rss
twitter
    Find out what I'm doing, Follow Me :)
Showing posts with label HACKS. Show all posts
Showing posts with label HACKS. Show all posts

How to Reveal Hidden Passwords (Asterisks) in Web Browsers

How to Reveal Hidden Passwords (Asterisks) in Web Browsers


see+the+passwords+behind+astericks+or+dots
Remember the situation, signing into your account with just a single click because browser is saving all your passwords for you. We know this is convenient but since you’re not typing your passwords any-more, eventually you’ll forget your password in a few days.  For security reasons, the password field in all browsers is masked with “asterisks” which won’t allow any third person (even you) to read the origi-nal typed password. But, what if you want to reveal the string behind the asterisks? There is actually few workaround for revealing the original passwords behind the asterisk and over the entire course of this article we’ll be discussing some known ways to reveal the characters behind the asterisks in different browsers.

Reveal Passwords Behind Asterisks or Dots in Different Web Browsers:

Google Chrome:

Starting off with Google chrome, the easiest way to reveal the original passwords behind the asterisk is using inbuilt Inspect element feature in the browser.
  • You just need to right click on the password field in the browser where you will get an option "Inspect Element". 
  • After clicking on it, "Web Inspector" will open out and there you can see some code which is basically Html code and you just need to replace the "password" word with "text" word and it will reveal the words behind the asterisks.
gmail+login+via+google+chrome
inspect+element+in+google+chrome

There’s another way using JavaScript which is quite quick and easy as compared to above method. Just open a site that allows users to login and after typing the password, just enter the following JavaScript code in the address bar.
Javascript: alert(document.getElementById('Passwd').value);
After entering the above code in the address bar, press enter and it will pop up a window with your password written on it.
reveal+passwords+with+javascript+in+google+chrome

Mozilla Firefox:

The Next most common browser is "Mozilla Firefox".
  • The chrome's "Web Inspector" trick is also applicable in Firefox.
  •  Open a site that asks for login (like Facebook), right click on the password field in the browser where you will get an option "Inspect Element". After clicking on it, "Web Inspector" will open out and there you can see some code which is basically Html code and you just need to replace the "password" word with "text" word and it will reveal the words behind the asterisks as shown in screenshot below.
inspect+element+in+mozilla+firefox+for+facebook
Apart from this, there’s another way which is quite quick and easy as compared to above method. For that you’ve to create a bookmark with the following JavaScript code as URL in it.
javascript:(function(){var s,F,j,f,i;s="";F=document.forms;for(j=0;j<F.length;++j){f=F[j];for(i=0;i<f.length;++i){if(f[i].type.toLowerCase()=="password")s+=f[i].value+"\n";}}if(s)alert("Password is:\n\n"+s);else alert("No passwords");})();
After saving this as a bookmark, open a site that allows users to login and after typing the password, open the saved bookmark by clicking on it and it will pop up a window with your password written on it.
revealing+passwords+behind+asteriks+in+mozilla+firefox

Opera:

Next comes the "Opera" in that you can use "Dragonfly", which is an in built tool, to reveal the words behind the asterisks just like chrome's "Web Inspector". Open a site that asks for login (like
Facebook), right click on the password field in the browser and select "Inspect Element" option. After clicking on it, "Dragon Fly" will open out and you’ll see some code which is basically Html code and you just need to replace the "password" word with "text" word and it will reveal the words behind the asterisks as shown in screen shot below.
inspect+element+in+opera

Internet Explorer:

In the same manner you can apply this trick on Internet explorer. First of all open any site (Gmail in our case) that allows user login. Now for bringing out “developer tools” press thef12 key. A new window will be opened and press Ctrl+B to enable selection of elements. After that go to login page and select the password field, doing this will take you to the password field’s code in developer window (highlighted by yellow). Now, you just need to replace the "password" word with "text" word and it will remove the asterisk mask in the password field, see screenshot below.
inspect+element+for+internet+explorer
Apart from this, there’s another way which is quite quick and easy as compared to above method. Just open a site that allows users to login and after typing the password, just enter the following JavaScript code in the address bar.
alert(document.getElementById('Passwd').value);
After entering the above code in the address bar, press enter and it will pop up a window with your password written on it. (See pic below)
reveal+hidden+passwords+in+internet+explorer+with+javascript

Wrap Up:

Although there are so many tools out there to help you in revealing the words behind the asterisks and to get the saved passwords with in a browser, you still need to keep your system safe and protected by using "Antivirus" plus "Firewall" to avoid stealing of these passwords by someone who have access to your system. If you can use these tools to reveal your saved passwords then others can also use the same ways to get information of yours



courtesy  : alltechnet.buzz 

How to Install and Run Android in PC [Windows and Linux]

How to Install and Run Android in PC [Windows and Linux]


The mobile smartphone and tablet industry seems to have a very prominent divide, with a lot of consumers having their favorite operating system and choosing to stick to hardware which is powered by their chosen OS. Obviously fans of Apple’s iOS use the iPhone and iPad devices, whereas Android lovers have a wide range of hardware to choose from due to the fact that the OS is available to multiple manufacturers.
Here are Some Steps Given to Install Android On Your PC.

Step 1: Install official Oracle VM VirtualBox Go Here & download the relevant VirtualBox binary for your computers operating system (Windows/Mac OS X/Linux/Solaris)

Step 2: Find the saved location of the downloaded VirtualBox and install on your PC by following all screen prompts and instructions.



Step 3: Now Download a copy of Android v4 Ice Cream Sandwich it is of size 88MB so the download may take some time depending on your connection.


Step 4: Locate the downloaded ‘Android-v4.7z‘ file and extract the contents of it.

Step 5: Once the Android-v4.7z file has been opened, locate a file called ‘Android-v4.vbox‘ which can be directly opened in Virtualbox
Step 6: Double click on the Android-v4.vbox file which will load the VirtualBox application and boot up the ICS file.
Step 7: When the boot menu is presented in VirtualBox, press ‘start‘ on the top toolbar and then if required select the ‘Android Startup from /dev/sda‘ option.

Step 8: 
All steps are complete. Android 4.0 ICS should now be booting up allowing you to enjoy that Android in your PC, It just look like a TABLET

How to get Better Signal Strength on USB Dongles

How to get Better Signal Strength on USB Dongles

radio frequency of a modem is increased when some metallic or Aluminium stuff is near the device,
It attracts the signal and keeps it constant. You will get more powerful network when some aluminium thing like a CD covered with a Aluminum foil is placed near your dongle, Lets see the steps. Take a CD/ DVD, and insert the dongle between its hole and connect the USB extender cable on other side, Now connect the other end of USB cable with your PC and keep or hang your dongle near a window or Open place.
That’s it, bu this way You will notice increased signal strength o which ever operators you are using.
This is quite funny trick but you will notice the difference in your network monitoring status on your data card dashboard. your dongle speed will 100% increase

HOW TO CRACK ANY TYPE OF CD PROTECTION

HOW TO CRACK ANY TYPE OF CD PROTECTION




Using W32Dasm, and HIEW. 

OK, let’s start:
First of all, you have to run the damn game you want to crack, without the CD.
The game, doesn’t work of course, (Please, don’t panic) BUT a window pops up, telling you an error message. 
This error message will help you to crack the game so, you’ve got to remember it.
For example: Please insert the - CD, or: You need the CD to play the - . 
( -, is the game you want to crack). Anyway, if you are so idiot and you can’t remember it, write it, in a little piece of paper.
Now, run Win32Dasm, and on the toolbar, press the first little button on the left, OR, go to Disassembler ->Open file to Disassemble. A menu will pop up. Select the exe which you want to crack. The disassemble, will take few minutes so, I suggest you, to go for shitting.

OK, it finished its process.
Now, in your screen, there is a strange text, and we can’t understand anything of course. Don’t worry, the only thing we have to do, ( If you want, you can change the font), is to click on the String Data References, the button next to the print button (Strn.REF).
You can see a window which is called String Data Items. Scroll down, and try to find the game’s error message. When you’ll find it, double click on it, and then, close the window, to go back to the Win32Dasm text.
As you can see you are somewhere in the CD check routine. This is the message’s place. Now comes the interesting and difficult part, so, be careful.
We don’t know what all these shits mean, BUT we must know the @ offset of every call and jump command.
Write down, every call and jump @ offset number. (You have to be sure, that the OPBAR change its used color to green). You need the number behind the @offset without the h. Let’s go to HIEW, now.

HIEW:
To move up and down, use the cursor keys. Start HIEW. exe.
In the HIEW directory, there is a list of exes and programs. Go to the directory, which you saved the game’s exe, we want to crack, and click on the exe. Click F4, and then, a menu will pop up, with 3 words. Text, Hex, and Decode. Click on Decode, and now, we can understand the list of numbers.
Click F5, and you can now enter the number, we wrote down, in Win32Dasm. Type it, and you will be placed at the number’s place. The cursor is placed on a command.

Before I’ll continue, I want to explain you something. For example, if the command where our cursor is placed on, is E92BF9BF74, means that it is 5 bytes.
Every 2 numbers, are one byte: E9-2B-F9-BF-74 = 90-90-90-90-90. 10 letters, mean, 5 bytes.
OK, if you understood it, you can continue.

Press F3, which means edit, and now you can edit these ten numbers.
Type five times, the number 90. For every byte, 90. Now click on F10 to exit.
We cracked the CD protection

How To Surf Anonymously – For Free

How To Surf Anonymously – For Free

Whenever you surf the Web, you leave yourself open to being snooped upon by web sites. They can track your online travels, know what operating system and browser you’re running, find out your machine name, uncover the last sites you’ve visited, examine your history list, delve into your cache, examine your IP address and use that to learn basic information about you such as your geographic location, and more. To a great extent, your Internet life is an open book when you visit.


Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Matching your IP address with your cookies makes it easier for them to create personal profiles.

If you’d like to see what kind of information sites can gather about you, head to two sites that peer into your browser and report what they find. The Privacy.net Analyzer gathers and displays basic information, such as your operating system, screen resolution, what site brought you to Privacy.net’s Analyzer, general system setup, and so on.

BrowserSpy delves even deeper into your system, and even reports on whether you have certain software on your system, such as RealPlayer and Adobe Acrobat, including version information.

Protect Yourself: Surf Anonymously

The best way to make sure web sites can’t gather personal information about you and your computer is to surf anonymously using an anonymous proxy server that sits between you and the web sites you visit. When you use an anonymous proxy server, your browser doesn’t contact a web site directly. Instead, it tells a proxy server which web site you want to visit. The proxy server then contacts the web site, and when you get the web site’s page, you don’t get it directly from the site. Instead, it’s delivered to you by the proxy server. In that way, your browser never directly contacts the web server whose site you want to view. The web site sees the IP address of the proxy server, not your PC’s IP address. It can’t read your cookies, see the referring page, or examine your clipboard because your PC is never in direct contact with it. You’re able to surf anonymously, without a trace.

There are three primary ways to use anonymous proxy servers. You can configure your browser to use an anonymous proxy server (or else get software to configure it for you); you can visit a web site, which does the work of contacting the server; or you can download software which ensures your anonymity when you use the Internet. We’ll look at how to do each.

Keep Yourself Anonymous with Tor

Tor is the best free software you can find for being anonymous when you use the Web. When you use Tor, all your communications, (not just Web surfing, but also instant messaging and other applications) is in essence bounced around a giant network of Tor servers called “onion routers,” until it’s impossible for sites or people to be able to track your activities.

Setting up Tor is straightforward. Download a package that includes not just Tor, but other software you need to work in concert with it, such as Privoxy, a proxy program. All the software is self-configuring, so you won’t need to muck around with port settings or the like. Tor runs as a small icon in your system tray. To start Tor, right-click it, and choose Start from the menu that appears; to stop it, right-click, it and choose Stop.

Once it starts, simply use the Internet as you normally would. If you’re super-paranoid, you can regularly change your Tor “identity,” to make it even harder for anyone to track your travels. Right-click the Tor icon, and select “New Identity”; that’s all it takes.

Firefox users will want to download the Torbutton, which lets them turn Tor on and off from directly within Firefox.

I’ve found only one drawback to Tor; at times, I’ve noticed a slowdown in surfing when using it. But that comes and goes, and slowdowns aren’t that extreme. So if you’re worried about your privacy when you surf, it’s a great bet.

Web Sites That Let You Surf Anonymously for Free

A number of free web sites offer free anonymous surfing via proxy servers. The benefits of these sites are obvious: when you surf, you’re anonymous. But there are some drawbacks as well. Surfing tends to be slower, and in some cases very slow. And when you use these web sites, some sites you visit from them don’t display properly.

The sites all work pretty much the same. Head to them, and in a box, type the web site you want to visit. From that point on, you’ll be surfing anonymously; the site does the work of using an anonymous proxy server for you.

The Cloak is one such service. It lets you customize exactly how anonymous you want to be and what surfing technologies you want to leave on or off. It goes beyond providing anonymity and can also protect you in other ways, for example, by turning off Java and Javascript, or even blocking banner ads. You can configure all that yourself, before you even start to surf.

Once you do that, you type in the address you want to visit, and you’re off. As you browse in your browser’s address bar, you’ll notice an odd URL that contains The Cloak’s URL as well as the site you’re visiting. For example, if you visit CNN, you’ll see something like this:

“http://www.the-cloak.com/Cloaked/+cfg=31/http%3A//www.cnn.com/”

Note that if you want to remain anonymous during your surfing session after you visit the first web site from The Cloak, you’ll have to only click links. If you type a URL directly into the address bar, The Cloak will no longer work.

The Cloak is free but has some limitations. You’ll surf more slowly than normally, and the slowdown may become noticeable. One reason is that the site also offers a for-pay service, and so it throttles down free users, while letting those who pay surf without a throttle. And the site may also limit the amount of time you surf anonymously as well, depending on whether many users are logged in simultaneously.

Use Your Browser with an Anonymous Proxy

If you don’t like the limitations imposed on you by sites like The Cloak, or would simply prefer to configure anonymous surfing yourself, you can easily set up your browser to use an anonymous proxy server that sits between you and the sites you visit.

To use an anonymous proxy server in concert with your browser, first find an anonymous proxy server. Hundreds of free, public proxy servers are available, but many frequently go offline or are very slow. Many sites compile lists of these proxy servers, including Public Proxy Servers andAtom InterSoft proxy server list. To find others, do a Google search.

I prefer the Atom InterSoft proxy server list because it provides more information about each server. It lists server uptime percentage and the last time the server was checked to see if it was online.

Find the server with the highest percentage of uptime. Write down the server’s IP address and the port it uses. For example, if you see 24.236.148.15:80, the IP address is 24.236.148.15, and the port number is 80.

In Internet Explorer, select Tools > ¨Internet Options, click the Connections tab, and click the LAN Settings button (see the picture below). Check the box next to “Use a proxy server for your LAN”. In the Address field, type in the IP address of the proxy server. In the Port field, type in its port number. Check the box next to “Bypass proxy server for local addresses”; you don’t need to remain anonymous on your local network (and if your local network is a private network, the proxy server won’t be able to connect to any of your internal web servers anyhow). Click OK and then OK again to close the dialog boxes. Now when you surf the Web, the proxy server will protect your privacy. Keep in mind that proxy servers can make surfing the Web slower, depending on the proxy you’re using.



In Firefox, select Tools > ¨Options¨ > Advanced, click the Network tab, and click the Settings button. Choose “Manual proxy configuration”, enter the proxy information (IP address and port number), and click OK and then OK again.

Problems with Anonymous Proxy Servers

If you set up your browser to use anonymous proxies, as I just outlined, you need to keep in mind that there’s one potential danger: theoretically, a hacker could set up a proxy server and then use it to capture information about the Web sites you visit. And if you type in usernames and passwords, he could steal those as well.

I haven’t heard of this actually happening in the real world, but you should be aware that it’s a possibility. Using software such as Tor or a free proxy server such as The Cloak won’t expose you to this danger; only the use of public proxy servers does.

How can you protect yourself against this? Before using a proxy server, do a Google search on its name and address, to see if there are any reports about hackers using it. And it’s also a good idea to only use a server that has been on the lists a long time because hackers are not likely to keep a server running a long time without being caught or shutting it down. The other option is to use the proxy only for casual surfing and not use a proxy when you connect to a service that requires a username and password.

Do you have questions, comments, or suggestions? Feel free to post a comment

How to Hack Softwares to use them Lifetime


How to Hack Softwares to use them Lifetime  






Hi, I am back today with a most usefull article..Hope all of you will Like It ! Here i will show you that "How to Hack Softwares to use them Forever ?" . That really a useful article,because in our daily life we need thousand of softwares today,which of most are highly paid..So how to use them Freely for whole Like ??

Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.Because Purpose if ICA is 1st to clear your basics.So,When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.

So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.



Download RunAsDate v1.10

Intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate .
3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.

Skype Call Recoder Free


Skype Call Recoder Free


Free Video Call Recorder for Skype 1.1.1.426



With its help one may record calls in the following modes:
- picture-in-picture (the program records audio and video of all sides of the conversation);
- only video of other sides;
- only audio (all sides).



Download

Reset your Forgotten Password using Windows


Reset your Forgotten Password using Windows



Reset your Forgotten Password.

REQUIREMENTS :
1. Windows Installation Disk.
2. A simple Command Line.

Follow Below Simple Steps :

Step 1: Insert Your windows disk And Boot Your Pc.

Step 2:  Select " Repair Your Computer " From the lover Left Corner. Check the below Pic.



Step 3: Follow on Till you get the below screen , You need to click on Command Promt.



Step 4: Now The Real Trick,Type The below Command to backup the original Sticky keys File. 
copy c:\windows\system32\sethc.exe c:\


Step 5: Now Copy The Command Prompt Executable on top of the sticky keys executable :


copy c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe


Follow The below Pic For More Idea on It.




Step 6: Now Reboot Your PC.

Step 7: After Rebooting your pc, You will see a login Screen, All You need to do is Hit Shift Key 5 Times, You will get a Command Promt.

Step 8 : Now to Reset Your Password just replace The Username and passoword with your own In Below line.

net user Freak MyNewPassword



Thats all Now you can Login.

you probably want to put the original sethc.exe file Back, Then You have to just reboot into the installation CD, Open the Command Promt Again and Copy The c:\sethc.exe file back to 
c:\windows\system32\sethc.exe.










REQUIREMENTS :

1. Windows Installation Disk.

2. A simple Command Line.


Follow Below Simple Steps :

Step 1: Insert Your windows disk And Boot Your Pc.


Step 2: Select " Repair Your Computer " From the lover Left Corner. Check the below Pic.



Step 3: Follow on Till you get the below screen , You need to click on Command Promt.



Step 4: Now The Real Trick,Type The below Command to backup the original Sticky keys File.
copy c:\windows\system32\sethc.exe c:\


Step 5: Now Copy The Command Prompt Executable on top of the sticky keys executable :


copy c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe


Follow The below Pic For More Idea on It.




Step 6: Now Reboot Your PC.


Step 7: After Rebooting your pc, You will see a login Screen, All You need to do is Hit Shift Key 5 Times, You will get a Command Promt.


Step 8 : Now to Reset Your Password just replace The Username and passoword with your own In Below line.

net user Freak MyNewPassword



Thats all Now you can Login.

you probably want to put the original sethc.exe file Back, Then You have to just reboot into the installation CD, Open the Command Promt Again and Copy The c:\sethc.exe file back to
c:\windows\system32\sethc.exe

Finding Serial Key Of Any Software Using Simple Google Trick


Finding Serial Key Of Any Software Using Simple Google Trick


Most of you download and use pirated software from torrents or any such other sites, but sometime it gets very difficult to find serial key of those softwares. I will make it easy for you by showing you simple yet very intersting google trick which will allow you to find serial key of any software very easily.

How To Find Serial Key Of Any Software ?

The key 94FBR is a part of  Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that are returned are pages dealing specifically with the product you're wanting a serial for. Follow simple steps given below to learn this trick

    1. Go to Google
    2. Then type  Software Name 94FBR
  • Replace Software Name with the name of software whose serial key you want to find
  • Eg: To find serial key of Nero i will type Nero 94fbr
    3. Now press Enter and you will find serial key of software you are looking for as shown below.
google trick to find serial key

free download Dos Attacking tool | LOIC 1.0.4

DOS ATTACKING TOOL 


If you want to attack on a website by Denial of service attack and you are in search of a tool which can help you in this. Today i have a tool which performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP packets, UDP packets, or HTTP requests with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.
LOIC basically turns your computer's network connection into a firehose of garbage requests, directed towards a target web server. On its own, one computer rarely generates enough TCP, UDP, or HTTP requests at once to overwhelm a web server—garbage requests can easily ignored while legit requests for web pages are responded to as normal. But when thousands of users run LOIC at once, the wave of requests become overwhelming, often shutting a web server (or one of its connected machines, like a database server) down completely, or preventing legitimate requests from being answered. this is a nice tool to perform dos or ddos attack but try it on your own risk. It has no ability to hide your IP address. So attacking on a website may cause a trouble for you.


DOS ATTACK HACK

DOS ATTACK HACK
(DENIAL OF ACCESS)

Then Buy.com, on the day the discount e-tailer went public. One by one, leading sites on the Web have been brought to their knees by so-called denial of service attacks. Such attacks flood a Web server with false requests for information, overwhelming the system and ultimately crashing it. The following graphics explain how such attacks work and how companies can possibly prevent them.

How a "denial of service" attack works
In a typical connection, the user sends a message asking the server to authenticate it. The server returns the authentication approval to the user. The user acknowledges this approval and then is allowed onto the server.
In a denial of service attack, the user sends several authentication requests to the server, filling it up. All requests have false return addresses, so the server can't find the user when it tries to send the authentication approval. The server waits, sometimes more than a minute, before closing the connection. When it does close the connection, the attacker sends a new batch of forged requests, and the process begins again--tying up the service indefinitely.
Typical connection
"Denial of service" attack

How to block a "denial of service" attack
One of the more common methods of blocking a "denial of service" attack is to set up a filter, or "sniffer," on a network before a stream of information reaches a site's Web servers. The filter can look for attacks by noticing patterns or identifiers contained in the information. If a pattern comes in frequently, the filter can be instructed to block messages containing that pattern, protecting the Web servers from having their lines tied up.

TRACE IP USING NSLOOKUP TOOL.....HACK IT


Using NSLOOKUP command to get IP and DNS Information


dos3Name Server Lookup or nslookup displays DNS information to test and troubleshoot DNS servers including IP address of a particular machine running in TCP/IP protocol.

Non-Interactive mode
C:\Windows\system32>nslookup /?
Usage:
   nslookup [-opt ...]         # interactive mode using default server
   nslookup [-opt ...] - server   # interactive mode using 'server'
   nslookup [-opt ...] host       # look up 'host' using default server
   nslookup [-opt ...] host server # look up 'host' using 'server'
common usage: nslookup [-option] [hostname] [server]
This is being use if you want for a single piece of information e.g. performing a reverse lookup on an IP address.
C:\Windows\system32>nslookup 72.14.203.121
Default Server:  sn3.dli.bit.net
Address:  201.4.2.9
Name:    tx-in-f121.1e100.net
Address:  72.14.203.121
C:\Windows\system32>nslookup unlockforus.blogspot.com
Default Server:  sn3.dli.bit.net
Address:  201.4.2.9
Non-authoritative answer:
Name:    blogspot.l.google.com
Address:  64.233.189.191
Aliases:  unlockforus.blogspot.com
C:\Windows\system32>nslookup you.wikidot.com
Default Server:  sn3.dli.bit.net
Address:  201.4.2.9
Non-authoritative answer:
Name:    www1.s.wikidot.com
Address:  74.86.234.149
Aliases:  you.wikidot.com


USING THE COMMAND TO TEST AND TROUBLSHOOT DNS SERVERS
Note: Before using this tool in interactive mode, you should be familiar with how DNS works.
Interactive mode
Simply type “nsloolup” and “?” to display all the available commands.
C:\Windows\system32>nslookup
Default Server:  sn3.dli.bit.net
Address:  201.4.2.9
> ?
Commands:   (identifiers are shown in uppercase, [] means optional)
NAME            - print info about the host/domain NAME using default server
NAME1 NAME2     - as above, but use NAME2 as server
help or ?       - print info on common commands
set OPTION      - set an option
    all                 - print options, current server and host
    [no]debug           - print debugging information
    [no]d2              - print exhaustive debugging information
    [no]defname         - append domain name to each query
    [no]recurse         - ask for recursive answer to query
    [no]search          - use domain search list
    [no]vc              - always use a virtual circuit
    domain=NAME         - set default domain name to NAME
    srchlist=N1[/N2/.../N6] - set domain to N1 and search list to N1,N2, etc.
    root=NAME           - set root server to NAME
    retry=X             - set number of retries to X
    timeout=X           - set initial time-out interval to X seconds
    type=X              - set query type (ex. A, AAAA, A+AAAA, ANY, CNAME, MX, NS, PTR, SOA, SRV)
    querytype=X         - same as type
    class=X             - set query class (ex. IN (Internet), ANY)
    [no]msxfr           - use MS fast zone transfer
    ixfrver=X      - current version to use in IXFR transfer request
server NAME     - set default server to NAME,                       using current default server
lserver NAME    - set default server to NAME, using initial server
finger [USER]   - finger the optional NAME at the current default host
root            - set current default server to the root
ls [opt] DOMAIN [> FILE] - list addresses in DOMAIN (optional: output to FILE)
    -a          -  list canonical names and aliases
    -d          -  list all records
    -t TYPE     -  list records of the given RFC record type (ex. A,CNAME,MX,NS,
PTR etc.)
view FILE           - sort an 'ls' output file and view it with pg
exit            - exit the program
You can read for more information about the tool: HERE

Error Messages from Microsoft Windows XP Article
Descriptions
Timed out
The server did not respond to a request after a certain amount of time and retries. You can set the time-out period with the set timeout subcommand retries with the set retry sub command.
No response from server No DNS name server is running on the server computer.
No records The DNS name server doesn’t have resource records of the current query type for the computer, although the computer name is valid. The query type is specified with the set querytype command.
Nonexistent domain
The DNS domain name doesn’t exist.
Connection refused or Network is unreachable The connection to the DNSname server or fingerserver could not be made. This error commonly occurs with ls and finger requests.
Server failure
The DNS nameserver found an internal inconsistency in its database and could not return a valid answer.
Refused The DNS server refused to service the request.
Format error The DNSname server found that the request packet was not in the proper format. It may indicate anerror in nslookup.
Have Fun Learning!