<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>Get Solution For your daily faced problems </title>
	<atom:link href="http://dailysolution.wordpress.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://dailysolution.wordpress.com</link>
	<description>Just another WordPress.com weblog</description>
	<lastBuildDate>Tue, 22 May 2012 12:21:25 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<cloud domain='dailysolution.wordpress.com' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<image>
		<url>http://s2.wp.com/i/buttonw-com.png</url>
		<title>Get Solution For your daily faced problems </title>
		<link>http://dailysolution.wordpress.com</link>
	</image>
	<atom:link rel="search" type="application/opensearchdescription+xml" href="http://dailysolution.wordpress.com/osd.xml" title="Get Solution For your daily faced problems " />
	<atom:link rel='hub' href='http://dailysolution.wordpress.com/?pushpress=hub'/>
		<item>
		<title>ALL SYSTEM SECURITY explained !!</title>
		<link>http://dailysolution.wordpress.com/2009/04/06/all-system-security-explained/</link>
		<comments>http://dailysolution.wordpress.com/2009/04/06/all-system-security-explained/#comments</comments>
		<pubDate>Mon, 06 Apr 2009 10:50:00 +0000</pubDate>
		<dc:creator>futurbillgate</dc:creator>
				<category><![CDATA[security]]></category>
		<category><![CDATA[tools]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[virus . hack]]></category>

		<guid isPermaLink="false">http://dailysolution.wordpress.com/?p=46</guid>
		<description><![CDATA[again a tutorial from me to explain the stuff ! cheers !!!! -futurbillgate WHAT MAKES A SYSTEM SECURE? &#8220;The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed [...]<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=46&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
			<content:encoded><![CDATA[<p><strong><span style="font-size:12pt;line-height:100%;"><span style="color:#ff0000;">again a tutorial from me to explain the stuff ! cheers !!!!<br />
-futurbillgate</p>
<p>WHAT MAKES A SYSTEM SECURE?<!--colorc--></span><!--/colorc--><!--sizec--></span><!--/sizec--></p>
<p><!--sizeo:3--><span style="font-size:12pt;line-height:100%;"><!--/sizeo--><!--coloro:#008000--><span style="color:#008000;"><!--/coloro-->&#8220;The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then I wouldn&#8217;t stake my life on it.&#8221;<!--colorc--></span><!--/colorc--><!--sizec--></span><!--/sizec--></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->WHAT WOULD BE IDEAL PROTECTION OF A SYSTEM?<br />
<!--colorc--></span><!--/colorc--><br />
</strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>Password Access- Get rid of simple passwords; routinely change all passwords; regular review/monitoring of password files.</p>
<p>Physical Access- Lock up terminals, personal computers, disks when not in use; eliminate unnecessary access lines; disconnect modems when not in use.</p>
<p>Other measures- Know who you are talking to; shred all documents; avoid public domain software; report suspicious activity (especially non-working hours access)</p>
<p>What this all means is that hackers must now rely on the ineptitude and laziness of the users of the system rather than the ignorance of SysOps. The SysOps and SecMans (Security Managers) are getting smarter and keeping up to date. Not only that, but they are monitoring the hack/phreak BBSes and publications. So the bottom line is reveal nothing to overinquisitive newbies&#8230;they may be working for the wrong side.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->WHAT IS A FIREWALL?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>A (Internet) firewall is a machine which is attached (usually) between your site and a Wide Area Network (WAN).  It provides<br />
controllable filtering of network traffic, allowing restricted access to certain Internet port numbers and blocks access to pretty well everything else.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->HOW TO HACK WITHOUT GETTING INTO TROUBLE AND DAMAGING COMPUTERS?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong> 1.  Don&#8217;t do damage intentionally.<br />
2.  Don&#8217;t alter files other than than to hide your presence or to remove traces of your intrusion.<br />
3.  Don&#8217;t leave any real name, handle, or phone number on any system.<br />
4.  Be careful who you share info with.<br />
5.  Don&#8217;t leave your phone number with anyone you don&#8217;t know.<br />
6.  Do NOT hack government computers.<br />
7.  Don&#8217;t use codes unless you HAVE too.<br />
8.  Be paranoid!<br />
9.  Watch what you post on boards, be as general as possible.<br />
10.  Ask questions&#8230;but do it politely and don&#8217;t expect to have    everything handed to you.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->WHAT DO I DO IF I AM GETTING NOWHERE?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>1. Change parity, data length, and stop bits. The system may not respond to 8N1 (most common setting) but may respond to 7E1,8E2, 7S2, etc.<br />
2.  Change baud rates.<br />
3.  Send a series of carriage returns.<br />
4.  Send a hard break followed by a carriage return.<br />
5.  Send control characters.  Work from ^a to ^z.<br />
6.  Change terminal emulation.<br />
7.  Type LOGIN, HELLO, LOG, ATTACH, CONNECT, START, RUN, BEGIN, GO,   LOGON, JOIN, HELP, or anything else you can think off.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>=====================================================================</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->WHAT ARE COMMON DEFAULT ACCOUNTS ON UNIX?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#008000--><span style="color:#008000;"><!--/coloro--><strong>Common default accounts are root, admin, sysadmin, unix, uucp, rje, guest, demo, daemon, sysbin. These accounts may be unpassworded or the password may possibly be the same (i.e. username uucp has uucp as the passwd).</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->HOW IS THE UNIX PASSWORD FILE SETUP?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>The password file is usually called /etc/passwd. Each line of the passwd file of a UNIX system follows the following format:</strong><!--colorc--></span><!--/colorc--><strong></p>
<p><!--coloro:#008000--><span style="color:#008000;"><!--/coloro-->userid:password:userid#:groupid#:GECOS field:home dir:shell<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>What each of these fields mean/do&#8212;</p>
<p>userid -=&gt; the userid name, entered at login and is what the login searches the file for. Can be a name or a number.</p>
<p>password -=&gt; the password is written here in encrypted form. The encryption is one way only. When a login occurs the password entered is run through the encryption algorithm (along with a salt) and then contrasted to the version in the passwd file that exists for the login name entered. If they match, then the login is allowed. If not, the password is declared invalid.</p>
<p>userid#      -=&gt;  a unique number assigned to each user, used for                 permissions</p>
<p>groupid# -=&gt; similar to userid#, but controls the group the user belongs to. To see the names of various groups check /etc/group</p>
<p>GECOS FIELD -=&gt; this field is where information about the user is stored. Usually in the format full name, office number, phone number, home phone. Also a good source of info to try and crack a password.</p>
<p>home dir -=&gt; is the directory where the user goes into the system at (and usually should be brought to when a cd is done)</p>
<p>shell        -=&gt;  this is the name of the shell which is                 automatically started for the login</p>
<p>Note that all the fields are separated by colons in the passwd file.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->WHAT DO THOSE *s, !s, AND OTHER SYMBOLS MEAN IN THE PASSWD FILE?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>Those mean that the password is shadowed in another file. You have to find out what file, where it is and so on. Ask somebody on your system about the specifics of the Yellow Pages system, but discretely!</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->WHAT IS A UNIX TRIPWIRE?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>Tripwire is a tool for Unix admins to use to detect password cracker activity, by checking for changed files, permissions, etc. Good for looking for trojan horses like password stealing versions of telnet/rlogin/ypcat/uucp/etc, hidden setuid files, and the like.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->USING SUID/GUID PROGS TO FULL ADVANTAGE.<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>A SUID program is a program that when executed has the privs of the owner.<br />
A GUID has the privs of the group when executed.</p>
<p>Now imagine a few things (which happen often in reality):</p>
<p>1. Someone has a SUID program on their account, it happens to allow a shell to, like @ or jump to a shell. If it does that, after you execute said file and then spawn a shell off of it, all you do in that shell has the privs of that owner.<br />
2. If there is no way to get a shell, BUT they leave the file writable, just write over it a script that spawns a shell, and you got their privs again.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->HOW CAN I HACK INTO AN AIX MACHINE?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>If you can get access to the &#8216;console&#8217; AIX machines have a security hole where you can kill the X server and get a shell with ctrl-alt-bkspce. Also by starting an xterm up from one you are not logged in the utmp for that session because the xterms don&#8217;t do utmp logging as a default in AIX. Or try the usual UNIX tricks:</p>
<p>ftping /etc/passwd, tftping /etc/passwd, doing a finger and then trying each of the usernames with that username as a password.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->HOW CAN I INCREASE MY DISK QUOTA ON UNIX?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>A UNIX disk quota may be increased by finding a directory on another partition and using that. Find another user who wants more quota and create a directory for the other to use, one that is world writable.<br />
Once they&#8217;ve put their subdirectory in it, change the perms on the directory to only read-execute. The reason this works is that<br />
usually accounts are distributed across a couple of filesystems, and admins are usually too lazy to give users the same quotas on each filesystem. If the users are all on one filesystem, you may be able to snag some space from one of the /usr/spool directories by creating a &#8216;hidden&#8217; subdirectory like .debug there, and using that.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->HOW CAN I FOOL AROUND ON XTERM / XWINDOWS?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>Most x commands have a -display option which allows you to pick a terminal to send to. So if you use bitmap to create a bitmap, or download one, etc then:</p>
<p>xsetroot -bitmap bitmapname<br />
[display the bitmap on your screen]</p>
<p>xsetroot -bitmap bitmapname -display xt2500:0<br />
[display the bitmap on another xterm]</p>
<p>Other uses, try xterm -display xt??:0 will give someone else one of your login windows to play with. They are then logged in as you though, and can erase your filespace, etc. Beware!</p>
<p>Slightly irritating:<br />
xclock -geom 1200&#215;1200 -display xt??:0<br />
[fills the entire screen with a clock]</p>
<p>Slightly more irritating:<br />
Use a shell script with xsetroot to flash people&#8217;s screens different colors.</p>
<p>On the nastier side:<br />
Use a shell script with xsetroot to kill a person&#8217;s window manager.</p>
<p>Downright nasty:<br />
Consult the man pages on xkill. It is possible to kill windows on any display. So to log someone off an xterm you merely have to xkill their login window.</p>
<p>Protect yourself:<br />
If you use xhost &#8211;   this will disable other people from being able to log you out or generally access your terminal.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->HOW CAN I TAKE ADVANTAGE OF THE DECODE DAEMON?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>First, you need to make sure that the decode daemon is active.<br />
Check this by telnetting to the smtp port (usually port 25), and expanding user Decode. If it gives you something, you can use it.<br />
If it tells you that the user doesn&#8217;t exist, or whatever, you can&#8217;t.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>If the daemon is active, this is how to exploit the decode daemon:<br />
1) uuencode an echo to .rhosts<br />
2) pipe that into mail, to be sent to the decode daemon (What happens: the decode daemon (1st) decodes the process, but<br />
leaves the bin priveleges resident. (2nd) the echo command is executed, because now the decoded message assumes the bin priveleges [which are *still* active, even though the daemon didn't issue the command]).<br />
3) If this is done right, you will be able to rlogin to the sysem.</strong><!--colorc--></span><!--/colorc--><strong></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->HOW CAN I GET THE PASSWORD FILE IF IT IS SHADOWED?<!--colorc--></span><!--/colorc--></p>
<p><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro-->If your system has Yellow Pages file managment:<!--colorc--></span><!--/colorc--></p>
<p><!--coloro:#008000--><span style="color:#008000;"><!--/coloro-->ypcat /etc/passwd &gt; whatever.filename<!--colorc--></span><!--/colorc--></p>
<p>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p><!--coloro:#ff0000--><span style="color:#ff0000;"><!--/coloro-->HOW IS A PASSWORD ENCRYPTED IN UNIX?<!--colorc--></span><!--/colorc--></p>
<p></strong><!--coloro:#0000ff--><span style="color:#0000ff;"><!--/coloro--><strong>Password encryption on UNIX is based on a modified version of the DES [Data Encryption Standard]. Contrary to popular belief, the typed password is not encrypted. Rather the password is used as the key to encrypt a block of zero-valued bytes.<br />
To begin the encryption, the first seven bits of each character in the password are extracted to form the 56-bit key. This implies<br />
that no more than eight characters are significant in a password.<br />
Next, the E table is modified using the salt, which is the first two characters of the encrypted password (stored in the passwd file).<br />
The purpose of the salt is to makae it difficult to use hardware DES chips or a precomputed list of encrypted passwords to attack the algorithm. The DES algorithm (with the modified E table) is then invoked for 25 iterations on the block of zeros. The output of this encryption, which is 64 bits long, is then coerced into a 64-character alphabet (A-Z, a-z, 0-9, &#8220;.&#8221; and &#8220;/&#8221;). Because this<br />
coersion involves translations in which several different values are represented by the same character, password encryption is essentially one-way; the result cannot be decrypted.</p>
<p>- futurbillgate</strong></span></p>
<br />  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/dailysolution.wordpress.com/46/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/dailysolution.wordpress.com/46/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/dailysolution.wordpress.com/46/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/dailysolution.wordpress.com/46/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/dailysolution.wordpress.com/46/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/dailysolution.wordpress.com/46/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/dailysolution.wordpress.com/46/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/dailysolution.wordpress.com/46/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/dailysolution.wordpress.com/46/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/dailysolution.wordpress.com/46/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/dailysolution.wordpress.com/46/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/dailysolution.wordpress.com/46/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/dailysolution.wordpress.com/46/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/dailysolution.wordpress.com/46/" /></a> <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=46&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></content:encoded>
			<wfw:commentRss>http://dailysolution.wordpress.com/2009/04/06/all-system-security-explained/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	
		<media:content url="http://1.gravatar.com/avatar/9bddab6905a682e04a1d8c0f141769c4?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">futurbillgate</media:title>
		</media:content>
	</item>
		<item>
		<title>Resolving virus problems</title>
		<link>http://dailysolution.wordpress.com/2009/04/06/resolving-virus-problems/</link>
		<comments>http://dailysolution.wordpress.com/2009/04/06/resolving-virus-problems/#comments</comments>
		<pubDate>Mon, 06 Apr 2009 10:48:20 +0000</pubDate>
		<dc:creator>futurbillgate</dc:creator>
				<category><![CDATA[security]]></category>
		<category><![CDATA[tricks]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[virus removal]]></category>

		<guid isPermaLink="false">http://dailysolution.wordpress.com/?p=44</guid>
		<description><![CDATA[here i explained some very basic method of removing viruses &#8230;. for more stay tunned with me FUTURBILLGATE ..:~Description~:.. Enable registry editor copy the following code, paste in notepd and save with .inf extension [Version] Signature=&#8221;$Chicago{:content:}quot; Provider=Symantec [DefaultInstall] AddReg=UnhookRegKey [UnhookRegKey] HKLM, Software\CLASSES\batfile\shell\open\command,,,&#8221;"&#8221;%1&#8243;&#8221; %*&#8221; HKLM, Software\CLASSES\comfile\shell\open\command,,,&#8221;"&#8221;%1&#8243;&#8221; %*&#8221; HKLM, Software\CLASSES\exefile\shell\open\command,,,&#8221;"&#8221;%1&#8243;&#8221; %*&#8221; HKLM, Software\CLASSES\piffile\shell\open\command,,,&#8221;"&#8221;%1&#8243;&#8221; %*&#8221; HKLM, Software\CLASSES\regfile\shell\open\command,,,&#8221;regedit.exe &#8220;%1&#8243;&#8221; [...]<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=44&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
			<content:encoded><![CDATA[<p><span style="color:#ff8c00;"><strong><span style="font-size:14pt;line-height:100%;">here i explained some very basic method of removing viruses &#8230;.<br />
for more stay tunned with me <img src='http://s0.wp.com/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /><br />
<span style="color:#ff0000;"> FUTURBILLGATE</span></p>
<p>..:~Description~:..<!--sizec--></span><!--/sizec--></strong><!--colorc--></span><!--/colorc--><br />
<strong>Enable registry editor</strong></p>
<p>copy the following code, paste in notepd and save with .inf extension</p>
<p>[Version]<br />
Signature=&#8221;$Chicago{:content:}quot;<br />
Provider=Symantec</p>
<p>[DefaultInstall]<br />
AddReg=UnhookRegKey</p>
<p>[UnhookRegKey]<br />
HKLM, Software\CLASSES\batfile\shell\open\command,,,&#8221;"&#8221;%1&#8243;&#8221; %*&#8221;<br />
HKLM, Software\CLASSES\comfile\shell\open\command,,,&#8221;"&#8221;%1&#8243;&#8221; %*&#8221;<br />
HKLM, Software\CLASSES\exefile\shell\open\command,,,&#8221;"&#8221;%1&#8243;&#8221; %*&#8221;<br />
HKLM, Software\CLASSES\piffile\shell\open\command,,,&#8221;"&#8221;%1&#8243;&#8221; %*&#8221;<br />
HKLM, Software\CLASSES\regfile\shell\open\command,,,&#8221;regedit.exe &#8220;%1&#8243;&#8221;<br />
HKLM, Software\CLASSES\scrfile\shell\open\command,,,&#8221;"&#8221;%1&#8243;&#8221; %*&#8221;<br />
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System,DisableRegistryTools,0&#215;00000020,0</p>
<p>now right click the file and select install.</p>
<p>if it doesnt work then log-in through a virtual admin account as explained below, and then install this .inf file.</p>
<p>________________________________________________________________________________<br />
________________________</p>
<p><span style="text-decoration:underline;"><strong>virtual admin account</strong></span><br />
you can create a new virtual admin account and edit registry etc that r not allowed due to a virus.</p>
<p>Things to do:<br />
♦ set a password for the working account (just to stop auto login after booting)<br />
♦ restart<br />
♦ when it will ask for pass after boot, press ++ twice<br />
♦ a pop up window should appear<br />
♦ write &#8220;Administrator&#8221; in place of username, leave the password space blank<br />
♦ hit &#8220;ok&#8221;<br />
♦ i t will login into the PC creating a temporary (more precisely virtual) admin account</p>
<p>now you got admin privileges.</p>
<p>________________________________________________________________________________<br />
________________________</p>
<p><span style="text-decoration:underline;"><strong>Enable Run Command</strong></span></p>
<p>Open My Computer –&gt; C drive –&gt; Windows –&gt; System32 –&gt; Locate gpedit.msc file and run it.</p>
<p>While you have opened Group Policy look at the left pane and in the User Configuration, expand Administrative Templates, select Start Menu and Taskbar now in the right pane locate Remove Run Menu from Start Menu and double click it.</p>
<p>Select Disabled in the properties dialogue and press apply then OK</p>
<p>Now close all open Windows you will see the Run has been restored in Start Menu.</p>
<p>________________________________________________________________________________<br />
________________________</p>
<p><strong>Enable Folder Options</strong></p>
<p>Go to Start&#8211;Run&#8211;type Regedit</p>
<p>from the edit tab click find</p>
<p>type Folder Options and search</p>
<p>in the Reg_dword value of folder option change it to 1</p>
<p>OR/AND</p>
<p>-&gt;Run -&gt; Type gpedit.msc</p>
<p>Then:<br />
-&gt;User Configuration -&gt;Administrative Templates &#8211;&gt; Windows Components &#8211;&gt; Windows Explorer-&gt; Removes the Folder Options menu item from the Tools menu.</p>
<p>Right click:<br />
-&gt; Properties -&gt; Disable -&gt;Apply</p>
<p>OR/AND</p>
<p>Run-Regedit<br />
flow to HKCU\Software\Microsoft\Windows\Policy<br />
and HKLM\Software\Microsoft\Windows\Policy</p>
<p>Find into this, if there&#8217;s any key like that : &#8220;disable cmd&#8221; or &#8220;disable Folder Options&#8221; with value=1<br />
Set the value to &#8220;0&#8243;</p>
<p>________________________________________________________________________________<br />
________________________</p>
<p><span style="text-decoration:underline;"><strong><br />
Show Hidden Files</strong></span></p>
<p>1. Go to Start &#8211;&gt; Run, then type regedit<br />
2. Navigate to the registry folder HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\<br />
CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL<br />
3. Find a key called CheckedValue.<br />
4. Double Click CheckedValue key and modify it to 1. This is to show all the hidden files.</p>
<p>OR if it doesnt work then:</p>
<p>copy this code, paste in notepad and save with .reg extension</p>
<p>Windows Registry Editor Version 5.00</p>
<p>[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]<br />
&#8220;RegPath&#8221;=&#8221;Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced&#8221;<br />
&#8220;Text&#8221;=&#8221;@shell32.dll,-30500&#8243;<br />
&#8220;Type&#8221;=&#8221;radio&#8221;<br />
&#8220;CheckedValue&#8221;=dword:00000001<br />
&#8220;ValueName&#8221;=&#8221;Hidden&#8221;<br />
&#8220;DefaultValue&#8221;=dword:00000002<br />
&#8220;HKeyRoot&#8221;=dword:80000001<br />
&#8220;HelpID&#8221;=&#8221;shell.hlp#51105&#8243;</p>
<p>now right click the file and select merge</p>
<p>________________________________________________________________________________<br />
________________________</p>
<p><span style="text-decoration:underline;"><strong>Enable Task Manager</strong></span></p>
<p>copy the following code and paste in notepad, then save with .reg extension. after that right click the file and select merge</p>
<p>Windows Registry Editor Version 5.00</p>
<p>[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]<br />
&#8220;DisableTaskMgr&#8221;=dword:00000000</p>
<p>or, if this doesnt work</p>
<p>. Click Start<br />
. Click Run<br />
. Enter gpedit.msc in the Open box and click OK<br />
. In the Group Policy settings window<br />
. Select User Configuration<br />
. Select Administrative Templates<br />
. Select System<br />
. Select Ctrl+Alt+Delete options<br />
. Select Remove Task Manager<br />
. Double-click the Remove Task Manager option select Disable</p>
<p>OR/AND</p>
<p>Click Start -&gt; Run. Type in regedit and hit Enter.</p>
<p>Search for HKEY_CURRENT_USER -&gt; Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System</p>
<p>Look for: DisableTaskMgr. Click on REG_DWORD. Value: 1=Enable this key (disables TaskManager); Value: 0=Disable (actually enables TaskManager)</p>
<p>Close RegEdit</p>
<p>Reboot</p>
<p>or use this:</p>
<p>its a soft that fixes the Task Manager. just 68kb size</p>
<p><!--coloro:#ff8c00--><span style="color:#ff8c00;"><!--/coloro--><strong><!--sizeo:4--><span style="font-size:14pt;line-height:100%;"><!--/sizeo-->..:~Download Link~:..<!--sizec--></span><!--/sizec--></strong><!--colorc--></span><!--/colorc--><br />
<!--c1--></p>
<div class="codetop">CODE</div>
<p><!--ec1-->http://www.download3000.com/download_19214.html</p>
<br />  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/dailysolution.wordpress.com/44/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/dailysolution.wordpress.com/44/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/dailysolution.wordpress.com/44/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/dailysolution.wordpress.com/44/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/dailysolution.wordpress.com/44/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/dailysolution.wordpress.com/44/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/dailysolution.wordpress.com/44/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/dailysolution.wordpress.com/44/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/dailysolution.wordpress.com/44/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/dailysolution.wordpress.com/44/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/dailysolution.wordpress.com/44/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/dailysolution.wordpress.com/44/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/dailysolution.wordpress.com/44/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/dailysolution.wordpress.com/44/" /></a> <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=44&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></content:encoded>
			<wfw:commentRss>http://dailysolution.wordpress.com/2009/04/06/resolving-virus-problems/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	
		<media:content url="http://1.gravatar.com/avatar/9bddab6905a682e04a1d8c0f141769c4?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">futurbillgate</media:title>
		</media:content>
	</item>
		<item>
		<title>how to trace a hacker !!</title>
		<link>http://dailysolution.wordpress.com/2009/04/06/how-to-trace-a-hacker/</link>
		<comments>http://dailysolution.wordpress.com/2009/04/06/how-to-trace-a-hacker/#comments</comments>
		<pubDate>Mon, 06 Apr 2009 10:46:54 +0000</pubDate>
		<dc:creator>futurbillgate</dc:creator>
				<category><![CDATA[hacks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[trace]]></category>

		<guid isPermaLink="false">http://dailysolution.wordpress.com/?p=42</guid>
		<description><![CDATA[how to trace a hacker !! ## Connections make the world go round ## The computer world, at any rate. Every single time you open up a website, send an email or upload your webpages into cyberspace, you are connecting to another machine in order to get the job done. This, of course, presents a [...]<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=42&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
			<content:encoded><![CDATA[<p><span style="color:#ff8c00;"><strong><span style="font-size:14pt;line-height:100%;">how to trace a hacker !!<br />
<!--sizec--></span><!--/sizec--></strong><!--colorc--></span><!--/colorc--><br />
## Connections make the world go round ##</p>
<p>The computer world, at any rate. Every single time you open up a<br />
website, send an email or upload your webpages into cyberspace, you are<br />
connecting to another machine in order to get the job done. This, of<br />
course, presents a major problem, because this simple act is what<br />
allows malicious users to target a machine in the first place.</p>
<p># How do these people find their victim?</p>
<p>Well, first of all, they need to get hold of the victim&#8217;s IP Address.<br />
Your IP (Internet Protocol) address reveals your point of entry to the<br />
Internet and can be used in many ways to cause your online activities<br />
many, many problems. It may not reveal you by name, but it may be<br />
uniquely identifiable and it represents your digital ID while you are<br />
online (especially so if you&#8217;re on a fixed IP / DSL etc).</p>
<p>With an IP address, a Hacker can find out all sorts of weird and<br />
wonderful things about their victim (as well as causing all kinds of<br />
other trouble, the biggest two being Portnukes/Trojans and the dreaded<br />
DoS ((Denial of Service)) attack). Some Hackers like to collect IP<br />
Addresses like badges, and like to go back to old targets, messing them<br />
around every so often. An IP address is incredibly easy to obtain -<br />
until recently, many realtime chat applications (such as MSN) were<br />
goldmines of information. Your IP Address is contained as part of the<br />
Header Code on all emails that you send and webpages that you visit can<br />
store all kinds of information about you. A common trick is for the<br />
Hacker to go into a Chatroom, paste his supposed website address all<br />
over the place, and when the unsuspecting victim visits, everything<br />
about your computer from the operating system to the screen resolution<br />
can be logged&#8230;and, of course, the all important IP address. In<br />
addition, a simple network-wide port scan will reveal vulnerable target<br />
machines, and a war-dialler will scan thousands of lines for exposed<br />
modems that the hacker can exploit.</p>
<p>So now that you know some of the basic dangers, you&#8217;re probably wondering how these people connect to a victim&#8217;s machine?</p>
<p>## Virtual and Physical Ports ##</p>
<p>Everything that you recieve over the Internet comes as a result of<br />
other machines connecting to your computer&#8217;s ports. You have two types;<br />
Physical are the holes in the back of your machine, but the important<br />
ones are Virtual. These allow transfer of data between your computer<br />
and the outside world, some with allocated functions, some without, but<br />
knowing how these work is the first step to discovering who is<br />
attacking you; you simply MUST have a basic knowledge of this, or you<br />
won&#8217;t get much further.</p>
<p># What the phrases TCP/UDP actually mean</p>
<p>TCP/IP stands for Transmission Control Protocol and Internet Protocol,<br />
a TCP/IP packet is a block of data which is compressed, then a header<br />
is put on it and it is sent to another computer (UDP stands for User<br />
Datagram Protocol). This is how ALL internet transfers occur, by<br />
sending packets. The header in a packet contains the IP address of the<br />
one who originally sent you it. Now, your computer comes with an<br />
excellent (and free) tool that allows you to see anything that is<br />
connected (or is attempting to connect) to you, although bear in mind<br />
that it offers no blocking protection; it simply tells you what is<br />
going on, and that tool is NETSTAT.</p>
<p>## Netstat: Your first line of defence ##</p>
<p>Netstat is a very fast and reliable method of seeing exactly who or<br />
what is connected (or connecting) to your computer. Open up DOS<br />
(Start/Programs/MS-DOS Prompt on most systems), and in the MSDOS<br />
Prompt, type:</p>
<p>netstat -a</p>
<p>(make sure you include the space inbetween the &#8220;t&#8221; and the &#8220;a&#8221;).</p>
<p>If you&#8217;re connected to the Internet when you do this, you should see something like:</p>
<p>Active Connections</p>
<p>Proto Local Address Foreign Address State</p>
<p>TCP macintosh: 20034 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED</p>
<p>TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT</p>
<p>TCP macintosh MACINTOSH: 0 LISTENING</p>
<p>TCP macintosh MACINTOSH: 0 LISTENING</p>
<p>TCP macintosh MACINTOSH: 0 LISTENING</p>
<p>Now, &#8220;Proto(col)&#8221; simply means what kind of data transmission is taking<br />
place (TCP or UDP), &#8220;Local address&#8221; is your computer (and the number<br />
next to it tells you what port you&#8217;re connected on), &#8220;Foreign Address&#8221;<br />
is the machine that is connected to you (and what port they&#8217;re using),<br />
and finally &#8220;State&#8221; is simply whether or not a connection is actually<br />
established, or whether the machine in question is waiting for a<br />
transmission, or timing out etc.</p>
<p>Now, you need to know all of Netstat&#8217;s various commands, so type:</p>
<p>netstat ?</p>
<p>You will get something like this:</p>
<p>Displays protocol statistics and current TCP/IP network connections.</p>
<p>NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]</p>
<p>-a Displays all connections and listening ports.</p>
<p>-e Displays Ethernet statistics. This may be combined with the -s option.</p>
<p>-n Displays addresses and port numbers in numerical form.</p>
<p>-p proto Shows connections for the protocol specified by proto; proto<br />
may be TCP or UDP. If used with the -s option to display per-protocol<br />
statistics, proto may be TCP, UDP, or IP.</p>
<p>-r Displays the routing table.</p>
<p>-s Displays per-protocol statistics. By default, statistics are shown<br />
for TCP, UDP and IP; the -p option may be used to specify a subset of<br />
the default.</p>
<p>Have a play around with the various options, but the most important use<br />
of these methods is when you combine them. The best command to use is</p>
<p>netstat -an</p>
<p>because this will list all connections in Numerical Form, which makes<br />
it a lot easier to trace malicious users&#8230;.Hostnames can be a little<br />
confusing if you don&#8217;t know what you&#8217;re doing (although they&#8217;re easily<br />
understandable, as we shall see later). Also, by doing this, you can<br />
also find out what your own IP address is, which is always useful.</p>
<p>Also,</p>
<p>netstat -b</p>
<p>will tell you what ports are open and what programs are connecting to the internet.</p>
<p>## Types of Port ##</p>
<p>It would be impossible to find out who was attacking you if computers<br />
could just access any old port to perform an important function; how<br />
could you tell a mail transfer from a Trojan Attack? Well, good news,<br />
because your regular, normal connections are assigned to low, commonly<br />
used ports, and in general, the higher the number used, the more you<br />
should be suspicious. Here are the three main types of port:</p>
<p># Well Known Ports These run from 0 to 1023, and are bound to the<br />
common services that run on them (for example, mail runs on channel 25<br />
tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if you find<br />
one of these ports open (and you usually will), it&#8217;s usually because of<br />
an essential function.</p>
<p># Registered Ports These run on 1024 to 49151. Although not bound to a<br />
particular service, these are normally used by networking utilities<br />
like FTP software, Email client and so on, and they do this by opening<br />
on a random port within this range before communicating with the remote<br />
server, so don&#8217;t panic (just be wary, perhaps) if you see any of these<br />
open, because they usually close automatically when the system that&#8217;s<br />
running on them terminates (for example, type in a common website name<br />
in your browser with netstat open, and watch as it opens up a port at<br />
random to act as a buffer for the remote servers). Services like MSN<br />
Messenger and ICQ usually run on these Ports.</p>
<p># Dynamic/Private Ports Ranging from 49152 to 65535, these things are<br />
rarely used except with certain programs, and even then not very often.<br />
This is indeed the usual range of the Trojan, so if you find any of<br />
these open, be very suspicious. So, just to recap:</p>
<p>Well Known Ports 0 to 1023 Commonly used, little danger.</p>
<p>Registered Ports 1024 to 49151 Not as common, just be careful.</p>
<p>Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.</p>
<p>## The hunt is on ##</p>
<p>Now, it is essential that you know what you&#8217;re looking for, and the<br />
most common way someone will attack your machine is with a Trojan. This<br />
is a program that is sent to you in an email, or attempts to bind<br />
itself to one of your ports, and when activated, it can give the user<br />
your passwords, access to your hard drive&#8230;they can even make your CD<br />
Tray pop open and shut. At the end of this Document, you will find a<br />
list of the most commonly used Trojans and the ports they operate on.<br />
For now, let&#8217;s take another look at that first example of Netstat&#8230;.</p>
<p>Active Connections</p>
<p>Proto Local Address Foreign Address State</p>
<p>TCP macintosh: 27374 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED</p>
<p>TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT</p>
<p>TCP macintosh MACINTOSH: 0 LISTENING</p>
<p>TCP macintosh MACINTOSH: 0 LISTENING</p>
<p>TCP macintosh MACINTOSH: 0 LISTENING</p>
<p>Now, straight away, this should make more sense to you. Your computer<br />
is connected on two ports, 80 and 27374. Port 80 is used for http/www<br />
transmissions (ie for all intents and purposes, its how you connect to<br />
the net, although of course it&#8217;s a lot more complicated than that).<br />
Port 27374, however, is distinctly suspicious; first of all, it is in<br />
the registered port range, and although other services (like MSN) use<br />
these, let&#8217;s assume that you have nothing at all running like instant<br />
messengers, webpages etc&#8230;.you&#8217;re simply connected to the net through<br />
proxy. So, now this connection is looking even more troublesome, and<br />
when you realise that 27374 is a common port for Netbus (a potentially<br />
destructive Trojan), you can see that something is untoward here. So,<br />
what you would do is:</p>
<p>1) run Netstat , and use:</p>
<p>Netstat -a</p>
<p>then</p>
<p>Netstat -an</p>
<p>So you have both Hostnames AND IP addresses.</p>
<p>## Tracerouting ##</p>
<p>Having the attacker&#8217;s IP is all well and good, but what can you do with<br />
it? The answer is, a lot more! It&#8217;s not enough to have the address, you<br />
also need to know where the attacker&#8217;s connections are coming from. You<br />
may have used automated tracerouting tools before, but do you jknow how<br />
they work?</p>
<p>Go back to MSDOS and type</p>
<p>tracert *type IP address/Hostname here*</p>
<p>Now, what happens is, the Traceroute will show you all the computers<br />
inbetween you and the target machine, including blockages, firewalls<br />
etc. More often than not, the hostname address listed before the final<br />
one will belong to the Hacker&#8217;s ISP Company. It&#8217;ll either say who the<br />
ISP is somewhere in there, or else you run a second trace on the new<br />
IP/hostname address to see who the ISP Company in question is. If the<br />
Hostname that you get back doesn&#8217;t actually seem to mention an actual<br />
geographical location within its text, you may think all is lost. But<br />
fear not! Suppose you get a hostname such as</p>
<p><a href="http://www.haha.com/" target="_blank"><!--c1--></p>
<div class="codetop">CODE</div>
<div class="codemain"><!--ec1-->http://www.haha.com<!--c2--></div>
<p><!--ec2--></a></p>
<p>Well, that tells us nothing, right? Wrong&#8230;.simply enter the hostname<br />
in your browser, and though many times you will get nothing back,<br />
sometimes it will resolve to an ISP, and from there you can easily find<br />
out its location and in what areas they operate. This at least gives<br />
you a firm geographical location to carry out your investigations in.</p>
<p>If you STILL have nothing, as a last resort you COULD try connecting to<br />
your target&#8217;s ISP&#8217;s port 13 by Telnet, which will tell you how many<br />
hours ahead or behind this ISP is of GMT, thus giving you a<br />
geographical trace based on the time mentioned (although bear in mind,<br />
the ISP may be doing something stupid like not having their clocks set<br />
correctly, giving you a misleading trace. Similarly, a common tactic of<br />
Hackers is to deliberately have their computer&#8217;s clock set to a totally<br />
wrong time, so as to throw you off the scent). Also, unless you know<br />
what you&#8217;re doing, I wouldn&#8217;t advise using Telnet (which is outside the<br />
parameters of this tutorial).</p>
<p>## Reverse DNS Query ##</p>
<p>This is probably the most effective way of running a trace on somebody.<br />
If ever you&#8217;re in a chatroom and you see someone saying that they&#8217;ve<br />
&#8220;hacked into a satellite orbiting the Earth, and are taking pictures of<br />
your house right now&#8221;, ignore them because that&#8217;s just bad movie<br />
nonsense. THIS method is the way to go, with regard to finding out what<br />
country (even maybe what State/City etc) someone resides, although it&#8217;s<br />
actually almost impossible to find an EXACT geographical location<br />
without actually breaking into your ISP&#8217;s Head Office and running off<br />
with the safe.</p>
<p>To run an rDNS query, simply go back to MS-DOS and type</p>
<p>netstat</p>
<p>and hit return. Any active connections will resolve to hostnames rather than a numerical format.</p>
<p># DNS</p>
<p>DNS stands for Domain Name Server. These are machines connected to the<br />
Internet whose job it is to keep track of the IP Addresses and Domain<br />
Names of other machines. When called upon, they take the ASCII Domain<br />
Name and convert it to the relevant numeric IP Address. A DNS search<br />
translates a hostname into an IP address&#8230;.which is why we can enter<br />
&#8220;www.Hotmail.com&#8221; and get the website to come up, instead of having to<br />
actually remember Hotmail&#8217;s IP address and enter that instead. Well,<br />
Reverse DNS, of course, translates the IP Address into a Hostname (ie -<br />
in letters and words instead of numbers, because sometimes the Hacker<br />
will employ various methods to stop Netstat from picking up a correct<br />
Hostname).</p>
<p>So, for example,</p>
<p>298.12.87.32 is NOT a Hostname.</p>
<p>mail6.bol.net.au IS a Hostname.</p>
<p>Anyway, see the section at the end? (au) means the target lives in<br />
Australia. Most (if not all) hostnames end in a specific Country Code,<br />
thus narrowing down your search even further. If you know your target&#8217;s<br />
Email Address (ie they foolishly sent you a hate mail, but were silly<br />
enough to use a valid email address) but nothing else, then you can use<br />
the Country codes to deduce where they&#8217;re from as well. You can also<br />
deduce the IP address of the sender by looking at the emails header (a<br />
&#8220;hidden&#8221; line of code which contains information on the sender)&#8230;on<br />
Hotmail for example, go to Preferences, and select the &#8220;Full Header&#8217;s<br />
Visible&#8221; option. Alternatively, you can run a &#8220;Finger&#8221; Trace on the<br />
email address, at:</p>
<p><a href="http://www.samspade.org/" target="_blank"><!--c1--></p>
<div class="codetop">CODE</div>
<div class="codemain"><!--ec1-->www.samspade.org<!--c2--></div>
<p><!--ec2--></a></p>
<p>Plus, some ISP&#8217;s include their name in your Email Address with them too<br />
(ie Wanadoo, Supanet etc), and your Hacker may be using an email<br />
account that&#8217;s been provided by a Website hosting company, meaning this<br />
would probably have the website host&#8217;s name in the email address (ie<br />
Webspawners). So, you could use the information gleaned to maybe even<br />
hunt down their website (then you could run a website check as<br />
mentioned previously) or report abuse of that Website Provider&#8217;s Email<br />
account (and thus, the Website that it goes with) to</p>
<p><a href="mailto:abuse@companynamegoeshere.com"><!--c1--></p>
<div class="codetop">CODE</div>
<div class="codemain"><!--ec1-->abuse@companynamegoeshere.com<!--c2--></div>
<p><!--ec2--></a></p>
<p>If your Hacker happens to reside in the USA, go to:</p>
<p><a href="http://www.usps.gov/ncsc/lookups/abbr_state.txt" target="_blank"><!--c1--></p>
<div class="codetop">CODE</div>
<div class="codemain"><!--ec1-->www.usps.gov/ncsc/lookups/abbr_state.txt<!--c2--></div>
<p><!--ec2--></a></p>
<p>for a complete list of US State abbreviatons.</p>
<p>## List of Ports commonly used by Trojans ##</p>
<p>Please note that this isn&#8217;t a complete list by any means, but it will<br />
give you an idea of what to look out for in Netstat. Be aware that some<br />
of the lower Ports may well be running valid services.</p>
<p>UDP: 1349 Back Ofrice DLL</p>
<p>31337 BackOfrice 1.20</p>
<p>31338 DeepBO</p>
<p>54321 BackOfrice 2000</p>
<p>TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash</p>
<p>23 Tiny Telnet Server</p>
<p>25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30</p>
<p>31 Hackers Paradise</p>
<p>80 Executor</p>
<p>456 Hackers Paradise</p>
<p>555 Ini-Killer, Phase Zero, Stealth Spy</p>
<p>666 Satanz Backdoor</p>
<p>1001 Silencer, WebEx</p>
<p>1011 Doly Trojan</p>
<p>1170 Psyber Stream Server, Voice</p>
<p>1234 Ultors Trojan</p>
<p>1243 SubSeven 1.0 &#8211; 1.8</p>
<p>1245 VooDoo Doll</p>
<p>1492 FTP99CMP</p>
<p>1600 Shivka-Burka</p>
<p>1807 SpySender</p>
<p>1981 Shockrave</p>
<p>1999 BackDoor 1.00-1.03</p>
<p>2001 Trojan Cow</p>
<p>2023 Ripper</p>
<p>2115 Bugs</p>
<p>2140 Deep Throat, The Invasor</p>
<p>2801 Phineas Phucker</p>
<p>3024 WinCrash</p>
<p>3129 Masters Paradise</p>
<p>3150 Deep Throat, The Invasor</p>
<p>3700 Portal of Doom</p>
<p>4092 WinCrash</p>
<p>4567 File Nail 1</p>
<p>4590 ICQTrojan</p>
<p>5000 Bubbel</p>
<p>5000 Sockets de Troie</p>
<p>5001 Sockets de Troie</p>
<p>5321 Firehotcker</p>
<p>5400 Blade Runner 0.80 Alpha</p>
<p>5401 Blade Runner 0.80 Alpha</p>
<p>5402 Blade Runner 0.80 Alpha</p>
<p>5400 Blade Runner</p>
<p>5401 Blade Runner</p>
<p>5402 Blade Runner</p>
<p>5569 Robo-Hack</p>
<p>5742 WinCrash</p>
<p>6670 DeepThroat</p>
<p>6771 DeepThroat</p>
<p>6969 GateCrasher, Priority</p>
<p>7000 Remote Grab</p>
<p>7300 NetMonitor</p>
<p>7301 NetMonitor</p>
<p>7306 NetMonitor</p>
<p>7307 NetMonitor</p>
<p>7308 NetMonitor</p>
<p>7789 ICKiller</p>
<p>8787 BackOfrice 2000</p>
<p>9872 Portal of Doom</p>
<p>9873 Portal of Doom</p>
<p>9874 Portal of Doom</p>
<p>9875 Portal of Doom</p>
<p>9989 iNi-Killer</p>
<p>10067 Portal of Doom</p>
<p>10167 Portal of Doom</p>
<p>10607 Coma 1.0.9</p>
<p>11000 Senna Spy</p>
<p>11223 Progenic trojan</p>
<p>12223 Hack´99 KeyLogger</p>
<p>12345 GabanBus, NetBus</p>
<p>12346 GabanBus, NetBus</p>
<p>12361 Whack-a-mole</p>
<p>12362 Whack-a-mole</p>
<p>16969 Priority</p>
<p>20001 Millennium</p>
<p>20034 NetBus 2.0, Beta-NetBus 2.01</p>
<p>21544 GirlFriend 1.0, Beta-1.35</p>
<p>22222 Prosiak</p>
<p>23456 Evil FTP, Ugly FTP</p>
<p>26274 Delta</p>
<p>30100 NetSphere 1.27a</p>
<p>30101 NetSphere 1.27a</p>
<p>30102 NetSphere 1.27a</p>
<p>31337 Back Orifice</p>
<p>31338 Back Orifice, DeepBO</p>
<p>31339 NetSpy DK</p>
<p>31666 BOWhack</p>
<p>33333 Prosiak</p>
<p>34324 BigGluck, TN</p>
<p>40412 The Spy</p>
<p>40421 Masters Paradise</p>
<p>40422 Masters Paradise</p>
<p>40423 Masters Paradise</p>
<p>40426 Masters Paradise</p>
<p>47262 Delta</p>
<p>50505 Sockets de Troie</p>
<p>50766 Fore</p>
<p>53001 Remote Windows Shutdown</p>
<p>54321 SchoolBus .69-1.11</p>
<p>61466 Telecommando</p>
<p>65000 Devil</p>
<p>## Summary ##</p>
<p>I hope this tutorial is useful in showing you both how to secure<br />
yourself against unwanted connections, and also how to determine an<br />
attacker&#8217;s identity. The Internet is by no means as anonymous as some<br />
people think it is, and although this is to the detriment of people&#8217;s<br />
security online, this also works both ways&#8230;.it IS possible to find<br />
and stop even the most determined of attackers, you just have to be<br />
patient and keep hunting for clues which will help you put an end to<br />
their exploits.</p>
<br />  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/dailysolution.wordpress.com/42/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/dailysolution.wordpress.com/42/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/dailysolution.wordpress.com/42/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/dailysolution.wordpress.com/42/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/dailysolution.wordpress.com/42/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/dailysolution.wordpress.com/42/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/dailysolution.wordpress.com/42/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/dailysolution.wordpress.com/42/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/dailysolution.wordpress.com/42/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/dailysolution.wordpress.com/42/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/dailysolution.wordpress.com/42/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/dailysolution.wordpress.com/42/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/dailysolution.wordpress.com/42/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/dailysolution.wordpress.com/42/" /></a> <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=42&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></content:encoded>
			<wfw:commentRss>http://dailysolution.wordpress.com/2009/04/06/how-to-trace-a-hacker/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	
		<media:content url="http://1.gravatar.com/avatar/9bddab6905a682e04a1d8c0f141769c4?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">futurbillgate</media:title>
		</media:content>
	</item>
		<item>
		<title>see it</title>
		<link>http://dailysolution.wordpress.com/2009/03/27/see-it/</link>
		<comments>http://dailysolution.wordpress.com/2009/03/27/see-it/#comments</comments>
		<pubDate>Fri, 27 Mar 2009 16:49:32 +0000</pubDate>
		<dc:creator>futurbillgate</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://dailysolution.wordpress.com/?p=40</guid>
		<description><![CDATA[<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=40&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
			<content:encoded><![CDATA[<p><!-- START CUSTOM WIDGETBUCKS CODE -->
<div></div>
<p><!-- END CUSTOM WIDGETBUCKS CODE --></p>
<br />  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/dailysolution.wordpress.com/40/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/dailysolution.wordpress.com/40/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/dailysolution.wordpress.com/40/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/dailysolution.wordpress.com/40/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/dailysolution.wordpress.com/40/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/dailysolution.wordpress.com/40/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/dailysolution.wordpress.com/40/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/dailysolution.wordpress.com/40/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/dailysolution.wordpress.com/40/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/dailysolution.wordpress.com/40/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/dailysolution.wordpress.com/40/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/dailysolution.wordpress.com/40/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/dailysolution.wordpress.com/40/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/dailysolution.wordpress.com/40/" /></a> <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=40&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></content:encoded>
			<wfw:commentRss>http://dailysolution.wordpress.com/2009/03/27/see-it/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	
		<media:content url="http://1.gravatar.com/avatar/9bddab6905a682e04a1d8c0f141769c4?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">futurbillgate</media:title>
		</media:content>
	</item>
		<item>
		<title>How to re-install windows without loosing anything</title>
		<link>http://dailysolution.wordpress.com/2009/03/26/how-to-re-install-windows-without-loosing-anything/</link>
		<comments>http://dailysolution.wordpress.com/2009/03/26/how-to-re-install-windows-without-loosing-anything/#comments</comments>
		<pubDate>Thu, 26 Mar 2009 11:25:49 +0000</pubDate>
		<dc:creator>futurbillgate</dc:creator>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[crap]]></category>
		<category><![CDATA[re-install]]></category>

		<guid isPermaLink="false">http://dailysolution.wordpress.com/?p=34</guid>
		<description><![CDATA[Over time, Windows loses stability. If you keep a computer for more than two years, at some point you&#8217;re going to have to bite the bullet and reinstall Windows from scratch. But contrary to popular belief, you won&#8217;t have to reformat your hard drive (with one exception, discussed below). The bad stuff you need to [...]<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=34&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
			<content:encoded><![CDATA[<p>Over time, Windows loses stability. If you keep a computer for more than two years, at some point you&#8217;re going to have to bite the bullet and reinstall Windows from scratch. But contrary to popular belief, you won&#8217;t have to reformat your hard drive (with one exception, discussed below). The bad stuff you need to get rid of is all in your Windows folder.</p>
<p>Before you begin, gather your Windows and application CD-ROMs. Back up your data files (just to be safe), and then clear two days off your calendar. If everything goes smoothly, you can reinstall Windows in a few hours. But you have to assume something will go wrong: You may not be able to find a necessary CD, or data won&#8217;t be where you thought it was, or something will simply refuse to work.</p>
<p>There&#8217;s a difference between a repair reinstall and a complete reinstall. Though a repair (also called a refresh) will let you keep your current settings, a complete reinstall will give you a truly fresh version of Windows. Repairs are fast and easy, but they don&#8217;t fix anywhere near as many problems. The instructions below are for total reinstalls, except where noted.<br />
Your Vendor&#8217;s Restore CD</p>
<p>Most computers ship with a vendor-specific restore CD rather than with a Microsoft Windows CD-ROM. (If your PC came with a Microsoft Windows CD, or if you bought a retail copy of Windows, skip to the section for your version.)</p>
<p>Some restore CDs give you all the options of a full Microsoft Windows CD, but with better instructions and the convenience of having all the right hardware drivers. Others can do nothing except reformat your hard drive and restore it to the condition it was in when you bought the PC. (This case is the exception I mentioned above that requires a reformat.)</p>
<p>If your restore CD is reformat-only, back up your data files to a network or a removable medium before reinstalling Windows. If you use Windows 98 or Me, back up C:\My Documents, plus the folders inside C:\Windows discussed in the 98*steroidsRgangstaa section below. If you have Windows 2000 or XP, back up C:\Documents and Settings. Also back up any other folders in which you store your data files.<br />
Windows 98 and ME CDs</p>
<p>These Windows versions keep some important data inside your soon-to-be-erased Windows folder, so you need to copy several of its subfolders to another location. Right-click My Computer and select Explore. Double-click the C: drive icon (in Me, you may then have to click View the entire contents of this drive). Right-click in the right pane and select New, Folder. Name the new folder oldstuff.</p>
<p>Go to the Windows folder (you might have to click View the entire contents of this folder), hold down Ctrl, and select the following subfolders: All Users, Application Data, Desktop, Favorites, Local Settings, Profiles, SendTo, and Start Menu. If you don&#8217;t see them all, select View, Folder Options (Tools, Folder Options in Me), click the View tab, select Show all files, and click OK. (If you still don&#8217;t see them all, don&#8217;t worry about it.) Press Ctrl and drag the folders to C:\oldstuff (see FIGURE 1).</p>
<p>Restart Windows with a start-up disk in your floppy drive. (To make a start-up floppy, insert a disk, select Start, Settings, Control Panel, double-click Add/Remove Programs, click Startup Disk, Create Disk, and follow the prompts.) At the Startup Menu, select Start computer with CD-ROM support. While the drivers load, insert your Windows CD-ROM.</p>
<p>Unless you&#8217;re doing a repair reinstall, type the command c:\windows\command\deltree /y c:\windows and press Enter. Deleting your old files could take time, but the /y switch suppresses confirmation prompts, so take a break.</p>
<p>When you&#8217;re back at the A: prompt, type x:setup, where x is your CD drive letter (it&#8217;s likely one letter past what it usually is in Windows, so if it&#8217;s D: in Windows, it&#8217;s probably E: here). Press Enter and follow the prompts.</p>
<p>Once you&#8217;re back in Windows, reinstall your graphics card driver. If you have Windows set up for more than one user, you&#8217;ll also have to re-create each account. Select Start, Settings, Control Panel, Users to do so. It&#8217;s important that the user names match those in the old installation. If you&#8217;re not sure, open Windows Explorer and navigate to C:\oldstuff\profiles. There you&#8217;ll find a folder for each registered user name (see FIGURE 2). Don&#8217;t worry about passwords. Log off and log back on as each user. When you&#8217;re done, log off and back on one more time, but instead of choosing a user name and a password, press Esc to enter Windows without being a specific user.</p>
<p>Select Start, Programs, MS-DOS Prompt (in Windows 98) or Start, Programs, Accessories, MS-DOS Prompt (in Windows Me). Type xcopy c:\oldstuff\*.* c:\windows /s /h /r /c and press Enter (if you want to know what the xcopy switches do, enter the command xcopy /?). When xcopy asks if it should overwrite a file, press a for All.</p>
<p>When xcopy is through, reboot and log on (as a particular user, if necessary). Open My Documents to make sure all your personal files are where they belong, including your Internet Explorer favorites and your custom Start menu shortcuts.</p>
<p>Now skip ahead to &#8220;Finishing the Job.&#8221;<br />
Windows 2000 and XP CDs</p>
<p>Boot your computer with your Windows CD-ROM inserted. When you get the &#8216;Press any key to boot from CD&#8217; message, do so. (If you don&#8217;t see that message before Windows starts, restart Windows, press the key you&#8217;re prompted to enter for your PC Setup program, and change the boot order so your CD drive is first.)</p>
<p>At the &#8216;Welcome to Setup&#8217; screen, press Enter. The R (repair) option takes you to the Recovery Module, which is useful if Windows won&#8217;t boot, but it&#8217;s no help with a reinstallation. Soon you&#8217;ll be told that there&#8217;s already a Windows installation on the computer. Press r for a repair reinstall or Esc to begin a complete, destructive one. For a complete restore, select your C: partition and press Enter. When you get the warning that says an operating system is on that partition, press c. When you are asked your partition preference, select Leave the current file system intact (no changes). When you&#8217;re told that a Windows folder (or Winnt folder for Windows 2000) already exists, press l (&#8216;ell&#8217;) to delete it and create a new one. Follow the series of prompts. When the installation program asks for your name, enter temp.</p>
<p>Once the installation is complete, your system will reboot into Windows, and you&#8217;ll be logged on as user Temp. If the screen is difficult to read, reinstall your graphics card driver.</p>
<p>If you are reinstalling Windows XP, skip to &#8220;For Both Windows XP and 2000.&#8221;</p>
<p>If you&#8217;re reinstalling Windows 2000, log off as Temp and back on as Administrator. Now log off and on again, this time as Temp. Open Windows Explorer and navigate to C:\Documents and Settings. One of the subfolders will be named Administrator. Another will be named something like Administrator.computername.</p>
<p>Select Start, Programs, Accessories, Command Prompt. Type cd &#8220;\documents and settings&#8221; and press Enter. Then type xcopy administrator\*.* administrator.computername /s /h /r /c, replacing computername with the last part of that folder&#8217;s name (after &#8220;Administrator.&#8221;) in Documents and Settings. Now press Enter, and when you&#8217;re asked about overwriting files or folders, press a for All.</p>
<p>If you have any users on the old installation besides Administrator, continue with the &#8220;For Both Windows XP and 2000&#8243; section. Otherwise, open Windows Explorer and make sure your data files are where they belong. Then go to Control Panel&#8217;s Users and Passwords applet and delete the user Temp before skipping to &#8220;Finishing the Job.&#8221;<br />
For Both Windows XP and 2000</p>
<p>Reopen Windows Explorer. Select your C: drive (you may have to click Show the contents of this folder). Right-click in the right pane and select New, Folder. Name the new folder oldstuff. In the left pane, choose the Documents and Settings folder. It should have subfolders for each user from the previous install, plus one for Temp and a few others. Move the folders for your previous user names to oldstuff.</p>
<p>Select Start, Control Panel, User Accounts (Start, Settings, Control Panel, Users and Passwords in Windows 2000). Create an account for each user who was registered before the reinstall. Be sure to use the exact names. They are the same names as the folders you just moved to oldstuff (as shown in FIGURE 2). In Windows XP, at least one user must have administrator privileges.</p>
<p>Log off and back on as each user, before logging back on as Temp. Make sure that you select Log Off and not Switch User at Windows XP&#8217;s Log Off dialog box (this isn&#8217;t an issue in Win 2000).</p>
<p>Log on as Temp, select Start, Programs, Accessories, Command Prompt (in XP, Start, All Programs, Accessories, Command Prompt), type xcopy c:\oldstuff\*.* &#8220;c:\documents and settings&#8221; /s /h /r /c, and press Enter. Press a when asked if you want to overwrite a file. Log off Temp and log on to each restored account to make sure everyone&#8217;s documents and data are where they belong. Log on as an administrator and run Control Panel&#8217;s User Accounts applet again to remove the user Temp.<br />
Finishing the Job</p>
<p>Now you&#8217;ve got Windows going, but not much else. You may have to reinstall your printer, sound card, and so on. Luckily, if a driver for the gadget came on your Windows or vendor restore CD, it was probably reinstalled automatically.</p>
<p>You&#8217;ll have to reinstall your applications to reintroduce them to Windows. Some of their settings will not be changed by the reinstallation, but those that were stored in the Registry were wiped out.</p>
<p>Once your Internet connection is running again, browse to Windows Update and download all critical updates for your version (see FIGURE 3). Then visit the sites of your hardware vendors to update your drivers.</p>
<p>After the reinstall, some of your data may not show up where it should. Search for it in both your Application Data and oldstuff folders, and see if you can move it to the folder in which Windows or your apps are looking for it. If you find a folder called Identities with two subfolders whose names are long and indecipherable, try moving the contents of one to the other and see if your data reappears.</p>
<p>You&#8217;ve probably guessed that the final step is deleting the c:\oldstuff folder&#8211;and the Administrator folder in Windows 2000. Make this the very last step, however. Wait a couple of days, weeks, or even months until you&#8217;re confident that all of your needed files are accessible.</p>
<br />  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/dailysolution.wordpress.com/34/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/dailysolution.wordpress.com/34/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/dailysolution.wordpress.com/34/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/dailysolution.wordpress.com/34/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/dailysolution.wordpress.com/34/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/dailysolution.wordpress.com/34/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/dailysolution.wordpress.com/34/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/dailysolution.wordpress.com/34/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/dailysolution.wordpress.com/34/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/dailysolution.wordpress.com/34/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/dailysolution.wordpress.com/34/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/dailysolution.wordpress.com/34/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/dailysolution.wordpress.com/34/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/dailysolution.wordpress.com/34/" /></a> <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=34&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></content:encoded>
			<wfw:commentRss>http://dailysolution.wordpress.com/2009/03/26/how-to-re-install-windows-without-loosing-anything/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	
		<media:content url="http://1.gravatar.com/avatar/9bddab6905a682e04a1d8c0f141769c4?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">futurbillgate</media:title>
		</media:content>
	</item>
		<item>
		<title>make a autorun file for your CD</title>
		<link>http://dailysolution.wordpress.com/2009/03/26/make-a-autorun-file-for-your-cd/</link>
		<comments>http://dailysolution.wordpress.com/2009/03/26/make-a-autorun-file-for-your-cd/#comments</comments>
		<pubDate>Thu, 26 Mar 2009 11:23:30 +0000</pubDate>
		<dc:creator>futurbillgate</dc:creator>
				<category><![CDATA[tricks]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[autorun]]></category>
		<category><![CDATA[cd]]></category>

		<guid isPermaLink="false">http://dailysolution.wordpress.com/?p=32</guid>
		<description><![CDATA[If you wanna make a autorun file for that CD you are ready to burn just read this&#8230; 1) You open notepad 2) now you writ: [autorun] OPEN=INSTALL\Setup_filename.EXE ICON=INSTALL\Setup_filename.EXE Now save it but not as a .txt file but as a .inf file. But remember! The &#8220;Setup_filename.EXE&#8221; MUST be replaced with the name of the [...]<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=32&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
			<content:encoded><![CDATA[<div id="post-261795" class="postcolor">If you wanna make a autorun file for that CD you are ready to burn just read this&#8230;</p>
<p>1) You open notepad</p>
<p>2) now you writ: [autorun]<br />
OPEN=INSTALL\Setup_filename.EXE<br />
ICON=INSTALL\Setup_filename.EXE</p>
<p>Now save it but not as a .txt file but as a .inf file.</p>
<p>But remember! The &#8220;Setup_filename.EXE&#8221; MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are called &#8216;.exe but some are called &#8216;.msi</p>
<p>3) Now burn your CD with the autorun .inf file included.</p>
<p>4) Now set the CD in you CD drive and wait for the autorun to begin or if nothing happens just double-click on the CD drive in &#8220;This Computer&#8221;<!--IBF.ATTACHMENT_261795--></div>
<br />  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/dailysolution.wordpress.com/32/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/dailysolution.wordpress.com/32/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/dailysolution.wordpress.com/32/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/dailysolution.wordpress.com/32/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/dailysolution.wordpress.com/32/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/dailysolution.wordpress.com/32/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/dailysolution.wordpress.com/32/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/dailysolution.wordpress.com/32/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/dailysolution.wordpress.com/32/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/dailysolution.wordpress.com/32/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/dailysolution.wordpress.com/32/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/dailysolution.wordpress.com/32/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/dailysolution.wordpress.com/32/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/dailysolution.wordpress.com/32/" /></a> <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=32&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></content:encoded>
			<wfw:commentRss>http://dailysolution.wordpress.com/2009/03/26/make-a-autorun-file-for-your-cd/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	
		<media:content url="http://1.gravatar.com/avatar/9bddab6905a682e04a1d8c0f141769c4?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">futurbillgate</media:title>
		</media:content>
	</item>
		<item>
		<title>Kaspersky 7&amp;8 KAV&amp;KIS Unblacklisting Method</title>
		<link>http://dailysolution.wordpress.com/2009/03/26/kaspersky-78-kavkis-unblacklisting-method/</link>
		<comments>http://dailysolution.wordpress.com/2009/03/26/kaspersky-78-kavkis-unblacklisting-method/#comments</comments>
		<pubDate>Thu, 26 Mar 2009 11:04:35 +0000</pubDate>
		<dc:creator>futurbillgate</dc:creator>
				<category><![CDATA[hacks]]></category>
		<category><![CDATA[tricks]]></category>
		<category><![CDATA[windows]]></category>

		<guid isPermaLink="false">http://dailysolution.wordpress.com/?p=29</guid>
		<description><![CDATA[[Tutorial] Kaspersky 7&#38;8 KAV&#38;KIS Unblacklisting Method NEW * Kaspersky version 8 Unblacklist Method Added scroll down after v.7 method Wink you will find &#8220;How to&#8221; for version 8 . Attention for those who didn&#8217;t read until bottom , the Patch works only if the AV is installed as Default in C:/Program Files/Kaspersky Lab/ Smile or [...]<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=29&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
			<content:encoded><![CDATA[<p><strong>[Tutorial] Kaspersky 7&amp;8 KAV&amp;KIS Unblacklisting Method</p>
<p>NEW * Kaspersky version 8 Unblacklist Method Added<br />
scroll down after v.7 method Wink you will find &#8220;How to&#8221; for version 8 .</p>
<p>Attention for those who didn&#8217;t read until bottom , the Patch works only if the AV is installed as</p>
<p>Default in C:/Program Files/Kaspersky Lab/ Smile</p>
<p>or C:/Program Files (x86)/Kaspersky Lab/ for those who have x64 Bit OS&#8217;s</p>
<p>Exclamation NEW</p>
<p>New Keys Added valid until 2011 Wink </strong></p>
<p><img class="linked-image" src="http://i203.photobucket.com/albums/aa144/copolovici/stop1.jpg" border="0" alt="" /><br />
<img class="linked-image" src="http://www.stealthsettings.com/wp-content/uploads/2006/12/WindowsLiveWriter/ddee5fb57bd7_119E0/blacklist%20kav_thumb%5B9%5D.jpg" border="0" alt="" /></p>
<p><strong>Are you using a &#8216;pirate&#8217; copy of KAV ? Are you tired of changing the license up to 3 times a month Very Happy ? Don&#8217;t stress yourself , Here&#8217;s my solution Smile :</p>
<p>Use this :</p>
<p>Idea This is the ultimate tool for KAV 7 and KIS 7</p>
<p>KIS &amp; KAV version 7.x: </strong></p>
<p><img class="linked-image" src="http://www.raymond.cc/images/free-kaspersky.png" border="0" alt="" /></p>
<p><img class="linked-image" src="http://i181.photobucket.com/albums/x229/CaZoR_/kaspersky7_2-1.jpg" border="0" alt="" /></p>
<p>Exclamation It uses advanced methods to avoid getting blacklisted and so on &#8230;</p>
<p><strong>Quote:</strong><br />
<span style="text-decoration:underline;">You will be able to use a key even if it is already blacklisted so , you better listen carefully Smile<br />
</span></p>
<p><strong>Download</strong><br />
<!--c1--></p>
<div class="codetop">CODE</div>
<div class="codemain"><!--ec1-->http://rapidshare.com/files/198307069/N0KaiBlk_zZzCocaColaFw.rar<!--c2--></div>
<p><!--ec2--></p>
<p><strong>Pass:</strong></p>
<p><!--c1--></p>
<div class="codetop">CODE</div>
<div class="codemain"><!--ec1-->warez-bb.org<!--c2--></div>
<p><!--ec2--></p>
<p>HOW TO<br />
Read the Readme in the Folder<br />
1. After installing KAV/KIS on your PC , do not activate , use &#8220;Activate Later&#8221; option .<br />
<img class="linked-image" src="http://images.kaspersky.com/en/support_new/kis7_activation%28en%29.gif" border="0" alt="" /><br />
2. Reboot to complete installation , again &#8220;Activate Later&#8221;<br />
<img class="linked-image" src="http://www.kaspersky.com.tw/KL-Services/images/kis7_reboot%28en%29.gif" border="0" alt="" /><br />
3. Deactivate all Proactive defense options from the AV like this :<br />
<img class="linked-image" src="http://i29.tinypic.com/2lc3a7d.png" border="0" alt="" /></p>
<p>4. In the folder you will find two patches , the one recommended for installing is &#8220;Kaspe.. Sollution&#8221; because the other one is slightly 99.8% stable not 100% , but is the same patch version so use whatever you like . (do not open the patch yet , so do not worry , cause it will work Wink)</p>
<p>5. Run your PC into Safe Mode with Networking Options :</p>
<p>Arrow There are two ways to get in Safe Mode<br />
a) when booting up windows , press F8 right after the POST screen .<br />
choose Safe Mode with Networking option .<br />
<img class="linked-image" src="http://www.playtool.com/pages/safemode/win2ksafemode3.jpg" border="0" alt="" /><br />
b) Use the RUN from Start Menu .<br />
go to Start -&gt; RUN -&gt; type : msconfig , hit ENTER ,<br />
go to Boot.ini tab , select Safe Boot , check the Network option bellow and close the dialog box , hit Restart after this operation .</p>
<p>When asked what User to Log in , Exclamation click on the Default SYSTEM Administrator , NOT your account or your Guest account , YOUR DEfault Administrator Account , the one from the System , ussually Located in the first ROW .<br />
[/img]http://www.techorama.org/images/win-xp-screen-full_69.jpg[img]<br />
It is very important because the fact that this way the Patch has acces to the System so it will smoothly update . If your account is password protected (The admin acc. , type password when asked)</p>
<p>[/img]http://www3.georgetown.edu/uis/images/software/documentation/winxp/runas2.gif[img]<br />
[/img]http://i25.tinypic.com/14mt25d.png[img]<br />
6. Wait until you reach (get inside) in Safe Mode , you will see that screen (black) with Safe Mode in corners<br />
[/img]http://www.bcot1.com/safemode03.jpg[img]<br />
hit Yes in that box .</p>
<p>7. Double click the &#8220;Kas.. Sollution&#8221; patch . NOTE! You will have to wait a bit until it shows on the desktop because in Safe Mode , VGA resources are poor .</p>
<p>Exclamation If the Patch isn&#8217;t starting in maximum 2.5 minutes , press Ctrl+Alt+Del and simply wait . If even this method isn&#8217;t working , Run the second patch and close the first one . But I advice you to wait cause it will work Wink .</p>
<p>8. After starting the patch , you will see some buttons , that may be pressed depending on your version of the AV (KAV or KIS) . Read the following very carefully Smile</p>
<p>9. You will see this screen :<br />
[/img]http://i26.tinypic.com/6fnpt3.jpg[img]<br />
Press &#8216;key remover&#8217; button first ,<br />
After that &#8216;Clean&#8217; Button<br />
After that press !! Depending on your version &#8220;Patch KAV&#8221; or &#8220;Patch KIS (intenet security)&#8221; .</p>
<p>Cool Probably you won&#8217;t have time to see anything on the screen because it&#8217;s very fast Wink</p>
<p>10. Now press the &#8220;Key KAV+KIS&#8221; , and press &#8220;Install&#8221; , just like there Smile .</p>
<p>After finishing , you may hit &#8220;Exit&#8221; .</p>
<p>11. Go again to RUN -&gt; msconfig -&gt; Boot.ini and deactivate the safe mode , uncheck the safe Boot , so the OS can start in normal boot .</p>
<p>Image</p>
<p>12. After reboot , you will be asked to Activate , hit &#8220;Apply Existing License&#8221; and Use one of the ones from the folder I supplied Wink I have included Keygen also for KAV version Smile .</p>
<p>[/img]http://www.kaspersky.com/support/images/support_new/codeinstalled.jpg[img]<br />
13. After Activation , you will have to Update the AV to have the latest protection services activated , and after that You may enable Proactive Defense again Wink .<br />
[/img]http://i26.tinypic.com/fve6oi.png[img]<br />
14. Happy Non-Blacklisting Protection , you can fully update and no worries about Blacklisting again , [the secret method I cannot tell you so don't ask Very Happy]</p>
<p>15. Updated successfully with a key that has already been blacklisted Very Happy :</p>
<p>[/img]http://i25.tinypic.com/m7gt2s.png[img]<br />
[/img]http://i32.tinypic.com/2i881gp.png[img]<br />
[/img]http://i29.tinypic.com/34858id.png[img]</p>
<p>Now you are protected against any type of malware</p>
<div class="resized-linked-image" style="width:610px;cursor:pointer;padding:2px;"><img style="vertical-align:middle;" src="http://rapidpiracy.com/style_images/new/img-resized.png" border="0" alt="" /> Reduced: 86% of original size [ 706 x 576 ] &#8211; Click to view full image</div>
<p><img class="linked-image" src="http://nebulla.files.wordpress.com/2008/06/kav2009.jpg?w=614" border="0" alt="" width="614" /><br />
Now install the Antivirus as Trial first .</p>
<p>4. Reboot the PC , and after this step , select Activate Later , go into &#8220;Self Defense&#8221; menu and Disable it Temporary .</p>
<p>5. Now Reboot in Safe Mode just like in the previous pictures .</p>
<p>6. Run the Kaspersky Patch Smile [ Do not forget to be logged in as the Administrator and not Guest or Other User ]</p>
<p>7. The steps to Patch KAV/KIS are exactly the same for version 8 too . , After Done Patching , exit the application [patch] &amp; Reboot in Normal Mode now .</p>
<p>8. When Asked for License , download this License File which is valid untill 2011 for KIS and until 2010 for KAV and until then you won&#8217;t have any problems with Updates</p>
<br />  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/dailysolution.wordpress.com/29/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/dailysolution.wordpress.com/29/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/dailysolution.wordpress.com/29/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/dailysolution.wordpress.com/29/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/dailysolution.wordpress.com/29/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/dailysolution.wordpress.com/29/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/dailysolution.wordpress.com/29/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/dailysolution.wordpress.com/29/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/dailysolution.wordpress.com/29/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/dailysolution.wordpress.com/29/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/dailysolution.wordpress.com/29/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/dailysolution.wordpress.com/29/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/dailysolution.wordpress.com/29/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/dailysolution.wordpress.com/29/" /></a> <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=29&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></content:encoded>
			<wfw:commentRss>http://dailysolution.wordpress.com/2009/03/26/kaspersky-78-kavkis-unblacklisting-method/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
	
		<media:content url="http://1.gravatar.com/avatar/9bddab6905a682e04a1d8c0f141769c4?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">futurbillgate</media:title>
		</media:content>

		<media:content url="http://i203.photobucket.com/albums/aa144/copolovici/stop1.jpg" medium="image" />

		<media:content url="http://www.stealthsettings.com/wp-content/uploads/2006/12/WindowsLiveWriter/ddee5fb57bd7_119E0/blacklist%20kav_thumb%5B9%5D.jpg" medium="image" />

		<media:content url="http://www.raymond.cc/images/free-kaspersky.png" medium="image" />

		<media:content url="http://i181.photobucket.com/albums/x229/CaZoR_/kaspersky7_2-1.jpg" medium="image" />

		<media:content url="http://images.kaspersky.com/en/support_new/kis7_activation%28en%29.gif" medium="image" />

		<media:content url="http://www.kaspersky.com.tw/KL-Services/images/kis7_reboot%28en%29.gif" medium="image" />

		<media:content url="http://i29.tinypic.com/2lc3a7d.png" medium="image" />

		<media:content url="http://www.playtool.com/pages/safemode/win2ksafemode3.jpg" medium="image" />

		<media:content url="http://rapidpiracy.com/style_images/new/img-resized.png" medium="image" />

		<media:content url="http://nebulla.files.wordpress.com/2008/06/kav2009.jpg" medium="image" />
	</item>
		<item>
		<title>How to bypass the Youtube age limit</title>
		<link>http://dailysolution.wordpress.com/2009/03/26/how-to-bypass-the-youtube-age-limit/</link>
		<comments>http://dailysolution.wordpress.com/2009/03/26/how-to-bypass-the-youtube-age-limit/#comments</comments>
		<pubDate>Thu, 26 Mar 2009 10:59:50 +0000</pubDate>
		<dc:creator>futurbillgate</dc:creator>
				<category><![CDATA[hacks]]></category>
		<category><![CDATA[internet trikx]]></category>

		<guid isPermaLink="false">http://dailysolution.wordpress.com/2009/03/26/how-to-bypass-the-youtube-age-limit/</guid>
		<description><![CDATA[How to bypass the Youtube age limit There are some videos on youtube which require you to be a member in order to watch them . What if you wanted to watch them without registering on youtube . Well here&#8217;s how to go about it . For example a video like this : http://youtube.com/watch?v=ksyxaKWS_j4 would [...]<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=28&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
			<content:encoded><![CDATA[<p>How to bypass the Youtube age limit</p>
<p>There are some videos on youtube which require you to be a member in order to watch them . What if you wanted to watch them without registering on youtube . Well here&#8217;s how to go about it .</p>
<p>For example a video like this :</p>
<p>http://youtube.com/watch?v=ksyxaKWS_j4</p>
<p>would ask you to login and verify your age .  *</p>
<p>** How to watch it without logging in ***</p>
<p>We need to edit the link this way .</p>
<p>&gt; Replace the &#8220;?&#8221; after watch with &#8220;/&#8221; and &#8220;=&#8221; after v with &#8220;/&#8221;</p>
<p>&gt; So our link after editing would be : http://youtube.com/watch/v/ksyxaKWS_j4</p>
<p>&gt; Now use this link in your browser to watch the video  Enjoy !</p>
<br />  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/dailysolution.wordpress.com/28/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/dailysolution.wordpress.com/28/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/dailysolution.wordpress.com/28/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/dailysolution.wordpress.com/28/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/dailysolution.wordpress.com/28/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/dailysolution.wordpress.com/28/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/dailysolution.wordpress.com/28/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/dailysolution.wordpress.com/28/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/dailysolution.wordpress.com/28/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/dailysolution.wordpress.com/28/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/dailysolution.wordpress.com/28/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/dailysolution.wordpress.com/28/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/dailysolution.wordpress.com/28/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/dailysolution.wordpress.com/28/" /></a> <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=28&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></content:encoded>
			<wfw:commentRss>http://dailysolution.wordpress.com/2009/03/26/how-to-bypass-the-youtube-age-limit/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	
		<media:content url="http://1.gravatar.com/avatar/9bddab6905a682e04a1d8c0f141769c4?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">futurbillgate</media:title>
		</media:content>
	</item>
		<item>
		<title>How to surf anonymously</title>
		<link>http://dailysolution.wordpress.com/2009/03/25/how-to-surf-anonymously/</link>
		<comments>http://dailysolution.wordpress.com/2009/03/25/how-to-surf-anonymously/#comments</comments>
		<pubDate>Wed, 25 Mar 2009 08:47:09 +0000</pubDate>
		<dc:creator>futurbillgate</dc:creator>
				<category><![CDATA[hacks]]></category>
		<category><![CDATA[internet trikx]]></category>
		<category><![CDATA[surf anonymously]]></category>

		<guid isPermaLink="false">http://dailysolution.wordpress.com/?p=25</guid>
		<description><![CDATA[How to surf anonymously &#8212; INTRO &#8212; In this tutorial, you will learn how to surf completely anonymously, not just anonymous to your friends, than for police and government. This is my first English tutorial, so don&#8217;t say I&#8217;m illiterate because of some grammar mistakes. I hope you&#8217; can read it&#8230; &#8212; WHAT IS TOR [...]<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=25&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
			<content:encoded><![CDATA[<p><strong>How to surf anonymously</strong></p>
<hr size="1" /><!-- / icon and title --> <!-- message --></p>
<div id="post_message_482477">&#8212; INTRO &#8212;</p>
<p>In this tutorial, you will learn how to surf completely anonymously, not<br />
just anonymous to your friends, than for police and government.<br />
This is my first English tutorial, so don&#8217;t say I&#8217;m illiterate because of<br />
some grammar mistakes. I hope you&#8217; can read it&#8230; <img class="inlineimg" title="Smile" src="http://img02.final4ever.com/images/smilies/smile.gif" border="0" alt="" /></p>
<p>&#8212; WHAT IS TOR AND HOW IT WORKS &#8212;</p>
<p><span class="highlight">Now you can see what&#8217;s hidden</span>Tor (The Onion Router) is software project/anonymous network that use<br />
onion routing for anonymity. I&#8217;m just paste wikipedia quote for onion<br />
routing, because I think you will understand it better than i write it:</p>
<p>&#8220;Onion routing is a technique for anonymous communication over a computer<br />
network. Messages are repeatedly encrypted and then sent through several<br />
network nodes called onion routers. Each onion router removes a layer of<br />
encryption to uncover routing instructions, and sends the message to the<br />
next router where this is repeated. This prevents these intermediary<br />
nodes from knowing the origin, destination, and contents of the message.&#8221;</p>
<p>If you still didn&#8217;t understand it, you can read great article on tor web-<br />
site with explanation images: <a rel="nofollow" href="http://www.final4ever.com/redirector.php?url=http://www.torproject.org/overview.html.en" target="_blank">http://www.torproject.org/overview.html.en</a></p>
<p>&#8212; INSTILLING AND CONFIGURING TOR AND NECESSARY SOFTWARE&#8212;</p>
<p>&#8212; LINUX / *BSD&#8212;</p>
<p>You can install it by repositories of your distribution, but I suggest<br />
downloading most update version from tor website:<br />
<a rel="nofollow" href="http://www.final4ever.com/redirector.php?url=http://www.torproject.org/download-unix.html.en" target="_blank">http://www.torproject.org/download-unix.html.en</a></p>
<p>After installing Tor, you need to install Privoxy &#8211; web filtering proxy so<br />
you could use Tor for anonymous web browsing. Go to <a rel="nofollow" href="http://www.final4ever.com/redirector.php?url=http://www.privoxy.org" target="_blank">http://www.privoxy.org</a> and<br />
then go to &#8220;Download recent releases&#8221;. I installed it form source, but if<br />
you don&#8217;t know how to do it&#8230; Well, than i must write new tutorial <img class="inlineimg" title="Smile" src="http://img02.final4ever.com/images/smilies/smile.gif" border="0" alt="" /></p>
<p>Now, we must configure Privoxy to work with Tor. Open privoxy config<br />
file (usually located in /etc/privoxy/config) and add this line on top of</p>
<p>CODE</p>
<p>forward-socks4a / 127.0.0.1:9050 .</p>
<p>9050 is Tor port, so privoxy will forward traffic(HTTP and HTTTPS) to Tor.<br />
If you want privoxy to stop logging files, comment (or delete) this files<br />
in his config file:<br />
logfile logfile<br />
jarfile jarfile<br />
and on some systems, you must comment debug lines (eg. &#8220;debug 1&#8243;)</p>
<p>Now you must restart privoxy to changes take effects.</p>
<p>&#8212; WINDOWS &#8212;</p>
<p>Go to Tor download page &#8211; <a rel="nofollow" href="http://www.final4ever.com/redirector.php?url=http://www.torproject.org/download.html.en" target="_blank">http://www.torproject.org/download.html.en</a>, and<br />
download tor for Windows. It will install Tor, Vidalia(GUI for Tor) and<br />
privoxy. And, that is that&#8230; Don&#8217;t panic if your firewall block 9050 and<br />
8118 port, that are default ports of Tor and Privoxy, so allow traffic on<br />
these ports&#8230;</p>
<p>&#8212; FIREFOX &#8212;</p>
<p>There is one beautiful thing &#8211; Torbutton firefox add-on, ypu can find it<br />
here: <a rel="nofollow" href="http://www.final4ever.com/redirector.php?url=https://addons.mozilla.org/en-US/firefox/addon/2275" target="_blank">https://addons.mozilla.org/en-US/firefox/addon/2275</a><br />
Restart Firefox and anonymously browsing is set, Torbutton is located in<br />
right-bottom corner of firefox, and you can easly toggle in Tor mode and<br />
non-tor mode of browsing. You can configure Torbutton for completely<br />
stealth browsing, so this is one more + to firefox <img class="inlineimg" title="Big Grin" src="http://img02.final4ever.com/images/smilies/biggrin.gif" border="0" alt="" /></p>
<p>&#8212; OTHER BROWSERS &#8212;</p>
<p>In other browsers, you will just must configure it http proxy to point to:<br />
host: 127.0.0.1<br />
port: 8118.<br />
That will forward HTTP/S traffic over privoxy,<br />
who will forward it to Tor. Note, check your firewall (it may block you to<br />
connect to localhost(127.0.0.1)).</p>
<p>&#8212; OUTRO &#8212;</p>
<p>Ofcourse, because of that, Tor will slow down your connection, but you<br />
must be patient if you want to be secure&#8230; Tor is free project who work<br />
because of volunteers, so don&#8217;t do illegal things or download big files<br />
over it.</p></div>
<br />  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/dailysolution.wordpress.com/25/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/dailysolution.wordpress.com/25/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/dailysolution.wordpress.com/25/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/dailysolution.wordpress.com/25/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/dailysolution.wordpress.com/25/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/dailysolution.wordpress.com/25/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/dailysolution.wordpress.com/25/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/dailysolution.wordpress.com/25/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/dailysolution.wordpress.com/25/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/dailysolution.wordpress.com/25/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/dailysolution.wordpress.com/25/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/dailysolution.wordpress.com/25/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/dailysolution.wordpress.com/25/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/dailysolution.wordpress.com/25/" /></a> <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=25&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></content:encoded>
			<wfw:commentRss>http://dailysolution.wordpress.com/2009/03/25/how-to-surf-anonymously/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	
		<media:content url="http://1.gravatar.com/avatar/9bddab6905a682e04a1d8c0f141769c4?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">futurbillgate</media:title>
		</media:content>

		<media:content url="http://img02.final4ever.com/images/smilies/smile.gif" medium="image">
			<media:title type="html">Smile</media:title>
		</media:content>

		<media:content url="http://img02.final4ever.com/images/smilies/smile.gif" medium="image">
			<media:title type="html">Smile</media:title>
		</media:content>

		<media:content url="http://img02.final4ever.com/images/smilies/biggrin.gif" medium="image">
			<media:title type="html">Big Grin</media:title>
		</media:content>
	</item>
		<item>
		<title>surf internet very fast !!!</title>
		<link>http://dailysolution.wordpress.com/2009/03/25/surf-internet-very-fast/</link>
		<comments>http://dailysolution.wordpress.com/2009/03/25/surf-internet-very-fast/#comments</comments>
		<pubDate>Wed, 25 Mar 2009 08:44:29 +0000</pubDate>
		<dc:creator>futurbillgate</dc:creator>
				<category><![CDATA[internet trikx]]></category>

		<guid isPermaLink="false">http://dailysolution.wordpress.com/?p=22</guid>
		<description><![CDATA[You have to change the DNS addresses.I ll give you two DNS addresses.Replace your DNS with these. Preferred DNS server:- 208.67.222.222 Alternate DNS server:- 208.67.220.220 To change this, 1 Go to control pannel 2 Network Connections 3 Then right click on your Internet connection and go to properties. 4 In the section &#8220;This connection uses [...]<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=22&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
			<content:encoded><![CDATA[<p>You have to change the DNS addresses.I ll give you two DNS addresses.Replace your DNS with these.</p>
<p>Preferred DNS server:-   208.67.222.222<br />
Alternate DNS server:-   208.67.220.220</p>
<p>To change this,<br />
1  Go to control pannel<br />
2  Network Connections<br />
3  Then right click on your Internet connection and go to properties.<br />
4  In the section &#8220;This connection uses the following items&#8221; ,click Internet Protocol(TCP/IP)<br />
5  Then click properties<br />
6  In that you will see two options 1.Obtain DNS server automatically<br />
2.Use the following DNS sever addresses.</p>
<p>7 then enter the DNS addresses i gave you.put 208.67.222.222 as preferred DNS srver and 208.67.220.220 as Alternate DNS serever.</p>
<br />  <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gocomments/dailysolution.wordpress.com/22/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/comments/dailysolution.wordpress.com/22/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godelicious/dailysolution.wordpress.com/22/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/delicious/dailysolution.wordpress.com/22/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gofacebook/dailysolution.wordpress.com/22/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/facebook/dailysolution.wordpress.com/22/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gotwitter/dailysolution.wordpress.com/22/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/twitter/dailysolution.wordpress.com/22/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/gostumble/dailysolution.wordpress.com/22/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/stumble/dailysolution.wordpress.com/22/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/godigg/dailysolution.wordpress.com/22/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/digg/dailysolution.wordpress.com/22/" /></a> <a rel="nofollow" href="http://feeds.wordpress.com/1.0/goreddit/dailysolution.wordpress.com/22/"><img alt="" border="0" src="http://feeds.wordpress.com/1.0/reddit/dailysolution.wordpress.com/22/" /></a> <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=dailysolution.wordpress.com&#038;blog=7089065&#038;post=22&#038;subd=dailysolution&#038;ref=&#038;feed=1" width="1" height="1" />]]></content:encoded>
			<wfw:commentRss>http://dailysolution.wordpress.com/2009/03/25/surf-internet-very-fast/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	
		<media:content url="http://1.gravatar.com/avatar/9bddab6905a682e04a1d8c0f141769c4?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">futurbillgate</media:title>
		</media:content>
	</item>
	</channel>
</rss>