Wednesday

Backup/Re-download accidentally deleted torrent(s)

Transfer WITH GREATER SPEED...

JOIN OUR FACEBOOK GROUP

Many of us know that it is possible to copy or move files & folders in Windows by either using your mouse to right click, select Copy and then Paste, or your keyboard’s shortcut key CTRL+C to copy, CTRL+X to cut (for moving) and CTRL+V to paste. The biggest factor on the time taken to copy or move the files very much depend on the hard drive’s speed (5400RPM, 7200RPM, SSD) and also the interface (PATA, SATA, SCSI). However, it is still possible to shorten the duration in copying or moving files if you use third party software to do it instead of relying on the Windows built-in function

I simply copied a folder containing 2319 files, ranging from files as small as 1KB to as big as 700MB to another hard drive using the software’s default settings. The file copying testing methodology which I used is very simple and I have to admit that it is not enough to determine which is the “best” or “fastest” file copying software. However, the results does give you a hint on which file copy software you should be try and avoid.

  • FastCopy 2.08 (57 seconds)
  • ExtremeCopy Pro 1.5.1 (57 seconds) *
  • TeraCopy 2.12 (65 seconds) *
  • RichCopy 4.0.217 (66 seconds) *
  • KillCopy 2.85 (74 seconds)
  • Ultracopier 0.2.0.15 (75 seconds)
  • PerigeeCopy 1.2 (75 seconds) *
  • Robocopy (75 seconds)
  • Windows 7 (76 seconds)
  • Copy Handler 1.32.276 (77 seconds) *
  • MiniCopier 0.5 (79 seconds)
  • Copywhiz 4.0 Build 3 (82 seconds)
  • SuperCopier 2.2 (86 seconds) *
  • Roadkil’s Unstoppable Copier 5.2 (86 seconds)
  • QCopy 1.0.2 (409 seconds)
  • I am quite surprise to find that only about half of the file copy software is able to copy faster than the default Windows 7 copy function and the rest takes longer time to finish copying. Hopefully this simple test will be an eye opener to those that are using the slower file copy software.

    The good thing about file copying software is the ability to that failed tresumeo copy. In Windows, if the copy failed, you’d have recopy and replace existing files that are already copied. Some file copy software above that are marked with an asterisk (*) are those that can completely replace Explorer copy and move functions, allowing you work with files as usual. For example, using the hotkey CTRL+C and CTRL+V will automatically make the file copy software to copy and paste instead of using the Windows built-in copy function.

    Tuesday

    install windows 7 from usb(min:4gb)

    JOIN OUR FACEBOOK GROUP



    Installing Windows 7 using a pendrive is very much faster than that from DVD/CD. You just need to follow some small steps to do this. You can keep this pendrive/USB drive for future installation of Windows 7. If you are a beginner or dont want to get messed up by typing in all commands, here is a Free Utility To Create A Bootable USB To Install Windows 7, Vista & Server 2008(http://cid-f52381d9f2fd5fd8.skydrive.live.com/browse.aspx/ABUSB). This tool will help you to automate the process of bootable pendrive’s and you can install windows 7 from pendrive easily. If not you can follow this guide to install windows 7 from a pendrive.

    installing of utility

    Check USB drive (To check whether your USB drive is connected or not)
    Format USB Drive
    Choose DVD or ISO image (To copy the needed files to USB drive)
    Start the process to create bootable USB drive
    Bootable USB automatically runs the required commands in Windows 7 / vista fro making the USB drive bootable. All you need to do is to follow these four simple steps.

    Note: Windows XP users cant Run this utility. If you try to run it Bootable USB will show a message saying that ” Unsupported Opperating System. Supported Operating systems are Windows Vista (SP1 or later) “. On Vista with no SP there is an error diskpart which is solved later by microsft on SP1 and later.

    And before selecting the DVD or ISO image of the Windows 7 or Vista installation make sure it is free of errors.
    Bootable USB works with 64 bit versions of Windows 7, Vista too. Bootable USB is a nice and sleek application that is of great use in creating A Bootable USB To Install Windows 7.


    Make sure you have a Pendrive or USB drive with a minimum of 4 GB space and you have the Windows 7 installation DVD. This tutorial is best suited if you have a Windows 7 DVD with you else you need to change it
    ...............................................

    Format the Pendrive or USB drive in NTFS format first.
    From the start menu right click on the command prompt and select “Run as administrator“.
    Now type the following commands (Press enter key after each command).
    diskpart. This is to open the disk partition program.
    Now to show the list of drives type list disk.
    You can see disk’s listed there. Note down the disk number of your pendrive eg. Disk .
    Now type SELECT DISK X (where X is the number you noted down for the pendrive from step 5)
    Now type CLEAN.
    Now type the following commands by pressing enter after each one.
    CREATE PARTITION PRIMARY
    SELECT PARTITION 1 (Assuming your pendrive/ USB drive is 1).
    ACTIVE
    FORMAT FS=NTFS
    ASSIGN
    EXIT(Now the disk partition program will exit). Now we need to give some more commands.
    Now insert the Windows 7 Installation DVD and to your DVD drive.
    Here i am assuming DVD drive as G and Pendrive as I.(Change it accordingly).
    Now type G:CD BOOT
    Now type this command BOOTSECT.EXE/NT60 I: to update your USB drive with bootmgr code.
    Finally copy all the contents from the Windows 7 DVD to your Pendrive. Make sure you don’t cause any errors.
    Plug / Insert your pendrive to your PC and restart the system.
    Now Enter the Bios system accordingly by pressing the key delete.(This may vary some times it will be F2 or F12. It depends on the type of your system. Any how during the start up your system will display which key to press to enter the Bios).
    Now select the USB/ Pendrive as the first boot driver.(Set the first boot priority to USB drive.).
    Now save the settings in Bios and restart and you will be able to Install Windows 7 using that pendrive.

    BIOS Password Backdoors in Laptops

    JOIN OUR FACEBOOK GROUP

    in ebay there are lots of guys selling this tricks $45 and above.this is simple trick u can do it..i got it from dogbert article..hack heck team always gratitude for that


    laptops bios locked with password, a checksum of that password is stored to a sector of the FlashROM - this is a chip on the mainboard of the device which also contains the BIOS and other settings, e.g. memory timings. For most brands, this checksum is displayed after entering an invalid password for the third time:

    The dramatic 'System Disabled' message is just scare tactics: when you remove all power from the laptop and reboot it, there are not new penalties such as additional passwords, locks and so on. From such a checksum (also called "hash"), valid passwords can be found by means of brute-forcing. Another method commonly used is that instead of a checksum, a number is displayed from which a randomly generated password can be calculated. Quite often, vendors also resort to storing the password in plain text, and instead of printing out just a checksum, an encrypted version of the password is shown. Either way, my scripts can be used to derive valid passwords with the hash.

    Some vendors have implemented obfuscation measures to hide the hash from the end user - for instance, some FSI laptops require you to enter three special passwords for the hash to show up (see other post). HP/Compaq laptops only show the hash if the F2 or F12 key has been pressed prior to entering an invalid password for the last time.

    Depending on the "format" of the number code/hash (e.g. whether only numbers or both numbers and letters are used, whether it contains dashes, etc.), you need to choose the right script - it is mostly just a matter of trying all of them and finding the one that matches your laptop. It does not matter on what machine the script are executed, i.e. there is no reason to run them on the locked laptop.
    This is an overview of the algorithms that I looked at so far:

    VendorHash EncodingExample of Hash Code/SerialScripts
    Compaq5 decimal digits12345pwgen-5dec.py
    Windows binary
    Dellserial number1234567-595B
    1234567-D35B
    1234567-2A7B

    Windows binary&source
    Fujitsu-Siemens5 decimal digits12345pwgen-5dec.py
    Windows binary
    Fujitsu-Siemens8 hexadecimal digitsDEADBEEFpwgen-fsi-hex.py
    Windows binary
    Fujitsu-Siemens5x4 hexadecimal digitsAAAA-BBBB-CCCC-DEAD-BEEFpwgen-fsi-hex.py
    Windows binary
    Fujitsu-Siemens5x4 decimal digits1234-4321-1234-4321-1234pwgen-fsi-5x4dec.py
    Windows binary
    Hewlett-Packard5 decimal digits12345pwgen-5dec.py
    Windows binary
    Hewlett-Packard/Compaq Netbooks10 charactersCNU1234ABCpwgen-hpmini.py
    Windows binary
    Insyde H20 (generic)8 decimal digits03133610pwgen-insyde.py
    Windows binary
    Phoenix (generic)5 decimal digits12345pwgen-5dec.py
    Windows binary
    Samsung12 hexadecimal digits07088120410C0000pwgen-samsung.py
    Windows binary


    The .NET runtime libraries are required for running the Windows binary files (extension .exe). If the binary files (.exe) don't work out for you, install Python 2.6(not 3.0!) and run the .py script directly by double-clicking them. Make sure that you correctly read each letter (e.g. number '1' vs letter 'l').

    Please comment on what make/model the scripts work and on what they don't. Also, be aware that some vendors use other schemes for master passwords - among them are e.g. IBM/Lenovo. Please understand that my motivation for reverse-engineering comes from a personal interest. If you find that your laptop does not display a hash or the scripts do not work for you for whatever reason, please use the vendor support. I will not accept offers to look at the specifics of certain models

    BIOS Password Backdoors in Laptops

    JOIN OUR FACEBOOK GROUP

    in ebay there are lots of guys selling this tricks $45


    laptops bios locked with password, a checksum of that password is stored to a sector of the FlashROM - this is a chip on the mainboard of the device which also contains the BIOS and other settings, e.g. memory timings. For most brands, this checksum is displayed after entering an invalid password for the third time:

    The dramatic 'System Disabled' message is just scare tactics: when you remove all power from the laptop and reboot it, there are not new penalties such as additional passwords, locks and so on. From such a checksum (also called "hash"), valid passwords can be found by means of brute-forcing. Another method commonly used is that instead of a checksum, a number is displayed from which a randomly generated password can be calculated. Quite often, vendors also resort to storing the password in plain text, and instead of printing out just a checksum, an encrypted version of the password is shown. Either way, my scripts can be used to derive valid passwords with the hash.

    Some vendors have implemented obfuscation measures to hide the hash from the end user - for instance, some FSI laptops require you to enter three special passwords for the hash to show up (see other post). HP/Compaq laptops only show the hash if the F2 or F12 key has been pressed prior to entering an invalid password for the last time.

    Depending on the "format" of the number code/hash (e.g. whether only numbers or both numbers and letters are used, whether it contains dashes, etc.), you need to choose the right script - it is mostly just a matter of trying all of them and finding the one that matches your laptop. It does not matter on what machine the script are executed, i.e. there is no reason to run them on the locked laptop.
    This is an overview of the algorithms that I looked at so far:

    VendorHash EncodingExample of Hash Code/SerialScripts
    Compaq5 decimal digits12345pwgen-5dec.py
    Windows binary
    Dellserial number1234567-595B
    1234567-D35B
    1234567-2A7B

    Windows binary&source
    Fujitsu-Siemens5 decimal digits12345pwgen-5dec.py
    Windows binary
    Fujitsu-Siemens8 hexadecimal digitsDEADBEEFpwgen-fsi-hex.py
    Windows binary
    Fujitsu-Siemens5x4 hexadecimal digitsAAAA-BBBB-CCCC-DEAD-BEEFpwgen-fsi-hex.py
    Windows binary
    Fujitsu-Siemens5x4 decimal digits1234-4321-1234-4321-1234pwgen-fsi-5x4dec.py
    Windows binary
    Hewlett-Packard5 decimal digits12345pwgen-5dec.py
    Windows binary
    Hewlett-Packard/Compaq Netbooks10 charactersCNU1234ABCpwgen-hpmini.py
    Windows binary
    Insyde H20 (generic)8 decimal digits03133610pwgen-insyde.py
    Windows binary
    Phoenix (generic)5 decimal digits12345pwgen-5dec.py
    Windows binary
    Samsung12 hexadecimal digits07088120410C0000pwgen-samsung.py
    Windows binary


    The .NET runtime libraries are required for running the Windows binary files (extension .exe). If the binary files (.exe) don't work out for you, install Python 2.6(not 3.0!) and run the .py script directly by double-clicking them. Make sure that you correctly read each letter (e.g. number '1' vs letter 'l').

    Please comment on what make/model the scripts work and on what they don't. Also, be aware that some vendors use other schemes for master passwords - among them are e.g. IBM/Lenovo. Please understand that my motivation for reverse-engineering comes from a personal interest. If you find that your laptop does not display a hash or the scripts do not work for you for whatever reason, please use the vendor support. I will not accept offers to look at the specifics of certain models