Sunday, July 27, 2008

Copy Files From Multiple Places and Paste it as per your Requirement where ever you wanted

Copy Files From Multiple Places and Paste it as per your Requirement where ever you wanted

For doing this you need a simple Software, The link is given Bellow:

PkySetup


With Piky Basket, you can reduce repetitive tasks when copying/moving files and folders in Windows. Piky Basket allows you to select files/folders in to a "basket" from different locations. Once you are done selecting, you can paste them all at once to the target folders. It also allows you to selectively paste the files to the target folder.

Piky Basket is integrated with Windows Explorer. You do not have to run Piky Basket as a separate program. It can be accessed from the menu which appears by right clicking on any files/folders in Windows Explorer.

If you didn't get it how it work just look at the screen shot Carefully...!! It will Help you out...!!



Copying And Droping content into Basket


Pasting all content To the Required Places

Saturday, July 26, 2008

Shutdown any computer in Network and File Sharing in network

Check this out Guys you can shutdown any computer in the network and also copy there content without permission This is only for Educational Purpose Don't Misuse it.....!!


The methods are :

For shutdown computer in your network:

1>First Download the netscan software it is freely available at sourceforge.net or just google it

2>scan the computer in the network with netscan it will show all the computers in the network which are present with there ip address....now look carefully there are some computer with ip address and its host name these computers are on..!!

3>now to shutdown them just right click them and select shut down there they goes...!! Voodo..!! hacker Rocks..!!


Now for Connecting to any computer which are on in the network without there permission and copying files:

1>First Download the netscan software it is freely available at sourceforge . net or just google it ,now download Putty(this is nothing but an SSH client used for connection that is known as tunneling) and now download Totalcommand software this is not free but you will get for 30 days trial...!! it is more than enough(This is just for giving command in the network for the files and all). Don't worry about the configuration and all.

Its all given in its respective Websites it is very easy because event the screen shot is also given..!!

2>scan the computer in the network with netscan it will show all the computers in the network which are present with there ip address....now look carefully there are some computer with ip address and its host name these computers are on..!!

3>Right click them and open with putty ...now you are connected to that computer

4>now right click the file you want to copy..and copy it..it is very easy..!! Voodo.!! Hacker Rocks..!!

WARNING: DON'T CROSS THE LIMIT BY SPREADING THIS INFORMATION TO ALL OF YOUR FRIENDS BECAUSE TOO MANY USE AGE CAN JAM THE NETWORK

Tuesday, July 22, 2008

Lock Windows Drive Or Hide Windows Drive

Lock Windows Drive Or Hide Windows Drive





I use this technique to Lock Or Hide my Drive You can also Follow it.

Procedure:

1>Go to control Panel
2>Then Open Administrative Tools
2>Then Open Computer Management
3>Now Expand Storage(On Left Side)
4>Now Open Disk Management
5>Now Select Which Drive you want to Lock or Hide(By Just Clicking it)
6>Now Just Right Click and Select Change Drive Letter and Paths
7>Now Select Remove Drive Letter
8>And now Just Close it normally

Now Open your My Computer It won't show that Drive....That is Totally Hidden...!! I Use this Trick In Windows XP Professional for Hiding Drives.

And for Unlocking the Locked Drive
Just Click on Add Drive instead of Remove Drive and the Drive will be back..!!

This is a bit Old trick some of the people might be knowing this..!! If not then Well and Good..!!

Thursday, July 17, 2008



RPM - The Redhat Package Manager

Article Contributed by TLDP
(For being a Hacker you should know how to work on Linux)

The Redhat Package Manager or ``RPM'' for short is a common way to distribute
precompiled binaries as well as source code, used in a few popular distributions like
Redhat, SuSE, Mandrake. The binaries are in the form of `*.rpm' files which may be
simply called rpm's.
These are manipulated by the rpm command with relevant options, some of which are
listed below.

Installing
usage: rpm -ivh Package_name
This is used to install a new rpm (package) on the system.

Uninstalling
Usage: rpm -e
Package_name
This is used to erase, ie, uninstall existing packages on the system.

Upgrading
Usage : rpm -Uvh
Package_name
This is used to upgrade an existing package or to install it if it does not already
exist.

Note: On distributions which use RPM such as Redhat and SuSE, the installer itself is
capable of taking care of dependencies. Thus when installing Linux for the first time,
in custom mode, the user can just specify what packages are needed. The installer
scripts will automatically include packages to satisfy any dependencies and prompt the