Must Have Softwares

Windows Genuine Hack


TuneUp Utilities


K-Lite Coec Pack

Free Download Manager

FoxIT Reader


Open Office

ESET NOD32 Internet Security Bussiness Edition

Direct X

For all of these in one place



Windows Installation Story

Today i decided to install a fresh copy of Windows. The previous installation was almost an year old and as usual slowed down a lot and messed up too. I searched the drawers for Windows XP, didn’t found any. Asked my mom about the CD, she answered, “why the hell should I know about CDs, I don’t own this PC, you do.”

At last without searching further I went to Jumbo CD shop. The shopkeeper pointed at a CD rack having Windows collection. I decided to stick to Windows XP as I didn’t want to experiment on Vista or 7 with my current PC specifications. I was amazed to see a dozen tweaked Windows XP Sp3. There was a Black Edition, a Blue Edition, crystal Edition, Silver Edition, Gold Edition, etc etc etc. These tweaked Windows are cool, I remembered installed a couple of these on my friends’ PC, they have all the essential software pre-installed but they get corrupt too early so not my option today and I pick a Plain Windows XP SP3.


Reached home, turned on my PC, copied all my data from C drive to D which included FireFox bookmarks, pics in My document folder and MSN chat logs in My Received files. I don’t keep much  in my Windows Drive.


Inserted the CD in the drive, booted the system from CD, waited till the installation menu appear. As usual I chose C drive as my Windows installation drive and NTFS as the file system, waited till the Windows install.


I have a ASUS board. i have downloaded the latest drivers from there support web site a couple of months ago. Installed them, restarted my PC.

Partitioning : Again!!

A stupid idea struck my mind, “I have too many partitions, lets reduce !”. So I installed the old trusty Symentec Partition Magic 8.0 and merge my last 2 partition. All was going well until I got an ERROR

“Partition Merging Not Done!!!! Completed with error”

My heart nearly came to my mouth, all my e-books, all my software ( cracked ones of course ), all my songs ( saving since 4 years ) , video ( etc etc) all may be gone. I opened My Computer, both the drives gone !!!! I nearly cried. I tried the old method of making things work – I restarted Windows. To my surprise a merged partition appeared, thank u God. But with one problem. When you merge two drives , the second drive becomes a folder in the first drive. This happened with me too, as was expected. The problem was , I could not get the folder to open, this time one more stupid error

“Access Denied”

What to do now??!? Once again I opened the not so trusty Symentec Partition Magic. All looked fine there. I performed a disk error check and got one more error

“Disk has blah blah blah errors”

This was enough, I remember there was one another partition manager, Paragon Partition Manager. I downloaded it , installed it and to my surprise its partition explorer was showing the second drive’s folder content. A slight relief. I quickly copied all my drive’s data to another one. One more problem – The folder size was 27GB and it was taking my disk space. I need this folder to be deleted ASAP. The software didn’t help much in removing disk errors but at least saved my data.

The Last Stand

Tired, frustrated cursing Symentec for the buggy software and incomplete troubleshooting guide I converted the whole partition to FAT32. To my surprise the folder was back again without error.

Problem solved 🙂

Softwares I installed

Most of them are here in this Link

Threat Dictionary


Adware (advertising-supported software) is any software application which automatically plays, displays, or downloads advertising material to a user’s computer without users knowing it, or with their partial assistance. Typical features are pop-up windows or banners, persuasions to set web page as a home page, etc. Some adware enter the program with user’s permission, because in order to use the program, you have to accept presence of advertising materials.


Backdoor is a client-server type of application allowing remote access to a computer. The difference from common legitimate application with similar function is that the installation is done without user’s knowledge.

Boot sector

Boot sector viruses attack boot sector of a hard disc to make sure that they run every time the computer is started. It is relatively older group of viruses.


Dialer is a program designed to redirect user’s telephone connection to the Internet to some premium rate number. These programs can be used legally when paying for Internet services, but fraudulent dialers are often used for redirecting without user knowing it.

File viruses

File viruses – use individual files as hosts. Generally, these are always executable files, because the aim of malicious code is its replication. Most frequent are viruses with “.COM“, “:EXE“, “.BAT“ or “.SYS“ extension.

HLL viruses

HLL (High Level Languages) are viruses created in high level programming languages as Pascal, C, C++, Delphi, Basic or Visual Basic. Common viruses are created in assembler, but HLL viruses are more massive and to analyze them is very complicated. The detection by heuristic analyses is almost impossible.


Hoax (rumor) – There are many hoaxes sent via emails, spreading only thanks to human endeavor. The only way how to defend from hoaxes is heightened caution. Hoaxes are the most common with trustworthy companies ( “Microsoft warns…”, “CNN announced…”, etc.) They often inform about catastrophic consequences, e.g. devastating new viruses. What these messages have in common, is appeal for immediate forwarding to other users. This is how hoaxes are spread


Microviruses – are Macros able to copy themselves from one document to another. So called macros are common parts of applications in office packages and they can positively enlarge their functionality. But they are programmable in common languages and thus can manipulate with application data, or modify other data in computer. Viruses especially written for specific application can be spread basically only on this application. Therefore the malicious code authors are searching generally spread applications. These conditions fulfill especially programs from Microsoft Office package, like Word or Excel.

Overwriting viruses

Overwriting viruses are the simplest forms of infection. The original code is deleted and substituted by new, malicious code. Upon execution of the infected file the virus is executed as well and it can try to replicate again.

Parasitic viruses

Parasitic viruses – they attach themselves to executable file as a host leaving the contents of the host program unchanged, but attaching to the host in such a way that the virus code is run first. When the file is infected, upon execution it runs the virus as well.


Phishing is a form of criminal activity using techniques of so called social engineering. It is characterized by attempts to fraudulently acquire sensitive information, e.g. password, or credit card details, by masquerading as a trustworthy person or business in an apparently official email. Obtaining this type of personal data is very attractive because it allows an attacker to impersonate their victims and make fraudulent financial transactions.


Retroviruses are malicious applications trying to disable, delete or deactivate antivirus systems.


Riskware as a term includes all applications that upon execution comprise some security risk. Similar to spyware or adware installation, their installation can be approved in license agreement when installing the program. Dialers can be considered as a good example.


Rootkit is a special type of infiltration able to hide its “root” on the infected systemwithout system administrator even seeing it and thus escape detection. Usually it’s a malicious code package enabling attacker to exploit vulnerabilities in the system and gain full control over infected (rooted) computer. The most important thing with rootkits is the prevention – the ability to stop the infiltration proactively when trying to infiltrate into the system, before it is executed. After execution a rootkit is able to make itself “invisible” and thus exploited user gains false feeling of security.

Social engineering

Social engineering is a way of gaining personal information by deception. This method commonly uses telephones or the Internet, exploiting the gullibility by masquerading as a trustworthy business or institution.


Spyware is a program using Internet to send various user’s data without his prior knowledge. Similarly to adware, accepting the license agreement can be a part of a free program. Spyware usually sends statistical data as information about installed programs, visited sites, etc. Acquired information is usually exploited for commercial gain.

Trojan horse

Trojan horse (sometimes called Trojan) is malicious program. Unlike viruses or worms, it is not able to replicate and infect files on its own. Most often it exists in a form of executable file with .EXE or .COM extension. Basically file itself doesn’t contain anything except malicious code. The most effective method of cleaning is very simple; deletion. Trojans can also pretend to be useful programs. This type of infiltration has various functions ranging from sending keyloggers to file deletion (e.g. to format a disc).It has also special function – installing of so called backdoor.


Virus is a program able to self-replicate. It spreads by inserting copies of itself into other executable files and ensures their execution. The name is derived from similarity to behavior of biological viruses. Virus can get to your computer mainly through usage of the Internet. Additionally, viruses can spread to other computers by infecting files on LAN or when copying from data medium like floppy disc, CD, DVD, etc. There are file viruses, thus individual malicious programs, boot viruses, which attack boot sector of a hard disc to make sure that they run every time the computer is started and macroviruses, which are most often a part of documents with .DOC and .XLS extension.

Viruses can be further divided into two types, on the basis of their behavior when they get executed. Whereas non-resident viruses are started upon execution of infected object, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed.


Worm is an independent self-replicating program spreading its copies via Internet or LAN. Traditional viruses are passive and cannot propagate themselves whereas worms can. A worm uses a network to send copies of itself to other systems, or on the lower level it uses vulnerabilities of the operation system. A worm is able to carry other malicious programs, which can perform various malicious activities, e.g. to install a backdoor in an infected computer. Even without this payload a worm is able to cause severe damage when enormously increasing the Internet traffic. As a matter of Internet expansion, a worm is able to be distributed worldwide within few hours. Side effects can be the complete congestion of network, including the businesses’ LANs.

How to Create Counter Sctrike 1.6 Dedicated Internet Server

You need to have a DSL connection at least to follow the tutorial.

Credit goes to Ehti.

C# Ebooks

On one of my good friend’s request, I have uploaded some Ebooks regarding OOP and C#. This might help you guys.

Pro C# 2005

Dietel C# How to program

Thinking in C#

Can upload more ebooks upon request.

Posted in Ebooks. Tags: , , , . 1 Comment »

Huge File of software, movies, ebooks link

I found this file on my PC, don’t know from where i got it from. It might help you if you download it.

Download the Link File

Windows Password Dumper

I have made a Windows Password Dumper for my software house. Its 50% complete so far as I have yet to include the brute force and dictionary i made separately. Rainbow attack is yet to be made. This code is also not complete  with a few bugs. The Password Dumper is complete 90%, the rest you will find out. I cant upload the complete code when the project will be finished as I don’t own the project, my software house does. Yet there is lot much in it for one who wants to AUDIT the windows passwords.

This software requires Administrative rights to execute. So log in as the system administrator before running it. I have yet to complete the log in process so that a normal user can log in as administrator within the application.

I have only tested on Windows XP. It might work fine on Vista. No clues about Windows 7.

What it Does??

  • Get windows Password Hashes
  • Get Plain text passwords for few accounts
  • The above 2 features on remote PC within the same network

What it will Do when it will be Completed?

  • Run a brute force attack on the password hashes
  • Run a dictionary attack on the password hashes
  • Run a rainbow attack on the password hashes
  • And the most important one ( according to Boss ), a better GUI.


It also require .Net Framework to run. You can download Microsoft .Net Framework 2.0 here

MS .Net Famework 2.0

If you want to edit the Password Dumper, you can edit the code using NotePad++ and then run the batch file to compile he code. Before that you have to install MinGW.

MinGW GCC for Windows

Note: This software is made purely for auditing purposes. I hold no responibilty for anything that this software does or any misuse of the software for illegal purposes.

Thanks to the creator of pwdump, pwdump2, pwdump3 and lsadump for open sources.