rss
twitter
    Find out what I'm doing, Follow Me :)

Windows 7 Image Capture Demonstration


Windows 7 Deployment

Windows 7 Image Capture Demonstration


Objectives:
 learn how to capture Windows 7 image using ImageX tool.Before you start

Prerequisites: we have to have WinPE media prepared, which includes ImageX tool which we will use to capture Windows image. Our reference computer should already be installed and ready to be captured.
Key terms: image, sysprep, capture, partition, imagex, winpe, diskpart, reference

Prepare the Reference System (Sysprep)

Before we capture our reference computer image, we should run Sysprep tool on it. Sysprep.exeprepares the Windows image for capture by cleaning up various user and computer specific settings, as well as log files. Let's say that in our case the reference installation is complete and ready to be imaged. Now we will use the sysprep command with the /generalize option to remove hardware-specific information from the Windows installation, and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. You can run the Sysprep tool from a command prompt by typing: 'c:\windows\system32\sysprep\sysprep.exe /oobe /generalize /shutdownIn'. Alternatively, if we run the Sysprep GUI in audit mode, we can use these options:
  • Enter System Out Of Box Experience (OOBE) (from the System Cleanup Action list)
  • Check the Generalize option
  • Shutdown (from the Shutdown Options list)
  • Click OK

Run WinPE

Our referenced computer is now prepared and turned off. Now we need to boot that computer using WInPE CD which we created earlier. WinPE runs from the command line. It boots the system with a limited version of Windows 7, which provides disk access and limited networking support. It has two different architectures: a 32-bit version and a 64-bit version. The version must match the intended installation version of Windows 7. Once we enter WinPE we can go to the root folder so that we can run ImageX which we copied earlier.
WinPE Root Folder
Image 185.1 - WinPE Root Folder
In WinPE we have access to our network. This is great because we can transfer images to the shared folder on our network. In our case we have a shared folder named 'shared-images' on computer named 'nx7300'. We will map a network drive to our shared folder using a net use command: 'net use z: \\nx7300\shared-images'.
Net Use Command
Image 185.2 - Net Use Command
Our shared folder is password protected, so we have to provide our credentials. Notice that we had to provide the computer name in front of our user name. If we had a domain account, we would provide a domain name instead of computer name.
Net Use Success
Image 185.3 - Net Use Completed Successfully
The shared folder is now mounted as our Z drive. Before we use ImageX command we have to see on which partition our Windows 7 installation is on. To do that we can use diskpart command.
Diskpart Command
Image 185.4 - Diskpart Command
Once in diskpart we can use a 'list disk' command.
List Disk
Image 185.5 - List Disk Command
In our case we only have one disk. Let's select it and list partitions on that disk. To select it enter the 'select disk 0' command.
Selected Disk
Image 185.6 - Selected Disk
To list partitions on disk enter the 'list partition' command.
List Partition
Image 185.7 - List Partition Command
We do that because we might have multiple disks with multiple boot partitions. We have to capture the proper image. In our case we only have one partition. In Windows 7, if we use BitLocker, we will always have at least two partitions when looking disks with diskpart. The first partition, size of 100MB would be BitLocker partition. Letters for partitions in WinPE can be different from those in regular Windows 7. While running Windows PE on a machine with BitLocker, the first logical partition is already used as drive C: (i.e., Partition 1) and does not contain the reference computer's Windows 7 installation. We can always check the content of our partitions.
Content of Windows Drive
Image 185.8 - Check Partition Content
Let's go back to our WinPE disk (x: drive) and run the ImageX command to capture our Windows 7 image. ImageX is a command line tool that creates an image from a reference computer. We will use the command 'imagex /capture c: z:\win7.wim "Win7 Image" /compress fast /verify'. The/capture means that we are capturing Windows image, c: is the drive we are capturing,z:\win7.wim will be the exported file on the z: drive that we mapped to, "Win7 Image" will be the image name, /compress fast will perform fast compression, and we will also verify the image (/verify switch).
ImageX Command
Image 185.9 - ImageX Command
ImageX Scanning
Image 185.10 - ImageX Scanning...
ImageX will first scan all files that are on our C: partition and then create an image out of all that files. Once the process is complete we will have win7.wim file which we can deploy to other computers, or which we can use to perform recovery if our computer brakes down. If we intend to transfer that image to different computer, we must run Sysprep on the reference computer before we capture the image.

Remember

If we intend to transfer captured image to different computer, we must run Sysprep on the reference computer before we capture the image. Once in WinPE, we can mount shared folder using Net Use command, which we will then use to store our captured image. Before capturing we also have to check which partition exactly contains Windows 7 installation files using diskpart command.
Commands that are mentioned in this article
Use Sysprep:
  • c:\windows\system32\sysprep\sysprep.exe /oobe /generalize /shutdown - run sysprep with the /generalize option to remove hardware-specific information from the Windows installation, and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart
Capture image using WinPE:
  • net use z: \\nx7300\shared-images - map a network drive to our shared folder using a net use command
  • diskpart - used to check on which partition our Windows 7 installation is on
  • list disk - used inside of diskpart to list all disks on our computer
  • select disk 0 - used inside of diskpart to select disk 0
  • list partition - used inside of diskpart to list all partitions on selected disk
  • imagex /capture c: z:\win7.wim "Win7 Image" /compress fast /verify - commend which we used to capture Windows 7 image to the z:\win7.wim image, with the name "Win7 Image", using fast compression. The image will be verified.
Paths that are mentioned in this article
  • c:\windows\system32\sysprep\sysprep.exe - location of the Sysprep tool
  • \\nx7300\shared-images - UNC path to our shared folder in which we stored captured image

How to Block USB Ports in Windows


How to Block USB Ports in Windows


Today in the modern world USB devices are very common among computer users. Nowadays the USB device has become the greater special quality in saving the important files and all other documents. It’s very common in the world because of it’s a movable and large disk space produced.


Either we are using a personal computer or laptop in any places it can be even in office. Computers or laptops having a possible or open USB ports on our machines can setup a computer guard threat where any person using computers can plug in a enable virus infected flash disk, outside hard drive, or any other USB competent devices. And also within our computers unlimited USB ports also can be created by an uncontrolled flow of data belonging to a corporation data or other users are enabling to act out personal.


3 Simple Ways to Disable USB Ports

I. Disabling through Registry Editor:

1. Click Start, and then click Run (or) press "windows button + R".

2. In the Run box, type regedit, and then click OK.




3. Locate, and then click the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor

4. In the right pane, double-click on Start.

5. In the Value data box, type 4, click Hexadecimal (if it is not already selected), and then click OK.

6. Quit Registry Editor.
By default the Hexadecimal value is set to 3, which means enabled. To re-enable USB ports change this value back to 3.

II. Disabling through Device Manager:

1. Click Start > RUN

2. Type “devmgmt.msc” (this will open Device Manager of Windows)
3. Under Universal Serial Bus Controller, right click and click “Disable” on all the USB drives you can see under the sub menu.
To re-enable USB ports change this to "Enable".

III. Disabling through BIOS:

1. At system startup press DEL or F2 key to open BIOS settings.

2. In BIOS, find “Advanced Settings” or “Onboard Devices” menu (this may vary due to different BIOS manufacturers)
3. Find “USB Configuration” and "Disable" USB Controllers to disable all USB ports.
To re-enable USB ports change this to "Enable"

Recover from virus infected pendrive

HOW TO RECOVER HIDDEN FILES FROM VIRUS INFECTED USB PENDRIVE


 Download File Recover Tool and Copy it in your Pendrive or Memory Card and Run the Program, it will automatically Recover your Files and Folder.

DOWNLOAD SOFTWARE 



. Or You can Read below to know how to do itManually.
Now a days all the people use USB Flash drives like Pendrive, External Hard Disk and Many more. They all skipped DVD, CD and all optical Disc because it takes time to copy and it cannot be reused. So USB Pendrives are now with all people. I used to see all over my college, they hang USB pendrive in their necks. They carry Music, Movies, Data in that. How USB flash drives improves as the mean while USB virus also increases along with that.

If you have some nasty virus on USB drive that hide all your file in the drive i.e; hides your files and folders, creates .exe file extensions of your folders and even corrupt your files. You can view these files by going to Tools>>Folder Options ..But the attributes of these files often stay unchanged even if you uncheck hidden attribute on file/folder properties.

Here i am going to tell the Permanent Solution for recovering hidden files by Command prompt in windows operating system.

STEP ONE:

Plug your USB Pendrive or External HDD or Memory Card which is Affected.

STEP TWO:

Go to Start -> Run-> Type CMD and Enter

STEP THREE:

Find the drive letter for the connected USB drive. For Example, I:
In command prompt, type I:
and Hit enter. Command Prompt will show I:/

STEP FOUR:

Then type
attrib -s -h /s /d *.*
Make sure that you put space between each elements in the code.
and hit enter and wait for few seconds.

TAKE CONTROL YOUR NETWORK

TAKE CONTROL YOUR NETWORK

Administer your network based on ARP protocol using NetCut, a classic and user friendly software. It can perform multiple tasks like listing IP-MAC table in seconds, turn the network on & off on any LAN computer or device like routers and switchers. Also in the latest version, you can also change the MAC address (spoofing) on any adapter.

netcut cut any computers net connection screenshot

With NetCut you can easily manage and track network events and protect users from ARP SPOOF based attacks with only one click! Also you can cut down any computer’s gateway network connection in no time using pure ARP protocol kernel enhanced cut off function keeping it trace free (nobody will be able to trace what happened).

Features Of Netcut :

  • Support windows 7 64 bit . The driver and Install package has been upgrade. tested working under windows 7 both 32 bit and 64 bit OS.
  • Support Clone MAC address from any PC that NetCut monitored.
  • You can cut any computers network or internet connection with NetCut
  • Automatic latest Version detect.
  • NetCut works great on many type of networks like home LAN, office LAN, school LAN or even ISP LAN.
  • Easy to use: One click to Protect user Computer Function!!! No one in the network can cut you off with ARP spoof technology anymore .
  • Effective: one Click to Cut down any computer s network connection to the gateway.
  • IYFT: Get all IP addresses of the computers in your LAN(Local Area Network) in Seconds
  • High applicability: Work in office LAN,school LAN,or even ISP LAN
  • Safe: TRACE Free, No one will TRACE out what happen.
NetCut works on Windows operating system. NetCut is provided as a free download for all software users (Freeware)

DEADLINE VIRUS MAKER NEW

DEADLINE VIRUS MAKER NEW

Everybody today wants to protect themselves from viruses, but will never miss a chance to play pranks with their friends. So, DeadLine’s Virus Maker is a tool that can make small viruses to let you play pranks with your friends. It provides you with some basic functions like infinite message box, force shutdown, infinite beeping, disabling task manager and registry editor and much more. Scroll below to see a video of DeadLine’s Virus Maker in action.
 
deadline virus maker make viruses

Features Provided By DeadLine’s Virus Maker V.1.3 :

  1. Infinite Beeping
  2. Infinite Message Boxes
  3. Disconnect From Internet
  4. Visit Random URL at Random Time
  5. Disable Firewall
  6. Disable Firefox
  7. Disable Chrome
  8. Disable IE
  9. Open Random Files
  10. Force Shutdown
  11. Disable Task Manager
  12. Disable Command Prompt
  13. Disable Registry Editor
  14. Disable Explorer
  15. Random Mouse Movements
  16. Random Keyboard Key Pressed
  17. Close Windows Live Messenger
  18. Close Skype
  19. Close Yahoo Messenger
  20. Random Things
In addition, it also gives an option to run the virus at the time of system start-up and also can display a message at the time of virus initiation.


Lock and unlock your computer with a USB drive, secret-agent style


Lock and unlock your computer with a USB drive, secret-agent style

With Predator, you can turn your USB drive into a "key" that unlocks your computer when plugged in, and locks it when it's removed.
If you prevent access to your computer with just a password, you are missing out on an alternate (and more secure) way to lock down your computer.
Predator, a free Windows program, turns your USB drive into a key that locks your computer when it's removed. To unlock your computer, you'll have to plug the USB drive back in. (Talk about having secret-agent-style security.)
Anyone who attempts to access your computer without the USB flash drive will be hit with an epic "Access Denied" message. To get started, follow this guide:
Step 1: Download and install Predator.
Step 2: Once Predator launches, plug in your USB flash drive. None of the contents of the drive will be deleted or altered in any way, so feel free to use your primary thumbdrive.
When you insert the drive, a dialog box will appear asking you to create a password. Click OK to continue.
Step 3: In the Preferences window, take note of a few key settings. First, enter a secure, unique password in the "New password" field. If you lose your USB drive, you'll use it to unlock your computer.
If you'd like, you can check the Always Required box and you'll be asked to enter the password each time you use your thumbdrive to unlock your PC.
Finally, in the section under Flash Drives, ensure that the correct USB flash drive is selected. When you're done, click "Create key" and then OK.
(Credit: Predator)
Step 4: Predator will exit. When it does, click the Predator icon in the taskbar to restart the program. A few seconds later, the icon will turn green, alerting you that Predator is running.
Every 30 seconds, Predator will check to see that your USB drive is plugged in. If it isn't, your computer will dim and lock down.
Here are some extra tips:
  • To pause Predator at any time select "Pause monitoring" from the taskbar menu.
  • If someone tried to access your PC while it was locked down, you'll see the activity log when you log back in. You can see the log at any time by clicking "View log" from the taskbar menu.
  • Predator's Web site has several cool how-tos, including one that shows you how to program your computer to take a snapshot each time someone tries and fails to log in to your computer. Check it out.
One obvious flaw comes with this setup: you'll always be down one USB port. But if you're sold on Predator, consider purchasing a USB hub to compensate.
For more tips like this, check out my story on 10 cool ways to use the USB thumbdrives you have lying around.

HIDE YOUR APPS.....

HOW TO HIDE A APPLICATION FROM ADD OR REMOVE PROGRAMMES
The Add Remove programs feature in the control panel shows us the list of all programs installed in the PC. Due to some reasons if we don’t want any particular programs to show up in the list, use the following trick to hide programs from add/ remove programs list in control panel.
The program list which is shown in Add/Remove programs is collected from registry path shown below.
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
So all we need to do is to go to that particular uninstall entry of the program and change the display name. Here I will show you an example on how to hide Yahoo Messenger from Add Remove programs list. Similarly you can do the same trick to hide programs like utorrent, Google Talk, MSN Messenger, Facebook Messenger etc.
How to hide Programs from Add/Remove Programs list.
—>Example shown below explains us how to hide  Yahoo Messenger.
  • Click Start and type Regedit.exe
regedit.exe search
  • Right click on regedit.exe and select Run as Administrator. [You’ll require admin rights to edit registry]
  • Navigate to the following location.
  • HKEY_LOCAL_MACHINE \SOFTWARE \Microsoft \Windows \CurrentVersion \Uninstall \Yahoo Messenger
  • Click on Yahoo Messenger on left pane.
  • Now you can see the options coming up for Yahoo Messenger in the right pane of registry editor.
hide-programs-control-panel
  • In the right pane, Select DisplayName.
  • Right click on DisplayName and select Rename.
  • Now change it any other value, like for example you can change it to NeverDisplayName or NoDisplayName.
After completing this trick, Yahoo Messenger program will not be shown in the Add/Remove programs list.
Similarly you can repeat the same trick to hide other programs which you want to hide from Add/Remove programs list, like Messengers, Utorrents, download managers etc. This hack for hiding programs from control panel will work on Windows Vista,Windows 7,Windows XP and Windows 8

How To Install Backtrack 5 On Virtual Machine ?

                                              

How To Install Backtrack 5 On Virtual Machine ?

Backtrack 5
If you want to experience and experiment with backtrack 5 hacking tools such as kismet, metasploit etc. Then today i am going to show you how you can install and run Backtrack 5 Operating System inside a virtual machine(VirtualBox). It works on all computers running any operating system such as Windows Xp, Windows 7, Or Mac Os X. So  lets get stared installing backtrack 5 on your operating system.


Downloading Softwares to install Backtrack on Virtual Box 

1. First you will need Virtual Machine to run Backtrack 5 which you can Download From VirtualBox Website. After downloading VirtualBox Install the program. Installing VirtualBox is really simple like any other program you install on your computer.
2. Then you will need Backtrack 5 .iso file which you can download from Here with below configuration. You can download it directly or via torrent thats your choice.
backtrack 5

Getting started installing Backtrack 5 on Virtual Box

1. Open VirtualBox and Click on New. Then a popup box will appear in that write Name as backtrack, Type as Linux and Version as Ubuntu as shown in below picture and click on Next.
Backtrack on Virtualbox
2. Next allocate memory to your virtual machine. I usually allocate half the ram i have which is 2GB of 4GB as shown below and click Next.
virtual box
3. Then choose second option Create Virtual Hard Drive Now from three options and then click on Next.
4. Then Choose VDI(Virtual Disk Image) From all the options and click Next.
5. Now to options will come to allocate size on Hard Drive from that choose Dynamically Allocated and click Next
6. Then leave name as it is and allocate the size to arround 15-20GB and click Create.
7. Now you will have your virtual machine on left. To start it double click the virtual machine. As you running it for the first time you need to configure it.
8. Navigate to the Backtrack 5 .iso file we downloaded by clicking on button i highlighted in red in below image and select it and click on start.
virtual box
9. After clicking on start click Enter and leave the setting as it is and press Enter again.
10. Now it will ask for command so type startx and press Enter and it will load user interface of backtrack.
11. Click on Install Backtrack icon from desktop and it will open installation window. Now leave language to English and click on Forward. It will now ask for location, Enter your location and press Forward.
12. On Step 3,4,5,6 you don't need to do anything just click on Forward and on step 7 Click on Install. It will take couple of minutes and you will have backtrack 5 install on your computer.
13. Now will need to enter username and password to enter backtrack, the default username for backtrack is root and password is toor. You can use passswd command to change your password.
14. Done you now have Backtrack 5 running on your virtual machine.

Blogger Buddy 1.1.0, a cool gadget for bloggers

Blogger Buddy 1.1.0

We did some tweaking to the Blogger Buddy gadget recently, mostly to re-write the code and try to account for the errors people have gotten trying to login and see their blog to post on. The new version is the same interface, but we cleaned some stuff up and made it more compatible with Windows 7.

The 1.1.0 version of the gadget includes better error handling and logging, so we can track down problems people are having and try to determine the best way to fix them. It's always tricky trying to fix remote problems that we can't replicate in the lab, so this version should be able to not only help with that, but we also fixed the view links for blogs (no more going to an odd, obscure XML page, yay!), and added in a lot of try catch code to handle individual error cases (hopefully this means that more blogs will show up for people). :)

As always, let us know if you run into problems and we'll see what we can do. And before someone suggests it, we did check out tagging for this update, though Blogger's API was being sporadic on it, so we decided to leave it out for now. We'll try to revisit it for future updates once the rest of the gadget is more stable.


How to use multiple net connections-=how to double your internet speed [connectify dispatch]


How to use multiple net connections-=how to double your internet speed [connectify dispatch]

pre requisite::t
1.working internet sources
   more than 1 of course

thats it

how to setup:
1.install dispatch and run
2.click start
3.it will detect active adapters automatically
4.select those adapters as primary whose speed u wanna combine



features:
1.if u have limited plan in some u can allot that much bandwidth
2.keep other adapters as secondary which u wana use only in case primary adapter fails
3.share combined speed as a single connection through wi-fi or lan whatever suitable

faq's:
1.how many connections u can combine :
eg: with two connections



i have tried phone+wifi+3g and it worked successfully
practically u can combine all which u have (coz practically u wont have more than 4 to 5 sources )
2.can we use two datacards simultaneously
yes of course but they should use different adapters

eg: in huawei dcs if u connect two dc u need to choose which one to use by going to
settings>diagnostics>select ur dc
:wso it detects both but runs one at a time ....
if anyone finds any solution like creating two huawei adapters and making them work that would be great
3.can we use two vpns...

yes u can ...
u should have different tap adapters(like two tap32 / one tap one hss/two hss adapter)
 and make sure second vpn is not running using connection from first vpn
else no use of combining their speed

here's simple tutorial or example
http://youtu.be/NixCBPZ_9Jw

software link in video description ....  (full versions not allowed here )

Google Chrome style Tabbed File Browsing In Windows Explorer


    Google Chrome style Tabbed File Browsing In Windows Explorer



Clover is an extension of the Windows Explorer, to add multi-tab functionality similar to Google Chrome browser
Clover 2 is a free utility which, once installed, fuse together Windows Explorer and Google Chrome so that when you open up My Computer, for example, you can see the usual Windows Explorer window, but with Chrome’s window border. Clover 2 won’t just give you tabs, you will also gonna see a complete new window appearance of the replacement Chrome/Windows Explorer mix.
It works on Windows XP, Windows Vista, Windows 7 and Windows 8, on both 32-bit and 64-bit OS editions.
The features added by Clover to our Windows explorer were just awesome. It makes our task much easier. We can just browse our computer in different tabs and we don’t need to mess up between different open explorer windows. You can also create bookmarks, as you do in Google Chrome. The bookmarks will be displayed in the bookmarks tab and they can be accessed anytime from there. Like Google Chrome, Clover also accepts shortcut keys like Ctrl+T, etc.
DOWNLOAD FROM HERE

IT WILL LOOK LIKE THIS

  • Ctrl+T: Open a new tab.
  • Ctrl+W: Close current tab.
  • Ctrl+D: Create a new bookmark.
  • Ctrl+Tab: Navigate between different tabs.
  • Ctrl+1, 2, 3: Switch to different tabs in order of the number

The Russian - Hacking Using The IP Address

The Russian - Hacking Using The IP Address



[DONT BLAME US!]

This website cannot be held responseable for the actions of its users in any way, any infomation you gain from this website is for educational purposes only. 

[IP ADDRESS]

If you want to gain acsess to a computer first you will need there ip address, i recommend you use command or cmd. If you dont no what this is stop now. To open up cmd go to start>Run>(then type cmd)and press enter.
I recommend that you use msn messenger while trying to get someones ip address, first what you do is:
>open msn messenger and sign in.
>open cmd (see above) and type in ''netstat''
>You will see a few ip addresses in the foreign address list.
>write these down or make a note of them.
>Now start sending a file to your victim using msn messenger
>After they accept the file open cmd and type in netstat again
>The ip address that is in the foregin list that wasent there before is the ip of you victim.


[TROJANS]

Now that you have your victims ip address you now need a trojan software such as sub7 this software is also known as RATS (im not listing RATS you can find them out for yourself but i will post i link at bottom of website that might help you) Once you have the software (RAT) you will need to send the victim your server, (WARNING! if you victim has a firewall or anti - virus software then you've had it cause the firwall will block you out and the anti - virus software will delete your server. but if you lucky and your victim is a idiot and has no security on there pc then just send them it and use the ip address you found to connect to them.
CMD COMMANDS]

Netstat = displays ip address connected to your computer (victims)
Ping [IP] = shows if the ip specified is real
Nbtstat -a [IP] = if this shows a list of stuff and a 20 in one of the rows then you can do stuff.