Wednesday, 16 December 2015

How To Remove Stock Apps on Android Without Rooting ?

1. Now First You Need to Download and
Install a Small Program called “Debloater “
that enable users to Remove Stock apps from
your Android Device.
2. Next Enable Developer Option in your
Android Phone. Go to Settings >> About
Phone >> Build Number Tap Approx. 5-6
Time now You Successfully Enable the
Developer option ( In Android 5.0 Lollipop
Developer Option is Easily found in Setting).
3. Open Developer Option and Scroll Down
you can see USB Debugging Mode Just
Enable it.
4. Now Connect your Android Device with
your Computer where you Install the
Debloater Tool Wait for tool to Detect your
Phone.
5. Click on Read Device and It will Scan your
all Android Apps from your Android Device.
6. Now Tick on Those Apps that you Want to
Remove from your Android Device and Click
on “ Apply” to Block these Apps. It will help
you to Free your Internal Memory and
make your Device Faster.
7. If You Accidentally Remove some App that
you want You can Also undo this Process by
un-ticking them to Access Again.
8. After Doing This, Now You Successfully
Remove Rooted Apps from your Android
Device.

Registry Hack

The registry is a hierarchical database that
stores the value of variables in windows and
the application and services that run on
windows.
The operating system and the other programs
also uses the registry to store about user and
about the current configuration of the system
and its components.
SUBTREE:Subtree are the root, or primary
divisions, of the registry.
The registry is divided into five subtrees.
Subtree contains the keys, subkeys, ans
enteries in which the data is stored.
LIST OF SUBTREES:
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG
TRICKS:
First of all open Registry Editor.
Go to start> run> regedit
1.How TO REMOVE THE SHORTCUT ARROW
FROM SHORTCUTS.
STEPS:
1.Open regedit.exe file.
2.Scroll down to create the following registry
key:
[HKEY_CLASSES_ROOT\lnkfile]
Under the lnkfile key, in the right pane delete
a String value named IsShortcut.
2.How TO DISABLE RIGHT CLICK ON THE
DESKTOP AND EXPLORER.
STEPS:
Open regedit.exe file.
Scroll down to create the following registry
key:
[HKEY_LOCAL_MACHINE\SOFTWARE
\Microsoft\Windows\CurrentVersion\Policies]
In the left side pane, right click on the
Policies key and create a new key called
Explorer.
Under the Explorer key, in the right pane
create a new DWORD value named
NoViewContextMenu within the above registry
key and set its data value to 1 to disable the
right click context menu on the desktop, and
to 0 to enable it.
NOTE: You may want to completely delete the
DWORD value NoViewContextMenu when you
want to enable right click.
3.How TO DISABLE RIGHT CLICK ON THE
TASKBAR.
STEPS:
Open regedit.exe file.
Scroll down to create the following registry
key:
[HKEY_LOCAL_MACHINE\SOFTWARE
\Microsoft\Windows\CurrentVersion\Policies
\Explorer]
In the right pane, create a new DWORD value
named NoTrayContextMenu within the above
registry key and set its data value to 1 to
disable the right click context menu on the
taskbar, and to 0 to enable it.
NOTE: You may want to completely delete the
DWORD value NoTrayContextMenu when you
want to enable right click.
4.How TO DISABLE WINDOWS HOTKEYS.
STEPS:
Open regedit.exe file.
Scroll down to create the following registry
key:
[HKEY_LOCAL_MACHINE\SOFTWARE
\Microsoft\Windows\CurrentVersion\Policies
\Explorer]
Under the Explorer key, in the right pane
create a new DWORD value named NoWinKeys
within the above registry key and set its data
value to 1 to disable the windows hotkeys, and
to 0 to enable it.
NOTE: You may want to completely delete the
DWORD value NoWinKeys when you want to
enable hotkeys.
5.How TO DISABLE THE CONTROL PANEL.
STEPS:
Open regedit.exe file.
Scroll down to create the following registry
key:
[HKEY_LOCAL_MACHINE\SOFTWARE
\Microsoft\Windows\CurrentVersion\Policies
\Explorer]
Under the Explorer key, in the right pane
create a new DWORD value named
NoControlPanel within the above registry key
and set its data value to 1 to disable the
windows hotkeys, and to 0 to enable it.
NOTE: You may want to completely delete the
DWORD value NoControlPanel when you want
to enable control panel.
6. How TO DISABLE THE FOLDER AND
SEARCH OPTION.
STEPS:
Open regedit.exe file.
Scroll down to create the following registry
key:
[HKEY_CURRENT_USER\Software\Microsoft
\Windows\CurrentVersion\Policies\ Explorer]
Under the Explorer key, in the right pane
create a new DWORD value named
NoFolderOptions within the above registry key
and set its data value to 1 to disable the
folder and search option, and to 0 to enable
it.
NOTE: You may want to completely delete the
DWORD value NoFolderOptions when you want
to enable the folder and search option.
7.How TO ADD AN APPLICATION TO THE
RIGHT CLICK MENU OF THE DESKTOP.
STEPS:
Open regedit.exe file.
Scroll down to create the following registry
key:
[HKEY_CLASSES_ROOT\Directory\Background
\shell]
In the left side pane, right click on the shell
key and create a new key called Paint
In the left side pane, right click on the Paint
key and create a new key called command.
Under the command key, in the right pane
double click on the (Default) string key and
change its data to: C:\Windows
\System32\mspaint.exe
NOTE: Now when you right click on your
desktop, a new menu item called Paint has
been added to the context menu.
8.How TO ADD CONTROL PANEL TO THE
RIGHT CLICK MENU OF THE DESKTOP.
STEPS:
Open regedit.exe file.
Scroll down to create the following registry
key:
[HKEY_CLASSES_ROOT\Directory\Background
\shell]
In the left side pane, right click on the shell
key and create a new key called Control Panel.
In the left side pane, right click on the
Control Panel key and create a new key called
command.
Under the command key, in the right pane
double click on the (Default) string key and
change its data
to: rundll32.exe shell32.dll,Control_RunDLL
NOTE: Now when you right click on your
desktop, a new menu item called Control
Panel has been added to the context menu.
9.How TO PREVENT ACCESS TO CERTAIN
DRIVES.
STEPS:
Open regedit.exe file.
Scroll down to create the following registry
key:
[HKEY_LOCAL_MACHINE\SOFTWARE
\Microsoft\Windows\CurrentVersion\Policies
\Explorer]
Under the Explorer key, in the right pane
create a new DWORD value named
NoViewOnDrive within the above registry key
and set its data value to the number of the
drive that you want to hide as per the below
list:
A: 1 , B: 2 , C: 4 , D: 8 , E: 16 , F: 32 , G: 64 ,
H: 128 (ALL: 67108863)
NOTE: You may want to completely delete the
DWORD value NoViewOnDrive when you want
to enable access to certain drives.
10.How TO DISABLE THE FOLDER AND
SEARCH OPTION.
STEPS:
Open regedit.exe file.
Scroll down to create the following registry
key:
[HKEY_CURRENT_USER\Software\Microsoft
\Windows\CurrentVersion\Policies\ System]
Under the System key, in the right pane create
a new DWORD value named DisableTaskMgr
within the above registry key and set its data
value to 1 to disable the folder and search
option, and to 0 to enable it.
You may need to restart Windows for the
changes to be implemented.

Tweaking Windows

>>Open COMMAND PROMPT while Locked by
User.
>open notepad
>type www.command.com
> then save as cmd.bat at desktop
>then enter now its open.....enjoy
>>If your computer is slow?then clean up the
ram..
>Open notepad
>type FREEMEM=SPACE(64000000)
>Save it as ram.vbs
now run the script.
Check out !!
>>CracK BIOS Password
>Open the CPU
>Observe the Motherbord
>Remove the Silver Battery(3v)
>Wait 2 minutes and place the Battery
>>Restoring a Lost Desktop-
>Start
>Run
Type a period " . "
Then press Enter
>>If ur PC is hanged then do this.
Press shift+ctrl+esc or ctrl+alt+del
n den click on 'END TASK'
ur PC is runing now
>>create folder without name>select any folder
>rename it
>press alt & type 0160 or 255
>enter
>>Amazing trick for use
Windows Backup Utility if installed
go to run
type ntbackup
ok
Now use backup
>>Increase the speed of your file sharing
Simple Way to Share Multiple Folders :
Goto Run and Type SHRPUBW.EXE then press
Enter
Select the folder you want to share and Set
permissions,
your share folder is ready now.....
>>Turning off the Help on Min, Max, Close
Icons
When the mouse goes over the minimize,
maximize and close icons on the upper
right hand side of a window.
To disable that display:
1. Start Regedit
2. Go to HKEY_CURRENT_USER \ Control
Panel \ Desktop
3. Create a String Value called MinMaxClose
4. Give it a value of 1
5. Reboot
>>FIX CORRUPTED FILE IN WINDOW XP
1.Load XP cd into cd drive
2. go to Run
3. type sfc/scannowok
4. Then copy its lost file frm cd.
>>AUTO DELETE TEMPORARY FOLDER.!!
what i prefer is %temp% " without quotes.. at
Start -> Run.. this opens ur temp folder n den
u cal erase it nearly
First go into gpedit.msc
Next select -> Computer Configuration/
Administrative Templates/Windows
Components/Terminal Services/Temporary
Folder
Then right click "Do Not Delete Temp Folder
Upon Exit"
Go to properties and hit disable. Now next
time Windows puts a temp file in
that folder it will automatically delete it when
its done! Note from Forum Admin: Remember,
GPEDIT (Group Policy Editor) is only available
in XP Pro.
>>Locking Folders:
Consider you want to lock a folder named
XXXX in your E:\, whose path is E:\XXXX.
Now open the Notepad and type the following
[code]ren xxxx xxxx.{21EC2020-3AEA-1069-
A2DD-08002B30309D}[/code]
Where xxxx is your folder name. Save the text
file as loc.bat in the same drive.
Open another new notepad text file and type
the following
[code]ren xxxx.{21EC2020-3AEA-1069-
A2DD-08002B30309D} xxxx[/code]
Save the text file as key.bat in the same drive.
Steps to lock the folder:
To lock the xxxx folder, simply click the
loc.bat and it will transform into control panel
icon which is inaccessible.
To unlock the folder click the key.bat file.
Thus the folder will be unlocked and the
contents are accessible.
>>Locking Drives:
We don’t usually prefer to lock our drives, but
sometimes it becomes nesscary. Say for
instance you might have stored your office
documents in D:\ and you don’t want your
kids to access it, in such case this technique
can be useful for you. Please don’t try this
tweak with your root drive (usually C:\ is the
root drive) since root drives are not intended
to be locked because they are mandatory for
the system and application programs.
Start & Run and type Regedit to open Registry
editor
Browse HKEY_CURRENT_USER\Software
\Microsoft\Windows\CurrentVersion\Policies
\Explorer
Create a new DWORD value NoViewOnDrive
and set its value as
2^ (Alpha Number of Drive Letter-1) where
Alpha number are simple counting of
alphabets from A to Z as 1 - 26
For example: to lock C:\, Alpha number of C is
3 so 2^ (3-1) = 4 (decimal value)
To lock more drives, calculate the value of
each drive and then set sum of those numbers
as value
To unlock your drive just delete the key from
the registry.
>>To Remove Recyle Bin From Your Desktop
Open Regedit by going to START - RUN and
type Regedit and hit enter. Then you should
navigate to following entry in registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
\Windows\CurrentVersion\Explorer\ Desktop
\NameSpace
\{645FF040-5081-101B-9F08-00AA002F954E}
and delete it. This action should remove
recycle bin from your desktop.
>>Disable the Security Center warnings
Follow the given steps to edit the computer
registry for disable message:
First click on Start button then type Regedit in
Run option.
Here locate the location to:
• HKEY_LOCAL_MACHINE\SOFTWARE
\Microsoft\Security Center
Here in right side panel, double click on Anti
Virus Disable Notify and set its value 1.
Now close the registry editor and restart your
computer after any changes to go into effect.
>>HIDE DRIVES - How to Hide the drives
(c:,d:,e:,a:...etc)
To disable the display of local or networked
drives when you click My Computer.
1.Go to start->run.Type regedit, Now go to:
HKEY_CURRENT_USER\Software\Microsoft
\Windows\CurrentVersion\Policies\Explorer
2.In the right pane create a new DWORD item
and name it NoDrives(it is case sensitive).
3.Modify it's value and set it to 3FFFFFF
(Hexadecimal) .
4.Restart the computer.
5.Now when you click on My Computer, no
drives will be shown(all gone...).
To enable display of drives in My Computer,
simply delete this DWORD item that you
created. Restart your computer. All the drives
are back again.
>>Show your name in taskbar
Trick to Show Your name after time in
taskbar...
Try this trick to add up ur name in place of
AM and PM beside time Its simple
Step-1:- Navigate to -> Start -> Control
Pannel -> Regional and Language Option ->
Click on Customize -> Go to TIME Tab ->
Change AM symbol and PM symbol from AM
and PM to ur name -> Apply -> Ok ...
Did It change? If not, follow step-2 below.
Step2:- Now go to time in taskbar and Double
Click it to open "Date and time
property" ...Look place where time changes in
digital form i.e. 02:47:52 AM , click to arrow
to change the AM or PM by selecting and
press arrow. It will Show ur name or name that
was entered by u, Apply -> OK Done

Installing Kali Linux on Android

Requirements
1. Rooted Android Device.
2. Busybox Installer.
3. Linux Deploy.
4. Android VNC Viewer
5. 4GB Free Space on your External Memory.
6. High Speed Net Connection.
STEP 1:(Rooting Android Device)
Root your android device using Kingo root
STEP 2:(Installing Busybox)
First install UNIX Scripts into your device
using the Busybox Installer app. Open the app
and follow the given steps.
1.Choose the Busybox Version from the drop
down menu.(optional)
2.Tap the install button.
3.It will download the scripts to be install.
4.After installing you will get the success
message.
Now you have successfully installed busybox
in your android device.
Note: If the installing fails you need to choose
different Busybox versions.
STEP 3:(Configure Linux Deploy)
Linux Deploy is the Official app to Download
and install kali linux in android download the
app and install it in your android. Now open
the app and follow the given steps.
1.Tap the properties icon it will opens the
properties screen.
2. In properties select the distribution to be
install.
3. Leave some setting to be default and select
the desktop environment to GNOME.
4.Select all the components in Components
Menu.
5. In GUI Settings just interchange the height
and width values.
6. Now select the install button and then OK.
7. Now the installation process starts be
patient for the installation process to
complete
8. Now tap the START button and tap OK it
will mount the Linux file.
9. Note the IP address in the top left corner of
Linux deploy it changes periodically.
STEP 4:(Configure Android vnc)
Now open the Android VNC Viewer, Enter
Nickname and password the default password
for Kali Linux ischangeme and give the IP
address copied from Linux deploy.
Finally tap the Connect button you will see
the Kali Linux in your android device.
STEP 5:
To close the Kali Linux, exit from the VNC
viewer and then go to Linux Deploy and
simply tap the Stop Button and the OK it will
close the Mounted Image.
"For Educational purpose only

Top 10 Ways How Hackers Can Hack Facebook Accounts

1. Facebook Phishing
Phishing still is the most popular attack
vector used for hacking facebook accounts,
There are variety of methods to carry out
phishing attack, In a simple phishing attacks
a hacker creates a fake login page which
exactly looks like the real facebook page and
then asks the victim to login into that page,
Once the victim logins through the fake page
the victims “ Email Address” and “Password ” is
stored in to a text file, The hacker then
downloads the text file and get’s his hands on
the victims credentials.
2. Keylogging
Keylogging, according to me is the easiest
way to hack a facebook password, Keylogging
sometimes can be so dangerous that even a
person with good knowledge of computers can
fall for it. A keylogger is basically a small
program which once is installed on victims
computer will record every thing which victim
types on his/her computer. The logs are then
send back to the attacker by either FTP or
directly to hackers email address. I have
dedicated a half of my newsest book “An
introduction to keyloggers, RATS And
Malware” to this topic.
3. Stealers
Almost 80% percent people use stored
passwords in their browser to access the
facebook, This is is quite convenient but can
sometimes be extremely dangerous, Stealers
are software’s specially designed to capture
the saved passwords stored in the victims
browser, Stealers once FUD can
be extremely powerful. If you want to how
stealers work and how you can set up your
own one?, Kindly refer the book above.
4. Session Hijacking
Session Hijacking can be often very dangerous
if you are accessing Facebook on a http://
connection, In a Session Hijacking attack a
hacker steals the victims browser cookie
which is used to authenticate a user on a
website and uses to it to access victims
account, Session hijacking is widely used on
Lan’s. I have already written a three part
series on How session hijacking works? and
also a separate post on Facebook session
hijacking.
5. Sidejacking With Firesheep
Sidejacking attack went common in late 2010,
however it’s still popular now a days,
Firesheep is widely used to carry out
sidejacking attacks, Firesheep only works
when the attacker and victim is on the same
wifi network. A sidejacking attack is basically
another name for http session hijacking, but
it’s more targeted towards wifi users.
6. Mobile Phone Hacking
Millions of Facebook users access Facebook
through their mobile phones. In case the
hacker can gain access to the victims mobile
phone then he can probably gain access to
his/her Facebook account. Their are lots of
Mobile Spying softwares used to monitor a
Cellphone.
7. DNS Spoofing
If both the victim and attacker are on the
same network, an attacker can use a DNS
spoofing attack and change the original
facebook.com page to his own fake page and
hence can get access to victims facebook
account.
8. USB Hacking
If an attacker has physical access to your
computer, he could just insert a USB
programmed with a function to automatically
extract saved passwords in the browser.
9. Man In the Middle Attacks
If the victim and attacker are on the same lan
and on a switch based network, A hacker can
place himself b/w the client and the server or
he could also act as a default gateway and
hence capturing all the traffic in between,
ARP Poisoning which is the other name for
man in the middle attacks is a very broad
topic and is beyond the scope of this article.
10. Botnets
Botnets are not commonly used for hacking
facebook accounts, because of it’s high setup
costs, They are used to carry more advanced
attacks, A botnet is basically a collection of
compromised computer, The infection process
is same as the keylogging, however a botnet
gives you, additional options in for carrying
out attacks with the compromised computer.
Some of the most popular botnets include
Spyeye and Zeus.