Saturday, July 18, 2009

Change your IP Address in Seconds

Here is a wonderful trick that you can use to change your IP Address in less than a minute.

1. Open up a Notepad file and type the following

cd/
cls
color 0a
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit

2. Save it as a batch file with .bat extension.

3. Execute this file to change the IP address.

[ NOTE ] – This will work only if you are using a ISP that assigns you a Dynamic IP.

Thursday, July 16, 2009

Why Pc boots Randomly?

Lots of people report that while doing there work, there pc suddenly boot. And all work that they have done get lost. Secondly it's very annoying . So i found different reasons of sudden PC boot.

+Hardware Reasons:

Voltage Fluctuation:-
Sudden change in Voltages cause the pc boot. To solve this problem use Stabilizers so that they step-up the Voltages

Processor's Fan:-
If Fan which is located on Processor is not working then process get over heated and cause random boot after every 2.5 Minutes.

Cracked Power Supply:-
I the power supply 230V is cracked from some where then it will also cause the same problem. Use multimeter, fix it to Ohm scale to check the cable.

Loose Socket:-
Loose socket result in sparking and random boot. It's very dangerous, fix it immediately.

+Software Reasons:

Many viruses are designed to boot PC again and again to make user annoy and result in data lost.
Many people reported that they used Alcohol 120% keygen and there PC start booting randomly. It's mean the keygen is infected with some virus.

Command:-

A batch command is basically used to reboot PC.

Shutdown -s -t 0 -f

Tuesday, July 7, 2009

Cracking & How to Defend It? Part II

For cracking you should know about assembly language not so much to program but enough so that you can understand it.
Mostly cracker open an application with Debuggers to study. But when an application is protected then debugger will display following message.



















Lets take some example of a protected application and an unprotected Application

Protected Application:
Here you can see trial period command is invisible or encrypted.
















Unprotected Application:
Here the trial period command become very easy to cheat.









Forms of Cracking:
key gens, patches, trial reseter and cracked exes are different forms of cracking.
If you are interested in cracking visit.
ap0x.jezgra.net

www.tuts4you.com
http://unkn0wn.ws/
http://hackhound.org/

Sunday, July 5, 2009

Cracking & How to Defend It? Part I


First of all we will discuss what is cracking? and then i will suggest some methods to defend cracking.

Suppose you make a tool or software after late night coding for few months. You sell that software for 55$ to earn money of your hard work but a cracker get that trial version and crack it and start distributing it. It will be very depressive. To get reward of your hard work you should defend cracking.

Lets see what methods commonly a cracker apply to crack an application.

APIs of An application:-
Often an attacker will try to study the APIs that are called by an application in order to see how it work and subsequently bypass the protection. Mostly commonly available tool will allow an attackers to do this.

Breakpoint:-
Normally an attacker will use a debugger to setup a breakpoint in an application. A breakpoint allows an attacker to spot execution of an application when a certain even occurs and study what the application is doing at that point.

Dumpers:-
Many attackers have access to tools that allow them to dump a running application from memory to disk. If a successful the attackers will be able to reconstruct the original application with this technique.
Most of the current software protectors use very weak techniques against memory dumpers such as destroying the exe header at runtime.

Memory Modification:-
in some situations an attacker will not try to reconstruct the original code of a protected application . Instead he will change some of the data or code in he memory to change the behavior of an application. This common scenario is often found in computer games where an attacker will modify the behavior of the game to get extra features.

Monitoring Tools:-
Many crackers use file or registry monitors to see which file or registry keys are accessed by an application, that could give him clues about how to cheat the trial period of an application.

Debugger s:-
Now in these days mostly cracks use debuggers to crack an application.

Defend Cracking:-
  • To defend cracking try to use very powerful protectors and encryption softwares to protect applications. They will make the code complicated and difficult for the crackers like adding garbage data in the application so that attackers will have to study many fake instruction instead of the original one, use memory blockers, code replace etc! To download those packers and Encryptors see my post "Download EXE packers"
  • Use Demo version for giving trial to the users, with very limited features.
  • If your use serials or keys for registering your software then program your application in such a way that it will check the serial number or key from a specific website, to avoid the user to use fake and black listed keys.
If you are interested in cracking visit ap0x.jezgra.net

Friday, July 3, 2009

Latest technique used By Malware Writers And how to defend it?[25-04-2009]

This info is for education Purposes so you can easily fight with malwares.

Recently i have seen that most of the malwares are hiding them in these places.

E:\$RECYCLE.BIN\S-1-5-21-753910001-3131002939-2694377654-1000

Reasons:-

Because this location is hidden or can be set it to hidden attributes. Some people try to check the files in pen drive with command prompt. So if the person do this he will only see the autorun file not the original exe file. For the original file he have to go to this location.

Restore Registry After Cleaning Malwares

Importance:-
Most of the time we have observed that many anti virus just clean the malwares they dont restore registry settings changed by Malwares. I read some where KasperSky also restore registry settings infected my a virus, but i m not sure.

So to solve this problem you should backup your registry, but before backup registry keep one thing in mind that your computer should be virus free.

Procedure:-
  • Ist go to Run and type regedit and hit enter, you will see registry editor( if nothing happens or pc shows some error then your PC is infected, clean it)
  • Go to File and then Click Export. See image
  • Then select the path to save the file and save it with the name WinRegBak.reg
  • Now it's done.

















To restore Registry:-
  • Double click the .Reg file that you have saved.
  • Computer will ask Do you want to merge setting" click Yes
  • Most of the settings will be restored by this.
An error may occur "Not all data was successfully written to the registry. Some keys are open by the system or some other processes."

Thursday, July 2, 2009

How to Disable Autorun Feature in XP?

Strategy:-

Most of the worms, now in these days put autorun.inf file in pendrive for infection. Then put autorun.inf and worm file to pendrive. When ever you open thumb drive autorun feature in windows automatically execute that virus file and your computer get infected. They make both of them (usually) hidden so that the user cant see them.

See in the picture-



















To disable this autorun feature so that your computer, at least , should not get infected from your pendrive make a reg file.

Procedure:-
  • Open notepad and put this code
  • Then save it as DisPenDrv.reg
  • Double click it and merge the settings.
Code:-
--------------------
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf]

@="@SYS:DoesNotExist"
--------------------

How to Explore Boot Sectors?

What is master boot record,? Answer of "What" is here.

http://en.wikipedia.org/wiki/Boot_sector

There is a tools which is used to Explore Boot Sectors.
















Size : 25KB License : Free ware

Download