Minimize any Application Window to System Tray

Very few applications like Microsoft Outlook, MSN Messenger and anti virus scanners have the built in support of minimizing the application windows to System Tray(the extreme right side of windows task bar). But luckily for rest of the application there is Trayit. Trayit Application allows you to save windows task bar space by placing the minimized application windows in to system tray.
See the following image which show application windows like MS Word, Windows Live Writer, Firefox, Google Talk, Notepad, etc.. minimized to the system tray with the help of Trayit.

Tech Thoughts: Trayit Application to minimize any application window to system tray

Trayit is a freeware application developed by Computer Technology Inc. It runs on on Windows 95/98/Me, NT/2000/XP/Vista and does not require any installation. Usage of the application is very simple. You can temporarily put any window in the system tray by keeping down the button when minimizing the window.
? Download Trayit

Download Youtube Videos without installing any software

Youtube is the best site to watch videos on the web.Downloading videos from Youtube is really simple. There are sites which allow you to download videos from Youtube without any difficulty, just by inputting video URL.

Some sites are given below:

Vixy.net

Vixy allows downloading youtube videos in many formats. It allows you to download YouTube’s video to AVI/MOV/MP4/MP3/3GP file format online. It has very handy options to download videos in various formats required for Personal Computers, MP3 Players, iPODs and mobile phones. To download the video go to Vixy.net, enter the URL of your favorite youtube video and select the download format. Click on start to download.

KissYoutube.com

This is one the easiest and my favorite site to download Youtube videos as flv files. When you are watching a video, just add the word “kiss” to the browser URL and press enter. For example if you are watching a video at youtube.com/watch?v=dXC3BFDq7U4, you need to add the word kiss in the begging of the URL[kissyoutube.com/watch?v=dXC3BFDq7U4] in your browser address bar and press enter. A link to download the video as FLV movie file. The FLV movie can be played back by many free FLV Players available on the net[Click here to download free FLV Player]

GrabYoutube.com
idestop.tv

Windows XP Shortcuts:For a smart user!

Its so much time waste to do everything in the way it is said to be done!

Take shortcuts and speed up your comp and time you take to do taska on it.

General keyboard shortcuts
? CTRL+C (Copy)
? CTRL+X (Cut)
? CTRL+V (Paste)
? CTRL+Z (Undo)
? DELETE (Delete)
? SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
? CTRL while dragging an item (Copy the selected item)
? CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
? F2 key (Rename the selected item)
? CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
? CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
? CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
? CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
? CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
? SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
? CTRL+A (Select all)
? F3 key (Search for a file or a folder)
? ALT+ENTER (View the properties for the selected item)
? ALT+F4 (Close the active item, or quit the active program)
? ALT+ENTER (Display the properties of the selected object)
? ALT+SPACEBAR (Open the shortcut menu for the active window)
? CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
? ALT+TAB (Switch between the open items)
? ALT+ESC (Cycle through items in the order that they had been opened)
? F6 key (Cycle through the screen elements in a window or on the desktop)
? F4 key (Display the Address bar list in My Computer or Windows Explorer)
? SHIFT+F10 (Display the shortcut menu for the selected item)
? ALT+SPACEBAR (Display the System menu for the active window)
? CTRL+ESC (Display the Start menu)
? ALT+Underlined letter in a menu name (Display the corresponding menu)
? Underlined letter in a command name on an open menu (Perform the corresponding command)
? F10 key (Activate the menu bar in the active program)
? RIGHT ARROW (Open the next menu to the right, or open a submenu)
? LEFT ARROW (Open the next menu to the left, or close a submenu)
? F5 key (Update the active window)
? BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
? ESC (Cancel the current task)
? SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
? CTRL+SHIFT+ESC (Open Task Manager)

Microsoft natural keyboard shortcuts
? Windows Logo (Display or hide the Start menu)
? Windows Logo+BREAK (Display the System Properties dialog box)
? Windows Logo+D (Display the desktop)
? Windows Logo+M (Minimize all of the windows)
? Windows Logo+SHIFT+M (Restore the minimized windows)
? Windows Logo+E (Open My Computer)
? Windows Logo+F (Search for a file or a folder)
? CTRL+Windows Logo+F (Search for computers)
? Windows Logo+F1 (Display Windows Help)
? Windows Logo+ L (Lock the keyboard)
? Windows Logo+R (Open the Run dialog box)
? Windows Logo+U (Open Utility Manager)

Accessibility keyboard shortcuts
? Right SHIFT for eight seconds (Switch FilterKeys either on or off)
? Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
? Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
? SHIFT five times (Switch the StickyKeys either on or off)
? NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
? Windows Logo +U (Open Utility Manager)

Windows Explorer keyboard shortcuts
? END (Display the bottom of the active window)
? HOME (Display the top of the active window)
? NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
? NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
? NUM LOCK+Minus sign (-) (Collapse the selected folder)
? LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
? RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
? RIGHT ARROW (Move to the right or to the beginning of the next line)
? LEFT ARROW (Move to the left or to the end of the previous line)
? UP ARROW (Move up one row)
? DOWN ARROW (Move down one row)
? PAGE UP (Move up one screen at a time)
? PAGE DOWN (Move down one screen at a time)
? HOME (Move to the beginning of the line)
? END (Move to the end of the line)
? CTRL+HOME (Move to the first character)
? CTRL+END (Move to the last character)
? SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)

Microsoft Management Console (MMC) main window keyboard shortcuts
? CTRL+O (Open a saved console)
? CTRL+N (Open a new console)
? CTRL+S (Save the open console)
? CTRL+M (Add or remove a console item)
? CTRL+W (Open a new window)
? F5 key (Update the content of all console windows)
? ALT+SPACEBAR (Display the MMC window menu)
? ALT+F4 (Close the console)
? ALT+A (Display the Action menu)
? ALT+V (Display the View menu)
? ALT+F (Display the File menu)
? ALT+O (Display the Favorites menu)

MMC console window keyboard shortcuts
? CTRL+P (Print the current page or active pane)
? ALT+Minus sign (-) (Display the window menu for the active console window)
? SHIFT+F10 (Display the Action shortcut menu for the selected item)
? F1 key (Open the Help topic, if any, for the selected item)
? F5 key (Update the content of all console windows)
? CTRL+F10 (Maximize the active console window)
? CTRL+F5 (Restore the active console window)
? ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
? F2 key (Rename the selected item)
? CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote desktop connection navigation
? CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
? ALT+PAGE UP (Switch between programs from left to right)
? ALT+PAGE DOWN (Switch between programs from right to left)
? ALT+INSERT (Cycle through the programs in most recently used order)
? ALT+HOME (Display the Start menu)
? CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
? ALT+DELETE (Display the Windows menu)
? CTRL+ALT+Minus sign (-) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
? CTRL+ALT+Plus sign (+) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)

Microsoft Internet Explorer navigation
? CTRL+B (Open the Organize Favorites dialog box)
? CTRL+E (Open the Search bar)
? CTRL+F (Start the Find utility)
? CTRL+H (Open the History bar)
? CTRL+I (Open the Favorites bar)
? CTRL+L (Open the Open dialog box)
? CTRL+N (Start another instance of the browser with the same Web address)
? CTRL+O (Open the Open dialog box, the same as CTRL+L)
? CTRL+P (Open the Print dialog box)
? CTRL+R (Update the current Web page)
? CTRL+W (Close the current window)

NOTE
? Some keyboard shortcuts may not work if StickyKeys is turned on in Accessibility Options.
? Some of the Terminal Services client shortcuts that are similar to the shortcuts in Remote Desktop Sharing are not available when you use Remote Assistance in Windows XP Home Edition.
? Some of the other Microsoft Knowledge Base articles that have similar information as this article are:

USB as RAM in Windiws Vista!

Windows Vista has a useful feature called ReadyBoost that can use your USB as memory.But, the problem with it is that Vista does not take up the slower USB sticks in the market. To break through this limitation, here is a easy four step tutorial:

1.Get the stuff ready
Plugin your USB drive (disable autoplay feature if you have got it enabled) and open the properties of the drive.

2. Readyboost setup
Click on the Readyboost tab in the properties menu and check “Do not restest this device”. Do OK and unplug your drive.

3. Edit Registry
Open the registry editor; type ‘regedit’ in Run(Windows Logo Key+R).The editor should have started up by now.
Use the left-hand pane to browse to :HKLM (Local Machine)\SOFTWARE\Microsoft\Windows NT\ CurrentVersion \EMDgmt. You’ll have a list of USB devices the computer has encountered, one of which should be your USB drive.Single-click it.
Here’s a few bit that you gotta edit:

  1. Double click on Device Status and change the value to 2, Do OK.
  2. Do the same for ReadSpeedKBs and WriteSpeedKBs, changing their values to both 1000.
  3. Exit Regedit and cool down.

Back to work.
Now all that’s left to do is put the stick back in and once again go to the device properties. If you look under the Readyboost Tab, you’ll be able to now select ‘Use this device’, click it. Success!Enjoy a faster Vista.

Bluetooth Intrusion

(Note: The below Article does not belong to me, so use it on your own risk!)

A tutorial I wrote a long time back for neworder group :-) The fundamentals of Bluetooth Security still remain same. Read on

This manual aims at enabling all people know the Pandora?s box in their very own pocket and know how it works! Mobile Phone Bluetooth enabled

Bluetooth, as we all know is a method for wirelessly transmitting the data over networks. Nowadays, it?s more seen in mobile phones. In India after the Cell phone revolution almost all people are now switching over to Bluetooth enabled cell phones to make their lives easier by allowing free transmission of data in a comfortable range and gaming etc. to the owner.

It is relatively better than Infrared (the one in your TV remote), operates on low power, and is a low cost technology with no usage charges. So no reason that it won?T be popular!

However in the mind of a hacker the ways to intrude keep germinating. As I said nothing is unbreakable! Bluetooth too. So before this cranky lecture gets over your nerves, I start the real thing.

It has been found that the complete memory contents of some mobile phones can be accessed by a previously trusted (?paired?) device that has since been removed from the trusted list. This data includes not only the phonebook and calendar, but media files such as pictures and text messages. In essence, the entire device can be ?backed up? to an attacker?s own system.

A good attacker generally creates a serial profile connection to the device, for obtaining full access to the AT command set( the same commands that connect your modem the internet although different for BT phones), which can then be exploited using tools freely available online, such as PPP for networking and messaging, contact management(deletion and addition), diverts and initiating calls, connect to data services such as the Internet through GPRS, and even monitor conversations in the vicinity of the phone. This latter is done via a voice call over the GSM network, so the attacker can be anywhere in the world. Bluetooth access is only required for a few seconds in order to set up the call. Call forwarding diverts can be set up, making the innocent owner?s incoming calls to be intercepted, either to provide a channel for calls to more expensive destinations, or for identity theft by impersonation of the victim. Hackers are getting smart. So should be you

************************
The Indian context
************************
He can even use that for transferring the balance on his cash card by transferring it from yours! (This is the exploit I discovered recently in the biggest GSM company in India while I was playing around with Bluetooth)
Sounds scary!
It is!
Bluetooth devices are classified among three classes
Class 1 – Range=high, up to 100 meters
Class 2 – Range=Medium, up to 10 meters
Class 3 – Range =low, very much within 10

We are dealing with Class 2 and 3 devices.
Every Bluetooth-enabled device has some characteristics that are either unique (Bluetooth device address), manufacturer specific (the first part of the Bluetooth device address) or model-specific (service description records).
Bluetooth Device Address
Bluetooth device address is something like IP address, unique for each device set. This address consists out of 6 bytes (looks like MAC addresses MM:MM:MM:XX:XX:XX). This address can also be understood as hardware address that is written in the ROM in the chipset of the device. The first three bytes of this address (the M-bytes in the above notation sample) tell us about the manufacturer of the Device. This is the first step to know about the device?s properties . @stake?s redfang tool does this. Unfortunately, it is not possible to tell upon the number range of the address part of the device address (the X-bytes in the above notation sample) which model it is.
Service Discovery Protocol Records
Each Bluetooth device that accepts communication from other Bluetooth devices announces its offered services through a service discovery protocol (SDP) Its like a profile of the device. So, remote devices can query devices upon the offered capabilities. SDP records are returned to the querying device and hold information on how to access the respective service. My method now hashes certain values from the SDPs and generates a unqiue fingerprint value that is then used to refer to a certain phone model.
Take a look at this SDP
Service Name: OBEX Object Push
Service Handle: 000?10c
Service Class ID list:
?OBEX Object Push (0001cx)
Protocol Descriptor list:
(0?0100)
Channel:9
Version:0?100
/ from Nokia 6310i

Now the attacker will run ?Blueprint software and obtain the following result:
00:60:57@2621543
Device: Nokia 6310i
Version: V 5.22 15-11-200x NP
Type: Mobile phone
Note: Vulnerable to Bluebug attack /* A type of attack

How the attack begins!

First step is to scan all the devices in the range of the phone (here I will limit my manual to mobile phones only) after know whom to bluejack/attack the hacker sends him a message using his Bluejack software on the phone.
This is normally only possible if the device is in ?discoverable? or ?visible? mode, but there are tools available on the Internet that allow even this safety to be bypassed easily.
I have written a program in Perl language for such intrusions. Use it to check your phone?s vulnerability to attacks. I will give you the source later in NH group.

How to send SMS from a hacked phone!
This technique can be used by the attacker to know your mobile phone number by sending SMS to himself. ( now you can think of the consequences, blackmailing etc) .
SMS messages can be sent by using SMS PDUs which are different for each company of the phone.
For Nokia PDU visit the German site www.nobbi.com . The sending of the SMS is not generally visible by the user of the attacked phone. Settings can be made for not generating the delivery reports on the phone. So it makes the sending completely hidden for the hacker

AT commands:

AT+CMGF=0 //Set PDU mode AT+CSMS=0 //Check if modem supports SMS commands AT+CMGS=23 //Send message, 23 octets (excluding the two initial zeros) >0011000B916407281553F80000AA0A

E8329BFD4697D9EC37There are 23 octets in this message (46 ?characters?). The first octet (?00?) doesn?t count, it is only an indicator of the length of the SMSC information supplied (0). The PDU string consists of the following

In the same way a call can be initiated on the hacked phone using AT commands that are freely available on net.

This is how one can start from the scratch and easily attack anyone in the range having a BT enabled phone.
For newbies and script kiddies I have few assorted tools in .SIS format that will do the needful for them. You can have the full package in the NH files section!
But its? always advisable to try out the real programming as it turns on the real hacking spirit in you.
Till the next update, bye!

100% Working Proxy Lists

Censorship in your country?
Try the proxies below. By now most of them would have been blocked in your country.
Note:To start a blocked proxy try adding ‘s’ to http in the proxy’s URL.
For example if the proxy http://www.cuteknife.com is blocked, try https://www.cuteknife.com .

http://www.cuteknife.com

www.kproxy.com

http://www.shadow.com/

http://miss.info/

http://4proxy.com/

http://conqueror.info/

https://proxify.com/

http://www.morepress.info/

http://nyclife.org/

http://www.pagewash.com/

Change your Recycle Bin’s Name

When you personalize your desktop, the Recycle Bin looks odd, dont you think so?
So here’s a small registry hack to change the recycle bin’s name:

To change the name of recycle bin or rename recycle bin in Windows XP,
Windows 2000, Windows NT, Windows Me, Windows 98 or Windows 95, just edit a registry value:

1. Open registry editor by going to Start -> Run, and execute regedit.
2. Navigate to the following registry branch:

HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\

3. On the right pane, locate the registry key of LocalizedString.
4. Double click on LocalizedString or right click on LocalizedString and
select Modify to modify the registry value.
5. You should see the default value of

@%SystemRoot%\system32\SHELL32.dll,-8964?.

Delete the default value. and then rename (very first default value) your desired new recycle bin?s name in text, e.g. Garbage Bin.
6. Refresh your desktop or Windows Explorer by pressing F5.
You will see the new recycle bin name.

All in one Keylogger

In these days,everyone uses computers. Computers have become something like a diary. Imagine that you would have the ability to read one?s diary without being exposed. Now you can! With All In One Keylogger you can monitor every activity on the computer including chat conversations,e-mails,keystrokes,desktop activities,and much more. Have you ever thought who is your wife?s ?friend? she chats with all the time? With All In One Keylogger you can read her chat conversations, look at her emails watch the sites she surfed to. Have you ever wondered why does your husband ?work? on his computer so late at the night? After reading over and over in the newspapers all those scary news about children who have been seduced by sick people. Dont you want to know what your children are doing on their computer? Who is this ?friend? they chat with? Do they surf to illegal sites? Everyone knows that time is money. Everyone also knows that almost every business has a computer. BUT not everyone knows this: an average business has 20 employees. Each employee spends 30 minutes a day for reading/sending emails,chatting and surfing. That gives 10 wasted hours a day 50 hours a week 200 hours a month about $2,000 a month! $24,000 a year! These days, almost all schools have labs. From our experience, it is hard and sometimes impossible to keep the teenager pupils away from those illegal and an inappropriate sites. By using All In One Keylogger on the school computers you can monitor and stop this habit. We are now offering a big discount for schools all over the world! By activating All In One Keylogger, you can monitor everything. Away from home, it can even send you logs by e-mail.