Search for notes by fellow students, in your own course and all over the country.
Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.
Title: Windows hacking 2015
Description: This book has been published for education purpose only. It does not in deem to legitimize certain steps that may be illegal under applicable law and organization policies in different parts of the world. This book does not contain any legal permission on what may be deemed as legal. Readers are advised to examine the privacy policy, organization policies and the laws of respective countries before taking their own decisions. They cannot rely on the present publication as a defence in any proceeding. The publisher and author are not liable for any steps that a reader may take based on this publication and are not responsible for any steps that may have been taken after reading the publication. Microsoft Windows and any other marks used (Pictures, Screen Shots, etc.) have been used descriptively as the marks are owned by third parties
Description: This book has been published for education purpose only. It does not in deem to legitimize certain steps that may be illegal under applicable law and organization policies in different parts of the world. This book does not contain any legal permission on what may be deemed as legal. Readers are advised to examine the privacy policy, organization policies and the laws of respective countries before taking their own decisions. They cannot rely on the present publication as a defence in any proceeding. The publisher and author are not liable for any steps that a reader may take based on this publication and are not responsible for any steps that may have been taken after reading the publication. Microsoft Windows and any other marks used (Pictures, Screen Shots, etc.) have been used descriptively as the marks are owned by third parties
Document Preview
Extracts from the notes are below, to see the PDF you'll receive please use the links above
______________________________
Windows Hacking
“Be the boss of your computer”
crack all cool stuff of windows
Works on Windows 7 and 8
_______________________________
D i s c l a i m e r
This book has been published for education purpose only
...
This book does not contain any
legal permission on what may be deemed as legal
...
They cannot rely on the present
publication as a defence in any proceeding
...
Microsoft Windows and any other marks used (Pictures, Screen Shots, etc
...
________________________________________
Content
Click the below headings for fast travel
________________________________________
CHAPTER 1 : INTRODUCTION TO HACKING
1
...
2 Hacker
1
...
4 Types of hacking attacks and techniques
1
...
1 Introduction to Windows Hacking
2
...
3 Local Group policies related hacking
Want to know: What happened in your absences on your PC?
How to Disable Shutdown, Restart, Sleep and Hibernate
How to Disable Access to the Registry in Windows 7
Prevent access to the command prompt
How to show or hide Control Panel items in Windows 7
How to Disable Control Panel in Windows 7
Disable Windows Hotkeys
2
...
5 Notepad related hacking
Dancing Keyboard Led Light Trick
Make your computer talk what you type!
Pin a drive to the taskbar
Shut-down the computer after conveying a message
Matrix Falling Code Effect
Make Your Keyboard Type (Any) Message Continuously
Continuously eject CD/DVD drives
Notepad trick to use it as a Diary
World Trade Center Notepad Trick
2
...
1 Hacking
The word “hacking” has two definitions
...
The second definition refers to modifies
computer hardware or software in a way that changes the creator’s original intent
...
Now that the world is using IT systems to gather, store and manipulate
important information there is also a need to make sure that data is secure
...
Holes are often present within security systems which, if
exploited, allow hackers to gain access to this otherwise restricted information
...
Since the Computer and Internet
became widely used in the World, We have started to hear more and more about hacking
...
2 Hacker
As the word ‘Hacking’ has two meaning, so the word ‘Hacker’ is a word that has two
meanings:
Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems
...
They love
discovering new ways to work electronically
...
Normally, Hackers are people who try to gain unauthorized access to your computer
...
Some
white hat hackers claim that they also deserve the title hacker, and that only black hats
should be called crackers
...
3 Classifications of Hacker
There are many more types of hackers in the world according to their motive and type of
work
...
White Hat hacker (Left) : Grey Hat hacker (Middle) : Black Hat hacker (Right)
White hat hacker
The term “White hat hacker” refers to an ethical hacker, or a computer security expert,
who specializes in penetration testing and in other testing methodologies to ensure the
security of an organization’s information systems
...
White-hat hackers
are also called penetration tester, sneakers, red teams, or tiger teams
...
Black hat hacker
A black hat hacker is an individual with extensive computer knowledge whose purpose is
to breach or bypass internet security
...
The general view is that, while hackers build things, crackers break
things
...
The term “black hat” comes from old westerns where the bad
guys usually wore black hats
...
They choose their targets using a two-pronged process known as the “pre-hacking stage”
...
It may relate to
whether they sometimes arguably act illegally, though in good will, or to show how they
disclose vulnerabilities
...
Elite hacker
A social status among hackers, elite is used to describe the most skilled
...
Script kiddie
A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using
pre-packaged automated tools written by others, usually with little understanding of the
underlying concept hence the term script (i
...
a prearranged plan or set of activities) kiddie
(i
...
kid, child an individual lacking knowledge and experience, immature)
...
Blue hat
A blue hat hacker is someone outside computer security consulting firms who is used to
bug test a system prior to its launch, looking for exploits so they can be closed
...
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological,
religious, or political message
...
Nation state
It refers to Intelligence agencies and cyber warfare operatives of nation states
...
Bots
Automated software tools, some freeware, available for the use of any type of hacker
...
4 Types of hacking attacks and techniques
A typical approach in a hacking attack on Internet-connected system is:
Network enumeration: Discovering information about the intended target
...
Exploitation: Attempting to compromise the system by employing the vulnerabilities
found through the vulnerability analysis
...
Security exploits
A security exploit is a prepared application that takes advantage of a known weakness
...
Other exploits would be able to be used through FTP, HTTP, PHP,
SSH, Telnet and some web-pages
...
Techniques of hacking
Vulnerability scanner
A vulnerability scanner is a tool used to quickly check computers on a network for known
weaknesses
...
These check to see which ports on
a specified computer are “open” or available to access the computer, and sometimes will
detect what program or service is listening on that port, and its version number
...
)
Password cracking
Password cracking is the process of recovering passwords from data that has been stored
in or transmitted by a computer system
...
Packet sniffer
A packet sniffer is an application that captures data packets, which can be used to capture
passwords and other data in transit over the network
...
The purpose of this is usually to fool programs, systems, or users into
revealing confidential information, such as user names and passwords, to the attacker
...
Usually, a rootkit will obscure its installation and attempt to
prevent its removal through a subversion of standard system security
...
Trojan horses
A Trojan horse is a program which seems to be doing one thing, but is actually doing
another
...
(The name refers to the horse from the Trojan War, with
conceptually similar function of deceiving defenders into bringing an intruder inside
...
Therefore, a computer virus behaves in a way similar to a
biological virus, which spreads by inserting itself into living cells
...
Worms
Like a virus, a worm is also a self-replicating program
...
Unlike a virus, it does
not need to attach itself to an existing program
...
Key loggers
A key logger is a tool designed to record (‘log’) every keystroke on an affected machine
for later retrieval
...
Some key loggers uses virus, trojan, and rootkit-like methods to remain
active and hidden
...
As an example, a business might have a key logger on
a computer used at a point of sale and data collected by the key logger could be used for
catching employee fraud
...
5 Password
A password is a secret series of characters that enables a user to access a file, computer, or
program
...
The password helps ensure that unauthorized users
do not access the computer
...
Ideally, the password should be something that nobody could guess
...
This is one reason it is relatively easy to break into most computer systems
...
It consists of at
least six characters (and the more characters, the stronger the password) that are a
combination of letters, numbers and symbols (@, #, $, %, etc
...
Passwords are
typically case-sensitive, so a strong password contains letters in both uppercase and
lowercase
...
Weak password
A weak password refers to a password that is easy to detect both by humans and by
computer
...
____________________________________
WINDOWS HACKING
____________________________________
2
...
People who engage in hacking activities
are often called hackers
...
Windows hacking is most common
among teenagers and young adults, although there are many older hackers as well
...
2 Registry Editor Related Hacking
What is Windows Registry? (Registry Editor)
Windows Registry is a database used to store information that is necessary to configure
the system for one or more users, applications and hardware devices and it keeps record of
the settings of all the Software installed in Computer including Operating System
...
HKEY_CLASSES_ROOT: The information that is stored here makes sure that the
correct program opens when you open a file by using Windows Explorer
...
The user’s folders, screen colors, and Control Panel settings are
stored here
...
HKEY_USERS: Contains all the actively loaded user profiles on the computer
...
HKEY_CURRENT_CONFIG: Contains information about the hardware profile that is
used by the local computer at system startup
...
Most hardware component
information is stored as binary data and is displayed in Registry Editor in hexadecimal
format
DWORD Value (REG_DWORD): Data represented by a number that is 4 bytes long (a
32-bit integer)
...
This data
type includes variables that are resolved when a program or service uses the data
String Value (REG_SZ): A fixed-length text string
Multi-String Value (REG_MULTI_SZ): Values that contain lists or multiple values in a
form that people can read are generally this type
...
We cannot guarantee that problems resulting from
modifications to the registry can be solved
...
Back up the registry
Before you make changes to a registry key or subkey, we recommend that you export, or
make a backup copy, of the key or sub key
...
If you make
changes that you want to undo, you can import the backupcopy
...
Open the Registry Editor by clicking the Start button, typing regedit into the
search box, and then pressing Enter
...
Locate and click the key or subkey that you want to back up
...
Click the File menu, and then click Export
...
In the Save in box, select the location where you want to save the backup copy to,
and then type a name for the backup file in the Filenamebox
...
Click Save
...
If you aren’t
logged in as an administrator, you can only change settings that apply to your user
account
...
Ultra-speed Shutdown of Windows 7
Follow the following steps to shutdown your Computer with ultra-speed
1
...
2
...
In the right pane, right click on WaitToKillServiceTimeout and click on Modify
...
Type in a number between 2000-20000 (2-20 seconds) and click on OK
...
5
...
6
...
The time to wait
for terminating services will be faster and shutdown won’t drag on forever
...
Change the log-on screen of Windows 7
1
...
2
...
Double-click the OEMBackground DWORD key and Set value of the key to 1
...
Select a background image for logon screen with size less than 256 KB and Rename
that image as BackgroundDefault
...
Copy
that
image,
Open
My
Computer
and
go
to
C:\Windows\system32\oobe\info\backgrounds folder
6
...
Tips: Cut and paste the original log-on Screen image in a folder for further use
...
Reboot, and now your logon image would have changed
...
Many companies disabled their employee’s laptop to prevent data threat
...
So, here is
the easy way to enable USB ports, access it and disable it back
...
Open the Registry Editor by clicking the Start button, typing regedit into the search
box, and then pressing Enter
...
In
left
pane
of
Registry
Editor,
go
to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR
3
...
4
...
After rebooting (restart) Windows the new settings will take effect
...
How to Display Legal Notice on Start up of your Windows
If your PC has multiple users then you can display legal notice to every user before they
login to your PC
...
Using this you can tell your friends about the do’s and don’ts in your
computer when they login in your absence
...
Click on Start button and type regedit and press Enter
2
...
On the right side pane look for legalnoticecaption, double click on it and enter the
desired Legal Notice Caption
...
Next below this look for legalnoticetext and enter the desired Legal Notice Text
...
5
...
Faster Thumbnail Previews
The taskbar shows thumbnail previews of opened windows when you hover the mouse
over the program icon
...
Make the
previews appear faster with this registry tweak:
1
...
2
...
3
...
(Be careful, as decreasing the key further may cause problems
...
After rebooting (restart) Windows the new settings will take effect
...
1
...
2
...
Change the value of NoViewContextMenu to 1
...
Now close the registry editor and restart your computer after any changes to go into
effect
...
Right click in the righthand pane; select New, then DWORD (32-bit) Value for 32 bit on Windows 7
...
Click the Start button, and type regedit in the search box
...
Browse the list as
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current
Version\Policies\Explorer
3
...
4
...
5
...
Enable Folder Options in Windows 7
Double click on the value named NoFolderOptions to set its value data to 0
...
Whenever you open a file
type with a particular program, Windows will add an entry for it to the Open with menu
...
On our
computer, we have tried to open a PDF file with Word and Notepad, neither which can
actually view the PDF itself
...
To do this, we need to remove
the registry entries for these programs
...
Enter regedit in your Start menu search or in the Run command to open the
Registry editor
...
2
...
Now, you will see a list of all the file extensions that are registered on your computer
...
Browse to the file extension you wish to edit, click the white triangle beside it to see
the subfolders, and select OpenWithList
...
...
Notice the names of the programs under the Data column on the right
...
6
...
7
...
You can go ahead and remove entries from other file types as well
if you wish
...
Restart the computer and check out the Open with menu in Explorer again
...
Add Recycle Bin to My Computer in Windows 7
To add the Recycle Bin on My Computer, follow the steps:
1
...
exe through the start menu search or run box
2
...
Now right-click and create a New Key
4
...
Close the Registry Editor and Open My Computer
...
Open up regedit
...
Go to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explor
3
...
Name the key with the following text as shown in the below figure
{26EE0668-A00A-44D7-9371-BEB064C98683}
Or
{21EC2020-3AEA-1069-A2DD-08002B30309D}
Tips:
Category View
{26EE0668-A00A-44D7-9371-BEB064C98683}
Icon View
{21EC2020-3AEA-1069-A2DD-08002B30309D}
5
...
2
...
Press Windows logo key + R to open Run
2
...
msc and press Enter
...
(Events
are stored in three log files: Application, Security, and System
...
For our purposes we want the System log
...
Click on Windows Log and then double-click on System in the left-hand column for
a list of events
...
Look for a date and time when you weren’t home and your computer should have
been off
...
Tips: You can also use this log to see how long someone was on the computer
...
How to Disable Shutdown, Restart, Sleep and Hibernate
Someday, you might want to make a computer could not be turned off easily
...
) and you have to leave the room
...
Follow these easy steps to disable Shutdown, Restart, Sleep and Hibernate:
1
...
msc in the Start menu’s search box and then press
Enter
...
2
...
In the right pane, find the Remove and Prevent Access to the shutdown, Restart,
Sleep, and Hibernate
...
4
...
Tips:
To make it back in to the normal function, just follow all the steps above, except for
the last one; you need to change back the option from Enable to Disable
...
The way
is by typing the below instructions in the search (Windows 7) and press Enter
...
This trick helps you to prevent users from accessing the Registry and making
any changes to it
...
1
...
msc into the Search box in the Start menu
2
...
Under Setting in the right panel double-click on
Prevent access to registry editing tools
...
Select the radio button next to Enabled, click OK, then close out of Group Policy
Editor
...
Now if a user tries to access the Registry, Then he will get the following message
advising they cannot access it
...
1
...
msc into the Search box in the Start menu
2
...
Under Setting in the right panel
double-click on Prevent access to the command prompt
...
Select the radio button next to Enabled, click OK, and then close out of Group
Policy Editor
...
The
...
g
...
cpl)
file name of the control panel item you wanted to show or hide however this has changed
in Windows 7 and you now need to use the Canonical Name when hiding or showing
specific items
...
Before you begin I recommend that you take a look at the below table which lists all the
Canonical names for the control panel items for Windows 7
...
Windows 7 Control Panel Canonical Names
The following canonical names are defined for Control Panel items in Windows 7
...
Control Panel Item
Canonical name
Action Center
Microsoft
...
AdministrativeTools
AutoPlay
Microsoft
...
BackupAndRestore
Biometric Devices
Microsoft
...
BitLockerDriveEncryption
Color Management
Microsoft
...
CredentialManager
Date and Time
Microsoft
...
DefaultLocation
Default Programs
Microsoft
...
DesktopGadgets
Device Manager
Microsoft
...
DevicesAndPrinters
Display
Microsoft
...
EaseOfAccessCenter
Folder Options
Microsoft
...
Fonts
Game Controllers
Microsoft
...
GetPrograms
Getting Started
Microsoft
...
HomeGroup
Indexing Options
Microsoft
...
Infrared
Internet Options
Microsoft
...
iSCSIInitiator
Keyboard
Microsoft
...
LocationAndOtherSensors
Sensors
Mouse
Microsoft
...
NetworkAndSharingCenter
Center
Notification Area Icons
Microsoft
...
OfflineFiles
Parental Controls
Microsoft
...
PenAndTouch
People Near Me
Microsoft
...
PerformanceInformationAndTools
Personalization
Microsoft
...
PhoneAndModem
Power Options
Microsoft
...
ProgramsAndFeatures
Recovery
Microsoft
...
RegionAndLanguage
RemoteApp
and Microsoft
...
ScannersAndCameras
Sound
Microsoft
...
SpeechRecognition
Sync Center
Microsoft
...
System
Tablet PC Settings
Microsoft
...
TaskbarAndStartMenu
Text to Speech
Microsoft
...
Troubleshooting
User Accounts
Microsoft
...
WindowsAnytimeUpgrade
Windows CardSpace
Microsoft
...
WindowsDefender
Windows Firewall
Microsoft
...
MobilityCenter
Windows SideShow
Microsoft
...
WindowsUpdate
To hide Control Panel items in Windows 7, do the followings:
1
...
msc into the Search box in the Start menu
2
...
Under Setting in
the right panel double-click on Hide specified Control Panel items
...
Select the radio button next to Enabled, Click Show button
...
Then Show Content dialog-box will appear
...
For example: If i want to hide Action Center, then I will type Microsoft
...
5
...
Note: In this example we are only going to hide the control panel items we want to see
(white list) however if you use the Show specified Control Panel items policy setting you
can black list only the items you don’t want listed
...
1
...
msc into the Search box in the Start menu
2
...
In the
right column double-click on Prohibit access to the Control Panel
...
Select the radio button next to Enabled, click OK, and then close out of Group
Policy Editor
...
After the Control Panel is disabled, you’ll notice it’s no longer listed in the Start
Menu
...
If the user tries to type Control Panel into the Search box in the Start menu, they will
get the following message indicating it’s restricted
...
Click Start button, type gpedit
...
Local Group Policy editor window will open
...
Navigate to User Configuration > Administrative Templates > Windows
Components and then select Windows Explorer in the left column of the
LocalGroup Policy editor
...
Double-click Turn off Windows+X Hotkeys in the Settings section of the Group
Policy editor
...
Select Enable and then click OK to save the changes
...
4 Shortcuts Related Hacking
One Click Shutdown / Restart / LogOff / Sleep / Hibernate – (Creating a Shortcut)
Windows operating System has come with a remote shutdown tool to shut down and
restart Windows
...
1
...
Type shutdown
...
Click Next, give a name to the shortcut, e
...
Shut Down Computer, and click
Finish
...
Double-click the shortcut to instantly shut down the system
...
To
Type the Following code in the
location field of Create Shortcut
dialog-box
Shutdown shutdown
...
exe -r -t 00
Logoff
shutdown
...
exe
PowrProf
...
exe
powrprof
...
You may have noticed
that, we can’t open My Computer directly from Windows 7 Taskbar
...
Windows explorer opens libraries which irritates me and quite a lot of
users
...
1
...
In location of the item enter the following string exactly as given below:
%SystemRoot%\explorer
...
Click Next and give a name to shortcut
...
Click Finish
...
A new shortcut of My Computer placed on desktop
...
You can change its icon if you wish
...
To pin the shortcut to Windows 7 Taskbar, just right click on it and select Pin to
Taskbar
...
Your direct shortcut to My Computer is pinned on taskbar now
...
Here’s
another way to do it with a single mouse click
...
Right-click on your desktop and select New>Shortcut
...
In Type the location of the item field, type rundll32
...
dll,LockWorkStation
...
Click Next, name the shortcut Quick Lock, and Finish
...
If you wish, you can make it look pretty by giving it a lock or keys icon: Right-click,
selectProperties, click ChangeIcon, enter shell32
...
Click OK
...
Drag this shortcut and pin it to the taskbar, after which you can delete the desktop
shortcut
...
Right Click on your desktop and Click on New and Click on Shortcut from the list
...
Type the below code in the location field as shown in below figure
rundll32
...
dll,Control_RunDLL hotplug
...
Now click on Next
4
...
5
...
2
...
Open Notepad and type below codes into it
...
CreateObject(“WScript
...
sleep 100
wshshell
...
sendkeys “{NUMLOCK}”
wshshell
...
Click File (from the Menu bar)and Save as the notepad file as anything
...
vbs is
must)
3
...
Tips: How to stop this?
1
...
3
...
First open Task Manager by pressing Ctrl +Alt +Delete
Then go to Processes tab
...
exe
Click on End Process
...
There is no requirement of any software
...
1
...
Dim message, sapi
message=InputBox(“What do you want me to say?”,“TALKING COMPUTER”)
Set sapi=CreateObject(“sapi
...
Speak message
2
...
vbs
3
...
4
...
Pin a drive to the taskbar
1
...
Tips: You will need to leave notepad blank
...
Navigate to your desktop
...
*), type in a
name you want for this (ex: Drive C
...
exe file extension at the end, and
click on the Save button
...
Close Notepad
...
Right click on the saved
...
exe), and click on
Pin to Taskbar
...
Right click on the pinned
...
exe file (ex:
Drive C
...
6
...
In the Target field, change it to be the
drive letter path (ex: C:\ ) that you want the pinned icon on the taskbar to open
...
(Just Looks Like the below image)
7
...
8
...
9
...
exe file on your desktop (ex: Drive C
...
Tips: To Unpin Drive from Taskbar: Right click on the pinned drive icon on the taskbar,
and click on Unpin this program from taskbar
...
In order to create the Shutdown file, follow the below
mentioned steps:
1
...
2
...
shutdown -c “Hello the computer is shutting down! Bye” -s
3
...
5
...
Click File (from Menu bar) and Select Save as
...
In the File name field type shutdownmsg
...
Double Click the batch file on desktop to execute the batch file
...
bat extension
...
The Computer shuts down the computer forcefully
...
Type the code given below in Notepad and save the file as
“Matrix
...
bat (File Extension must be
...
Upon running the bat file, you
will see the “Matrix falling code” effect
...
Open Notepad, type
the code given below and save the file as keyboard
...
vbs (File Extension
must be
...
Set wshShell = wscript
...
Shell”)
do
wscript
...
sendkeys “This is a Virus
...
”
loop
Tips: If you will open the VBS file then you might need to restart your computer to stop
this
...
If you put them back in, it will pop them out again
...
vbs or anything
...
vbs)
Set oWMP = CreateObject(“WMPlayer
...
7”)
Set colCDROMs = oWMP
...
Count>= 1 then
For i = 0 to colCDROMs
...
Item(i)
...
Count - 1
colCDROMs
...
Eject
Next
End If
wscript
...
Notepad trick to use it as a Diary
1
...
3
...
Open Notepad
...
LOG
Save the file as LOG
...
World Trade Center Notepad Trick
1
...
3
...
Open Notepad
...
2
...
Press Windows logo key + R to open Run
2
...
The System Configuration window appears
...
Go to Boot tab and change Timeout to 5 sec from 30
...
Remove Unwanted Startup Programs
1
...
3
...
Press Windows logo key + R to open Run
Type msconfig and press Enter
...
Go to Services or Startup tab
...
Then
click OK
...
Go to Start > All Programs > Accessories > System Tools > Disk Defragment
2
...
If you want to select all disks, then hold Ctrl key and click the
disks
...
Click Analyze disks and after analyzing is over click on Defragment disks
...
Press Windows logo key + R to open Run
2
...
Now the folder of temporary files will be open
...
Select all files by pressing Ctrl + A, press Delete and then Enter (You may press
Shift + Delete to delete those files permanently)
Tips: If a popup window (File In Use windows) opens, then Skip those items
...
Press Windows logo key + R to open Run
2
...
Now the folder of recent files will be open
...
Select all files by pressing Ctrl + A, press Delete and then Enter (You may press
Shift + Delete to delete those files permanently)
Scan disk regularly for fix issues
1
...
2
...
A popup menu will be open
...
3
...
Then click
Start
...
, then scan those disks also
...
It features many visual effects that draw heavy on
your graphics card and system memory
...
1
...
2
...
Click on System and then click on Advanced system settings from the left hand
pane
...
On Advance tab, under Performance Click Settings
5
...
6
...
Tips: If you would like to retain a nice interface, select Custom and check Use visual
styles on windows and buttons
...
God Mode, however, while not being particularly
godlike, does offer an easier way to access everything you could want from a single folder
...
Create a New folder and rename it to GodMode
...
The extension, {ED7BA470-8E54-465E-825C-99712043E01C}, must be entered
exactly as it is here, though, including the curly brackets
...
Double-clicking the GodMode will display shortcuts to functions in the Action
Centre, the Network and Sharing Centre, Power options, troubleshooting tools, user
accounts and others - more than 260 options in total
...
Tips:
To create
Create a New Folder and Rename the folder as the
below codes
GodMode
GodMode
...
{645FF040-5081-101B-9F0800AA002F954E}
My
Computer
My
Computer
...
{7007ACC7-3202-11D1AAD2-00805FC1270E}
User
Accounts
User
Accounts
...
{031E4825-7B94-4dc3-B131E946B44C8DD5}
Unlock Hidden Themes in Windows 7
1
...
2
...
If you are in Large icon/Small icon view: Click on Folder Options
4
...
6
...
8
...
Click on Show hidden files, folders and drives
Then uncheck the box Hide protected operating system files(Recommended)
...
Click OK
...
10
...
These are the
country codes in which these themes are automatically available
...
Inside each MCT-XX (where XX will be AU, CA etc
...
Open it and Double-click on the theme file to unlock it
...
Once you unlocked the theme will be available to you in personalization option
...
1
...
Select the Shortcut tab, click in Shortcut key and enter a key to set the keyboard
shortcut for that program
...
Click OK
...
Create a New folder on the desktop
...
Select to rename it, delete the default New folder title
...
Press and hold Alt then 0160 (press the numbers from Number pad which is
locatedon the right hand side of the keyboard), release the Alt key and then press
Enter
...
(Make sure Num Lock is ON)
Tips: Desktops must use the number keys on the right of the keyboard and not above
the letters
...
” These are over
the letters m, j, o, m
...
Holding the Alt and
typing those numbers will name the folder as a space, pretty much giving it no name
...
4
...
Select Properties, then Customize tab, and then
Change icon
...
If you scroll through the provided icons, you will see a certain area that seems a few
icons are simply missing
...
6
...
7
...
Please remember that this is not a secured file, just invisible to the eyes
...
This
also works on the desktop
...
Open Command Prompt with right click
If you don’t already have a quick launch icon or a hotkey set to open a command prompt,
there’s really quick trick that you can do on any Windows 7 computer to open up a
command prompt without having to navigate the menu
...
Hold down the Shift key and right-click on the desktop
...
Choose Open Command Window Here from the menu
...
Hold down the Shift key and right-click on any folder
...
Choose Open Command Window Here form the menu
...
Open the folder that you want to open with Command Prompt
...
Right-click on inside the folder and choose Open Command Window Here
form the menu
...
By this simple process you
can easily change your Windows 7 password without knowing current password
...
Click on Start>All Programs>Accessories
2
...
3
...
net user Account Name Your New Password
Example of Reset password on Command Prompt : In the above picture SRB is the
Account Name and 123456 is the new password
5
...
6
...
Tips: Remember the new password, don’t forget it
...
Just follow the steps –
1
...
2
...
OR In Large/Small icons View: Click Programs and features > Click Turn
Windows features on or off on the left side of the window
...
Then Windows Features window will open
...
Put tick mark in Telnet Client and Telnet Server like the above image
...
5
...
Type telnet towel
...
nl and press Enter
...
Set your Shutdown Button / Power button
If you restart your computer more often than you shut it down, change the default
Shutdown power button to Restart
...
Shutdown button changes to Restart button
Use Check Boxes in Windows Explorer
You can select non-adjacent files in Explorer using Ctrl-click, but there is an easier way
using check boxes
...
Open MyComputer, click Tool, then select Folder options from the File menu
...
Click on the View tab, under Advanced Settings, scroll down to select Use check
boxes to select items
...
Click OK
...
Use Pen drive to fast your computer (Boost performance with ReadyBoost)
Windows 7 has a feature called ReadyBoost which enables its users to use their pen
drives as temporary RAM for their systems
...
Instructions to do this are given
below:
1
...
3
...
Insert a Pen Drive/USB drive in the USB port
...
Right-click on the icon of the newly inserted USB drive and select Properties
...
5
...
Alternatively
you can dedicate any specified amount of space from the pen drive for ReadyBoost
...
6
...
More Info: When ReadyBoost is enabled a file named ReadyBoost
...
This file is compressed and encrypted so that even if anyone steals the pen drive, the thief
cannot read data the pen drive contains
...
Don’t save any data files on the flash drive when it is being used as
ReadyBoost device
...
Right-click on your USBdrive
in My Computer, select Turn on BitLocker and follow the instructions to protect
sensitive data on your thumb drives
...
You can even use the
drive on older computers running Windows XP/Vista
...
Your Windows 7 installation disc also serves as a recovery disc
...
Click Start, type recdisc
...
Insert a blank CD/DVD in
your CD/DVD drive, and click Create Disc
...
You can invert your window
screen and can impress your friends; this is one of the scariest tricks which turn Windows
upside down
...
Ctrl + Alt + Left arrow Rotate by 90 degree
...
key
Tips: If the keyboard shortcut doesn’t work, then follow the below steps
1
...
2
...
3
...
If the changes are acceptable, click Keep
changes from the confirmation pop-up window
...
Click OK to close the Display Settings window
...
You might want to disable error
reporting for privacy concerns, if you’re not connected to the Internet all the time, or
maybe just to stop being annoyed by the alerts
...
To disable error reporting in Windows 7:
1
...
2
...
3
...
4
...
5
...
6
...
7
...
8
...
Close the Action Center window and it’s done
...
Process - 1
1
...
2
...
Press Enter
...
This will show the time when you last rebooted the computer
...
Tips: To know the date of installation of Windows on your PC –Type systeminfo | find /I
“install date”
Process – 2
1
...
2
...
Make a Private Folder – no-one can enter, copy, cut, delete Private Folder
To make Private folder which nobody can open, delete, see properties, rename
...
Follow the steps to make a Private Folder:
1
...
In this example I rename the folder to
Secret
...
Press Windows logo key + R to open Run
3
...
exe
4
...
Then type cacls secret /E /P everyone:n and Press Enter to Lock the Secret folder
...
To unlock the Secret folder type cacls secret /E /P everyone:f and Press Enter
...
I know you
guys are eager to know that, so here it is
...
2
...
4
...
Go to View > Read out Loud > Activate Read Out Loud
...
Swap Mouse Right & Left Click
1
...
2
...
3
...
4
...
5
...
Enable / Disable Automatic Updates in Windows 7
1
...
2
...
3
...
4
...
In order to have the same behavior for Recommended updates also tick the Give me
recommended updates the same way I receive important updates check box
...
You can also choose if you want to allow anyone to install updates by selecting the
Allow all users to install updates on this computer check box
...
Click OK to save the settings
...
Note: Microsoft recommends that you must keep your windows up-to-date in order to
remain secure
...
Change Your Computer Name in Windows 7
If you’ve ever bought a new computer with the operating system already installed, you
might be annoyed by the default name of the computer when you start trying to connect
different computers together
...
1
...
Then a window opens as
shown in the below image
...
Click on Advanced System Settings on the left menu
...
Now System Properties dialog-box opens as shown in the below image
...
Click on Computer Name tab and click on Change button on the right-low side
...
Enter a name in Computer name field
...
Click OK
...
Steganography – Hide a text behind an image
Steganography is the art and science of hiding messages
...
The word steganography is derived from the Greek words “steganos” and “graphein”,
which mean “covered” and “writing
...
Historical steganography involved techniques such as disappearing ink or microdots
...
It is fairly easy to hide a
secret message in a graphic file without obviously altering the visible appearance of that
file
...
1
...
Select an image to be used for hiding file behind the image
...
Now select a file to hide behind the image and make it in
...
4
...
5
...
cd desktop
Copy /b imagename
...
rar finalnameofimage
...
Then press Enter the file will be created with the file final file name of the image
...
Disable delete confirmation dialog box
The delete confirmation dialog box appears every time you give the command of deleting
a file
...
This delete confirmation dialog box will really bother you at such
times and you would want to get rid of it as it takes up a lot of your time while you are
deleting numerous files
...
As you
disable delete confirmation dialog box in Windows 7, you will be able to save a lot of your
time
...
You should turn it back on after you are done with
your cleaning up of the computer
...
Right-click on the Recycle Bin icon on the desktop
2
...
The Recycle Bin Properties dialog box will appear
...
Uncheck the Display delete confirmation dialog box at the bottom
...
Click on the Apply and then the OK button
...
The
method to turn it on again is very simple too
...
Minimize quickly with shake
Using Shake, you can quickly minimize all open windows on the desktop except the one
you want to focus on
...
To restore the minimized windows, shake the open window again
...
Using Snap, you can quickly align windows at the side of the desktop, expand them
vertically to the entire height of the screen, or maximize them to completely fill the
desktop
...
Snap to top of the desktop
To use Snap, drag the title bar of an open window to either side of the desktop to align it
there, or drag it to the top of the desktop to maximize the window
...
Drag a window to the top of the desktop to expand it to full of the screen
Aero Peek
You can use Aero Peek features to quickly preview the desktop without minimizing all
your windows, or preview an open window by pointing at its icon on the taskbar
...
In addition to clicking the Show desktop button to get to the desktop, you can temporarily
view or peek at the desktop by just pointing your mouse at the Show desktop button
...
To make the windows reappear, move the mouse
away from the Show desktop button
...
Peek at an open file on the desktop
You can also use Aero Peek to take a quick look at other open windows without clicking
away from the window you are currently working on
...
Thumbnail
previews of any open files associated with that program appear above the taskbar
...
To open the window
you’re previewing, click the thumbnail
...
Here are your choices:
Always combine, hide labels
This is the default setting
...
A single icon represents both a program and open items
Combine when taskbar is full
This setting shows each item as an individual, labeled icon
...
Clicking the icon displays a list of the items that are open
...
Individually labeled icons combine when the taskbar is full
Never combine
This setting is similar to Combine when taskbar is full, except icons never
collapse into a single icon, regardless of how many windows are open
...
Individually labeled icons always appear
To change how programs and icons appear on the taskbar
1
...
2
...
To use small icons, select the Use small icons check box
...
4
...
Pin any item to the Windows 7 taskbar
You can pin your favorite applications or files so that you could open them quickly from
any window at any time
...
To pin a program shortcut to the taskbar, do one of the following:
If the program is already running, right-click the program’s button on the taskbar (or
drag the button toward the desktop) to open the program’s Jump List, and then click
Pin this program to taskbar
...
You can also pin a program by dragging the program’s shortcut from the Desktop or
Start menu to the taskbar
...
Open the Control Panel and right-click its taskbar icon to pin it to the taskbar
...
Windows 7 Taskbar icons appears in the center of the taskbar
Everything that comes out of the box by default lacks the ability to re-adjust
...
Also, by default the icons will always be aligned to
the left, what if you want to make them align to the center or even right?
Center align icons on taskbar
1
...
2
...
Go to Toolbars>Newtoolbar (by using right-click on taskbar)
4
...
(Hint: New empty folder)
5
...
6
...
7
...
8
...
Access Jump Lists with the Left Mouse Button
Jump Lists usually show up when you right-click on a taskbar icon
...
If you’re using a
laptop touchpad or a touch screen, this is convenient because you do not have to click any
button to access a context menu
...
Click OK
...
To add a
folder, navigate to it in Explorer, right-click Favorites in the left navigation pane, and
select Add current location to Favorites
...
Get Exact Colors on Your Screen
If you are an artist or you work with colors, use the Calibrate Color option in the Control
Panel Display applet or run dccw
...
Then Display
Color Calibration window appears
...
Tips: You can adjust gamma, brightness, contrast, and color balance, ensuring that colors
are displayed correctly on your screen
...
Run
cttune
...
Choose your options and Finish
...
Simply Shift + Right-click on
any program shortcut to run it as a different user, if for example you need higher privileges
when logged in with your child’s account
...
cpl
Add Hardware (Device hdwwiz
...
cpl
Administrative Tools
control admintools
Automatic Updates
wuaucpl
...
msc
Date and Time Properties
timedate
...
msc
Disk Cleanup
cleanmgr
Disk Defragmenter
dfrg
...
msc
Partition manager
diskpart
Display Properties
control desktop
Event Viewer
Eventvwr
...
IExpress
Cab)
Internet Properties
IPConfig
configuration)
inetcpl
...
msc
Logout
logoff
Microsoft Chat
winchat
Minesweeper (game)
winmine
Properties of the mouse
control mouse
Network Connections
Network
wizard
control NetConnect
configuration netsetup
...
msc
Monitor performance (2)
Perfmon
Power Options
powercfg
...
cpl
Options
Registry Editor
regedit
Remote desktop connection Mstsc
Scheduled Tasks
control schedtasks
Security Center
wscui
...
msc
Turn off windows
shutdown
Sounds and Audio Devices mmsys
...
cpl
System Information
Dxdiag
Task Manager
taskmgr
Telnet client
telnet
User Accounts
nusrmgr
...
Keystroke loggers record every single keystroke you type on
your computer; this includes your private email messages, your bank account password,
and your credit card number
...
1
...
3
...
5
...
Update your computer to latest Operating System (e
...
Windows 7 or 8)
Update Microsoft Windows regularly
...
Use antivirus software or internet security to protect your computer from virus
...
g
...
)
6
...
Some ‘hijack’ your web browser and redirects you to their website
...
to your computer so
hackers can take control of your computer later
...
Keep your software up-to-date
...
g
...
,)
8
...
__________________________________________________
Please mention your valuable ratings and review on Amazon
___________________________________
Thanks for reading
Email : justsrb
...
com
Editor : S
...
Behera
__________________________________
***
Title: Windows hacking 2015
Description: This book has been published for education purpose only. It does not in deem to legitimize certain steps that may be illegal under applicable law and organization policies in different parts of the world. This book does not contain any legal permission on what may be deemed as legal. Readers are advised to examine the privacy policy, organization policies and the laws of respective countries before taking their own decisions. They cannot rely on the present publication as a defence in any proceeding. The publisher and author are not liable for any steps that a reader may take based on this publication and are not responsible for any steps that may have been taken after reading the publication. Microsoft Windows and any other marks used (Pictures, Screen Shots, etc.) have been used descriptively as the marks are owned by third parties
Description: This book has been published for education purpose only. It does not in deem to legitimize certain steps that may be illegal under applicable law and organization policies in different parts of the world. This book does not contain any legal permission on what may be deemed as legal. Readers are advised to examine the privacy policy, organization policies and the laws of respective countries before taking their own decisions. They cannot rely on the present publication as a defence in any proceeding. The publisher and author are not liable for any steps that a reader may take based on this publication and are not responsible for any steps that may have been taken after reading the publication. Microsoft Windows and any other marks used (Pictures, Screen Shots, etc.) have been used descriptively as the marks are owned by third parties