Orkut stufff (it just 4 fun)

just copy paste them in ur adress bar and press enter :
========================================================

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i

Orkut stufff (it just 4 fun)

just copy paste them in ur adress bar and press enter :
========================================================

javascript:R=-1;DI=document.links;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(5,100,500);DIS.top=A(5.6,60,150)}setInterval('R++;B(R%DIL)',15);void(0)

How to Spoof Caller ID – Caller ID Spoofing

http://www.gohacking.com/wp-content/uploads/2010/04/Caller_ID_Spoofing.jpg

Caller ID spoofing is the act of making the telephone network to display any desired (Fake) number on the recipient’s Caller ID display unit instead of the original number. The Caller ID spoofing can make a call appear to have come from any phone number that the caller wishes.

Have you ever wondered how to perform Caller ID spoofing? Read on to know more information on Caller ID spoofing and find out how it is performed.

Unlike what most people think, an incoming call may not be from the number that is displayed on the Caller ID display unit. Because of the high trust that the people have in the Caller ID system, it is possible for the caller to easily fool them and make them believe that the number displayed on the Caller ID display is real. This is all possible through Caller ID spoofing.



How to Spoof Caller ID?

You can easily spoof any Caller ID using services like SpoofCard. In order to use the spoofcard service, you need to pay in advance and obtain a PIN (Personal Identification Number) which grants access to make a call using the Caller ID spoofing service. Once you have purchased the service, you will be given access to login to your SpoofCard account. To begin with, you need to call the number given by SpoofCard and enter the PIN. Now you will be given access to enter the number you wish to call and the number you wish to appear as the Caller ID. Once you select the options and initiate the calling process, the call is bridged and the person on the other end receives your call. The receiver would normally assume that the call was coming from a different phone number ie: the spoofed number chosen by you - thus tricking the receiver into thinking that the call was coming from a different individual or organization than the caller’s. In this way it is just a cakewalk to spoof Caller ID and trick the receiver on the other end. Thus you neither need to be a computer expert nor have any technical knowledge to perform Caller ID spoofing. For more information on SpoofCard service visit the following link.


SpoofCard (http://www.gohacking.com/recom_products/SpoofCard.php)



How Caller ID Spoofing works?

Caller ID spoofing is done through various methods and using different technologies. The most commonly used technologies to spoof Caller ID is VOIP (Voice Over IP) and PRI (Primary Rate Interface) lines.

Today most VOIP systems provide an option for it’s users to enter whatever number they want in the calling party field and this number is sent out when they make a call. Hence it is easily possible for any user to spoof Caller ID provided they have a VOIP system and know how to properly configure it to spoof the Caller ID. However sites like SpoofCard provide an easy and cheap spoofing services for those who aren’t using VOIP systems that they can configure themselves.

Caller ID spoofing is possible and being performed right from the days Called ID system was introduced. However most people are unaware of the fact that it is possible to spoof Caller ID and make any number to be displayed on the receiver’s end. In the past, Caller ID spoofing service was mostly used by telemarketers, collection agencies, law-enforcement officials, and private investigators but today it is available to any Internet user who wish to perform Caller ID spoofing.

Windows Installer Service could not be accessed" error message when installing application

The Windows Installer Service could not be accessed. This can occur if
you are running Windows in safe mode, or the Windows Installer is not
correctly installed. Contact your support personnel for assistance.

Method 1: Unregister and re-register the Windows Installer

1. Click Start, click Run, type MSIEXEC /UNREGISTER, and then click
OK. Even if you do this correctly, it may look like nothing occurs.
2. Click Start, click Run, type MSIEXEC /REGSERVER, and then click
OK. Even if you do this correctly, it may look like nothing occurs, or
you may briefly see an hourglass. After you run this command, the
operation is complete.
3. Try your Windows Installer-based application again.
Method 2: Verify the DCOM permissions
This method involves changing the DCOM default impersonation level to
Identify, removing the Msisip.dll file, and then reinstalling SP 3 for
Windows 2000.

To do this, follow these steps:

1. Click Start, click Run, type dcomcnfg, and then click OK.
2. On the Default Properties tab:
1. In the Default Authentication Level list, click Connect.
2. In the Default Impersonation Level list, click Identify,
and then click OK.
3. Click Start, click Run, type explorer /select, %windir%
\system32\msisip.dll, and then click OK.
4. Rename the Msisip.dll file as Msisip.old.
5. Reinstall Windows 2000 Service Pack 3.

Method 3: Give Full Control permission to the SYSTEM account

1. Start Windows Explorer, right-click the computer's root hard
drive, and then click Properties.
2. Click the Security tab, and then click Add.
3. In the Select Users, Computers, or Groups dialog box, click the
SYSTEM account, click Add, and then click OK.
4. Under Allow, click to select the Full Control check box, and
then click OK.
5. Click the TEMP folder and then verify that the SYSTEM account
has full control.

Method 4: Verify the registry permissions

1. Click Start, click Run, then type Regedt32.
2. For each of the registry hives, follow these steps:
1. Select the hive.
2. For Windows XP, on the Edit menu, click Permissions.

For Windows 2000 and Windows NT 4, on the Security menu,
click Permissions.
3. Verify that the SYSTEM account has been added and that it has
Full control. If it does not, add the SYSTEM account with Full
control.

Method 5: Fix the broken security key for the MsiServer service

1. Start the computer by using Windows 2000.
2. Click Start, click Run, type regedit.exe, and then rename the
following key to Old_Security:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSIServer
\Security
3. Restart the computer (you must do this).
4. Run Instmsiw.exe for installer 2.0 again; this corrects the
broken security key for the MSI service.
========================================

* Free Laptop *

* Free Downloads *

Digital Circut  Designer Click here  to download

Desktop Animated Fish Click here to download

Cd-Rom Access Click here to download

Win.Hacker Click here to download

You-tube Video Downloader Click here to download

Emulator Click here to download

Windows 7 Remix XP themes Click here to download

Download IGNOU Solved Assingment

MCS-011

Earn Rs.500-1000 Daily.

Earn Money

* A Hacker's Mind *


A hacker’s main objective is to compromise the targeted computer, network, or application. The hacker starts off with little information and ends up with a detailed map into the system. There are five steps which hackers follow to hack into a system:


Reconnaissance
The target of this investigation stage is to gather info about domain names, IP address ranges, business partners, phone numbers, type of software and operating systems in use and existing network defence mechanisms.

First, hackers must identify the domain names of the target such as xxxx.com. Then they gather as much information as possible through public channels. One good source is through newsgroups. Information Technology (IT) staff often divulge too much information about their configurations and applications when approached for assistance. Job announcements also provide vital information about the company’s computer systems, operating systems and applications. If the job advertises for an information-security position, the type of network defense of the target can easily be identified.

The hacker can then visit the Internet Archive’Web site (archive.org) to check for information about the target that may go back for years. The Securities and Exchange Commision’s website (www.sec.gov) can reveal information about impending company merges – this means that the IT defenses for both companies will be significantly lowered to merge resources and ensure a smooth transition. When the enemy’s defences are down, it’s time to attack.

Hackers can also use social engineering to gather facts. The human element is oftentimes the weakest link in the system. For example, if you have the trust of an employee who is authorised to access the network, you can pretend to have an urgent problem that appeals to the natural helpfulness of the person.

Scanning and Enumeration
Next, hackers will scan servers and resources on the target network using the software from any “Warez” websites for free. Once a hacker gets detailed info about the target operating systems or application via scanning, it only takes a little talent and substantial patience to identify weaknesses in the system. A visit to any hacking tool website will give the beginner hacker a push in the right direction. Sometimes a computer system will even offer information about password length or bypass the need for a password if the hacker asks the computer a suitably formatted question. Once past the firewall, internal security is usually slack.

Gaining Access
After scanning for the relevant information, the hacker now has free access to the system or network. They will have a free run of the place with complete administrative access and can change any information or play havoc to the system. A tip: an easy way to do this is a call to the company help desk and impersonate the manager to get a password reset if an email sent to the manager earlier triggers an automatic ‘I’m on leave’ message.

Perfect
If the hacker still has difficulty getting administrative access into the system, a Trojan disguised as a service pack or system update can be sent to company staff. This can be sent from the System Administrator’s email account (obtained from a newsgroup message in the reconnaissance phase) –The Trojan appears harmless but will install a key-logger program in the background when run by employees. When the employees key in their user-IDs and passwords throughout the day, the program will automatically forward these to the hacker.

Maintaining Access
Once the hacker has access to critical computer systems, the password file or the Security Account Manager (SAM) is easily obtainable. This contains the user-IDs and passwords for all the system users. From here, they can hack into other systems. Hackers also install backdoor programs on all compromised systems so that they will continue to have access even when the passwords are changed. Furthermore, this will be totally overlooked by even experienced IT staff as normal network traffic. The perfect crime!
A hacker’s main objective is to compromise the targeted computer, network, or application. The hacker starts off with little information and ends up with a detailed map into the system. There are five steps which hackers follow to hack into a system:


Reconnaissance
The target of this investigation stage is to gather info about domain names, IP address ranges, business partners, phone numbers, type of software and operating systems in use and existing network defence mechanisms.

First, hackers must identify the domain names of the target such as xxxx.com. Then they gather as much information as possible through public channels. One good source is through newsgroups. Information Technology (IT) staff often divulge too much information about their configurations and applications when approached for assistance. Job announcements also provide vital information about the company’s computer systems, operating systems and applications. If the job advertises for an information-security position, the type of network defense of the target can easily be identified.

The hacker can then visit the Internet Archive’Web site (archive.org) to check for information about the target that may go back for years. The Securities and Exchange Commision’s website (www.sec.gov) can reveal information about impending company merges – this means that the IT defenses for both companies will be significantly lowered to merge resources and ensure a smooth transition. When the enemy’s defences are down, it’s time to attack.

Hackers can also use social engineering to gather facts. The human element is oftentimes the weakest link in the system. For example, if you have the trust of an employee who is authorised to access the network, you can pretend to have an urgent problem that appeals to the natural helpfulness of the person.

Scanning and Enumeration
Next, hackers will scan servers and resources on the target network using the software from any “Warez” websites for free. Once a hacker gets detailed info about the target operating systems or application via scanning, it only takes a little talent and substantial patience to identify weaknesses in the system. A visit to any hacking tool website will give the beginner hacker a push in the right direction. Sometimes a computer system will even offer information about password length or bypass the need for a password if the hacker asks the computer a suitably formatted question. Once past the firewall, internal security is usually slack.

Gaining Access
After scanning for the relevant information, the hacker now has free access to the system or network. They will have a free run of the place with complete administrative access and can change any information or play havoc to the system. A tip: an easy way to do this is a call to the company help desk and impersonate the manager to get a password reset if an email sent to the manager earlier triggers an automatic ‘I’m on leave’ message.

Perfect
If the hacker still has difficulty getting administrative access into the system, a Trojan disguised as a service pack or system update can be sent to company staff. This can be sent from the System Administrator’s email account (obtained from a newsgroup message in the reconnaissance phase) –The Trojan appears harmless but will install a key-logger program in the background when run by employees. When the employees key in their user-IDs and passwords throughout the day, the program will automatically forward these to the hacker.

Maintaining Access
Once the hacker has access to critical computer systems, the password file or the Security Account Manager (SAM) is easily obtainable. This contains the user-IDs and passwords for all the system users. From here, they can hack into other systems. Hackers also install backdoor programs on all compromised systems so that they will continue to have access even when the passwords are changed. Furthermore, this will be totally overlooked by even experienced IT staff as normal network traffic. The perfect crime!