Hacking Tools

Here are some hacking tools.

Crack MD5

Here top tools for crackig md5 to noral text.

Photo Editing

Top online tools for editing photos.

Friday, December 2, 2011

How to monitor your time spent Web surfing

The Internet is full of useful information. It's also full of lots of distractions that can prevent you from being productive at work or at home. If you're curious what sites you spend the most time on, or are concerned with how much time you spend not working on the job, follow these five steps to monitor your browsing habits.

Begin by downloading and installing Gold Limiter. When installing, you will be given the option to add the Internet monitor and filter, or just the Internet monitor. Chances are, you're only interested in the monitor, so select that option.

Step 1: Run the program from the desktop or Start menu. On first run, you will prompted to set up a password and security question. This is recommended if you'd like to keep your browsing records private.

Step 2: Follow the setup wizard to adjust your monitor settings. First up are timing settings. Preset options are available for monitoring at all times or just during work hours, and you can also enter your desired times manually.

Step 3: Adjust the settings for reporting. You can choose to receive reports daily, weekly, monthly, or not at all from the program.
(Optional) Step 4: If you're monitoring your browser activity at work, the next page of the wizard has a setting for your hourly earnings. If you set this, your reports will show you how much money you're wasting with your browsing habits.



Google Chrome Step 5: From the main window, click on a report type to see what sites you spend the majority of your time on.
Whether your productivity is low at work or you're a parent concerned with your child's browsing, you're sure to gather a few bits of useful and interesting information from running this program.


Source:http://news.cnet.com

Thursday, December 1, 2011

Google, Microsoft, Yahoo, AOL join Agari anti-phishing service

The major Web-based e-mail providers are joining forces with an anti-fraud startup, which is launching tomorrow, to help keep phishing messages out of peoples' inboxes.



Google, Microsoft, Yahoo, and AOL are providing metadata from messages that get delivered to their customers to Palo Alto, Calif.-based Agari so it can be used to look for patterns that indicate phishing attacks. Agari collects data from about 1.5 billion messages a day and analyzes them in a cloud-based infrastructure, according to Agari CEO Patrick Peterson.


The company aggregates and analyzes the data and provides it to about 50 e-commerce, financial services and social network customers, including Facebook and YouSendIt, who can then push out authentication policies to the e-mail providers when they see an attack is happening.
"Facebook can go into the Agari console and see charts and graphs of all the activity going on in their e-mail channel (on their domains and third-party solutions) and see when an attack is going on in a bar chart of spam hitting Yahoo," for instance, Daniel Raskin, vice president of marketing for Agari, told CNET in an interview. "They receive a real-time alert and they can construct a policy to push out to carriers (that says) when you see this thing happening don't deliver it, reject it."
Agari doesn't collect the actual messages, he said. Some e-mail providers will take a message that is failing authentication and provide the malicious URLs in it to Agari to pass on to the company whose name is being used in the phishing messages, Raskin said. "Other than that we don't want to see the content," he said.
Google expects Gmail users to benefit as more mail senders authenticate their messages and implement block policies.
"Since 2004 Gmail has supported several authentication standards and developed features to help combat e-mail phishing and fraud," Google Product Manager Adam Dawes said in a statement to CNET. "Proper coordination between senders and receivers is the best way to cut down on the transmission of unauthorized mail, and AGARI's approach helps simplify this process."
Agari, which has been operating in stealth mode since October 2009, rejected more than 1 billion messages across its e-mail partners' networks in a year, according to Peterson, who was with the original management team of e-mail security firm IronPort. IronPort got acquired by Cisco in 2007.
Agari protects 50 percent of U.S. consumer e-mail traffic and more than one billion individual mailboxes.
Originally posted at InSecurity Complex
Source:http://news.cnet.com

Thursday, October 13, 2011

Usefull Ebooks

 rc4-misuse.pdf   The Misuse of RC4 in Microsoft Word and Excel
 802.11_attacks.pdf   802.11 Attacks
 ActiveX_active_expl.pdf   ActiveX - Active Exploitation
 address-spoof.txt   Address Bar Spoofing Attacks Against IE 6
 Address_Resolution.txt   Understanding Address Resolution Protocol Attacks
 adv-buff-overflow.txt   Advanced Buffer Overflow Exploits
 Adv-Shell-Tech.txt   Advanced Shellcoding Techniques
 Advanced_SQL_Injection.pdf   Advanced SQL Injection In SQL Server Applications
 afs.ps   Highjacking AFS
 brute_force_analysis.txt   Analysis of Brute Force & Dictionary Attacks
 Anatomy_of_Malware.pdf   Anatomy of a Malware
 anomaly_rules_def.pdf   Using Snort as an anomaly based IDS
 AnonMax.txt   How to maintain your anonymity on the web
 appOSfingerprint.txt   Advanced application-level OS fingerprinting
 aspmail-spoof.pdf   ASP CDONTS.NEWMAIL object E-mail Spoofing
 Oracle_PL_SQL_Injection.pdf   Assault on Oracle PL SQL Injection
 xss-attack-defense.txt   Cross Site Scripting - Attack and Defense guide
 banking-flaws.pdf   Internet Banking Flaws In India
 beginners.txt   Beginners guide to UNIX Hacking
 Biologger.pdf   Biologger - A Biometric Keylogger
 biosdefault.txt   Default BIOS passwords
 Blind_MySQL_Injection.pdf   Blind MySQL Injection
 cryptography_basics.pdf   Basics of Cryptography
 browserhack.txt   Hacking from your Web Browser
 bsdkern.htm   Attacking FreeBSD with Kernel Modules
 Buffer_Overflow.txt   Buffer Overflow Tutorial
 Bypassing_NAC.pdf   Bypassing network access control (NAC) systems
 clickjack-xss.txt   The Clickjacking Meets XSS: A State Of Art
 Spyware_Intro.pdf   Introduction to Spyware
 defaultpasswords.txt   Default Passwords for network switches and devices
 dns-writeup.txt   DNS cache poisoning then and now
 dsniff_netmon.txt   Network Monitoring with Dsniff
 email_and_telnet.txt   Sending Emails via SMTP and Telnet
 Erasing_Logs.txt   Erasing Your Presence From System Logs
 ErrSQL_Inj.pdf   Error based SQL Injection
 format_string_exp.txt   Exploiting Format String Vulnerabilities
 faqar.txt   Remailers FAQs
 ffp.pdf   Fuzzy Fingerprinting
 firewall-stego.txt   Bypassing firewalls through protocol stenography
 FirewallsFAQ.txt   Firewalls FAQs
 advanced_xss.txt   Advanced Cross-Site-Scripting
 vista_dll_injection.pdf   Windows Vista DLL Injection
 IDS_Agents.pdf   IDS Using Security Agents
 whid_2008.pdf   Web Hacking Incidents Database 2008
 expl_buff_ovfl.pdf   Exploiting Buffer Overflows
 IIS_Exploitation.txt   Guide to IIS Exploitation
 finger.txt   Finger a user via telnet
 hacker-howto.html   How To Become A Hacker
 hackers-rfc.txt   The Hacker's RFC
 hackfaq.zip   The Hack FAQ
  hackkit-2.0b.txt   Hacking Kit v2.0
 hackpage.txt   Hacking Webpages The Ultimate Guide
 hackpw.txt   How to crack a unix password file
 HostFingerprinting.pdf   Host Fingerprinting and Firewalking With hping
 Honeywalldetection.pdf   How to detect Honeypots using hping
 host-detection.doc   Advanced Host Detection Techniques
 Bypass_BIOS.txt   How to Bypass BIOS Passwords
 find-ftps.txt   How To Find Ftp's The Easy Way
 modify_exe.txt   How to modify exe files
 httprint_paper.zip   Introduction to HTTP fingerprinting
 UnicodeExpl.doc   Unicode exploitation with how it works
 Info-Gathering.txt   The Info-Gathering Tutorial
 int-arr-overfl.txt   Integer array overflows
 intv2-8.pdf   A Network Intrusion Detector
 ip-faq.htm   An IP address FAQ
 tcp-attack.txt   Simple Active Attack Against TCP
 ipspoofing_dem.zip   IP-spoofing Demystified
 inetsec.txt   A Guide to Internet Security
 ip-spoof.txt   A short overview of IP spoofing
 anon-ftp-faq.htm   Anonymous FTP FAQ
 pack_cap.htm   Network Packet Capture FAQ
 javascript_fun.txt   how javascript can be used to bypass html forms
 John_The_Ripper.pdf   John The Ripper -An Illustrated Guide
 Learning_Perl.pdf   Learning Perl Writing Exploits
 Info_Gather.pdf   Learn Information Gathering By Example
 vuln_look.txt   Looking for Vulnerabilities
 linux-kernel.txt  The Linux Kernel HOWTO
 linux-shell-ref.pdf   LINUX SHELLCODING REFERENCE
 firewalls-loc.txt   Locating Stateless Firewalls
 mac_addr_clon.pdf   "Cloning MAC Addresses" Whitepaper
 metasploit_expl.txt   Metasploit 3.0 Automated Exploitation
 dns_spoof.htm   DNS Spoofing and Abuse
 MiddleMan.pdf   Paper explaining man-in-the-middle attacks
 linux_tips.txt   Misc Linux Tips & Tricks
 secret_codes.txt   Mobile Secret Codes
 HackingFeeds.pdf   Feed Injection in Web 2.0

Credit: http://insecure.in/

Saturday, October 8, 2011

Friday, July 1, 2011

google chrome shortcuts

google chrome shortcuts(for Windows)

Ctrl+N Opens a new window.
Ctrl+T Opens a new tab.
Ctrl+Shift+N Opens a new window in incognito mode.
Press Ctrl+O, then select file. Opens a file from your computer in Google Chrome.
Press Ctrl and click a link. Or click a link with your middle mouse button (or mousewheel). Opens the link in a new tab in the background .
Press Ctrl+Shift and click a link. Or press Shift and click a link with your middle mouse button (or mousewheel). Opens the link in a new tab and switches to the newly opened tab.
Press Shift and click a link. Opens the link in a new window.
Ctrl+Shift+T Reopens the last tab you've closed. Google Chrome remembers the last 10 tabs you've closed.
Drag a link to a tab. Opens the link in the tab.
Drag a link to a blank area on the tab strip. Opens the link in a new tab.
Drag a tab out of the tab strip. Opens the tab in a new window.
Drag a tab out of the tab strip and into an existing window. Opens the tab in the existing window.
Press Esc while dragging a tab. Returns the tab to its original position.
Ctrl+1 through Ctrl+8 Switches to the tab at the specified position number on the tab strip.
Ctrl+9 Switches to the last tab.
Ctrl+Tab or Ctrl+PgDown Switches to the next tab.
Ctrl+Shift+Tab or Ctrl+PgUp Switches to the previous tab.
Alt+F4 Closes the current window.
Ctrl+W or Ctrl+F4 Closes the current tab or pop-up.
Click a tab with your middle mouse button (or mousewheel). Closes the tab you clicked.
Right-click, or click and hold either the Back or Forward arrow in the browser toolbar. Displays your browsing history in the tab.
Press Backspace, or Alt and the left arrow together. Goes to the previous page in your browsing history for the tab.
Press Shift+Backspace, or Alt and the right arrow together. Goes to the next page in your browsing history for the tab.
Press Ctrl and click either the Back arrow, Forward arrow, or Go button in the toolbar. Or click either button with your middle mouse button (or mousewheel). Opens the button destination in a new tab in the background.
Double-click the blank area on the tab strip. Maximizes or minimizes the window.
Alt+Home Opens your homepage in your current window.

Google Chrome feature shortcuts

Alt+F or Alt+E Opens the wrench menu, which lets you customize and control settings in Google Chrome.
Ctrl+Shift+B Toggles the bookmarks bar on and off.
Ctrl+H Opens the History page.
Ctrl+J Opens the Downloads page.
Shift+Esc Opens the Task Manager.
Shift+Alt+T Sets focus on the first tool in the browser toolbar. You can then use the following shortcuts to move around in the toolbar:
  • Press Tab, Shift+Tab, Home, End, right arrow, and left arrow to move focus to different items in the toolbar.
  • Press Space or Enter to activate toolbar buttons, including page actions and browser actions.
  • Press Shift+F10 to bring up any associated context menu (e.g. browsing history for the Back button).
  • Press Esc to return focus from the toolbar back to the page.
F6 or Shift+F6 Switches focus to the next keyboard-accessible pane. Panes include:
  • Address bar
  • Bookmarks bar (if visible)
  • The main web content (including any infobars)
  • Downloads bar (if visible)
Ctrl+Shift+J Opens Developer Tools.
Ctrl+Shift+Delete Opens the Clear Browsing Data dialog.
F1 Opens the Help Center in a new tab (our favorite).

Address bar shortcuts

Use the following shortcuts in the address bar:
Type a search term, then press Enter. Performs a search using your default search engine.
Type a search engine keyword, press Space, type a search term, and press Enter. Performs a search using the search engine associated with the keyword.
Begin typing a search engine URL, press Tab when prompted, type a search term, and press Enter. Performs a search using the search engine associated with the URL.
Ctrl+Enter Adds www. and .com to your input in the address bar and open the resulting URL.
Type a URL, then press Alt+Enter. Opens the URL in a new tab.
Ctrl+L or Alt+D Highlights the URL.
Ctrl+K or Ctrl+E Places a '?' in the address bar. Type a search term after the question mark to perform a search using your default search engine.
Press Ctrl and the left arrow together. Moves your cursor to the preceding key term in the address bar
Press Ctrl and the right arrow together. Moves your cursor to the next key term in the address bar
Ctrl+Backspace Deletes the key term that precedes your cursor in the address bar
Select an entry in the address bar drop-down menu with your keyboard arrows, then press Shift+Delete. Deletes the entry from your browsing history, if possible.
Click an entry in the address bar drop-down menu with your middle mouse button (or mousewheel). Opens the entry in a new tab in the background.
Press Page Up or Page Down when the address bar drop-down menu is visible. Selects the first or last entry in the drop-down menu.

Webpage shortcuts

Ctrl+P Prints your current page.
Ctrl+S Saves your current page.
F5 or Ctrl+R Reloads your current page.
Esc Stops the loading of your current page.
Ctrl+F Opens the find bar.
Ctrl+G or F3 Finds the next match for your input in the find bar.
Ctrl+Shift+G, Shift+F3, or Shift+Enter Finds the previous match for your input in the find bar.
Click the middle mouse button (or mousewheel). Activates auto-scrolling. As you move your mouse, the page automatically scrolls according to the direction of the mouse.
Ctrl+F5 or Shift+F5 Reloads your current page, ignoring cached content.
Press Alt and click a link. Downloads the target of the link.
Ctrl+U Opens the source of your current page.
Drag a link to bookmarks bar Saves the link as a bookmark.
Ctrl+D Saves your current webpage as a bookmark.
Ctrl+Shift+D Saves all open pages as bookmarks in a new folder.
F11 Opens your page in full-screen mode. Press F11 again to exit full-screen.
Ctrl and +, or press Ctrl and scroll your mousewheel up. Enlarges everything on the page.
Ctrl and -, or press Ctrl and scroll your mousewheel down. Makes everything on the page smaller.
Ctrl+0 Returns everything on the page to normal size.
Space bar Scrolls down the web page.
Home Goes to the top of the page.
End Goes to the bottom of the page.
Press Shift and scroll your mousewheel. Scrolls horizontally on the page.

Text shortcuts

Ctrl+C Copies highlighted content to the clipboard.
Ctrl+V or Shift+Insert Pastes content from the clipboard.
Ctrl+Shift+V Paste content from the clipboard without formatting.
Ctrl+X or Shift+Delete Deletes the highlighted content and copies it to the clipboard.

Tuesday, June 21, 2011

HackerTools-online

HackerTools-online

MDcrack (MD5 Cracker)
http://membres.lycos.fr/mdcrack/

Passwords Pro (MD5/MD4/Pass Generator)
http://www.insidepro.com/eng/passwordspro.shtml

RainbowCrack Hash Cracker
http://www.antsight.com/zsl/rainbowcrack/

Distributed John The Ripper by Luis Parravicini
http://ktulu.com.ar/en/djohn.php

Cain and Abel by Massimiliano Montoro
http://www.oxid.it/cain.html

Salt Grinder by Wolfman
http://wolfman.deny.de/SaltGrinder.php

Log Tools LogRip by Rhino -
http://rhino.deny.de/logrip.php

Azarius by Rhino -
http://rhino.deny.de/azarius.php

Zimapass Parser by Sentinel:
http://sentinel.deny.de/zimaparser.htm

C-Parse (ccbill.log parser) by Sentinel:
http://sentinel.deny.de/c_parse.htm

CCBill USI (CCBILL log parser that removes all dead account PRIOR to decrypting)
http://membres.lycos.fr/ccbill/

Accessdiver/Ares Parser by Sentinel:
http://sentinel.deny.de/ad_ares_parser.htm

Spoofers Zspoof by wolfman -
http://wolfman.deny.de/tools.html

Spooph by nast0
http://24.106.100.133/spooph/index.html

Charon by Rhino
http://www.icefortress.com/hosts/rhino/

Advanced Proxy Leecher (APL) by Sentinel
http://sentinel.deny.de/apl.htm

Sentry by Sentinel
http://sentinel.deny.de/sentry.php

Goldeneye by Madmax
http://madmax.securibox.net/products/goldeneye/goldeneye.htm

Form@ (specifically for FORM sites) by SSS -
http://sss.deny.de/

httpbugger By Ken78x (specifically for form sites and httpS form sites) 
http://ken78x.securibox.net/

Caecus by Sentinel (For form sites that require an OCR [t4wsentry.pl]) 
http://sentinel.deny.de/Caecus.php

Ares by Gamoaa -
http://www.xisp.org/downloads/FACE_Setup.zip

Brutus
http://www.hoobie.net/brutus/

Tools Hacking Reverse IP to Hacking
http://huehacker.info

Bruteforcing Programs Accessdiver (AD) by Jean Fages
http://www.accessdiver.com

AuthForce by Zachary P. Landau
http://kapheine.hypa.net/authforce/index.html

Entry by Sparkleware
http://www.sparkleware.com/entry/index.html

Xavior By LithiumSoft
http://www.btinternet.com/%7Elithiumsoft/Products.html

Web Password Checker (WPC) .1 For UNIX by g1soft 
http://www.securityfocus.com/tools/885/scoreit

Munga Bunga’s http Brute Forcer by Munga Bunga
http://www.hackology.com

Wordlist Tools Raptor 3 by Madmax
http://madmax.securibox.net/products/raptor/raptor.htm

Staph by Ashes available at securibox.net under “downloads” Words Extractor 
http://www.intellitamper.com/wordsextractor/

Parsley by on_a_role_again
http://www.geocities.com/parsley_home/

Lucifer by Rhino -
http://rhino.deny.de/lucifer.php

ALS_novice by Wolfman -
http://wolfman.deny.de/tools.html

Combomania by Gamoaa: available at securibox.net under “downloads” Z-leecher by Beda
http://goldmaster.webpark.cz/sleech.html

S-Generator by Beda
http://goldmaster.webpark.cz/sgen.html

S-WordlistTool by Beda
http://goldmaster.webpark.cz/swordt.html

Proxy Tools Proxyrama By Gaamoa
http://gaamoa.deny.de/


Geowhere by Jean Fages (NOT-Freeware) -
http://www.geowhere.net/

Proxy List Filter -
http://www.freeproxy.ru/en/programs/proxy_filter.htm

Sploof by Jean Fages -
http://www.accessdiver.com/sploof.htm

Final Spoof
http://www.beatharness.com/finalspoof/

AATools by Glocksoft
http://www.glocksoft.com/aatools.htm

Proxy Checker by Hell Labs
http://www.helllabs.com.ua/labs.php?

Proxy Bag
http://www.intellitamper.com/proxybag/

S-Proxy Tool by Beda
http://goldmaster.webpark.cz/sproxy.html

Decrypting Tools John The Ripper (JTR) -
http://www.openwall.com/john/


D-Spoof And Others (Russian Site, English Prog)
http://mspoofer.pisem.net/zaza/index.htm

MVSLite By Mentor
http://mvs.freehosting.net/index.html

Mikho’s Online Spoofer (web based spoofer, choose “open” when dialog appears)
http://www.mikhosoft.com/spoofs/

QuickSpoof
http://httpd.chello.nl/%7Em-koster2/spoofs.htm

Other Tools Scholar by Sentinel – (History checker)
http://sentinel.deny.de/scholar.htm

Crackmate Gold by Xtremet (adultcheck gold pass verifier)
http://xtremet.deny.de/products.htm

Monday, June 20, 2011

Sega Customer Database Hacked

Sega Customer Database Hacked

Video game company Sega had a and sensitive information on about 1.3 million customers has been compromised, according to media reports.
The database of the Sega Pass website includes customer names, dates of birth, e-mail addresses, and encrypted passwords.
 
Various media outlets have been able to confirm the attack with officials from the Japanese company. The news site Playstation Lifestyle posted the text of an e-mail that Sega reportedly sent to Sega Pass registered users on Friday night informing them of the breach.
In the letter, Sega stresses that passwords weren't stored in plain text, but rather encrypted, and that payment information wasn't involved in the incident.
Still, the company recommends that people who use the same e-mail/password combination to access other websites that they used for Sega Pass proactively change those passwords. (See also Lulzsec E-Mail Hack Proves We're Lousy at Picking Passwords.")
Customers should also be on the lookout for suspicious communications asking for personal information, as they may be attempts to involve them in fraudulent transactions using the compromised information, the company said in the letter.
The company already disabled the Sega Pass website temporarily while it investigates the incident and has reset all passwords.
The breach is the latest large-scale hacking incident to happen in recent months. Sony has had several systems compromised, most infamously its Playstation Network and Qriocity service, exposing personal and credit card information on millions of customers. Citibank also fell victim to a hack attack that compromised credit card data, as well as U.S. government agencies
The LulzSec hacker group has reportedly offered to help Sega in its investigation

Source: www .pcworld .com

Wednesday, June 15, 2011

Foxit Reader

Foxit Reader


The Best PDF Reader – Over 100 Million Users

Whether you're a consumer, business, government agency, or educational organization, you need to read and annotate PDF documents and fill out PDF forms. You need your PDF Reader to be:
  • Fast - so you're not waiting forever to read files.
  • Lightweight - so it's easily deployable and doesn't exhaust system resources.
  • Secure - so you don't get infected with viruses and can keep sensitive information safe.
  • A Platform - so you can extend the Reader by creating your own value added capabilities for internal use or for resale.
The Foxit Reader is a small, fast, and feature rich PDF viewer which allows you to open, view, and print any PDF file. Unlike other free PDF readers, Foxit Reader also includes easy to use collaboration features like the ability to add annotations, fill out forms, and add text to PDF documents. Foxit Reader has a small footprint that starts up instantly, renders PDF files quickly and uses very little memory, which is especially important with today's handheld devices. The Foxit Reader is packed full of convenient and easy to use viewing, editing and printing features that make document collaboration simple. Foxit Reader's secure platform insures worry free operation against malicious virus and provides a secure and reliable digital signature verification platform for exchanging electronics documents without putting the user at risk from falsified documents.



Sourse: http://www .foxitsoftware .com/products/reader/

Sunday, June 12, 2011

Fake Anti-Virus Poses As Microsoft Update

Fake Anti-Virus Poses As Microsoft Update


Sophos, the IT security and data protection firm, has released a new warning regarding a fake anti-virus attack. The specialty of this is that it masquerades as Microsoft's security update and tricks the user into installing malicious software. The affected user sees an almost exact replica of the Microsoft update page, but there is a difference. This works only in Firefox, while the real Microsoft update site requires you to use Internet Explorer.

Fake Microsoft update looks exactly like the real thing

Fake Microsoft update looks exactly like the real thing
It can be seen of late, that fake anti-virus attacks have become more professional, and can actually convince more innocent people than ever before, to fall into this trap. In this case, a huge amount of attention has been paid to copy the graphics and website elements of the original site to fool people into believing that the bogus site is in fact, the original. They have also taken advantage of the timing of the monthly update patch released by Microsoft, known as Patch Tuesday, to get more users into installing this malicious software.


Source : www .techtree .com

Friday, June 10, 2011

Wednesday, June 1, 2011

Some Registry Tricks

1. Disable the Autorun Option in your CD Rom Drive:

Open your Registry and navigate to "HKEY_LOCAL_MACHINE\system\
currentcontrolset\services\cdrom"
Change the value of 'Autorun', or create a new DWORD value if it doesn't already exist, and set the value as '0' for Autorun disabled.
___________________________________________________________________


2. Disable the Harddisk Lowdiskspace warning in Windows Xp User Key:


"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
and
System Key: 

"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
create a new DWORD 'NoLowDiskSpaceChecks' and change its value to '1'.

___________________________________________________________________

3. Disable the Windows Key


"HKEY_LOCAL_MACHINE\system\urrentcontrolset\control\keybo ard layout"
Create a new Binary value, or modify the existing value called 'Scancode Map' as shown below.
Value: 00 00 00 00 00 00 00 00 03 00 00 00 00 00 5B E0 00 00 5C E0 00 00 00 00

___________________________________________________________________

4. View System BIOS Information:

Open Registry and navigate to
"
HKEY_LOCAL_MACHINE\hardware\description\system"

___________________________________________________________________

5. Change the Title of Windows Media Player


"HKEY_CURRENT_USER\software\policies\microsoft\windows medi aplayer\"
Create a new string value called ' TitleBar' and change text as your wish.

___________________________________________________________________

6. Disable Internet access in Network
Open Registry and make the following changes


"HKEY_CURRENT_User\software\microsoft\windows\currentversi on\internetsettings\"
Change the value of "Proxyenabled" to 1 and change the value of "proxyserver" and set it to an ip address. Change the value of the ip address and port to "10.0.0.1:5555"

___________________________________________________________________

7. Disable the ability to Right click on the desktop


"HKEY_CURRENT_User\software\microsoft\windows\currentv ersi on\policies\explorer\"
Create a DWORD "NoViewContextMenu" and change its value to "0" for disabling and "1" for enabling.

___________________________________________________________________

8. Hide all items on desktop


"HKEY_CURRENT_USER\software\microsoft\windows\currentv ersi on\policies\explorer\"
and
"HKEY_LOCAL_MACHINE\software\microsoft\
windows\currentvers ion\ policies\explorer\"
create a new DWORD "NoDesktop" and change its value to "1"
You can show all the items in the desktop by chaning the value to "0"

___________________________________________________________________

9. Disable the "Change Password" button in windows


"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\System"
and
"HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows \Cur rentVersi on\Policies\System"
Create a new DWORD "DisableChangePassword" and change its value to "0" for disabling and "1" for enabling.

___________________________________________________________________

10. Disable the "cancel" button or pressing the "Esc" key while logging on to Windows"


"HKEY_USERS\.DEFAULT\Software\Microsoft\Window s\Cu rrentVersion\Run"
Create a new string value "NoLogon" and change its value to "RUNDLL32 shell32,SHExitWindowsEx 0"

___________________________________________________________________

11. Remove "Log off" from start menu
"HKEY_CURRENT_USER\Software\Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoLogOff" and change its value to "1" for disabling and "0" for enabling. 

___________________________________________________________________

12. Clear the Recent playlist in Media Player
Navigate to "HKEY_CURRENT_USER\Software\
Microsoft\MediaPla yer\ Player"
And clear the "RecentFileList" subkey.

___________________________________________________________________

13. Empty temporary Internet files on exit (in Internet Explorer)
"HKEY_CURRENT_USER\Software\
Microsoft\Windows\ Curr entVersion\Internet Settings\Cache"
and
"HKEY_LOCAL_MACHINE\SOFTWARE\
Microsoft\Windows \Cur rentVersion\Internet Settings\Cache"
Create a new DWORD "Persistent" and change the value to "0" for emptying and "1" to remove this option.
___________________________________________________________________

14. Clear the Internet Explorere typed addresses history
"HKEY_CURRENT_USER\Software\
Microsoft\Internet Explorer\TypedURLs"
And delete the subkeys.
___________________________________________________________________

15. Remove recent documents from start menu
"HKEY_CURRENT_USER\Software\
Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoRecentDocsMenu" and change its value to "1".
___________________________________________________________________

16. Remove Network connections from start menu
"HKEY_CURRENT_USER\Software\
Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoNetworkConnections" and change its value to "1".

17. Remove My documents from start menu
"HKEY_CURRENT_USER\Software\
Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoSMMyDocs" and change its value to "1".

18. Remove My pictures from start menu
"HKEY_CURRENT_USER\Software\
Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows \Cur rentVersion\Policies\Explorer "
Create a new DWORD "NoSMMyPictures" ad change its value to "1".

19. Remove My music fro start menu
"HKEY_CURRENT_USER\Software\
Microsoft\Windows\ Curr entVersion\Policies\Explorer"
and
"HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows \Cur rentVersion\Policies\Explorer"
Create a new DWORD "NoStartMenuMyMusic" and change its value to "1".

20. Reboot windows after crash
"HKEY_LOCAL_MACHINE\SYSTEM\
CurrentControlSet\C ontr ol\CrashControl"
Create a new DWORD "AutoReboot" and change its value to "1".Restart the machine for the effect to take place.

21. Disable the use of MSDos
User Key: "HKEY_CURRENT_USER\Software\
Microsoft\Windows\ Curr entVersion\Policies\WinOldApp"
and
System Key: "HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows \Cur rentVersion\Policies\WinOldApp"
Create a new DWORD "Disabled" and set its value to "1". Change it to "0" for enabling.

22. Enable Directory completion in MSDos prompt
User Key: "HKEY_CURRENT_USER\Software\
Microsoft\Command Processor
and
System Key: "HKEY_LOCAL_MACHINE\Software\
Microsoft\Command Processor"
Create a new DWORD "PathCompletionChar " and set it to equal the hex value of the required control character.

23. Quick edit the command prompt

User Key: "HKEY_CURRENT_USER\Console"
and
System Key: "HKEY_USERS\.DEFAULT\Console"
Create a new DWORD "QuickEdit" and set its value to "1" for enabling and "0" for disabling.

24. Disable Registry editing
"HKEY_CURRENT_USER\SOFTWARE\
Microsoft\Windows\ Curr entVersion\Policies\System"
Create a new DWORD "DisableRegistryTools" and change its value to "0" for allowing Regeditand "1" for disabling it.

25. Disable task scheduler
" HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows\Curr entVersion\RunServices"
Delete the value from "SchedulingAgent". Usually its value is set to "'mstask.exe".

26. Remove My computer from desktop and start menu
User Key: "HKEY_CURRENT_USER\Software\
Microsoft\Windows\ Curr entVersion\Policies\NonEnum"
and
System Key: "HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows \Cur rentVersion\Policies\NonEnum"
Create "{20D04FE0-3AEA-1069-A2D8-
08002B30309D}" and change its value to "1" for removing. Change its value to "0" for showing.

27. Show Windows version on desktop
User Key: "HKEY_CURRENT_USER\Control Panel\Desktop"
Create a new DWORD " PaintDesktopVersion" and change its value to "1" for showing and "0" for removing.

28. Remove My documenst from desktop
Windows 95, 98 and Me
"HKEY_CURRENT_USER\Software\
Classes\CLSID\{450 D8FB A-AD25-11D0-98A8-0800361B1103}\ShellFolder"
Windows NT, 2000 and XP
"HKEY_CURRENT_USER\Software\
Microsoft\Windows\ Curr entVersion\Explorer\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103}\ShellFolder"
Modify the value called "Attributes" as "0xf0500174" to hide or "0xf0400174" to show.

29. Disable Scan disk after improper shutdown
" HKEY_LOCAL_MACHINE\System\
CurrentControlSet\Contro l\FileSystem"
create a new DWORD "DisableScandiskOnBoot" and change its value to "01" for disablng and "00" for enabling.

30. Automatically end Hung programs.
" HKEY_CURRENT_USER\Control Panel\Desktop"
and
"System Key: [HKEY_USERS\.DEFAULT\Control Panel\Desktop"
Modify the value of "AutoEndTasks" to "1".