October 30, 2012

Customize the Windows 7 or Vista Send To Menu

You’ve seen the SendTo folder in action any time you right-click a file and select the Send To folder from the context menu. What you might be unaware of is that you can customize the items in this menu.
Go ahead, right click a file. You should see something that looks like this:
To get to the SendTo folder, you’ll need to open up an Explorer window, and then paste in the following to the address bar.
First you Go to Control Panel --->Folder Options--->Show all hidden Files
Then Go to your Username Like Karthick-->Appdata--->Roaming--->Microsoft--->Windows--->SendTo
Then Add your Shortcut What do you want....
%APPDATA%\Microsoft\Windows\SendTo
%APPDATA% is an environment variable that actually maps to something like C:\users\<username>\AppData\Roaming.
You should now see a bunch of shortcuts:
Let’s say you wanted to add an item to the Send To menu to open files in Notepad. You could just drag a shortcut to Notepad into this folder, or create a new shortcut. Now you can see the new Notepad item in the menu:
This method should work for any application that allows you to open a file by using a command line argument.

October 29, 2012

Download books from Google books for Free?

 Here is the trick to download google book and read it off line also.  

How to do this?
Step 1:
Download/install Greasemonkey addon(Customize the way a web page displays or behaves, by usingsmall bits of JavaScript.) in Firefox

Install this userscript :google book download

Download/insall the Flashgot (FlashGot is the free add-on for Firefox and Thunderbird, meant to handle single and massive ("all" and "selection") downloads with several external Download Managers. )

Download/install Flashget(Download Manager)

Step 2: 
View your favorite book.

For Example: http://books.google.com/books?id=Tmy8LAaVka8C&printsec=frontcover

In the left panel, click Download this book

Select all pages, right-click, choose FlashGot Selection
Press OK to start downloading. Note : Download only one page at a time, or your IP will be banned
After the downloading is finished, in FlashGet, left panel, choose Downloaded folder.
Select all pages of the book, right-click, choose Rename -> Comment As Filename
Read book

October 17, 2012

How To Block Failed Login Attempts In Windows 7


imageEven if you put a password on your computer, that doesn’t stop someone from breaking in by using a brute force password guessing technique.  Although more of a problem for Laptops than your home desktop, I’m going to show you a trick used by almost all corporations who run Windows.  Essentially what were going to do is run a command that will lock your login account for a specified amount of time after a specified number of bad login attempts (wrong password).  By doing this an attacker won’t be able to use an application to try a few million passwords per minute against your computer to break in since every 10, 20, 30 etc. attempts will lock the account for a few minutes thus killing any attempt to break in.  Here, let me show ya.
Step 1 – Launch CMD as an administrator
Click the Start Menu Orb and Type cmd into the search box.  Under the programs list that appears Right-Click cmd.exe and Select Run as administrator from the context menu.
run cmd as administrator

Step 2

In the command line, Type in the following command:
net accounts /lockoutthreshold:10
You can replace the number 10 with any number you like, this will determine how many incorrect password attempts can occur before a lockout is initiated.  Personally, 20 or even 30 should be fine but 10 is a good number for most people even if you commonly fat finger your password….
set lock out threshold in windows 7

Step 3 – Set the account lockout duration

By default, when your account is locked due to the X failed attempts you set above, your account will be locked out for 30 minutes.   I personally think that’s a bit excessive.  My recommendation is you change it to something like 3 or 5 minutes so even if you fat finger your password, you only need to wait a few minutes to try your password again.  You can change this using the following command:
net accounts /lockoutduration:30
The lockout duration can be set to any value between 1 and 99,999 minutes.*  If you set it to 0, the account will be locked until an Admin unlocks it… Don’t do that.
*This range varies depending upon which version of Windows 7 you are running.
set lockout duration in windows 7

Done!

Now whenever someone attempts to break into your computer by guessing your password Windows will lock them out!

Show a Fake Error Message When Your Computer Boots

As we’ve mentioned on groovyPost before, one of the most valuable things inside your computer is your data. One way to throw would-be identity thieves off your trail is to make them think that your computer is broken. This might also be handy if, say, you were held at gunpoint and forced to type your password into your computer (for all you international spies out there who read groovyPost…).
With TrueCrypt, you can make it so your computer shows nothing but a black screen and a fatal-looking error. A thief might give up at this point, but you can simply punch in your password and use your computer as normal. Here’s how it works.
First off, you’ll need to encrypt your system disk using TrueCrypt. Of course, encrypting your disk is likely deterrent enough to your everyday criminal, but again—the gunpoint hostage thing.
After you’ve taken care of that, launch TrueCrypt and click System >> Settings.
Adding fake error message in TrueCrypt
In the System Encryption Settings screen, check “Do not show any texts in the pre-boot authentication screen (except the below custom message)” box. This will forgo the usual TrueCrypt Boot Loader prompt for your password. Type in a message the textbox. Use something convincing like “Missing operating system” or “Non-system disk or disk error.”
Faking a broken computer with TrueCrypt Encryption
TrueCrypt will warn you that, after enabling this option, your computer will appear “frozen” when you first turn it on. You won’t get a password prompt or cursor, though the boot loader will still accept your password. This is what you want. Click Yes.
TrueCrypt Boot Disk Encryption
Now, next time you boot your computer, you’ll get  your fake message. Type your password and press Enter to get into Windows. If you type the wrong password, nothing happens.
Fake error messages using TrueCrypt Boot Loader
In terms of added security when compared to simply encrypting your system disk, this trick doesn’t really add all that much value. But it may save you in the rare case you are forced to enter your password under duress. Or, if nothing else, it could make for a nice prank opportunity.

Can Your Data Be Undeleted? Four Ways to Erase Your Hard Drive

When you throw away old paper checks and tax returns, you shred them (right?). This makes them unreadable to would-be identity thieves or people who are just too nosy for their own damn good. But what do you do with your old data when you want to trash it? If you’re not securely erasing your files and hard drives, then you’re doing the equivalent of putting your bank statement in the trash without shredding it. It’s not a guarantee of catastrophe, but it’s risky.
If you don’t sanitize a hard drive with a secure format, then chances are there are gigabytes worth of data that can be easily undeleted by any kid with a free data recovery utility off the Internet. To illustrate this, let’s take a look at a Windows Quick Format vs. Full Format vs. Secure Format/Erase.
Tutorial Outline
  1. How to Perform a Quick Format / Is a Quick Format Secure?
  2. How to Perform a Full Format / Is a Full Format Secure?
  3. Eraser: Secure Erase and Erase Unused Space
  4. DBAN: Erase a Hard Drive without Removing It

How to Perform a Quick Format

A Quick Format is a fast way to prep an old drive for a new life. You can do it from Windows Explorer by clicking Start > Computer and then right-clicking the drive and choosing Format…
quick format instructions
In the Format disk  window, check Quick Format and click Start. That’s all there is to it.
quick format vs. full format
The drive will appear to be blank in Windows Explorer.
quick format security

Is Quick Format Secure?

What makes a Quick Format quick is that it doesn’t delete all data on the disk. Instead, a Quick Format writes a new file table onto the drive. The new file table doesn’t have any information about the data that was on the disk before the format. So, for most purposes, the disk is now “blank.” This is good if you are going to be reusing the disk yourself or if you are reinstalling an operating system. But if you are selling, donating or trashing your hard drive, a Quick Format isn’t a good idea.
Above, we saw that a quick formatted drive ended up blank in Windows Explorer. But what if we analyze the drive using a data recovery utility?
quick format data recovery
What we see above is virtually all files and folders that were on that hard drive before it was quick formatted. That’s because we’ve overwritten the file table, but we haven’t overwritten the data with anything. Until new data is written onto the disk, the old data will still be accessible via programs like R-StudioRecuva, or TestDisk.  This is the reason why a full format is recommended when prepping a hard drive for a truly fresh start.

How to Perform a Full Format

To perform a full format, right-click the drive in Windows Explorer and click Format as you did before, but this time, un check Quick Format. Click Start.
FULL FORMAT INSTRUCTIONS
Like a Quick Format, a full format overwrites the file table with a new one. But it also writes zeros onto the entire disk or partition. For this reason, it’ll take much longer than a Quick Format. Let’s try analyzing it again in R-Studio:
data recovery after full format
None of the old files that were on the disk before the format show up. There is some meta data on the disk, but this was recently written during the format (as you can see by the “created” date).
Note: In Windows XP, a full format does not overwrite the disk with zeros. Instead, it overwrites the file table and checks the disk for bad sectors. To do a full format as described above, you’ll need Windows Vista or later.

Is a Full Format Secure Enough?

While writing this article, I tried my darndest to recover data off of my full formatted drive. I tried performing deep scans using both R-Studio and Recuva and found no recoverable files. Given that, I would say that doing a full format in Windows Vista or later is secure enough for most personal users. If you have government secrets or sensitive customer data on your hard drive, you’ll want to do a more thorough job of obfuscating your data. Allegedly, there are ways to recover parts of data that has been overwritten, but it requires a true data recovery pro and some expensive equipment.
You should also be aware that, due to the way the firmware on drives work, there are some sectors that can’t be deleted through normal means. For example, when a sector is corrupted, the drive marks it as bad and stops allowing access to it—even to wipe it. In addition to bad sectors and reserved sectors (which are used when sectors go bad), most hard drives have recovery partitions on them or separate data partitions on them. These won’t always show up in Windows Explorer, so they may not get wiped by a full format.
Also, studies show that solid-state drives are nearly impossible to securely wipe, due to the way the data is physically handled. The best way to securely destroy data is by shredding the whole drive.

Eraser: Secure Erase and Erase Unused Space

If you want something a little bit more secure than a full format but not as extreme (or costly) as hiring someone to run your hard drive through an industrial-grade shredder, then you might want to check out Eraser. Eraser is a free utility that formats your drive and then overwrites the blank space several times with “special patterns.” The makers of Eraser claim that they’ve taken into consideration all the sticky issues that hinder hard drive sanitization, including “the use of write cache, construction of the hard disk and the use of data encoding” and designed their program to solve them. I’m in no position to debunk or verify those claims, but the program is free and immensely popular, so it’s worth a try.
After installing Eraser, you get a new option in your right-click contextual menu in Windows Explorer with three different options: Erase, Erase on Restart, and Erase Unused Space.
Eraser: Erase Unused Space
After choosing one, the process goes to town in the background. When it’s done, you’ll get a notification in your taskbar. You can also check the status by opening Eraser from your system tray.
Erase Unused Space is handy if you’ve already started using a disk that you should’ve full formatted. Using this option, you can securely wipe what’s left on the disk without impacting the files you’ve written on it since the format. Reinstalling Windows onto your computer and then running Erase Unused Space on the drive would do a fairly good job of securely erasing its contents.
Note that, even though clicking Erase Unused Space launches the User Access Control window, it may sometimes fail even after clicking Yes. If you look at the task log, you’ll see a log output saying: “The program does not have the required permissions to erase the unused space on disk. Run the program as an administrator and retry the operation.”
This happens because when you run another Eraser operation that doesn’t require administrator access, it’ll launch it normally. So, when you go to launch it again, it’s already running.
The program does not have the required permissions to erase the unused space on disk
If this happens, try right-clicking the Eraser icon in your system tray, choosing Exit Eraser and then re-launching it from the Start menu by right-clicking it and choosing Run as Administrator.
Run Eraser as Administrator
Now, try erasing the unused space again. It should work.

DBAN: Erase a System Disk without Removing It

Performing a full format is all well and good, but a disk can’t format itself. This makes formatting the drive that Windows is currently running on impossible. The other option: reinstalling Windows and then using Eraser to Erase Unused Space. This would work but it’s time consuming and you’ll be giving away your Windows license in the process.
If you don’t feel like cracking open your laptop to dig out the hard drive and attach it to another computer, then you should give Darik’s Boot and Nuke (DBAN) a try. DBAN can run without an operating system from a LiveCD or LiveUSB. This is also handy if your system drive is corrupted, or your computer won’t boot normally for some other reason.
Here’s how to use DBAN:
Download the ISO and use Windows Disc Image Burner to burn it to a disc or image. Or, create a bootable USB using Universal USB Installer (you can see a walkthrough of this process in this bootable USB tutorial; just choose DBAN as your Linux distro from the drop-down menu and skip the part about creating persistent storage).
dban on live USB
Boot your computer from the bootable USB drive or LiveCD. You may need to tweak your BIOS to change the boot order. You’ll see the austere DBAN screen.
dban virtualbox
If you have only one drive installed and want to blast it without the fuss, type: autonukeand press Enter. DBAN will wipe the drive and overwrite it with random data. By default, it wipes the drive and writes over it three times (DoD short), but it also supports several other secure wipe methods. Settle in. This could take awhile.
dban autonuke
To use the interactive mode, press Enter from the main menu without typing anything. This lets you pick and choose the drives you want to delete.
dban interactive mode
Now your drives will be sufficiently nuked. To use them, they’ll have to be formatted.

Conclusion

There you go. Four different ways to erase your hard drive, including okay (Quick Format), good enough (full format), better (Eraser) and best (DBAN). While it’s unlikely that the next owner of your computer is going to go snooping through your old files, it certainly has happened. That’s why it’s never a bad idea to wipe your hard disk drive before sending it in for warranty repairs, trashing it or selling it. Combine that with an encrypted system disk and your data will be positively inscrutable.

October 15, 2012

Remove - Bypass a BIOS or CMOS Password without using any software

DISCLAIMER: This information is intended for experienced users. It is not Intended for basic users, hackers, or computer thieves. Please do not try any Of following procedures if you are not familiar with computer hardware. We'll Not be responsible for the use or misuse of this information, including Personal injury, loss of data or hardware damage. So use it at your own risk.

BIOS passwords are used to add some extra security to computers. You can either Set a password to prevent access to BIOS settings or to prevent PC from booting.But sometimes this extra security might become a pain when you forget the BIOS Password or someone changes your system BIOS password intentionally.But there is no need to worry. There are many known ways to reset / remove / Bypass the password:

a) By removing the CMOS battery
b :) By using the motherboard jumper
c :)  By using MS DOS command
d :) By using Backdoor BIOS password

Also See: How to break an Administrator Password in Windows

A.By Removing the CMOS Battery: 
Almost all motherboards use a small coin sized CMOS battery to store all BIOS Settings along with the password. To reset the password, unplug the PC, open the Cabinet and remove the CMOS battery for approx. 15-30 minutes and then put it Back. It'll reset all BIOS settings as well as the password and you'll need to Re-enter all settings.If it fails, then try to remove the battery for at least one hour.

B.By Using the Motherboard Jumper:
 Almost all motherboards contain a jumper that can clear all CMOS settings along With the BIOS password. The location of this jumper varies depending upon the Motherboard brand. You should read your motherboard manual to check its Location. If you don't have the manual then look for the jumpers near the CMOS Battery. Most of the manufacturers label the jumper as CLR, CLEAR, CLEAR CMOS, Etc.When you find the jumper, look carefully.  There will be 3 pins and the jumper Will be joining the center pin to either left or right pin. What you need to do, Is removing the jumper and join the center pin to the opposite pin. E.g. if the jumper joins center pin to left pin, then remove it and join center pin to right Pin. Now wait for a few seconds and then again remove the jumper and join the Center pin to left pin.Make sure to turn the PC off before opening the cabinet and resetting the
Jumper.

C.By Using MS DOS Command:
This method works only if you have access to the system when it’s turned on Because this method requires MS DOS. Open Command Prompt from Programs menu and Provide following commands one bye one:
  debug
  o 70 2E
  o 71 FF
  quit


NOTE: The first character in the above commands is "O" and not the number 0.After providing the above commands, restart your system and it should reset the CMOS Settings along with the BIOS password.
If you are curious to know how it works? Then let me explain the above commands: In this method we are using the Debug tool of MS DOS. The "O" character present  At first in these commands, outputs the values to IO ports. The number 70 and 71 Are port numbers which are used to access CMOS memory. By providing FF value we are telling CMOS that there is an invalid checksum and it resets the CMOS 
Settings as well as BIOS password.

D.By Using Backdoor BIOS Password:

Some BIOS manufacturer put a backdoor password in BIOS which always works
Irrespective of what password you have set in BIOS. It’s a master password which
Is used for testing and troubleshooting purposes.

AMI BIOS Passwords:
  A.M.I.
  AAAMMMIII
  AMI?SW
  AMI_SW
  AMI
  BIOS
  CONDO
  HEWITT RAND
  LKWPETER
  MI
  Oder
  PASSWORD
AWARD BIOS Passwords:
  01322222
  589589
  589721
  595595
  598598
  ALFAROME
  ALLy
  aLLy
  aLLY
  ALLY
  aPAf
  _award
  award
  AWARD_SW
  AWARD?SW
  AWARD SW
  AWARD PW
  AWKWARD
  awkward
  BIOSTAR
  CONCAT
  CONDO
  Condo
  d8on
  djonet
  HLT
  J64
  J256
  J262
  j332
  j322
  KDD
  Lkwpeter
  LKWPETER
  PINT
  pint
  SER
  SKY_FOX
  SYXZ
  syxz
  shift + syxz
  TTPTHA
  ZAAADA
  ZBAAACA
  ZJAAADC
PHOENIX BIOS Passwords:
  BIOS
  CMOS
  phoenix
  PHOENIX
Misc Common Passwords:
  ALFAROME
  BIOSTAR
  biostar
  biosstar
  CMOS
  cmos
  LKWPETER
  lkwpeter
  setup
  SETUP
  Syxz
  Wodj
Other Manufacturer BIOS Passwords:
  Biostar - Biostar
  Compaq - Compaq
  Dell - Dell
  Enox - xo11nE
  Epox - central
  Freetech - Posterie
  IWill - iwill
  Jetway - spooml
  Packard Bell - bell9
  QDI - QDI
  Siemens - SKY_FOX
  TMC - BIGO
  Toshiba - Toshiba
  VOBIS &  IBM - merlin

Read more: http://www.mihirbabu.com/2011/06/how-to-reset-remove-bypass-bios-or-cmos.html#ixzz29MVPmsy6