Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Saturday, February 11, 2012

The Basics of Hacking II


The Basics of Hacking II            

Basics to know before doing anything, essential to your continuing
career as one of the elite in the country...  This article, "the
introduction to the world of hacking" is meant to help you by telling you
how not to get caught, what not to do on a computer system, what type of
equipment should I know about now, and just a little on the history, past
present future, of the hacker.

Welcome to the world of hacking! We, the people who live outside of the
normal rules, and have been scorned and even arrested by those from the
'civilized world', are becomming scarcer every day.  This is due to the
greater fear of what a good hacker (skill wise, no moral judgements
here)|can do nowadays, thus causing anti- hacker sentiment in the masses.
Also, few hackers seem to actually know about the computer systems they
hack, or what equipment they will run into on the front end, or what they
could do wrong on a system to alert the 'higher' authorities who monitor
the system. This article is intended to tell you about some things not to
do, even before you get on the system.  I will tell you about the new wave
of front end security devices that are beginning to be used on computers.
I will attempt to instill in you a second identity, to be brought up at
time of great need, to pull you out of trouble. And, by the way, I take no, repeat,
no, responcibility for what we say in this and the forthcoming articles.
Enough of the bullshit, on to the fun: after logging on your favorite bbs,
you see on the high access board a phone number!  It says it's a great
system to "fuck around with!" This may be true, but how many other people
are going to call the same number?  So:  try to avoid calling a number
given to the public. This is because there are at least every other
user calling, and how many other boards will that number spread to?
If you call a number far, far away, and you plan on going thru an
extender or a re-seller, don't keep calling the same access number
(I.E. As you would if you had a hacker running), this looks very suspicious
and can make life miserable when the phone bill comes in the mail.
Most cities have a variety of access numbers and services,
so use as many as you can. Never trust a change in the system...
The 414's, the assholes, were caught for this reason: when one of them
connected to the system, there was nothing good there.  The next time,
there was a trek game stuck right in their way!  They proceded to play said
game for two, say two and a half hours, while telenet was tracing them!
Nice job, don't you think?  If anything looks suspicious, drop the line
immediately!!  As in, yesterday!! The point we're trying to get accross is:
if you use a little common sence, you won't get busted.  Let the little
kids who aren't smart enough to recognize a trap get busted, it will take
the heat off of the real hackers. Now, let's say you get on a computer
system...  It looks great, checks out, everything seems fine.
Ok, now is when it gets more dangerous.  You have to know the computer
system to know what not to do.
Basically, keep away from any command something, copy a new file into the
account, or whatever!  Always leave the account in the same status you
logged in with.  Change *nothing*... If it isn't an account with priv's,
then don't try any commands that require them! All, yes all, systems are
going to be keeping log files of what users are doing, and that will
show up.  It is just like dropping a trouble-card in an ESS system,
after sending that nice operator a pretty tone.
Spend no excessive amounts of time on the account in one stretch.
Keep your calling to the very late night ifpossible, or during
business hours (believe it or not!).  It so happens
that there are more users on during business hours, and it is very
difficult to read a log file with 60 users doing many commnds every minute.
Try to avoid systems where everyone knows each other, don't try to bluff.
And above all:  never act like you own the system, or are the best there
is. They always grab the people who's heads swell... There is some very
interesting front end equipment around nowadays, but first let's
define terms... By front end, we mean any device that you must
pass thru to get at the real computer. There are devices that are made to
defeat hacker programs, and just plain old multiplexers.
To defeat hacker programs, there are now devices that pick up the phone
and just sit there...  This means that your device gets no carrier,
thus you think there isn't a computer on the other end.  The
only way around it is to detect when it was picked up.  If it pickes up
after the same number ring, then you know it is a hacker-defeater.
These devices take a multi-digit code to let you into the system.
Some are, in fact, quite sophisticated to the point where it
will also limit the user name's down, so only one name or set of names
can be valid logins after they input the code... Other devices input a
number code, and then they dial back a pre-programmed number for that code.
These systems are best to leave alone,
because they know someone is playing with their phone.  You may think "but
i'll just reprogram the dial-back." Think again, how stupid that is...
Then they have your number, or a test loop if you were just a little
smarter. If it's your number, they have your balls (if male...),
If its a loop, then you are screwed again, since those loops
are *monitored*. As for multiplexers...  What a plexer is supposed
to do is this:
The system can accept multiple users. We have to time share, so we'll let
the front-end processor do it...  Well, this is what a multiplexer does.
Usually they will ask for something like "enter class" or "line:".  Usually
it is programmed for a double digit number, or a four to five letter word.
There are usually a few sets of numbers it accepts, but those numbers also
set your 300/1200/2400 baud data type.
These multiplexers are inconvenient at best, so not to worry. A little
about the history of hacking: hacking, by my definition, means a great
knowledge of some special area. Doctors and lawyers
are hackers of a sort, by this definition.  But most often, it is
being used in the computer context, and thus we have a definition of
"anyone who has a great amount of computer or telecommunications
knowledge."  You are not a hacker because you have a list of codes...
Hacking, by my definition, has then been around only about 15 years.
It started, where else but, mit and colleges where they had computer
science or electrical engineering departments.
Hackers have created some of the best computer languages, the
most awesome operating systems, and even gone on to make millions.
Hacking used to have a good name, when we could honestly say
"we know what we are doing".  Now it means (in the public eye):
the 414's, ron austin, the nasa hackers, the arpanet hackers...
All the people who have been caught,
have done damage, and are now going to have to face fines and sentences.
Thus we come past the moralistic crap, and to our purpose:  educate the
hacker community, return to the days when people actually knew something...




Hacking Tutorial


Hacking Tutorial                    

What is hacking?
----------------
According to popular belief the term hacker and hacking was founded at mit
it comes from the root of a hack writer,someone who keeps "hacking" at
the typewriter until he finishes the story.a computer hacker would be
hacking at the keyboard or password works.

What you need:
--------------
To hack you need a computer equipped with a modem (a device that lets you
transmit data over phone lines) which should cost you from $100 to $1200.

How do you hack?
----------------
Hacking recuires two things:
1. The phone number
2. Answer to identity elements

How do you find the phone #?
----------------------------
There are three basic ways to find a computers phone number.
1. Scanning,
2. Directory
3. Inside info.

What is scanning?
-----------------
Scanning is the process of having a computer search for a carrier tone.
For example,the computer would start at (800) 111-1111 and wait for carrier
if there is none it will go on to 111-1112 etc.if there is a carrier it
will record it for future use and continue looking for more.

What is directory assictance?
-----------------------------
This way can only be used if you know where your target computer is. For this
example say it is in menlo park, CA and the company name is sri.

1. Dial 411 (or 415-555-1212)
2. Say "Menlo park"
3. Say "Sri"
4. Write down number
5. Ask if there are any more numbers
6. If so write them down.
7. Hang up on operator
8. Dial all numbers you were given
9. Listen fir carrier tone
10. If you hear carrier tone write down number, call it on your modem and your
    set to hack!
                       



Wednesday, February 8, 2012

HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM.

HACKING THE WAL-MART ARMORGUARD
COMPUTER PROTECTION SYSTEM.

***NOTE***
To use this, you must have a system disk (i.e. a disk that has been
formatted using [format a: /s]) in 3.5" format under Windows 95, because that
is what they sell all of their computers with.

***NOTE***
In this file, instructions to be input into the computer are surrounded
by [ and ]. Keys are surrounded by < and >. So if I say "hit [-] I
mean to hold down the control button and hit F1.

The armorguard is a program that prevents you from writing to the
directories, changing the attributes of files, and deleting files. It
basically prevents you from doing anything cool.

The first thing to do is to go into Wal-Mart. Now, go to the
computer section and turn off the screen saver. Shut down as many apps as
you can with the [--] and then choosing a program and
hitting enter. You cannot simply do this to the ArmorGuard program.

The next thing to do is to go to the DOS PROMPT. Most Wal-Marts
take the mouse ball out of all of the display mice to make it harder to
control the system. If you are adept at putting your finger inside the mouse
and controlling it that way, fine. Otherwise, just hit [--].
This activates the start menu. Select "Programs", hit enter, then go down to
near the bottom of the "Programs" menu and select "MS-DOS PROMPT". Hit enter.

Now you are in a DOS window and in the C:\Windows directory. Hit
[cd..] and then hit [fdisk /mbr], which restores the master boot record,
preventing the password prompt from coming up when you reset the computer.

Now just hit [--] twice (once gets you to task manager,
twice reboots) and wait. When you see

Starting Windows 95...
on the screen, hit [] really fast just once, then choose "Verify
each step" (or something to that effect), usually choice number 4. It will
give you an A: prompt and say "Please give the path of your command interpreter,
i.e. C:\WINDOWS\COMMAND.COM". At this point, put the system disk you have
made in the drive and hit [A:\COMMAND.COM]. Say "Yes" to everything except
the following:

Log this bootup? (Bootlog.txt)? (y/n)
C:\armguard.exe? (y/n)
(***OR ANYTHING ELSE STARTING WITH "C:\ARM", LIKE "C:\ARMOR",
for instance.)

If you have done this right, ARMGUARD SHOULDN'T COME UP AT ALL. If
it does, hit "command prompt only" instead of "Verify each step" and then
specify C:\AUTOEXEC.BAT and C:\CONFIG.SYS if it asks for the configuration
and the startup file. (IN THE OPPOSITE ORDER. CONFIG.SYS IS THE CONFIG FILE,
AUTOEXEC.BAT IS THE STARTUP FILE.) Then immediately hit [] and it will
give you step-by-step confirmation for each item. See above for the ones
to say no to. Then you want to hit

[C:\WINDOWS\COMMAND\EDIT.COM C:\WINDOWS\WIN.INI]

and the DOS edit program will come up. Choose "Search" and hit "Find" and
then tell it to find ARM and make sure it's NOT on match whole word only.
Delete any line with ARM in it that looks like a part of ArmorGuard. This
should prevent it from coming up on Windows.

*******IF NONE OF THIS WORKS, YOU HAVE TO TAKE THE READ-ONLY AND ARCHIVE
ATTRIBUTES OFF OF THE WIN.INI, SYSTEM.INI, AUTOEXEC.BAT, AND CONFIG.SYS FILES
BY HITTING [ATTRIB -A -R (c:\WHATEVERFILE.YOUWANTTODOTHISTO)]

*******I'D ALSO RECOMMEND EDITING THE AUTOEXEC.BAT FILE TO PREVENT ARMGUARD
FROM EVER COMING UP AGAIN.

****************THINGS TO DO AFTER HACKING ARMORGUARD***********

Hmmm....
USE YOUR IMAGINATION!

Think of this: Hit "shut down in MS-DOS mode" or start up in MS-DOS mode,
put your boot disk in drive a: and hit the following commands

[A:]
[FORMAT C:]

and then confirm this. You have just started the permanent erasing of
EVERYTHING on the hard drive. You can also do some other cool stuff with
it too, just basically IF YOU WOULD DO IT TO SOMEONE YOU HATE, DO IT TO
WAL-MART. Personally, I'd think that INSTEAD OF ERASING THE HARD DRIVE, I'D
WRITE A VIRUS AND PUT IT ON THE COMPUTER. THAT WOULD REALLY BE MORE FUN.
JUST STORE IT ON A FLOPPY AND COPY IT.

HAVE FUN, DON'T GET CAUGHT.
SINCERELY,
DaRkNeSs

Wednesday, January 18, 2012

Windows Login Passwords and BIOS: Hacking



Windows Login Passwords and BIOS: Hacking





On Many computers a series of keystorkes may crash the password program.
To try this boot the PC and wait for the password prompt,then keep pressing ESC 50 to 100 times.This will result in crashing of the password program and the computer will continue booting.However, this might work only in selected machines.

There's yet another pretty easy solution to the BIOS password problem.Its a program called KillCMOS which you can download from www.koasp.com
or if you cant find it there,search for it at astalavista.box.sk.There is also a number of CMOS password crackers available on various hacking web sites.But its really lame to use someone else's software for hacking and then call yourself a hacker.

you have cracked the BIOS password and are just about to say how easy this hack was,when you suddenly see windows asking you for the login password.
Fret not,for this hack is even easier than the previous one.After this hack,you will know why a hacker running windows is considered to be lame and why a hacker laughs whenever someone says Microsoft and security in the same sentence.
To hack the windows login password,reboot and wait for the message.
"Starting Windows 9x"
When you see this on the screen,press f8.The boot menu will come up.Select option 7,to boot into Dos.Then go to the Windows Directory by typing
c:\>cd windows

Keys that will affect the boot up process are F4,F5,F6,F8,Shift +F,Control+F5 and Shift+F8.Try them out and see what happens!!!!!

then rename all files with the extension.pwl by tyyping the following command:
C:\windows>ren*.pwl*.xyz
Or,delete them typing
C:\windows>del"*.pwl*.xyz

......poof............
Now when windows Password login pops up,yo can write anything in the place where the password has got to be typed.As you have renamed(or deleted-although remaining then would be better as the victim will not know that his PC has been tampered with)the password files,Windows cannot find the file so when you enter a password,Windows just takes it as the original password..

Sunday, January 15, 2012

Tricks In Command Prompt


The Windows Command Prompt tool, and many of its commands, might seem boring or even relatively useless at first glance, but as anyone who has ever used the Command Prompt very often can tell you, there's much to love!
Below are several Command Prompt tricks and other Command Prompt hacks that I guarantee will get you excited about many of the mundane sounding Command Prompt commands like telnet, tree, or robocopy... okay, robocopy sounds pretty cool.
Some of these Command Prompt tricks and hacks are special features or uses of the Command Prompt itself, while others are just neat or relatively unknown things you can do with certain commands. Enjoy!

1. Use Ctrl-C to Abort a Command

Ctrl-C - Command Prompt Tricks
Just about any command can be stopped in its tracks with the abort command: Ctrl-C.
If you haven't actually executed a command, you can just backspace and erase what you've typed, but if you've already executed it then you can do a Ctrl-C to stop it.
Warning: Ctrl-C isn't a magic wand and it can't undo things that aren't undoable, like a partially complete format command. However, for things like the dir command that seem to go on forever or questions you're asked at the prompt that you don't know the answer to, the abort command is an excellent Command Prompt trick to know.

2. View a Command's Results One Page (or Line) at a Time

More Command - Command Prompt Tricks
Ever run a command, like the dir command, that produces so much information on the screen that it's almost useless? You're not alone.
One way around this is to execute the command in a special way so whatever information is generated is shown to you one page, or one line, at a time.
To do this, just type the command, the dir command for example, and then follow it with the pipe redirection operator and then the more command.
For example, executing dir /s | more will generate the thousands of lines of results that you expect from the dir command, but the more command will pause each page of results with -- More -- at the bottom of the page, indicating that the command is not done running.
Just press the space bar to advance by page or press the Enter key to advance one line at a time.
See Command Prompt Trick #7 below for a different solution to this problem.

3. Run Command Prompt as an Administrator Automatically

Command Prompt Admin Shortcut - Command Prompt Tricks
Many commands require that you execute them from an elevated Command Prompt in Windows 7 and Vista - in other words, execute them from a Command Prompt that's run as an administrator.
You can always right-click on any Command Prompt shortcut and chooseRun as administrator but creating a shortcut to do the same thing can be a huge time saver if you're a frequent Command Prompt power user.
To complete this Command Prompt trick, just create a Command Prompt shortcut on the desktop, enter the shortcut's properties and then select the Run as administrator box located in the Advanced button on theShortcut tab.

4. Become a Command Prompt Power User with Function Keys

Command Prompt Function Keys - Command Prompt Tricks
The fact that the function keys actually do something in the Command Prompt is maybe one of the best kept secrets about the tool:
F1: Pastes the last executed command (character by character)
F2: Pastes the last executed command (up to the entered character)
F3: Pastes the last executed command
F4: Deletes current prompt text up to the entered character
F5: Pastes recently executed commands (does not cycle)
F6: Pastes ^Z to the prompt
F7: Displays a selectable list of previously executed commands
F8: Pastes recently executed commands (cycles)
F9: Asks for the number of the command from the F7 list to paste
Command Prompt Trick #17 is full of arrow key shortcuts, a few of which are similar to these function key tricks.

5. Hack the Prompt Text

Prompt Command - Command Prompt Tricks
Did you know that the prompt itself in the Command Prompt is completely customizable thanks to the prompt command? It is, and when I say customizable, I mean really customizable.
Instead of C:\>, you can set the prompt to any text you want, have it include the time, the current drive, the Windows version number, you name it.
One useful example is prompt $m$p$g which will show the full path of a mapped drive in the prompt, alongside the drive letter.
You can always execute prompt alone, without options, to return it to its sometimes boring default.

6. Get Help for Any Command

Help Switch - Command Prompt Tricks
Believe it or not, the help command does not provide help for every Command Prompt command. However, any command can be suffixed with the /? option, usually called the help switch, to display detailed information about the command's syntax and often times even some examples.
I doubt that the help switch is the coolest Command Prompt trick you've ever heard of, but it's hard to disagree that it's one of the more useful.
Unfortunately, neither the help command nor the help switch offer much in the way of explaining how to interpret the syntax. See How To Read Command Syntax if you need help with that.

7. Save a Command's Output to a File

Command Output - Command Prompt Tricks
An incredibly useful Command Prompt trick is the use of redirection operators, specifically the > and >> operators.
These little characters let you redirect the output of a command to a file, giving you a saved version of whatever data the command produced in the Command Prompt window.
Let's say you're about to post a computer problem to an online forum, like my computer support forum for example, and you want to provide really accurate information about your computer. An easy way to do that would be to use the systeminfo command with a redirection operator.
For example, you might execute systeminfo > c:\mycomputerinfo.txtto save the information provided by the systeminfo command to a file. You could then attach the file to your forum post.
See How To Redirect Command Output to a File for more examples and a better explanation of how to use redirection operators.

8. View Your Hard Drive's Entire Directory Structure

Directory Structure with Tree Command - Command Prompt Tricks
I think one of the neatest little commands is the tree command. With tree, you can create a kind of map of your computer's directories.
Execute tree from any directory to see the folder structure under that directory.
Tip: With so much information, it's probably a good idea to export the results of the tree command to a file. For example, tree /a > c:\treeresults.txt, just as explained in Command Prompt Trick #7.

9. Customize the Command Prompt Title Bar Text

Command Prompt Title Bar - Command Prompt Tricks
Tired of that Command Prompt title bar text? No problem, just use the title command to change it to whatever you like.
For example, let's say your name is Maria Smith, and you want to express your ownership of the Command Prompt: execute title Property of Maria Smith and the Command Prompt's title bar will change immediately.
The change won't stick, so the next time you open Command Prompt the title bar will be back to normal.
The title command is usually used to help give a custom appearance in script files and batch files... not that I'm saying titling it with your name isn't a good idea!

10. Copy From the Command Prompt

Mark Feature in Command Prompt - Command Prompt Tricks
As you may or may not know, copying from the Command Prompt is not as easy as copying from other programs, which is part of the reason why saving a command's output to a file, Command Prompt Trick #7, is so handy.
But what if you do just want to copy a short section of text to the clipboard? It's not too hard but it's not very intuitive either.
Right-click anywhere in the Command Prompt window and choose Mark. Now, highlight with your left mouse button whatever you'd like to copy. Once your selection is made, press Enter.
Now you can paste that information into whatever program you'd like.

Types Of Hacking


1)Trojan Horses:
Trojan Horses is the best and easy way of get break-in to your PC. Usually hacker send a trojan by BINDING it with other genuine program , By this it will try to hide from your Anti-virus.
When the user opens the program, trojan executes first and opens BACKDOOR for the Hacker…
2) Viruses and Worms:
Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
3) Back Doors:
Hackers can gain access to a network by exploiting back doors ‘administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in your network…
4) Rogue Access Points:
Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech..
5) Denial of Service:
DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).
Distributed DoSs (DDoS5) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
6) Anarchists, Crackers, and Kiddies:
Who are these people, and why are they attacking I your network?
Anarchists are people who just like to break stuff. They usually exploit any target of opportunity.
Crackers are hobbyists or professionals who break passwords and develop Trojan horses or other SW (called warez). They either use the SW themselves (for bragging rights) or sell it for profit.
Script kiddies are hacker wannabes. They have no real hacker skills, so they buy or download warez, which they launch.
Other attackers include disgruntled employees, terrorists, political operatives, or anyone else who feels slighted, exploited, ripped off, or unloved.
7) Sniffing and Spoofing:
Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.
Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.

Best Notepad Tricks

1. Bush Hid the Facts/This App Can Break

This is one of the most popular notepad tricks because of its mysterious nature. In order to get an idea as to what this trick does, just follow the steps given below:

  • Open Notepad.
  • Type “BUSH HID THE FACTS” or “this app can break” (without quotes).
  • Save that file with any name and close it.
  • Open It Again to see the magic.

Reason For This Behavior: It is known as the 4335 Rule. It means that if we enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters each, and the last word has five letters. Then Notepad Automatically hides the text into unknown code.

2. World Trade Center Attack Trick

As you might be knowing that the flight number of the plane that had hit World Trade Center on that dreadful day (9/11) was Q33NY. Now call this trick a coincidence or something else but whatever it is, it does startle us.

  • Open Notepad.
  • Type “Q33N” (without quotes) in capital letters.
  • Increase the font size to 72.
  • Change the Font to Wingdings.

You will be amazed by the findings.

3. Make A Personal Log-Book or A Diary

Did you know that you can also use Notepad as a simple digital diary or a personal Log-Book ? Well, if you didn’t then follow the below mentioned steps to make one for yourself !

  • Open Notepad.
  • Type .LOG (in capital letters) and hit enter.
  • Save it with any name and close it.
  • Open it again.

When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.

4. Test Your Anti-Virus

You can also test your anti virus program for its effectiveness using a simple notepad trick. Follow the steps below to know more:

  • Open Notepad.
  • Copy the code give below in the notepad file:
    X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  • Save it with an .exe extension like testvirus.exe

As soon as you save this file, your anti virus program will detect the file (virus) immediately and will attempt to delete it. If this happens then your Antivirus is working properly. If not, then its time to look for some other reliable program.

5. Continually pop the CD Drive

  • Open Notepad.
  • Copy the code given below onto the notepad file:

Set oWMP = CreateObject(“WMPlayer.OCX.7?)

Set colCDROMs = oWMP.cdromCollection

do

if colCDROMs.Count >= 1 then

For i = 0 to colCDROMs.Count – 1

colCDROMs.Item(i).Eject

Next

For i = 0 to colCDROMs.Count – 1

colCDROMs.Item(i).Eject

Next

End If

wscript.sleep 5000

loop

  • Save it as “Anything.VBS”.

Now open the file and see the magic! The file will continuously force the CD rom to pop out! And If you have more than one then it pops out all of them!

6. Matrix Effect

Not much to explain, just follow the steps and see the amazing matrix effect happen in your DOS window:

  • Open Notepad.
  • Copy the below mentioned text in your notepad file:

@echo off

color 02

:start

echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%

goto start

  • Save the file with .bat extension like Matrix.bat

Thats it. Just open the file to see the matrix effect right before your eyes!

7. Change The Header/Footer Of Your Notepad File

More often than not whenever you get a printout of your notepad file, it starts with “Untitled” or the filename at top, and “Page ” on bottom. Now if you want to get rid of it or want to change it, just follow the simple steps given below.

  • Open Notepad.
  • Click on File -> Page Setup.
  • Replace the text written in the “Header” and “Footer” box (as shown above) by any of the following codes:

&l Left-align the characters that follow

&c Center the characters that follow

&r Right-align the characters that follow

&d Print the current date

&t Print the current time

&f Print the name of the document

&p Print the page number

8. Constantly Repeat Messages

Using this notepad trick you can annoy anyone and can actually force them to log off or leave the computer (LOL….). This notepad trick will create an infinite cycle of a message in the computer. Follow the steps to know more:

  • Open Notepad.
  • Paste the following code in the notepad file:

@ECHO off

:Begin

msg * Hi

msg * Are you having fun?

msg * I am!

msg * Lets have fun together!

msg * Because you have been o-w-n-e-d

GOTO BEGIN

  • Save the file with any file name but with .bat as extension and close it. For eg. Freakymessage.bat

After saving the file just open it (by double clicking) and see what happens.

Pssstttt……. You can piss of your friends by sending it as an email attachment asking them to try it out !

9. Shut-down The Computer After Conveying Any Message

This one is kind of an annoying trick and if used unknowingly can certainly cause problems (am serious). What this trick does is, after conveying a (any) message it shuts down the computer without any confirmation. In order to create the Shutdown file, follow the below mentioned steps:

  • Open Notepad.
  • Paste the following code in it:

@echo off

msg * Its time to get some rest.

shutdown -c “Error! You have to take rest! Byeeeeee” -s

  • Save the file with any name but with .bat extension and close it. For eg. TakeRest.bat

NOTE : Use this carefully. If you are playing prank then keep in mind that this may lead to loss as it shuts down the computer forcefully.

10. Toggle Keyboard Button Simultaneously

Using Notepad (and VB) you can set different keys on your keyboard to toggle continuously. Following are the 3 tricks using which different keys can be set to toggle simultaneously. Follow the steps given under each head to try out the tricks.

1. Caps Lock Key

    • Open Notepad.
    • Paste the following code in the notepad file:

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{CAPSLOCK}”

loop

    • Save the file with anyname and .vbs extension. and close it.
    • Now open the newly created file and see how the caps lock key behaves on your keyboard!

2. Hit Enter Key Continuously

    • Open Notepad.
    • Paste the following code in the notepad file:

Set wshShell = wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “~(enter)”

loop

    • Save the file with any name and .vbs extension and close it.
    • Now open the newly created file and see how the enter key behaves!

3. Hit Backspace Key Continuously

    • Open Notepad.
    • Paste the following code in the notepad file:

MsgBox “Lets Rumble”

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{bs}”

loop

    • Save the file with any name and with .vbs extension and close it.
    • Now open the newly created file and see how the key behaves!

In order to end the vbs script (stop continuous key presses), open task manager and end thewscript.exe process as shown in image below.

11. Slowly Type Messages

This one is my favorite. Completely harmless trick and perfect for playing pranks on one’s friends. This trick can really freak out anyone! Follow the below mentioned steps to perform this trick:

  • Open Notepad.
  • Paste the following code in the notepad file:

WScript.Sleep 180000

WScript.Sleep 10000

Set WshShell = WScript.CreateObject(“WScript.Shell”)

WshShell.Run “notepad”

WScript.Sleep 100

WshShell.AppActivate “Notepad”

WScript.Sleep 500

WshShell.SendKeys “Hel”

WScript.Sleep 500

WshShell.SendKeys “lo ”

WScript.Sleep 500

WshShell.SendKeys “, ho”

WScript.Sleep 500

WshShell.SendKeys “w a”

WScript.Sleep 500

WshShell.SendKeys “re ”

WScript.Sleep 500

WshShell.SendKeys “you”

WScript.Sleep 500

WshShell.SendKeys “? ”

WScript.Sleep 500

WshShell.SendKeys “I a”

WScript.Sleep 500

WshShell.SendKeys “m g”

WScript.Sleep 500

WshShell.SendKeys “ood”

WScript.Sleep 500

WshShell.SendKeys ” th”

WScript.Sleep 500

WshShell.SendKeys “ank”

WScript.Sleep 500

WshShell.SendKeys “s! “

  • Save the file with any name and with .vbs extension and close it.

Now open the file and see how freakishly slow the messages appear!

NOTE: In order to stop it. Follow the “Note” given in 10th Trick.

12. Type “You are a fool” Continuously

Not much to explain, the title says it all! Follow the steps to make this trick work:

  • Open Notepad.
  • Paste the following code in the notepad file:

Set wshShell = wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “You are a fool.”

loop

  • Save the file with any name but with .vbs extension and close it.

Ope the file and see how it makes you type!

NOTE: In order to stop it. Follow the “Note” given in 10th Trick.

13. Open Notepad continuously

  • Open Notepad.
  • Paste the following code in your notepad file:

@ECHO off

:top

START %SystemRoot%system32notepad.exe

GOTO top

  • Save the file with any name nut with .bat extension and close it.

Now open the file and see how it annoys you by opening notepad again and again.

14. Pick Your Option Batch File

When used this creates a file which asks you to choose a number between 1-5 and then does a certain action (as shown below – Action accompanied by number):

1 – Shut’s down the computer

2 – Restart’s the computer

3 – Wipes out the hard drive

4 – Net send

5 – Shows a message & then shut’s down the computer

Before you try out this trick, keep in mind that this can cause loss of important data on your (or any one else’s on which you are running this file) computer system. So BEWARE! In order to create the file, follow the steps given below:

  • Open Notepad.
  • Paste the following code in the notepad file:

@echo off

title Get A Life

cd C:

:menu

cls

echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press ‘x’ then your PC will be formatted. Do not cry if you loose your data or anything.

pause

echo Pick your option:

echo 1. Die Slowly

echo 2. Instant Death

echo 3. Stay Away From This One

echo 4. Die this way (For Wimps!)

echo 5. Easy way out

set input=nothing

set /p input=Choice:

if %input%==1 goto one

if %input%==2 goto two

  • Save the file with any name and with a .bat extension and close the file.

15.Lock File(s) on Windows Without Using Any Software

How many times have you wished of a software using which you can hide or lock files, restricting its access to other unwanted users. Although there are various software available in market using which you can easily lock/hide files but, i personally dont trust them because most of them are bloatware or spyware.

In this post i am going to share a simple yet powerful way of locking and hiding important files using a the following method. Follow the instructions to make you own Locker ( Without any software !! ) :

  • Open notepad.
  • Copy the following code in notepad file :

    cls
    @ECHO OFF
    title Folder Locker
    if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
    if NOT EXIST Locker goto MDLOCKER
    :CONFIRM
    echo Are you sure u want to Lock the folder(Y/N)
    set/p "cho=>"
    if %cho%==Y goto LOCK
    if %cho%==y goto LOCK
    if %cho%==n goto END
    if %cho%==N goto END
    echo Invalid choice.
    goto CONFIRM
    :LOCK
    ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    echo Folder locked
    goto End
    :UNLOCK
    echo Enter password to Unlock folder
    set/p "pass=>"
    if NOT %pass%==YOUR PASSWORD HERE goto FAIL
    attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
    echo Folder Unlocked successfully
    goto End
    :FAIL
    echo Invalid password
    goto end
    :MDLOCKER
    md Locker
    echo Locker created successfully
    goto End
    :End
  • Change the “YOUR PASSWORD HERE” with your password.
  • Save it as batch file ( with extension .bat ) For eg. Locker.bat
  • Now you will see a batch file. Double click it to create a folder locker ( A new folder named Locker would be formed at the same location )
  • Thats it you have now created your own locker and that too without using any software !
  • Brings all the files you want to hide in the locker folder.
  • Double click the batch ( As created above ) file to lock the folder namely Locker.

Folder lock

If you want to unlock your files, simple double click the batch file again and you would be prompted for password ( In DOS window ). Enter the password and enjoy access to the folder.

But don’t delete .bat file and loose your stuff…….

16.Convert Text Into Audio Using Notepad

  1. Open Notepad file on your Windows PC.
  2. Copy and paste the below mentioned code :

      Dim msg, sapi
      msg=InputBox("Enter your text for conversion–www.knowhacking.wordpress.com","Knowhacking Text-To-Audio Converter")
      Set sapi=CreateObject("sapi.spvoice")
      sapi.Speak msg
  3. Save this file with any name with .vbs as extension. For eg. Text-To-Audio.vbs

Thats it ! Your Text to Audio converter is ready to be used. Now open the saved file and key in the text you want to convert and click OK. If you find any difficulties in using this code, let me know via comments section.

17.Format Your Hard Disk Using Just Notepad !!

Ever wondered of a way to format your hard disk using just notepad ?
I bet you haven’t even thought about it or if you have had then you would still have preferred using reliable software’s available to do the job.

In this post i am going to share a simple way to format your C drive (Yep, only C drive) using just notepad. This is just a nice little nifty trick, which i am sharing with you. Make sure you don’t actually use it on your business computer. Try to make this trick work in a VMWare Machine in your free time.

Moving on, in order to completely format your C: Drive (Primary disk) follow the steps given below :-

  1. Open notepad.
  2. Type the following the code in it (Or just copy paste it).
  3. 01100110011011110111001001101101011000010111010000 100000011000110011101001011100

    0010000000101111010100010010111101011000

  4. Save it as an .exe file giving any name you desire.

Thats It ! Now just double click on the file (to open it) and your C: drive will be formatted !

This is just a little binary fun. Be Careful while using it.

UPDATE : No, you can’t run it from C: drive itself (not from the drive in which OS is installed & running).

here

PLS pass your comments on this

Share it