100+ Free Portable Apps

This stuff can be installed on any portable drive, i.e. USB thumbdrive, PDA or an iPod. You can use them at work, school, or any other place where you can plugin your device. Check them out, you can either scroll-down for relevant category, i.e office software, email tools, messengers, games, etc. or get a ‘all-in-one’ package (all essential tools) . While there are more apps for windows users, I tried to include a mac version for each essential tool. All free. Enjoy!
What is a portable program ? : A portable program is a piece of software that you can carry around with you on a portable device and use on any other computer. It can be your email program, your browser, system recovery tools or even an operating system. The coolest part about it, is that all of your data and settings are always stored on a thumbdrive so when you unplug the device, none of your personal data is left behind.
Portable Office Software
  • Abiword [Win (6.3 mb) / Mac (9.5 mb)] – word processor (compatible with Microsoft word)
  • OpenOffice [Win (65 mb) / Mac (127 mb)] – free alternative to Microsoft Office (fully compatible with Microsoft Office docs)
  • PDF Viewers: Sumatra [Win (1.1 mb) ], Foxit PDF Reader [Win, (1.8 mb) ]
  • Notepad ++ – feature-rich Notepad replacement.
Portable Email/Calendar/ToDo Programs

How to Hack Password of any Operating System

One thing any hacker should know is how to hack into login account of any operating system. Major Operating Systems that are used these days are Windows, Linux and Mac. So today I will show you how to hack into these Operating Systems. Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password.
Windows
Windows being very popular has a lot of programs available which can be used to hack the login password. One of the most successful  program is Ophcrack, and it is free. Ophcrack is based on Slackware, and uses rainbow tables to solve passwords up to 14 characters in length. The time required to solve a password? Generally 10 seconds. The expertise needed? None.
Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). Insert the CD into a machine you would like to gain access to, then press and hold the power button until the computer shuts down. Turn the computer back on and enter BIOS at startup. Change the boot sequence to CD before HDD, then save and exit.
The computer will restart and Ophcrack will be loaded. Sit back and watch as it does all the work for your. Write down the password it gives you, remove the disc, restart the computer, and log in as if it were you own machine.
You can download OphCrack from the following link:
http://ophcrack.sourceforge.net/

Linux

Setting Up A Hackers Workstation

Hi guys, Hope you have gone through the previous article and you’re now ready to take on the hacking stuff.  At very beginning you have to make your workstation ready, so that things will be available to you at one click.
You have to collect some of the tools, Operating System & documentation on your PC with a very clear format.
Operating System:
Which OS to use, choice is all yours. Windows in all cases is not so ‘made for hacking’ according to me. Whatever XP,Vista or windows 7. They are all just OS which are made for novice public which can learn computers.
If you are a regular Linux user, Then shift to Backtrack Linux. It is Linux made for hacker geeks & completely embedded with all penetration testing tools in it. You can Download Backtrack here. But if you have never used Linux & wish to learn then you can use basic Linux distributions like Ubuntu. But remember that you or not supposed to learn Linux desktop environment like windows, you have to learn its shell or terminal. (command prompt of Linux)
As I said Choice is all yours you can go with Windows also. Its all on you.  (Suggestion: If you can’t make it habit to learn new things, you can never be a HACKER)
Hackers Toolkit:
In your root directory or C:/ in windows make a folder named Tools. So that you can access all tools from command prompt easily E.g.  c:/tools/example
Go surf for these tools enlisted.

Your First Step Towards Hacking

Hello Folks,
With my very first post, I am trying to divert you from tutorials. I am assuming you surf daily, download too much stuff, find cracks & serials & hacking tutorials.  This group is called as anarchists. This is the very beginning step of hacking. But many people stay in the same zone & never get promoted to the real penetration. The one I would like to share that you need to read a lot (very much than you can think), otherwise you can loose the thing.
Basic principle behind hacking is learn how the things are constructed, You can easily find the way to destruct it. There are some general mistakes in making things, you can know it only when you try to make it too.
When you make mistake while creating something, if someone try to take over that mistake & use it as a security hole to intrude in your system is called as hacker. So you need to learn the construction. The construction of following things:
Networks :
1. How Network is Created
2. How Firewalls are placed
3. Topology of The Network
4. Encryption
Web/Internet:
1. How a website is created, how they run (For that have some website, learn some potential problems in making a website, if you don’t have budget, then search for free hosts & domains )
2. How a blog is created & managed

Windows 7 Cheat Sheet

As you all know Windows 7 RC3 is launched. Here’s a little cheat sheet I made up for some of the handy new hot key combination, many of which I’ve become quite dependent on!

From Desktop

  1. Windows Key + Tab : Aero [press Tab to cycle between Windows]
  2. Windows Key + E : Windows Explorer is launched.
  3. Windows Key + R : Run Command is launched.
  4. Windows Key + F : Search (which is there in previous Windows versions too)
  5. Windows Key + X : Mobility Center
  6. Windows Key + L : Lock Computer (It is there from the earlier versions as well)
  7. Windows Key + U : Launches Ease of Access
  8. Windows Key + P : Projector
  9. Windows Key + T : Cycle Super Taskbar Items
  10. Windows Key + S : OneNote Screen Clipping Tool [requires OneNote]
  11. Windows Key + M : Minimize All Windows
  12. Windows Key + D : Show/Hide Desktop
  13. Windows Key + Up : Maximize Current Window
  14. Windows Key + Down : Restore Down / Minimize Current Windows
  15. Windows Key + Left : Tile Current Window to the Left
  16. Windows Key + Right : Tile Current Windows to the Right
    [Continue pressing the Left and Right keys to rotate the window as well]
  17. Windows Key + # (# is any number) : Quickly Launch a new instance of the application in the Nth slot on the taskbar. Example Win+1 launches first pinned app, Win+2 launches second, etc.
  18. Windows Key + = : Launches the Magnifier
  19. Windows Key + Plus : Zoom in
  20. Windows Key + Minus : Zooms out
  21. Windows Key + Space : Peek at the desktop

From Windows Explorer

22. Alt + Up : Go up one level
23. Alt + Left/ Right : Back/ Forward
24. Alt + P : Show/hide Preview Pane

Taskbar modifiers

25. Shift + Click on icon : Open a new instance
26. Middle click on icon : Open a new instance
27. Ctrl + Shift + Click on icon : Open a new instance with Admin privileges
28. Shift + Right-click on icon : Show window menu (Restore / Minimize / Move / etc). Note: Normally you can just right-click on the window thumbnail to get this menu.
29. Shift + Right-click on grouped icon : Menu with Restore All / Minimize All / Close All, etc.
30. Ctrl + Click on grouped icon : Cycle between the windows (or tabs) in the group
Though some of them are there in previous versions of Windows, Windows 7 has incorporated many of them and have started many afresh.

How to Set up your own Proxy Server

Lot´s of people complain that Web Proxys are not working at their Works / Schools computer because they have been banned by administrators. A way around this would be to setup your very own proxy server that is being hosted a) by a free web hosting service that supports either php or cgi or b) your own website that is being hosted by a web hosting company.
Both methods should work and I will walk you right through the installation process for both scripts and give you tips how to find out what is actually being blocked. Before we start you need to download a copy ofphpproxy or cgiproxy depending on what you want and can use. You also could perform a search for free web hosting on google for instance and try to find a web host that supports one of the two languages, a good site that I found while searching for those terms might be freewebspace.net
1. phpproxy
Download phpproxy and unpack it to a local directory on your hard drive. All you need to do know is to upload the script to your webspace and open up the new url to check if its working allright. You might want to rename the file to something different, something that does not contain the word proxy in it to avoid filters that ban everything that has the word “proxy” in it.

Enabling/Disabling User Access Control in Windows Vist

Microsoft’s advertising has stressed the new security features found in Windows Vista. From the user perspective, one such feature, User Access Control, is arguably the most noticeable enhancement. User access control is a mechanism by which users — even administrators — perform common Windows tasks with non-administrative rights, or as a standard user. Before administrative tasks can be performed, users must actively approve actions that could be potentially dangerous to the computer.
In this article, I’ll give you a complete look at User Access Control’s inner workings and show you some ways you can change the behavior of this new feature.
How does User Access Control work?
The Inner workings of User Access Control reveal a lot about how this feature protects your computer. First, let’s talk about why User Access Control was developed.
The problem: Windows XP and silent installations
In pre-Vista versions of Windows, upon login, a user was assigned an access token. A non-administrative user was assigned a token that granted him access to resources that did not require administrative rights. Users that were members of an administrative group were assigned a single token that granted them full rights to all of the resources on the local computer.
From an ease-of-use perspective, this level of authority was great. However, from a security perspective, it’s not so great; even for IT pros. Consider the potential for “drive-by” spyware installation. A drive-by installation happens when you visit, either accidentally or intentionally, a site containing malicious code that you don’t know about. While spyware scanners have significantly improved over the past couple of years, there’s not a single solution on the market that will protect against every known threat. Even if there was such a product, there would still be the issue of unknown threats. New spyware pops up every day and it takes vendors time to discover these new nuisances and update their products.
If you’re logged in to Windows XP as a user with administrative privileges at the time the drive-by takes place, spyware may get installed to your computer with absolutely no notice to you. This spyware could be anything from a fairly innocuous tool to a key logger that keeps track of everything you type and sends the results to a predetermined location. You might end up with the installation of a back door that allows a hacker to make his way into your system at some point in the future to achieve his nefarious goals. Worse, the deeper spyware is embedded into your system, the more difficult it is to remove, short of a complete system rebuild, which can take hours.
[eminimall]
Note: When you install Windows XP, the Setup Wizard assigns administrative rights to all local accounts.
Now, you might tell yourself you already knowall of this; but, in your organization, you’re forced to allow users to run as a local administrator for any number of reasons. For example, many users (with the backing of management) feel it is vital that they have the ability to install new applications on their desktop. Unfortunately, they’re often right. Doing business on the Web often means having to install a new ActiveX control or other type of application. While not the safest behavior, allowing people to do their jobs is preferable to paying people to sit in a chair doing nothing under the unyielding thumb of IT.

The solution: Windows Vista and User Access Control

Windows Vista’s introduction of User Access Control aims to tame this beast and bring some order back to chaos. Under Vista, when an administrative user logs in to the system, he is granted not one, but two access tokens: an administrative access token and a standard user access token. The standard access token is used to start the user’s desktop. The end result is that the administrator is running a system with more limited rights than he would have received upon login under Windows XP. Until there is a need, the second token — the one with administrative rights — is not used.
This situation takes place, for example, when the administrative user starts a control panel applet and tries to change a setting, Windows Vista’s User Access Control feature pops up a window indicating that permission is necessary to continue. When you choose to allow an administrative action to take place using the administrative token, you are allowing that application to run with elevated privileges. Figure A gives you a look at a typical User Access Control dialog box. If you want to allow the action, press the Continue button.
Figure A
windows Vista user access control UAC - The Ethical Hacking

JPEG Binding

Do you know most of the virus that infiltrate your computer are stored secretly in a jpeg image? Well if you are not aware of this then you must read it.
# You will need the following.. Windows 2000 / XP
# Basic Knowledge of the Command Prompt
# WinRar
1. Gather your image and the files you wish to lodge into it. Here I have a meeting.txt which I will hide inside my toshow.jpg.
2. Add the files you want to hide into a new RAR archive. (so meeting.txt.rar created newly)
3. Open Command Prompt and go to the folder where your files are located, e.g., ‘C:\hidden’.
5. At command prompt type ‘copy /b toshow.jpg + meeting.txt.rar lizard.jpg’ (without quotes).
(toshow.jpg is the picture I want to show, meeting.txt.rar is the file to be hidden, and lizard.jpg is the file which contains both.
6. Now test the lizard.jpg by double clicking it, and verifying it still opens.
7. Now try opening that same lizard.jpg file from menu: file->open of WinRar. It will show the original hidden file meeting.txt.
Done !!!!!
Now lizard.jpg is a simple JPEG for others, but it contains a secret file meeting.txt for you !!!!!!!!!