Trick To "Delete administrator Password" Without Any Software

Trick "Delete administrator Password" without any software.

Trick 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Trick 2
Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log 
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer

Make Your Computer Welcomes You When You Log On.

This is very simple and cool trick to impress your friend.

In this trick when you start you computer it will say "Welcome Back,your name"
and can use your own msg..

isn't it cool..!!

lets start the tricks.

just follow these steps.

1.Open notepad and copy the code in it.
code is.

Dim speaks, speech
speaks="Welcome Back, yourname"
Set speech=CreateObject("sapi.spvoice")
speech.Speak speaks


2. Put your name at the place of your name.
3. Save this with the name of welcome.vbs
4.  Copy File welcome.vbs and paste it in bellow address.

For Windows-7 user.

C:\Users\Username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

For Windows-Xp user.

C:\Documents and Settings\All Users\Start Menu\Programs\Startup

done, now just do log of your computer and log in again...it will welcome you.


Comment Below If You Have Any Problem!!!!

Facebook Logout Hack For Fun.

Hey Here Is A Simple Facebook logout trick which make your friend Logout from Facebook.









Just Give this link to your friend friend and ask him/her to click on it.

Copy This link :-  http://on.fb.me/1hGY3il

when anyone click on this link his account automatic will be logout from Facebook.

you can give this link as a comment on his/her  status or from message.

Comment below if you have any question.

The Evolving Face Of BYOD

The Evolving Face Of BYOD
The emerging trend of BYOD has taken the corporate world by surprise and there are many business owners who are still not quite convinced with the BYOD (Bring your own device) model. Traditional businesses still believe in providing their employees with the desktops and workstations that can be both procured and managed by their in-house IT team. The very idea that smartphones and mobile devices (which once were for personal use only) can be used for official or business purpose sounds a little bizarre to many. But all this does not hide the fact that there are several companies that are successfully using the BYOD model where cloud telephony, thin clients and MDM are fast becoming a way of life.

The concept of BYOD is catching up fast, exciting employees with their new found freedom, and confusing employers with loss of control. IS BYOD that good? What are the issues being faced. Is BYOD inexpensive? Can you run your full office workload on a smart phone or a tablet? Well, the answers to all these questions lies in how you want to use technology with the prevailing business processes in your company.

The concept of BYOD does not sound as exciting as it used to when it entered into the IT lexicon. Companies who had immediately implemented the BYOD model have slowly found out that it has its own limitations and shortcomings, which at times provided more hindrances to business processes and hampered productivity. This does not mean that BYOD is going to fade away into the oblivion; companies will certainly try to accommodate the concept into their broader model of endpoint procurement.

BYOD is an extremely exciting concept wherein employees will be able to bring their own mobile telephony and computing devices to the office. They can easily connect these endpoint devices to the cloud telephony system at office. Cloud storage will replace the ubiquitous servers and desktops. Company executives will be able to work from anywhere by logging in to the central office network. They will be more comfortable by working on their own devices rather than coming to the office and switching on their desktop. Thus, there will be more freedom in the way the employee work which eventually will boost their productivity. A definite positive impact on the bottom line of the company should be the eventual outcome of the new BYOD induction policy.

Well, the reality is a little different from the above where there are instances of many companies that have actually found the BYOD move difficult. The most challenging part of allowing employees to bring their own device is the loss of control. Yes, the company owners do not have any control on the way their employees use their devices and they hardly have a say what is stored on not stored on these devices. Installing management apps on the tablets and smartphones owned by the employees is a big headache as majority of the employees are not comfortable with the idea of installing the apps. Thus, companies find it really difficult to manage the employees who are not ready to do away with the privacy of their devices.

The ownership of the devices also plays a very significant role in determining their use. If the companies are worried about the privately owned devices then they can try out a different model - COPE (Company owned and personally enabled). Under this, the companies can buy the mobile devices and the employees can use it for both their personal work as well official work. Thus, the employees will be equally comfortable working with the company procured devices without affecting negatively affecting the productivity levels or efficiency. BYOD can be given a completely new face by adapting the COPE model.

Image Credit: basketman




Author Bio:
Michelle Patterson has been working with telecom companies for over 20 years, and is excited with the new IP/VoIP/Cloud Telephony and other systems flooding the market. She is learning as much as she can about IP Telephony, Cloud Telephony, VoIP, Unified Communications, etc.

Windows 8 Pro 9200 Product Keys/Activation Keys







Here I will Give You Some Of The Keys For Windows 8 . All the keys arenot 100% working this may work for some Computer.Please let me know if it worked for you or not by commenting below.If this key didn't Worked For You Please Contact Me For More Keys.



Windows 8 Cracked Keys(Activation/Product Keys)

HB39N-V9K6F-P436V-KWBTC-Q3R9V
6PN82-R4BBH-XX8K2-DCK84-VMFDH
QGR4N-78PMD-KCRQ7-83BXT-YG667
BTNJ7-FFMBR-FF9BH-7QMJ9-H49T7
G9XNM-YYY38-8R9HM-YFPTX-T8XT7
CR8NG-63KCR-X2MPD-G7M7P-GQ4DH



This keys are updated in the next section to access those new keys CLICK HERE or Visit Areoftricks

NGMMV-FVDXB-QP6XF-9FTRT-P7F9V
7TWWK-WNB2W-VRVPV-XG6RV-MBFDH
HN42W-QF3D6-2KM6W-C79XK-JW8XV
RFQ3N-4Y4XR-JY9PV-883PR-BY2KV
VC972-N7YXW-G9WQY-VBDP4-GXT67
QDCTN-G878G-WBHHQ-GW7XP-XTJXV
NBCCB-JJJDX-PKBKJ-KQX8X-WTV3H
2747P-9WNWW-MD6JF-HRC36-HFPKV
2Y8NR-PPTC4-XYX8G-4KQGC-6JCKV
38N79-8B9GY-J4JYJ-D29V3-YBFDH
3FCND-JTWFM-24VQ8-QXTMB-TXT67
GX9N8-4H2FH-D987T-BQ9GK-XKT67
P8MCC-G7NDR-D27YY-Q83CC-8W8XV
KKPMN-469HY-H6V43-T8VX2-8W8XV
T3NJK-3P683-2T7BJ-2X27F-8B2KV
HB39N-V9K6F-P436V-KWBTC-Q3R9V
6PN82-R4BBH-XX8K2-DCK84-VMFDH
QGR4N-78PMD-KCRQ7-83BXT-YG667
BTNJ7-FFMBR-FF9BH-7QMJ9-H49T7
G9XNM-YYY38-8R9HM-YFPTX-T8XT7
CR8NG-63KCR-X2MPD-G7M7P-GQ4DH
NGMMV-FVDXB-QP6XF-9FTRT-P7F9V
7TWWK-WNB2W-VRVPV-XG6RV-MBFDH
HN42W-QF3D6-2KM6W-C79XK-JW8XV
RFQ3N-4Y4XR-JY9PV-883PR-BY2KV
VC972-N7YXW-G9WQY-VBDP4-GXT67
QDCTN-G878G-WBHHQ-GW7XP-XTJXV
NBCCB-JJJDX-PKBKJ-KQX8X-WTV3H
2747P-9WNWW-MD6JF-HRC36-HFPKV
2Y8NR-PPTC4-XYX8G-4KQGC-6JCKV
38N79-8B9GY-J4JYJ-D29V3-YBFDH
3FCND-JTWFM-24VQ8-QXTMB-TXT67
GX9N8-4H2FH-D987T-BQ9GK-XKT67
P8MCC-G7NDR-D27YY-Q83CC-8W8XV
KKPMN-469HY-H6V43-T8VX2-8W8XV
T3NJK-3P683-2T7BJ-2X27F-8B2KV


CLICK HERE TO ACCESS UPDATED KEYS OF WINDOWS 8





Is Managed File Transfer (MFT) important in 2014?

Excuse Me!


Managed File Transfer
Managed File Transfer (MFT) ever heard of it? Well until just the other day neither had I, but apparently since the late 1990’s this little niche of an industry has been growing steadily to meet the demands of those of us who wish to exchange large amounts of data on a regular basis. And when you stop and think about it, it’s not surprising that this has happened. Nearly all of us exchange files of one kind or another every week, it’s just that some of us do it on a more industrial scale (think of those running databases and sharing info between one or more business units).

These folk are almost always going to need more than just a good FTP file storage and exchange site.

Professional Needs

What these professional guys require is a whole raft of additional features that go beyond just the ability to transfer a file form one person to another.

First and foremost they are going to want to know that the channel used to carry the transferred data is secure. For those that are really concerned about security that will mean the target file being encrypted not only whilst being transferred but also while it is at rest on whatever server it is stored.

Coming close on the heals of this requirement is the ability to have the transfer made not just person to person but also the possibility of transferring between person and process/application, or process/application to person and even process/application to process/application. This will allow the accommodation of automating the exchange, which in turn may require the integration of third party products such as content and anti-virus scanners.

Managing these exchanges is also extremely important to the corporate user, since keeping control of their data is paramount when considering the potential cost of a data loss or breach. The ability to refer to an audit trail of what was shared with whom is almost as important as preventing the unauthorised access to the data in the first place.

Should You be Interested in MFT

So now that you understand slightly better what MFT is all about should you be making use of it? Do you have a regular and on-going need to exchange data with business partners, sales teams and potential new clients? For most of us the answer is probably yes, but the good news is that there are emerging new products that can achieve this MFT without major cost or in major changes to our existing working practices.

The Future of MFT Today

A favourite of mine is a strong contender to be the next market leader in my humble opinion. It offers everything above and then some but unlike the norm it doesn’t ask you to take a leap of faith, a sort of step into the unknown. This product comes with several independent certifications and industry awards. Not necessarily the be all and end all, but offering a refreshing level of comfort in the fact that you are not the guinea-pig on this occasion.

Summary

And so it seems that although as I’ve stated earlier that this industry has matured, there appears to be always room for innovation and improvement. Oh and if you want to look at my choice go to egress.com.

How To Convert Webpage Into PDF File ?

webpage as pdf

In this post i will teach a simple trick or browser feature that let you convert any web page into PSD file format, which might help you to read your favourite articles offline.Are you really interested in this post? Do you really wanna learn this trick simply not a trick but an idea? Do you wanna convert webpages into PDF File? If your answer is yes this post is for you. 

How To Save Web Page To PDF File ?

1. Open the Google Chrome Browser on your PC or MAC 
2. Then go to the web page that you want to convert as a PDF. 
3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser
4. Now Change the destination to “Save As PDF” and hit the save button.
5. The current web page will instantly be downloaded as a PDF document. 

How To Open Banned Website With Proxy Sites ?

Open Banned Websites WIth Proxy Sites

There are many sites which are blocked by government because of breaking laws of their country. The user downloads many softwares to open these sites but end up being infected by  malware, virus. Today i will share a trick with you guys which can help you easily open these banned sites without downloading anything. As you know that there are many online proxies but everyone need a proxy server which is faster and trusted. Here in this post I am revealing an online proxy and a tutorial to open banned sites with the help of these online proxies which is trusted and fast. Just follow my step to open banned sites.

How To Open Banned Site ?

1. Open www.incloak.com in your browser.

2. After that enter the URL of the site which you want to open like below.

3. Now You Can Enjoy Your Site.

How To Make Nameless Folders In Windows ?

creating nameless folder
In this small tutorial i will show you a smiple windows trick. Basically you can not make folder with no name on windows. This trick will allow you to make folder without any name. This trick works on any windows operating system.


How To Make Nameless Folder

Before attempting this trick, try to make a folder with no name and you will fail to do so. This is what this trick will let you do. Below is screenshot of folder before and after doing this interesting trick.
creating nameless folder
  1. Make a Newfolder on desktop or where ever you want.
  2. Right click on this newly created folder and select Rename.
  3. Erase the text showing "new folder".
  4. Now keep Pressing Alt (i.e alter key) and type 255. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function key.
  5. After that leave alt key and Press enter.
  6. Done you just created nameless folder.

How To Create Undeleteable And Unrenameable Folders In Windows ?

creating undeleteable files
In this tutorial you will learn cool and simple trick to Create an undeletable and unrenamable Folders In Windows Operating System. Most of the Peoples are not aware that it is possible to create Undeletable, Unrenamable folder in windows without any software. To Test this concept just follow simple steps given below.

Try to make a new folder in windows & give it name con,aux, lpt1, lpt2, lpt3 up to lpt9. you won't be allowed to create folder with above mentioned names, Because they are reserved words in windows.

How To Create Undeletable And Unrenamable Folders ?

  1. Go to Start and then Click on Run
  2. Type cmd & hit enter (To open Command Prompt ).
  3. Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
  4. Type D: or E: and hit enter
  5. Type md con\ and hit enter (md - make directory)
  6. You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
  7. Open that directory, you will see the folder created of name con.
  8. Try to delete that folder or rename that folder windows will show the error message.

How to delete that folder ?

It is not possible to delete that folder manually but you can delete this folder by another way mentioned below.
  1. Open Command Prompt
  2. Type D: ( if u created this type of folder in D: drive) & hit enter
  3. Type rd con\ (rd - remove directory)
  4. Open that directory and the folder will not appear because it is removed.
How To Grab Someone IP Address ?

How To Grab Someone IP Address ?

In this tutorial i will you show you how to grab someone Ip address using PHP script.This method can be used to grab someone Ip address on yahoo or Facebook chat or by sending mail to victim. 

How To Hack Someone Ip Address ?

    1. Copy the below codes into Notepad and save it as Grab.php (.php is must) 

           

   <?php$hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);$img_number = imagecreate(400,95);$backcolor = imagecolorallocate($img_number,10,102,153);$textcolor = imagecolorallocate($img_number,255,255,255);imagefill($img_number,0,0,$backcolor);$number0 = " This is Your IP/Proxy";$number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";$number2 = " Host/Proxy: $hostname";$number4 = " _________________________________";Imagestring($img_number,10,5,5,$number0,$textcolor);Imagestring($img_number,10,5,25,$number1,$textcolor);Imagestring($img_number,10,5,45,$number2,$textcolor);Imagestring($img_number,10,5,50,$number4,$textcolor);Imagestring($img_number,10,8,50,$number4,$textcolor);Imagestring($img_number,10,5,10,$number4,$textcolor);Imagestring($img_number,10,8,10,$number4,$textcolor);header("Content-type: image/png");imagepng($img_number);$file=fopen("Name-here-to-protect-the-File.txt","a");$file2 = "- IP joined - IP/Proxy: $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";fwrite($file, $file2);fclose($file);?>e 

   Now Make Free account on any of  the free webhosting  sites Ripway or on My3gb .

    3. Now Upload Grab.php to your site.
    4. Copy the link of your  uploaded file and send it to victim.
    5. As soon as victim will click on your link his ip will be saved in your free web hosting site.

    6. Enjoy you are Done !!

How To Change Your IP Address In Less Than A Minute ?

    
           




      Today I will teach  how to change ip address in less then a minute. For now it will take 2 to 3 minutes but with some practice you can do this within a minute.


  • Click on "Start" in the bottom left corner of the screen.
  • Click on "RUN"
  • Type in "command" and click OK

      You should be now at MSDOS prompt Screen

  • Type "ipconfig /release" just like that, and press "enter"
  • Type "exit" and leave the prompt
  • Right-click on "Network Places" or "My Network Places" on your desktop.
  • Click on "properties"

     Now you should  be on a screen with something titled "Local Area Connection", or something  similar to that, and, if you have a network hooked up, all of your other networks.

  •  Right click on "Local Area Connection" and click "properties"
  • Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
  • Click on "Use the following IP address" under the "General" tab
  • Create an IP address (It doesn't matter what it is)
  • Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  • Press the "Ok" button here
  • Hit the "Ok" button again

     Now you should be back to the "Local Area Connection" screen.

  • Right-click back on "Local Area Connection" and go to properties again.
  • Go back to the "TCP/IP" settings
  • This time, select "Obtain an IP address automatically"
  • Click on "Ok"
  • Hit "Ok" again.
  • Now you have a New IP address.

How To Find IP Address Of Any Website By Using CMD ?

In this tutorial i will teach you to find Ip Address of any website using Command Prompt or in short CMD. Using IP Address you can find location of the website server and do more stuff. I will demostrate this tutorial with Google but you can use this method to find IP Address of any website like twitter, facebook etc. so lets start

How to find IP ?

1. Go to Start > Type CMD and press Enter.
2. Now write Ping followed by website URL whose IP you want to find.
finding ip adddress of website

3. It will take less then a second and come up with the results as shown below.
finding ip adddress of website

What Is Phishing And How To Be Safe From Phishing ?





What is Phishing ?

                    Phishing is simply one of the type of hacking . It is a method of acquiring sensitive information such as username, password, etc.Phishing page could be saif as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail. Target of phishing are mostly facebook, gmail, etc. 



    Example of Phishing scams:

         1) Email asking you to login to your locked account to unlock it.

         2) Email carrying a Link to sites like Facebook,yahoo etc and asking you to Login.

         3) Emails containing some Information of your Interest and asking you to Login to Your Account.
   
     How to be safe from phishing ?

        1) Never login to any of your account through link provided in the Email.

        2) Go to real website dont click on any link posted anywhere. such as link posted on your               facebook wall by friend or link provided in comments or link to certain website on any                 blog.

        3) Check the URL of website before entering any sensitive information. Because the URL of             phishing page is not same as the URL of  real one.Real gmail page looks like gmail.com                 while phishing looks different somthing like gmail.anything.com

What Is Keylogger And How To Be Safe From Keyloggers ?


Hy Everyone today  i am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your own computer and that is Keyloggers. Simply keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets start Step By step.

 1. What is keylogger ?

I think You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger  is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes and For hacking Password Too.

2. How it can harm you ?

 It can be used by your enemy or friend to get sensitive information such as your username and password, Bank Credit card details, or any other activities you do on your computer.

       EXAMPLE:- You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.

3. Types of  keyloggers 

There are two types of keylogger Hardware and software Keylogger. Software keylogger is install in your computer where as Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.

                              HARDWARE KEYLOGGER                                  
hardware keyloggers 

 software keyloggers
                              

 4. How to Protect yourself from keyloggers ?

 In order to be safe from keylogger  keep following points in your mind.
  • Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
  • You can even use above method to protect your facebook profile, yahoo or gmail id.
  • When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.