Shortcut” Dialog box as shown below

Create Shortcut

3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.

4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.

5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.

6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.

In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.

To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.

I hope you like this post! Pass your comments.

How to Hack Windows Administrator Password

Submitted by Ankit on Thursday, 12 February 2010


Simple way to reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.

1. Open the command prompt (Start->Run->type cmd->Enter)

2. Now type net user and hit Enter

3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows

4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.

So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.

Another way to reset non-administrator account passwords

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.

Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.

  • You do not need to know the old password to set a new one
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.

The download link for both CD and floppy drives along with the complete instructions is given below

Offline NT Password & Reg Editor Download

It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.