Thursday, August 8, 2013



* Windows 7-style Start menu with Windows 8 enhancements
* Search for Windows 8-style (Modern UI) apps
* Pin desktop and Metro apps to the start menu
* Jump List support
* Unified Search for apps, settings and files
* Boot directly to the Windows 8 desktop
* One click access to shut down, devices, music, documents, and videos


* Configurable Start menu size
* Windows 8 Start screen accessible from the Start menu
* Clean, streamlined UI enhances Start8's usability


* Optionally disable the desktop Windows 8 "hot spots"

* Supports WindowFX 5.1 start menu animations




Tuesday, August 6, 2013

How to Crack a Wpa2-Psk Password with Windows


It,s very common question on the internet to How to hack a Facebook account password and how to hack a WiFi password. Even if you search on YouTube you will find a lots of tutorial to How to hack a WiFi password using backtrack. However, backtrack OS is not most handy OS for normal users. yesterday my one Facebook friend Lovito Tsuqu Kiho ask me to how to hack WiFi using commview using aircrack-ng.
Today i am going to show you how to a crack a Wp2-psk password with windows machine.
Software Requirement for this lab :-

1. CommView for Wifi Download)
2. Elcomsoft Wireless Security Auditor (Download)

Presently i am connected with my own wifi network Virusfound and i want to hack the password of Ultimate that is secured with Wpa2-psk encryption.

First you need to be capture the Wpa2, four-way handsake with CommView.
Open commView and click on the Start option

then click on the capture option to start the capture

now it will show you all available AP, Now click on the Tools > Select the Node Reassoication option

now select your target AP in the Send a deauthentication request from this AP option. it will show you all available client option.

now click on the Send Now option to send the packet for 4-way authentication. wait for some time so it will capture the packet.

now click on the Save option and choose your file format Commview Capture Files (*.ncf)

you capture work is done.

Now open Elcomsoft Wireless Security Auditor to crack your wifi password.
Click on the Import Data tab > select the Import CommViewLog option.

now it will show you information about AP and Multiple Handshake selection information. Click on Ok.

now click on the Start attack option and select the Dictionary Attack option. However you have other attack options are also available.

now within minutes it will found your password and it will show you the password.

Enjoy Wifi Hacking with Windows machinism.

How to Protect USB Flash Drive from Viruses


USB Flash Drives are now the most popular data transfer facility since it enables fast transmission and file sharing from computer to another. Although using USB flash drives may take down your computer with Viruses infection and you may be a victim of this vulnerability. The USB flash drives can be easily infected with viruses (especially Autorun.inf viruses, trojans, Rats...) and you can't do anything with that problem, so I'm writing this article about How you can Protect your USB Flash Drive from Viruses and make your computer more Secure when using those USB keys.

How your USB Flash Drive is Infected?

While using the USB flash drive to transfer data between computers, it may catch different types of viruses like Trojans, Rats, Worms, Autorun.inf... you cannot see how & when the virus is copied to USB flash drive,  because it works & spread silently. So when it's connected to an Infected PC the virus is directly transmitted to the USB, then the virus will do one of the following infection methods:

1)The virus creates 2 Files:  Autorun.inf & Worms Viruses
  • Autorun.inf : It auto-executes the virus simply when you double-click the USB drive in your computer.
  • Virus.exe or : This is the virus which will be executed by the Autorun.inf, it's always a .Exe .Com or .Pif file, so it will be executed as a normal file.
2)The virus will infect any Files in the USB:  Rats & Trojans
  • The virus will start exploring and running through all the Files existing in the USB flash drive and start infecting them with itself ( binding the files ), and after you try to open any of the programs in your flash drive, your computer will get infected by the virus and it will starts the destruction.

How to Protect USB Flash Drive from Viruses

1) Using USB Flash Drive Antivirus

If you are suffering from the above 2 types of infections, then you can apply the following 3 Tricks to Protect your USB & Computer from malware, spyware or any other infections.

You can install one of the best USB Antivirus protection software to protect your computer from different attacks. When you plugin the Flash it starts analyzing all it folders and sub-folders for common types of possible attacks.

     Top USB Flash Drive Antivirus:

2) Scan for USB Viruses Manually using CMD 

You can also manually scan for Autorun.inf using the Command Prompt from Windows, by this method you can search for Autorun.inf and delete it to protect your USB drive. Here's how you can do it:

  1. Press Windows + R and type CMD to open the command prompt.
  2. Now type your USB drive letter (you can find it on Computer) followed by Autorun.inf example: F:\Autorun.inf
  3. Press Enter , if a new Notepad window is opened then you have to proceed to step 4, else your USB is not infected.
  4. If you found an Autorun in step3 then type the following command: del /a/f/s F:\Autorun.inf and replace F:\ with your drive letter/

3) Write Protect USB Drive

With this method you can protect your USB drive from writing, means that no one can copy files to it even viruses cannot make changes to your flash drive. And you can only read files easily. Here's the top software to use to Write Protect USB Drive:

How to Protect Your Registry from Viruses


The Registry of Windows is a sort of internal database that stores all programs configurations and options. Since Windows doesn't prompt users of any new entry added to the Registry, it's easy that some malicious programs can tweak up your registry just to infect your computer (for example by adding a new entry to launch the virus on every Windows startup). To protect your registry from those harmful attacks, you need to monitor unwanted actions imported to the registry on every new program setup, run or modification, to do so by ourselves is almost impossible since the Registry contains millions of entries. In this article I'm going to show you 2 Ways to Protect your Computer from Registry malwares/viruses

1. Registry Alert

Registry Alert is the best free easy & Reliable Registry monitoring tool, it allows users to protect their computer's sensible database (reg) from different malicious programs. Once installed, it will be running reduced and in stealth mode. Whenever a new program (malicious or not) demands access to registry, the program will prompt you with a Yes or No buttons to allow or not the program to access and modify your registry. If it's a trustworthy program and it was ran by you then simply click Allow to enable registry access.

2. Monitor Registry Changes Software

Monitor Registry Changes software is a little different from the above monitor and listener tool Registry Alert. This software is no doubt a registry monitor but works in a different way, it takes a snapshot (current image of the registry) and starts listening for any new entries and - in realtime - comparing the current registry to the old created snapshot, if a difference is found then it will lists it. Another feature of this software is that you can monitor (listening) on a specific branch (example: HKLM only or HKLM/Software/Microsoft ) what will make it easy to find any suspicious access.

Hacking PC with IP

Generally Hacking is the term that refers to gaining access to someone's Computer without permissions or interest. Although Hacking is not very hard as everybody imagines, today's hackers are not wasting all their time to learn How to Hack, but some Internet websites will Learn you How to Hack anything . Okay this tutorial will teach you How to Hack anyone's Computer with just using his IP Address...

What you'll need :

*IP address of the Victim.

*Telnet : It's Built-in Windows command.You can add it by going Control Panel > Add Remove Programs > Add Windows Components

Advanced Port Scanner You can download it from HERE

Remember, IP Address can be Retrieved by chatting on Facebook, Skype, Windows Live Messenger and more...

How to Hack a Computer with Only IP Address

1) Prepare the IP address of the Victim. (e.g : )

2) Download and Install Advanced Port Scanner.

3) Open Advanced Port Scanner
 and Type the IP Address in the right column and Click Scan.

4) It will lists you all Opened Ports of the Victim's PC or Router. (e.g : Port 91 )

5) After retrieving the IP address and the Opened Ports of the Victim, Open Command Prompt (CMD)

and Type: telnet [IP ADDRESS] [PORT]

e.g : telnet 91

6) Now you'll be asked to Enter Login Information, Just type Username and Password and hit Enter.
If no password is used just type the Username.

Done! Now you'll get access to all Victim's Files and Documents by browsing with CMD (use cd, copy, delete, mv... to do all tricks.