Showing posts with label WINDOWS. Show all posts
Showing posts with label WINDOWS. Show all posts

Friday, 21 October 2016

How to remove shortcut virus in computer/laptopslike removable disk(2gb).lnk,js.vbs ,IMG.exe etc

How to remove shortcut virus in computer/laptopslike removable disk(2gb).lnk,js.vbs ,IMG.exe etc.

  1. First of all you need to download the eset smart antivirus from link below for 32bit and 64 bit as u wish.
  2. 32bit-esest 32bit offline
  3. 64bit-eset 64 bit offline
  4. Remember no need to activate this antivirus because of this is works fine full access so don't worrY..
  5. ESET is privately held and has branch offices in San Diego, United States; Montreal, Canada;[10] Buenos Aires, Argentina; São Paulo, Brazil; Prague, Czech Republic; Kraków, Poland, Singapore; and Australia[11] as well as distributors in over 180 countries.
    According to Gartner, ESET showed the largest worldwide growth rate within the Consumer Security industry for 2011. ESET falls within the Niche Player category of the Gartner Magic Quadrant.[12] According to the Gartner report, "ESET has built a substantial installed base in Europe, the Middle East and Africa, particularly in Eastern Europe, and it has a rapidly growing Small and medium-sized business presence in North America. Its Completeness of Vision score benefits from good malware effectiveness in a lightweight client, but it still suffers from weak enterprise management capabilities and lack of investment in market-leading features, such as application control and virtualization support. ESET is a good shortlist option for organizations seeking an effective, lightweight anti-malware solution.".[13]
    According to Frost & Sullivan, "ESET offers high-performance, proactive endpoint security solutions, and the company goes above and beyond the competition to add value to its products by educating both Mac and PC users on how to defend themselves against the latest cyber threats" and it concluded that "ESET will continue to maintain a strong presence in the endpoint security market and provide high value to its customers.".[14] It awarded ESET the 2012 North American Endpoint Security Products Customer Value Enhancement Award and the 2011 Global Customer Value Enhancement Award.[15]

    Recognition

    ESET Endpoint Security was rated Five Stars by SC Magazine, and won the Best Antivirus Software of 2013 award by Maximum PC. It further received the Parent Tested Parent Approved seal from PTPA Media.[16][17]
    In 2009, CNET awarded ESET Smart Security 4 the CNET Editor's Choice Award under the Internet security suite category.[18] Reviewers stated that "ESET Smart Security is surprisingly light, consuming around 50MB of RAM when running" and concluded that "For getting all your security tools in one box, Smart Security is an effective and well-respected choice.".[19]
    In early 2013, Maximum PC awarded ESET Smart Security 5 a 6/10 rating and was impressed with its comparative strengths. Reviewers stated that "Things weren’t quite as bad as they were with McAfee, and ESET did a much better job at blocking polluted downloads and keeping us away from murky websites.", but concluded with "We had high hopes for ESET, but we are ultimately let down by this year’s release."[20]
    In late 2013, Maximum PC awarded ESET Smart Security 6 a 9/10 rating and was impressed with the improvements made in version 6. Reviewers were unimpressed with the user interface, stating that "There’s nothing flashy about ESET’s interface. It hasn’t been modernized for Windows 8 or touchscreen displays" although they concluded "We dinged the program last year for letting a few nasty containments through, a rare misstep for a program that’s collected a dozen straight VB100 awards from Virus Bulletin in the past two years. It fared much better in our tests this time around."[21]
    ESET products are tested and certified by organizations such as AV-Comparatives (Advanced+, Approved Corporate Product), AV-TEST, Virus Bulletin, ICSA Labs, West Coast Labs (Checkmark), CheckVir (Highest Advanced Rank), VMware (VMware Ready) and Microsoft (Windows 8 Certified).[17][16][22] ESET set a world-record when it received 80 consecutive VB100 awards from Virus Bulletin.[23]

    Products

    Main article: ESET NOD32
    Home/Home Office[24]
  6. ESET Smart Security 9
  7. ESET NOD32 Antivirus 9
  8. ESET Cyber Security Pro for Mac®
  9. ESET Cyber Security for Mac®
  10. ESET Mobile Security for Android™
  11. ESET Anti-Theft
Business Solutions[25]
  • ENDPOINT AND MOBILE SECURITY:
    • ESET Endpoint Security (OSX, Windows)
    • ESET Endpoint Antivirus (OSX, Windows)
    • ESET NOD32 Antivirus Business for Linux Desktop
    • ESET Endpoint Security for Android
  • SERVER SOLUTIONS:
    • ESET File Security For Windows Server
    • ESET File Security for Linux / BSD / Solaris
    • ESET Mail Security for Microsoft Exchange
    • ESET Mail Security for Linux / BSD / Solaris
    • ESET Mail Security for IBM Lotus Domino
    • ESET Security for Microsoft SharePoint
    • ESET Security for Kerio
    • ESET Gateway Security for Linux / BSD / Solaris
  • DATA & ACCESS PROTECTION:
    • ESET Secure Authentication
    • DESlock+ Data Encryption
  1.  

How to download hotstar videos that can't be downloaded from IDM and from other sources.

How to download hotstar videos that can't be downloaded from IDM and from other sources.
  1. First of all you need to know that you can't download full videos from hotstar via IDM.
  • So here is the trick for winows and android.
  • For windows u need to download this hotstarlivesportstraemer.zip from here-download.
  • Then open it and extract it. And goto the hotstarlivestreamer.bat  file and paste there you hotstar video page link in this.
  • Then select your desire video quality like 720 P etc.
  • 2.for android there is no trick but still you can download the copyrighted you tube videos from the trick below.
  • First of all you need to copy the video link from you tube. Then open a new tab and type ssyoutube.com and open.
  • Then paste you you tube video link there and you will see which quality you want to download the video , just select the quality and download popup dialogue will open and download your desired video.
  • I know you are thinking about UC browser that gives download option directly but this is not gives download option sometimes so this trick is helpful.
  •  
  • Hotstar is an online video streaming platform owned by Novi Digital Entertainment Private Limited, a wholly owned subsidiary of Star India Private Limited. Hotstar currently offers over 50,000 hours of TV content and movies across 8 languages, and every major sport covered live. Highly evolved video streaming technology and a high attention to quality of experience across devices and platforms, make Hotstar the most complete video destination for Over The Top (OTT) video consumers.

    A Video Experience Like No Other

    Seamless Video Playback - Our adaptive video streaming technology ensures that the best possible video quality is played back automatically based on the available bandwidth, therefore making it a great video experience on both mobile networks as well as WiFi internet connections. Our video is optimized to play on mobile networks with inconsistent throughput so that our users don’t have to compromise on their experience on the low end, and play HD quality video on the top end of bandwidth availability. Additionally, our users can manually select the quality of video that suits their taste.
    Smart Search - Content search on Hotstar has been optimized to reduce complexity and delay in accessing content. Accurate search results, with lightning fast autocomplete suggestions navigate users to video with minimal navigation friction and ease of use.
    Friendly User Interface - Content organization on Hotstar is a result of a thoughtful user experience approach and strong design principles that ensure that the user is not overwhelmed with the breadth of content available. Using a mix of algorithms and human curation, users at any stage of their interaction with Hotstar will discover content and see their experience evolve with their interaction patterns over time.
    Hot Content Catalogue - Hotstar offers the latest and popular TV, movies and knowledge-based content from India and the world. With content in 8 languages, spanning 15 TV channels, Hotstar is home to some of the longest running, and highest rated TV content in the country. Our roster of the biggest names in Indian cinema makes Hotstar the preferred destination for the biggest blockbusters from Bollywood and regional cinema.
    Originals - In our endeavour to drive meaningful engagement with our audience, Hotstar is investing in generating content keeping in mind the sentiments and attitudes of our consumers and has enjoyed great success with original programming content such as On Air with AIB, M Bole Toh, One Tip One Hand.
    Access - Hotstar is available on the Google Play Store and Apple App Store for mobile and tablet applications and can be accessed at www.hotstar.com.
     

The keyloggers for android mobile and windows pc.

The keyloggers for android mobile and windows pc.
->First of all you need to know what is keylogger : Keylogger is a just a software that monitors what you in device and saves all the keys on the device then after you can see in your device all the typed keys via keyboard entered via you or your friend.
->So we will take here the keylogger as a hacking software.
*For android users all versions.:
1.First you need to download this app called hackers keylogger link here--hackers keylogger.apk.
2.Now install and open the app and choose the keyboard as hackers keyboard by goto settings >language&input>choose keyboard>hacker keyboard.
3.Now is activated, now give you device to your friend and tell him to do some web surf that he desire. If he opens facebook or gmail or anything then you can see all the keys typed by your friend even passwords too.
4.so lets enjoy.
*For windows pc users:
1. First of all you need to download this software by link--keylogger windows.
2.It's same as android keylogger.
3. so enjoy.



A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any e-mail addresses you use and Web site URLsyou visit.
Keyloggers, as  a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spywareallowing your information to be transmitted to an unknown third party.
Safeguarding the Internet




How to set a video as a wallpaper on desktop or laptops.

How to set a video as a wallpaper on desktop or laptops.
Steps:
1. Open VLC Media Player. 
   2. Then Go to Tools > Preference Or press CTRL + P and Selecet Video from left panel
   3. Then Choose DirectX video output from output dropdown list
      as shown in below image .
 4. Save the changes ans restart VLC Media Player.
   5. Play any video you would like to set as your desktop wallpaper.
   6. Then click on Video and select DirectX Wallpaper from the dropdown list as show in below image.
  7. Now Minimize vlc player and you will see your video running on your desktop as wallpaper.
   8. If you want your default wallpaper back then uncheck DirectX Wallpaper from video dropdown list.
   9. Hope you like this simple trick share your thought about this trick in comment section.


Matrix effect on desktop.[PC]


        This is amazing notepad trick which will display matrix effect like you might have seen in movies, that is numbers flashes in green colour. Basically we will be creating a small batch file in notepad.

  • Go to Notepad and copy below codes
@echo off

color 02

:start

echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%

goto start
  • Save this file as matrix.bat 

  • Now open this file as see matrix effect on your screen.
SECOND EFFECT:

How To Create Matrix File ?

  1. Open Notepad and copy below code.

@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A

  2. Save the file as matrix.bat  (.bat is must)
  3. Done enjoy !!

In chemical analysis, matrix refers to the components of a sample other than the analyte[1] of interest. The matrix can have a considerable effect on the way the analysis is conducted and the quality of the results obtained; such effects are called matrix effects.[2] For example, the ionic strength of the solution can have an effect on the activity coefficients of the analytes.[3][4] The most common approach for accounting for matrix effects is to build a calibration curve using standard samples with known analyte concentration and which try to approximate the matrix of the sample as much as possible.[2] This is especially important for solid samples where there is a strong matrix influence.[5] In cases with complex or unknown matrices, the standard addition method can be used.[3] In this technique, the response of the sample is measured and recorded, for example, using an electrode selective for the analyte. Then, a small volume of standard solution is added and the response is measured again. Ideally, the standard addition should increase the analyte concentration by a factor of 1.5 to 3, and several additions should be averaged. The volume of standard solution should be small enough to disturb the matrix as little as possible.

HOW TO CHANGE MAC ADDRESS IN WINDOWS PC.

Technitium MAC Address Changer Screen Shot
1.FIRST OF ALL DOWNLOAD THIS SOFTWARE-DOWNLOAD
2.INSTALL THE SOFWARE.
3.CHANGE YOUR CURRENT MAC TO ANOTHER RANDOM MAC ADDRESS.

  • Static IP Assignment: Routers allow you to assign static IP addresses to your computers. When a device connects, it always receives a specific IP address if it has a matching MAC address
  • MAC Address Filtering: Networks can use MAC address filtering, only allowing devices with specific MAC addresses to connect to a network. This isn’t a great security tool because people can spoof their MAC addresses.
  • MAC Authentication: Some Internet service providers may require authentication with a MAC address and only allow a device with that MAC address to connect to the Internet. You may need to change your router or computer’s MAC address to connect.
  • Device Identification: Many airport Wi-Fi networks and other public Wi-Fi networks use a device’s MAC address to identify it. For example, an airport Wi-Fi network might offer a free 30 minutes and then ban your MAC address from receiving more Wi-Fi. Change your MAC address and you could get more Wi-Fi. (Free, limited Wi-Fi may also be tracked using browser cookies or an account system.)
  • Device Tracking: Because they’re unique, MAC addresses can be used to track you. When you walk around, your smartphone scans for nearby Wi-Fi networks and broadcasts its MAC address. A company named Renew London used trash bins in the city of London to track people’s movements around the city based on their MAC addresses. Apple’s iOS 8 will use a random MAC address each time it scans for nearby Wi-Fi networks to prevent this sort of tracking.
Bear in mind that each network interface has its own MAC address. So, on a typical laptop with both a Wi-Fi radio and a wired Ethernet port, the wireless and wired network interface each have unique, separate MAC addresses.
find-mac-addresses-with-ipconfig-all-on-windows

Windows

Most network cards will allow you to set a custom MAC address from their configuration panes in the Device Manager, although some network drivers may not support this feature.
First, open the Device Manager. On Windows 8.1, press Windows Key + X and click Device Manager. On Windows 7, press the Windows key, type “Device Manager” to search for it, and click Device Manager.
Locate the network interface you want to modify under Network Adapters, right-click it, and select Properties.
modify-network-interface-properties
Click the Advanced tab and select Network Address in the list. Your network driver doesn’t support this feature if the option isn’t here.
Enable the Value option and enter your desired MAC address without any separating characters — don’t use dashes or colons. Click OK afterward.
spoof-mac-address-on-windows

Bypass windows login security

If the audit policy is set to record logins, a successful login results in the user's user name and computer name being logged as well as the user name they are logging into.[3] Depending on the version of Windows and the method of login, the IP address may or may not be recorded. Windows 2000 Web Server, for instance, does not log IP addresses for successful logins, but Windows Server 2003 includes this capability.[4] The categories of events that can be logged are:[5]
The sheer number of loggable events means that security log analysis can be a time-consuming task.[6] Third-party utilities have been developed to help identify suspicious trends. It is also possible to filter the log using customized criteria. Logging is dangerous.

Attacks and countermeasures

Administrators are allowed to view and clear the log (there is no way to separate the rights to view and clear the log).[7] In addition, an Administrator can use Winzapper to delete specific events from the log. For this reason, once the Administrator account has been compromised, the event history as contained in the Security Log is unreliable.[8] A defense against this is to set up a remote log server with all services shut off, allowing only console access.[9]
As the log approaches its maximum size, it can either overwrite old events or stop logging new events. This makes it susceptible to attacks in which an intruder can flood the log by generating a large number of new events. A partial defense against this is to increase the maximum log size so that a greater number of events will be required to flood the log. It is possible to set the log to not overwrite old events, but as Chris Benton notes, "the only problem is that NT has a really bad habit of crashing when its logs become full".[10]
Randy Franklin Smith's Ultimate Windows Security points out that given the ability of administrators to manipulate the Security Log to cover unauthorized activity, separation of duty between operations and security-monitoring IT staff, combined with frequent backups of the log to a server accessible only to the latter, can improve security.[11]
Another way to defeat the Security Log would be for a user to log in as Administrator and change the auditing policies to stop logging the unauthorized activity he intends to carry out. The policy change itself could be logged, depending on the "audit policy change" setting, but this event could be deleted from the log using Winzapper; and from that point onward, the activity would not generate a trail in the Security Log.[5]
Microsoft notes, "It is possible to detect attempts to elude a security monitoring solution with such techniques, but it is challenging to do so because many of the same events that can occur during an attempt to cover the tracks of intrusive activity are events that occur regularly on any typical business network".[12]
As Benton points out, one way of preventing successful attacks is security through obscurity. Keeping the IT department's security systems and practices confidential helps prevent users from formulating ways to cover their tracks. If users are aware that the log is copied over to the remote log server at :00 of every hour, for instance, they may take measures to defeat that system by attacking at :10 and then deleting the relevant log events before the top of the next hour.[10]
Log manipulation is not needed for all attacks. Simply being aware of how the Security Log works can be enough to take precautions against detection. For instance, a user wanting to log in to a fellow employee's account on a corporate network might wait until after hours to gain unobserved physical access to the computer in their cubicle; surreptitiously use a hardware keylogger to obtain their password; and later log in to that user's account through Terminal Services from a Wi-Fi hotspot whose IP address cannot be traced back to the intruder.
After the log is cleared through Event Viewer, one log entry is immediately created in the freshly cleared log noting the time it was cleared and the admin who cleared it. This information can be a starting point in the investigation of the suspicious activity.
In addition to the Windows Security Log, administrators can check the Internet Connection Firewall security log for clues.

Writing false events to the log

It is theoretically possible to write false events to the log. Microsoft notes, "To be able to write to the Security log, SeAuditPrivilege is required. By default, only Local System and Network Service accounts have such privilege".[13] Microsoft Windows Internals states, "Processes that call audit system services . . . must have the SeAuditPrivilege privilege to successfully generate an audit record".[14] The Winzapper FAQ notes that it is "possible to add your own 'made up' event records to the log" but this feature was not added because it was considered "too nasty," a reference to the fact that someone with Administrator access could use such functionality to shift the blame for unauthorized activity to an innocent party.[8] Server 2003 added some API calls so that applications could register with the security event logs and write security audit entries. Specifically, the AuthzInstallSecurityEventSource function installs the specified source as a security event source.[15]

Admissibility in court

The EventTracker newsletter states that "The possibility of tampering is not enough to cause the logs to be inadmissible, there must be specific evidence of tampering in order for the logs to be considered inadmissible".[16]
>>>>
This amazing tool helps us bypass security of any windows operating system any means any including windows 10 local security lets start up.
rollinggg hacking!
STEP 1:

Download the kon boot from their website google it and purchase as i have and support the developers :)

STEP 2:

Now launch kon boot installer to see the following window. Since I will be using USB stick for this hack so attach usb before launching.
        
                

Click on install to USB stick and wait for process to be over. A command window will open up and show you the process. I didnt had time for its screen shot.
And now your USB stick is ready

STEP 3:

Use the bios or the boot menu and select USB stick to boot from on a password protect computer or whose password you want to bypass without changing it.
        

Wait for kon boot to load up
    
        
        


       Now when you see password screen just press enter or click on login. 

        
>>password is bypassed..