Crack windows 8 password (without using third party software)

Hello GreenHackerz Readers......

With the help of this method you may reset your lost password of your administrator account. when we are doing this practical we need a boot-able pen-drive of windows 8 or a boot-able disk of windows 8 to perform the practical.

How to use:

1. As we know that, we missed the password.

2. Now, insert your boot-able disk in DVD-ROM, then restart the computer. 

3. Now, windows 8 DVD start booting. when the below window open press Ctrl+Shift+10.

4. Ctrl+Shift+10 with this command prompt is open.

5. Run "diskpart" command to see the label. Same as seen in above picture.

6.  Now, Check the windows directory. Run few commands in the command prompt.

7. Disk label change in some cases, In my pc Windows in D label drive. Now, we enter command "cd windows" then enter.

8. You seen the above picture clear more. Here we copy  utilman.exe by this command "copy utilman.exe utilman1.exe". we use this command for backup of utilman.exe.

9. Now, "copy cmd.exe cmd1.exe" for copy the command prompt.

10. Now, del utilman.exe using command " del utilman.exe".

11. Now, rename cmd1.exe to utilman.exe using command " rename cmd1.exe utilman.exe".

12. Now, restar the pc.

13. Click the button shown in the above picture and below the

14. CMD is open the use command " control userpasswords2".

15. User accounts menu open from their you should reset the password and login again.

Thanks for reading......
Stay Connected.
Continue Reading...

Customize Windows 7 Boot Screen Animation

Hello GreenHackerz readers....

Tired of watching the same animation again and again every time you boot windows?? Then you are in luck. There is a very easy way to change Windows 7 boot screen. Windows 7 boot updater makes it possible to change boot animation, text as well as background. This application works for all versions of Windows 7.

The application works by modifying the BOOTMGR system file. Since the application is in beta version and modifies certain critical system files it is always recommended to backup before using it. Though in our testing we found that the application worked well on a Windows 7 system without any problem.

Windows 7 Boot Updater is a free portable tool that allows you to change your Windows 7 boot screen animation. To download this software click here.

How to use:

1.Run the tool as admin.

2. Click Select Animation and browse for the folder that contains your boot animation images. If you do not have any get some from here.

3.Uncheck Text as it doesn't work at the time of writing this article.

4.Click Go!. It will take some time and display a message.

5.Click OK.

Now restart your PC and check if the animation has been changed successfully. If not, then follow  to recover your computer.

Thanks for reading...friends
Stay Connected...
Continue Reading...

Create Wi-Fi HotSpot in Wndows 8 (Ad-Hoc Network)

Hello GreenHackerz Readers..
This Article is about to create Wi-Fi Hotspot in Windows 8 is not new but may be useful who want to create their laptop as a Wi-Fi Hotspot w/o third party tool. So Let's Start ....

Apart from Start Orb and classic Start Menu, what most Windows 7 users, who decided to take Windows 8 for a spin, miss in Windows 8 is ability to create ad-hoc network. If you’re a power users, you might’ve noticed that Windows 8 doesn’t include an option to create and setup ad hoc network connection to share files and internet with Wi-Fi enabled computers and devices. Windows 7 ad hoc connection feature does nothing except creating a shared connection with separate IP address to register the device on the virtual network. This allows users to use router’s default or specified DNS server address to easily connect to internet. Even though Windows 8 comes with ICS (Internet Connection Sharing) feature to allow devices  to connect to yours PC internet connection, it doesn’t allow creating a wireless network connection to share the internet. In this post, we will look at some tools that let you easily create and manage ad-hoc connections in Windows 8.

Using Windows Netsh Utility

The Network Shell (netsh) utility is basically developed to let users configure network devices in

Now, first you need to check weather your network interface supports virtualization or not. Simply, run the following command to view Hosted network supported status.
netsh wlan show drivers

In case, it says No, you will need to update your both client and server editions of Windows. The support for configuring WLAN using netsh was first introduced in Windows Vista, and it’s now available in Windows Server 2008, Windows 7 and Windows 8. Using netsh wlan command, one can easily use hosted network (virtualization) feature to create a virtual wireless connection. The Hosted Network is WLAN feature, which is designed to implement virtualization of physical network adapter. Since it plays a vital role in creating a virtual wireless adapter, it’s used by a majority of virtual Wi-Fi hotspot applications, such as Virtual WiFi Router, MyPublicWiFi, Marfi etc. So, if your NIC supports wireless hostednetwork / virtualization feature, then you can create an ad hoc wireless connection and turn your PC into Wi-Fi hotspot.
As stated earlier, both Windows 7 and Windows 8 natively support configuring ad hoc wireless connection using the netsh commands. In order to create an ad hoc connection in Windows 8 using netsh utility, run CMD with administrative privileges’; just type cmd on Start Screen, right-click it and select Run as administrator.

network adapter’s driver. If your NIC supports virtualization, you’re good to go. Now,
enter the following commands to configure an ad hoc wireless connection.
netsh wlan set hostednetwork mode=allow ssid=<network name> key=<passkey>

Once the hosted network has been set to allow, you need to start the mode to create an ad hoc connection. Just enter the command below.
netsh wlan start hostednetwork

If it says “hosted network couldn’t started”, you need to disable current wireless network device and then enable it. You may also need to refresh network adapter list from Device Manger to install a virtual network device driver.
When the hosted network is started, enable ICS for newly created Wi-Fi connection, so that you can share your internet connection with others. In order to enable ICS feature, head over to Network and Internet –> Network Connections, and open Properties dialog of network device (which is connected to internet). Now, open Sharing tab, enable Allow other network users to connect through this computer’s Internet connection, and then choose the newly created ad hoc connection from the list. In our case, it’s Wi-Fi 2, as shown in the screenshot below.

Once the internet connection is shared, check the IP address assigned to newly created ad hoc connection from TCP/IPv4 Properties. If it doesn’t assign IP address, then run netsh wlan start hostednetwork command in CMD.

After following the above steps, you will be able to connect Wi-Fi enabled devices with your Windows 8 PC.

Enjoy Wi-Fi HotSpot In Windows 8... :)

Continue Reading...

DNS HiJacking ( Introduction )

Hello GreenHackerz Readers...

DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the default DNS settings. In other words, when an attacker takes control of a computer to alter its DNS settings, so that it now points to a rogue DNS server, the process is referred to as DNS hijacking.

As we all know, the “Domain Name System (DNS)” is mainly responsible for translating a user friendly domain name such as “” to its corresponding IP address “″. Having a clear idea of DNS and its working can help you better understand what DNS hijacking is all about.

How DNS Hijacking Works?

As mentioned before, DNS is the one that is responsible for mapping the user friendly domain names to their corresponding IP addresses. This DNS server is owned and maintained by your Internet service provider (ISP) and many other private business organizations. By default, your computer is configured to use the DNS server from the ISP. In some cases, your computer may even be using the DNS services of other reputed organizations such as Google. In this case, you are said to be safe and everything seems to work normally.

But, imagine a situation where a hacker or a malware program gains unauthorized access to your computer and changes the DNS settings, so that your computer now uses one of the rogue DNS servers that is owned and maintained by the hacker. When this happens, the rogue DNS server may translate domain names of desirable websites (such as banks, search engines, social networking sites etc.) to IP addresses of malicious websites. As a result, when you type the URL of a website in the address bar, you may be taken to a fake website instead of the one you are intending for. Sometimes, this can put you in deep trouble!

What are the Dangers of DNS Hijacking?

The dangers of DNS hijacking can vary and depend on the intention behind the attack. Many ISPs such as “OpenDNS” and “Comcast” use DNS hijacking for introducing advertisements or collecting statistics. Even though this can cause no serious damage to the users, it is considered as a violation of RFC standards for DNS responses.

Other dangers of DNS hijacking include the following attacks:

Pharming: This is a kind of attack where a website’s traffic is redirected to another website that is a fake one. For example, when a user tries to visit a social networking website such as he may be redirected to another website that is filled with pop-ups and advertisements. This is often done by hackers in order to generate advertising revenue.
Phishing: This is a kind of attack where users are redirected to a malicious website whose design (look and feel) matches exactly with that of the original one. For example, when a user tries to log in to his bank account, he may be redirected to a malicious website that steals his login details.

How to Prevent DNS Hijacking?

In most cases, attackers make use of malware programs such as a trojan horse to carry out DNS hijacking. These DNS hijacking trojans are often distributed as video and audio codecs, video downloaders, YoTube downloaders or as other free utilities. So, in order to stay protected, it is recommended to stay away from untrusted websites that offer free downloads. The DNSChanger trojan is an example of one such malware that hijacked the DNS settings of over 4 million computers to drive a profit of about 14 million USD through fraudulent advertising revenue.
Also, it is necessary to change the default password of your router, so that it would not be possible for the attacker to modify your router settings using the default password that came with the factory setting. For more details on this topic you can read my other post on How to Hack Ethernet ADSL Router.
Installing a good antivirus program and keeping it up-to-date can offer a great deal of protection to your computer against any such attacks.

What if you are already a victim of DNS hijacking?

If you suspect that your computer is infected with a malware program such as DNSChanger, you need not panic. It is fairly simple and easy to recover from the damage caused by such programs. All you have to do is, just verify your current DNS settings to make sure that you are not using any of those DNS IPs that are blacklisted. Otherwise re-configure your DNS settings as per the guidelines of your ISP.
Continue Reading...

Superman Memory Crystal: 5D Nano-Glass to Preserve Data for Million Years

A research group in Britain has recorded data into a crystal of nanostructured glass. This future storage with practically unlimited lifetime and capacity exceeding Blu-Ray’s by 2,800 times might save civilization’s data for aliens if humankind is gone.

A group of scientists from University of Southampton has developed a ‘five-dimensional’ optical memory, having experimentally proven a possibility of recording data into nanostructured glass using a high speed (femtosecond) laser, which creates self-assembled nanostructures in fused quartz.
The creators of 5D memory has dubbed their invention ‘Superman memory crystal’, following the ‘memory crystals’ used in a number of movies featuring the superhero.
The method is called 5D because in addition to the three dimensional position of these nanostructures their refraction and polarization characteristics work as two additional parameters.
The newly-developed storage promises unprecedented data capacity of 360 Terabyte for a DVD-sized disc. The maximum capacity of a latest generation quad-layer Blu-Ray DVD is “only” 128 Gigabytes. The largest heat-assisted magnetic recording hard drive (HAMR), yet to be commercially produced, will have about 20 terabytes per disc.
Glass storage could preserve data for millions of years whereas a DVD guarantees only about seven years of faultless playback.
The nanostructured glass remains stable if exposed to temperatures up to 1,000°C.
“We are developing a very stable and safe form of portable memory using glass, which could be highly useful for organizations with big archives. At the moment companies have to back up their archives every five to ten years because hard-drive memory has a relatively short lifespan,” said the head of the project Jingyu Zhang, pointing out that museums and national archives with their huge numbers of documents are going to be the first to benefit.
A joint project of University of Southampton’s Optoelectronics Research Centre (ORC) and Eindhoven University of Technology has presented ‘5D Data Storage by Ultrafast Laser Nanostructuring in Glass’ report at the Conference on Lasers and Electro-Optics (CLEO’13) in San Jose, California.
The ORC’s physical optoelectronics group supervisor Prof. Peter G. Kazansky, follower of the Nobel Prize laureate for the invention of laser, Aleksandr Prokhorov, shared that “It is thrilling to think that we have created the first document which will likely survive the human race. This technology can secure the last evidence of civilization: all we’ve learnt will not be forgotten.”

Technology similar to polarized sunglasses

Technically speaking, the process appears as follows. A femtosecond laser that produces extremely short (280 femtoseconds – or 280 quadrillionths of a second) and intense pulses of light encrypts data file into layers of nanostructured dots inside a quartz glass. The layers are placed very close, with mere five micrometers (one millionth of a meter) between them. 
These light impulses modify polarization and refraction of self-assembled dots as the light travels through the glass, somehow similar to the principle used in polarized sunglasses. Later the information encoded in dots’ 5D parameters can be read using an laser scanning device similar to the one used to read CD, DVD and Blu-ray discs and an optical microscope capable of untangling the polarized light reflected by the three-bit spots.
So far there is no talk about re-writing glass discs so they are going to be write-once-read-many (WORM).
Unlike modern DVD and Blu-Ray disks which record data on up to four layers, the 5D data storage will have hundreds of layers (around 400 layers for standard 1.2 mm CD), but will be made of glass instead of plastic encasing metal spraying with data.
So far the developers reported of a successful recording and reading of a 300kb text file on three layers of glass, but this is regarded only as a technological demonstration of this ground-breaking new technology with a very bright future.


Continue Reading...