Pages

Powered by Blogger.

My name is Mohd-Danish This blog is for education purpose only.

HOW TO UNBLOCK HACK BYPASS WEBSENSE TO ACCESS SITES

What this   watch this http://youtu.be/FTo03f7yMS8
First of all I would like to provide basic information about Websense. How it works and restricts users to access web freely.Websense blocks the website on basis of two things :
1. Category: Websense divides all the Websites over the internet in some categories like commercial, Business, Entertainment etc. Websense blocks the particular category completely means all websites of that categories are blocked.
2. Based on Meta Keyword : Websense regularly identifies certain keywords and add them to its database of blocked keywords. Now if any of these keyword is included in the Website TITLE or URL then it will be automatically blocked.

TECHNIQUES TO BYPASS OR UNBLOCK OR HACK WEBSENSE
1. Cached Copy Hack
Note: This hack doesn't work on Websites blocked by second Websense Technology. But all the websites blocked by first category can be easily accessed.
When you search anything using google In the each search result there are two things in blue color prior to URL i.e Cached and Similar. To view that blocked Website You have to click on Cached as Shown on the snapshot..
How to Unblock  Hack  bypass Websense to Access Sites

Most Websites can be opened using this Technique but some websites require some more efforts. You have to do some more ting like you have to remove certain codes from the Cached URL as shown below...

How to Unblock  Hack  bypass Websense to Access Sites

Hope this will help you to access almost all blocked websites except social networking one's.


2. Finding a Good Proxy
You can also bypass Websense using several proxy sites. Note: Most of the proxy sites will be blocked after one or two days. So you have to search for proxies regularly. But  I have an easy method to find proxies..
you have to use the cached copy hack to find the daily proxy websites...
Method to Find Proxy:
Open the Google and In search Query column type "tech-faq Proxy" without quotes. Now open the Cached copy of the website. Here you will find daily new proxy list now you have to copy the proxy URL's and check for working Proxies.
Now using proxy you can unblock any Website but I will advice don't open Social Networking sites and Emails using these.


3. Using Cloud Computing (Virtual Operating System)
For Opening Gmail ,gtalk,Yahoo,hotmail means all email clients you can use virtual operating system. For this you have to register on cloud computing website. After that you will get Virtual computer online which you can use anywhere in the world just you need a internet connection.
Some Virtual Operating Websites are:


4. Bypass or Unblock Downloading RESTRICTION
In most corporate offices you have download restrictions. I will tell you the basic simple method to bypass all downloading restrictions. Just follow the following instructions.
Open the Internet Explorer then go to Tools then to Internet Options and Then Click on Security Tab. Now Click on internet Icon and then on default level and then click on Local Internet and then again on default level and then on Trusted Sites and Again on default level then click On apply.

DNSRECON TOOL TUTORIAL

Welcome friends to KYB (Know your Backtrack) Tutorial 4, today i am going to teach you another interesting DNS Information gathering tool i.e. DNSRECON. DNSRECON like other DNS tools used to enumerate the standard records of a domain like A, NS, SOA, MX etc. So friends lets learn all about DNSRECON Tool on Backtrack 5.


DNSRECON Tool Tutorial Hackingloops | KYB Tutorial 4
Dnsrecon KYB Tutorial 4 : Information gathering tool on Backtrack Linux


Below is the list of things that we can do using DNSRECON Tool:



  • Top level domain expansion ( Zone Walking and Zone Transfer)
  • Reverse Lookup against IP range
  • Perform general DNS query for NS,SOA and MX records (Standard Record Enumeration)
  • Cache snooping against Name Servers
  • Google Scanning for Sub Domains and Host
We can access DNSRECON TOOL over Backtrack by navigating below path:

Backtrack -> Information Gathering -> Network Analysis -> DNS Analysis -> dnsrecon

Lets learn each of above things in detail and how to use DNSRECON tool to achieve the same:

1. Top level domain Expansion:
First of all we all should understand what are top level domains. A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet. For ex: In www.mywebsite.com , .com is  a top level domain. Usually expansion occurs for those websites which uses country codes as their top level domains ex: .in, .uk, .au etc. As the name suggests Top level domain Expansion means to expand your domain from one region to other which is also known as Zone Transfer and in case zones are not correctly configured we can extract almost all internal records of a domain which is also known as Zone Walking. So we can use DNS Recon for multiple purposes i.e. Zone Walking and Zone Transfer. Lets understand both of them in detail i.e. How we will use DNSRECON to exploit both of these features:

a. Zone Transfer : The security problem with DNS zone transfer is that it can be used to decipher the topology of a company’s network. Specifically when a user is trying to perform a zone transfer it sends a DNS query to list all DNS information like name servers,host names,MX and CNAME records, zone serial number, Time to Live records etc. Due to the amount of information that can be obtained DNS zone transfer cannot be easily found in nowadays. However DNSRecon provides the ability to perform Zone Transfers and we can use following commands to perform Zone transfer:

./dnsrecon.py -d <mywebsite.com> -a

or you can use below command :

./dnsrecon.py -d <mywebsite.com> -t axfr

2. Reverse Lookup against IP range:
DNSRecon can perform a reverse lookup for PTR (Pointer) records against IPv4 and IPv6 address ranges.To run reverse lookup enumeration the command:


./dnsrecon.py -r <startIP>-<endIP>


For Example :
./dnsrecon.py -r 192.168.5.100-192.168.5.200


Also reverse lookup can be performed against all ranges in SPF records with the command :


./dnsrecon.py -d <domain> -s

3. Domain Brute Force Enumeration:
For performing Domain Brute force technique, we have to give a name list and it will try to resolve the A,AAA and CNAME records against the domain by trying each entry one by one.
In order to perform domain brute force attack user needs to type below command:


./dnsrecon.py -d <domain> -D <namelist> -t brt

For example:
./dnsrecon.py -d hackingloops.com -D namelist.txt -t brt

4. Cache Snooping against name servers:
DNS cache snooping happens when the DNS server has a specific DNS record cached.This DNS record will often reveal plenty of information about the name servers and other DNS information.However DNS cache snooping does not happen quite often because servers normally do not cache DNS records.
The command that can be used to perform cache snooping is as follows:


./dnsrecon.py -t snoop -n server -D <dictionary file>

For example :
./dnsrecon.py -t snoop -n <server IP address> -D dictionary.txt


5. Standard Records Enumeration:
Standard Enumeration is generally used to gather information about NameServers,SOA and MX records. In order to perform standard enumeration you can use below command:


./dnsrecon.py -d <domain>

For example:
./dnsrecon.py -d hackingloops.com

There are lot of other options that DNSRECON tool provides. It is an extremely useful tool to gather plenty of information about DNS records.

Thats all for today. If you have any doubts feel free to ask. Don't forget to join us at Facebook in order to recent updates.

Secure Yourself from Hackers & Hijackers

Hackers and Browser Hijacking is one area of the Net that affects everyone at some stage.

In addition to having third party utilities such as SpyBot, Anti Virus scanners and firewalls installed there are some changes that can be made to Windows 2000/XP. Below are some details to make your system safer from hackers and hijackers.

Some of these tips require editing of the Registry so it is wise to either backup the registry and/or create a Restore Point.
1. Clearing the Page File at Shutdown
Windows 2000/XP paging file (Sometimes called the Swap File) can contain sensitive information such as plaintext passwords. Someone capable of accessing your system could scan that file and find its information. You can force windows to clear out this file.

In the registry navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management and add or edit the DWORD ClearPageFileAtShutdown. Set it to 1.

Note that when you do this, the system will take much longer to shut down: a system with a really big Page File (! Gig or more) may take a minute or two longer.

2. Disable the POSIX and OS/2 Subsystem.
Windows 2000 and XP come with little-documented subsystems it at allow compatibility with UNIX and OS/2 systems These rues systems are enabled by default but so rarely used that they are best off bring disabled completely to prevent possible service hijackings.

To disable these subsystems, open the registry and navigate to HKEY LOCAL MACHINESYSTEMCurrentControlSetControlSession ManagerSubSystems. Delete the subkeys Os2 and Posix. then reboot.
3. Never leave default passwords blank.
On installation, Windows 2000 sets up an Administrator account with total 
system access and prompts for a password. Guess what: by default, it allows that password to be blank. If a user doesn't want to type a password, he can simply click Next and the system will be an open door for anyone who wants to log on. Always opt for a password of some kind when setting up the default account on a machine.
4. Disable the Guest accountWindows XP comes with a Guest account that's used for limited access, but it's still possible to do some damage with it. Disable it completely if you are not using it. Under Control Panel, select User Accounts, click on Guest Account and then select Turn Off the Guest Account.
5. Install Windows In a different directory.
Windows usually installs itself in the WINDOWS directory. 
Windows NT 4 0 and 2000 Will opt for WINNT. Many worms and other rogue programs assume this to be the case and attempt to exploit those folders files. To defeat this install Windows to another directory when you're setting it up - you can specify the name of the directory during setup. WINDIR is okay; so some people use WNDWS - A few (not that many) programs may not install properly if you install Windows to another folder but t hey are very few and they are far between

6. Fake out hackers with a dummy Administrator account
Since the default account in Windows 2000 is always named Administrator, an enterprising hacker can try to break into your system by attempting to guess the password on that account. It you never bothered to put a password on that account, say your prayers.

Rather than be a sucker to a hacker, put a password on the Administrator account it you haven't done so already. Then change the name of the Administrator account. You'll still be able to use the account under its new name, since Windows identifies user accounts by a back-end ID number rather than the name. Finally, create a new account named Administrator and disable it. This should frustrate any would -be break-ins.

You can add new accounts and change the names of existing accounts in Windows 2000 through the Local Users and Groups snap in. Right-click on My Computer, select Manager, open the Local Users and Groups subtree, look in the Users folder and right-click on any name to rename it. To add a new user, right-click on the containing folder and select New User. Finally, to disable an account, double-click it, check the Account is disabled box and click OK.

Don't ever delete the original Administrator account. Some programs refuse to install without it and you might have to log in under that account at some point to setup such 
software. The original Administrator account is configured with a security ID that must continue to be present in the system.

7. Set the Hosts file to read-only to prevent name hijacking.

This one's from (and to a degree, for) the experts. The HOSTS file is a text file that all flavors of Windows use to hold certain network addresses that never change. When a network name and address is placed in HOSTS, the computer uses the address listed there for that network name rather than performing a lookup (which can take time). Experts edit this file to place their most commonly-visited sites into it, speeding things up considerably.

Unfortunately hijackers and hackers also love to put their own information into it - redirecting people from their favorite sites to places they don't want to go. One of the most common entries in HOSTS is local host which is set 1770.0.1. This refers to the local machine and if this entry is damaged the computer can behave very unpredictably.

To prevent HOSTS from being hijacked, set it to read-only. Go to the folder %Systemroot%system32driversetc, right-click on HOSTS, select Properties check the Read-Only box and click OK. If you want to add your own entries to HOSTS, you can unprotect it before doing so, but always remember to set it to read-only after you're done.

8. Turn off unneeded Services
Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter, 
Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry, Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.
A good resource and instruction on which of these services can be disabled go to /http://www.blkviper.com/WinXP/
9. Disallow changes to IE settings through IE
This is another anti hijacker tip. IE can be set so that any changes to its settings must be performed through the Internet icon in the Control Panel, rather than through IE's own interface. Some particularly unscrupulous programs or sites try to tamper with setting by accessing the Tools, Options menu in IE. You can disable this and still make changes to IE's settings through the Control Panel.

Open the Registry and browse to HKEY_CURRENT_USER SoftwarePoliciesMicrosoftInternet ExplorerRestrictions. Create or edit a new DWORD value named NoBrowserUptions and set it to 1 (this is a per-user setting). Some third-party programs such as Spybot Search And Destroy allow you to toggle this setting.

You can also keep IE from having other programs rename its default startup page, another particularly annoying form of hijacking. Browse to HKEY.CURRENT USERSoftwarePolicies MicrosoftInternet ExploreControl Panel and add or edit a DWORD, Homepage and set it to 1.


10. Disable simple 
File Shares.
In Windows XP Professional, the Simple File Sharing mode is easily exploited, since it
抯 a little too easy to share out a file across your LAN (or the NET at large). To turn it off, go m My Computer, click Tools, Folder Option and the View tab, and uncheck Use Simple file sharing (Recommended). Click OK. When you do this you can access the Security tab in the Properties window for all folders; set permissions for folders; and take ownership of objects (but not in XP Home)

Track mobile phones

Track anything here
Mobile no
Ip Address
more and more
http://www.indiatrace.com/

Nokia Mobile hidden Codes list to do all the secret things


On the main screen on your Nokia Made mobile phone type in:
*#06# for checking the IMEI (International Mobile Equipment Identity).
*#7780# reset to factory settings.
*#67705646# This will clear the LCD display(operator logo).
*#0000# To view software version.
*#2820# To show Bluetooth device address.
*#746025625# Sim clock allowed status.
#pw+1234567890+1# Shows if sim have restrictions.
*#92702689# takes you to a secret menu where you may find some of the information below:
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair – if found (0000)
5. Shows life timer of phone (time passes since last start)
*#3370# Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.
*#3370* (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.
*#4720# Half Rate Codec activation.
*#4720* Half Rate Codec deactivation. The phone will automatically restart
If you forgot wallet code for Nokia S60 phone, use this code reset: *#7370925538#
Note, your data in the wallet will be erased. Phone will ask you the lock code. Default lock code is: 12345
Press *#3925538# to delete the contents and code of wallet.
Unlock service provider: Insert sim, turn phone on and press vol up(arrow keys) for 3 seconds, should say pin code. Press C,then press * message should flash, press * again and 04*pin*pin*pin# \
*#7328748263373738# resets security code.
Default security code is 12345
Change closed caller group (settings >security settings>user groups) to 00000 and ure phone will sound the message tone when you are near a radar speed trap. Setting it to 500 will cause your phone 2 set off security alarms at shop exits, gr8 for practical jokes! (works with some of the Nokia phones.) Press and hold “0″ on the main screen to open wap browser.

Increase your ram and so speed ur system


Google Search Tricks:

Well let me tell You what actually google tricks mean. Google tricks/google tips, does not mean hacking google, Using the below Google operators, we can get the desired google result very quickly. Well we can name this as hidden google secrets or Advanced google searching.                              .                                                                 Google Search Tricks tips
Google Trick -1 :- GOOGLE OPERATOR
Type the following highlited words in google search box.
oogle has several google operators that can help you find specific information, specific websites or inquire about the indexing of your own   site, below you will find the most important ones:   
define: - This google operator will find definitions for a certain term or  word over the Internet. Very useful when you come across a strange word when writing a post. I use this as a google dictionary. example : (define computer)
info: - The google info operator will list the sets of information that    Google has from a specific website (i.e. info:http://hack2007.50webs.com)
site: - This google operator can be used to see the number of indexed     pages on your site (i.e.site:www.hack2007.50webs.com).                  Alternative it can also be used to search for information inside a specific        site or class of sites.
link: - This google link operator allows you to find backlinks pointing         to your site. Unfortunately the count is not updated frequently and             not all backlinks are shown
allinurl: - Using this Google operator will limit the search to results         that contain the desired keywords on the URL structure. (i.e. allinurl:dailyblogtips)
fileformat: - Useful Google operator for finding specific file formats. Sometimes you know that the information you are looking for is likely to be contained in a PDF document or on a PowerPoint presentation, for instance. (i.e. “fileformat:.pdf market research” will search for PDF documents that contain the terms “market” and “research”)

Google trick -2 Top 10 Cool Google Search Tricks

well as we have gained enough knowledge regarding google operators, lets have a look at the following 10 cool google search tricks. Click on the example google trick, and You will be redirected to google.
  1. Google trick to  search different file formats (keyword filetype:doc)
  2. Google trick to search educational resources (keyword site:.edu) example (computer site:.edu)
  3. Finding the time of any location (time romania)
  4. Finding the weather of any location (boston weather)
  5. Tracking commentary of live events (Olympic games Beijing 2008)
  6. Using Google as a calculator (9 * 10)(143+234)(119-8)
  7. Converting currencies (1 USD in INR)(10 US Dollars in Indian Rupee)
  8. Find how many teaspoons are in a quarter cup (quarter cup in teaspoons)
  9. how many seconds there are in a year (seconds in a year)
  10. Tracking stocks (stocks:MSFT)
  11. Finding faces (add imgtype=face to the URL)
google trick -3 Top Essential Google Search shortcuts

#1: Get Local Weather

Type: “weather [city name or zip/postal code]”                                                                     Example: “weather 500054″ or “weather boston”

#2: Check Flight Status

Google automagically pulls flight data from FlightStats.com. All you have to do is enter the flight number.                                                                                                                                                           Type: [flight name and/or number]                                                                                     Example: “bc254″ or “newyork21″

#3: Convert Distances

Type: “[value] [first distance unit] to [second distance unit]”                                              Example: “100 kilometers to miles”

#4: Find a Phone Number

Find a Person:

    Type: “[person’s name], [city or zip/postal code]”                                                           Example: “john smith, london”

Find a Business/store:

    Type: “[business name or type], [city or zip/postal code]”                                         Example: “book store, boston”
Google trick -4 :Google search trick for Rapidshare files search:
#1 site:rapidshare.com inurl:users "*"

#2 site:rapidshare.de inurl:users "*"

#3 site:rapidshare.com inurl:files "*"

#4 site:rapidshare.de inurl:files "*"

#5 site:rapidshare.com inurl:users (pass|password)
#6 site:rapidshare.de inurl:users (pass|password)

Suppose u need some info on ebooks. Then u can try following keyword to see all rapidshare folders having any hacking related thing in it

site:rapidshare.com inurl:users "ebooks"

Turn ON/OFF Num Lock on Startup

Most of standard keyboards come with a small numeric keypad which identified by the numbers from 0 to 9. However, this numeric keypad is also served for some other functions such as "Page Up", "Page Down", "End", "Home", etc... depending on which mode of the "Num Lock" is being used. Many Windows users find this numeric keypad useful to type the numbers faster. But oopps... after hitting a several keys on the numeric keypad, you recognize the outcomes are not what you expected. Then you recognize the "Num Lock" mode is "OFF", so you just need to switch it on, and... start over your typing! The bad news is, by default, Windows turns the Num Lock off; however, the good news is, you can configure Windows to turn this Num Lock ON so that whenever you mean "number", you really get a number.

Read on, you'll get the details how to set Windows to keep the Num Lock status "ON" as default. In fact, you will need to make a small change on your Windows Registry to turn the Num Lock ON everytime Windows starts up.
IMPORTANT This article will guide to some steps to modify your Windows Registry. Stop if you're not familiar with the Windows Registry. Making a wrong change on the Windows Registry could cause critical problems to your computer.
Proceed at your own risks
This tip modifies the Windows Registry. So be aware and careful when following the steps. Damage the Windows Registry might damage your Windows.
  1. Open the "Registry Editor" ("Start" >> "Run", then type "regedit" and Enter).
  2. Expand to the following key:
    HKEY_CURRENT_USER\Control Panel\Keyboard\
  3. Within the keyboard folder, you should have a string value named "InitialKeyboardIndicators" with a value of 01, or 2.
  4. Double-click on this string value "InitialKeyboardIndicators" and edit the value to what you want. Below is the explaination of the values:
    0Num Lock is turned OFF on startup
    1Disable Num Lock
    2Num Lock is turned ON on startup

Hide Files or Folders Using Command Prompt

Trick to hide files and folders using Command Prompt
The most important thing is that, once hidden with this method, the files/folders cannot be viewed by any search options even if you click "Show All Hidden Files and Folders". 
Hiding the most wanted files and folders is very important nowadays and it's really a tedious job too. In order to make this tedious job an easy one, i'm going to deliver you a the trick now.
For Example: You have a folder named "collegephotos" and this folder is stored in (Disk Drive E). You think that it should not be seen by strangers who use your PC.

For that you need to follow the following instructions
  1. Press windowkey+R: Run command dialog box appears.
  2. Now type "cmd" and hit enter. A command prompt window displays.
  3. Now type "attrib +s +h E:\collegephotos" and hit enter.
  4. The folder "collegephotos" will be hidden (Note: It cannot be viewed by any search options)

    (To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h')

Any Folder as a Photo Folder

this tricks shows you how to setup any folder to display its contents as a photo folder. In many cases, you save your images/photos in a folder different than "My Pictures" (under "My Documents"). Since this folder you choose is just like any other normal folders, its contents displayed as a listing of files. You can temporary change it by just right-click and select "View" >> "Thumbnails". But if you want to change the folder so that everytime you come back, the folder itself, as well as all its subfolders, display the contents as photo thumbnails.
Here's How
  • Right-click on the folder you choose and select "Properties"

  • Select "Customize" Tab. Then under "Use this folder type as a template", select "Pictures (best for many files)"

  • Check on "Also apply this template to all subfolders" to apply the setting to subfoders as well

  • Click OK to exit
  • Reset Windows Password

    Forgot your administrator password? Don't panic, it happens to some other people too, and you have found the solution! The following instructions will show you step-by-step how to reset your local Windows password. This only works for local user accounts, however, not domain accounts.The password recovery tool from this page is written by Petter Nordahl-Hagen, and the original information, as well as the downloadable tool, can be found from his website. According to the author, this tool should work for Windows NT/2000/XP/Vista.
    WARNING! Users who have EFS encrypted files on the Windows XP or Vista computers will loose access to the EFS encrypted files after recovery of your password!
    Use this trick at your own risks
    The tool to reset your password can be downloaded here.

    I. Download the bootdisk:
    1. Download the bootdisk, which includes the password recovery tool here. The file contains the ISO CD image.
    2. Unzip (extract) the ISO file and burn it to a CD. Note that this is an ISO file, you must burn it to CD as an ISO image, not as a "data" file. If you're not sure how, see this article. Also, the image is bootable, you need to burn the image to a CD using the image burning feature; do not extract the contents of the ISO and burn them to the CD, you'll end up with a CD that can't boot!
    I. Understanding the process:
    • You'll use the bootdisk created from the above steps to bootup your computer, which you want to reset your administrator password.
    • You'll be asked for things like: which drive is the boot drive, which path to the SAM file, etc.. but don't worry, details will be provided.
    • Once you have selected an account to reset the password, you'll need to type in a new password; however, it is highly recommended to use a BLANK password at this point, then you can change your password later in Windows.
    • Follow the prompts to the end. You'll need to save the changes at the end!

    III. OK! Enough talking. Here are the steps:
    1. Startup your computer with the bootdisk created above. You should see a welcome screen following with a prompt:
       boot:
      
    2. Just wait, the bootup process will continute automatically. Then you should see a screen similar to this:
       =========================================================
       . Step ONE: Select disk where the Windows installation is
       =========================================================
       ....
       NT partitions found:
        1 :   /dev/sda1    4001MB  Boot
        2 :   /dev/sda5    2148MB
       
       Please select partition by number or
       a = show all partitions, d = automatically load new disk drivers
       m = manually load new disk drivers
       l = relist NTFS/FAT partitions, q = quit
       Select: [1]
      
    3. Notice the last line "Select: [1]" which shows the [1] as default selection because the tool detected the bootup partition is [1]. This might be different on your own machine, so you should review the list shown under "NT partitions found:". The partition with the word "Boot" should be selected.
    4. Hit Enter once you confirm the selection. You should see a similar screen as follows:
       =========================================================
       . Step TWO: Select PATH and registry files
       =========================================================
       ....
       What is the path to the registry directory? (relative to windows disk)
       [windows/system32/config] :
      
    5. Notice the last line "[windows/system32/config]" which shows the default path. This was also detected by the tool. If the path is correct, hit Enter, or if you wish to enter a different path, enter it now then hit Enter.
      Here are the paths for different versions of Windows:
      - Windows NT 3.51: winnt35/system32/config
      - Windows NT 4 and Windows 2000: winnt/system32/config
      - Windows XP/2003 (and often Windows 2000 upgraded from Windows 98 or earlier): windows/system32/config
    6. Once you hit "Enter", you should see the next screen similar to the following:
       -r--------    1 0        0          262144 Jan 12 18:01 SAM
       -r--------    1 0        0          262144 Jan 12 18:01 SECURITY
       -r--------    1 0        0          262144 Jan 12 18:01 default
       -r--------    1 0        0         8912896 Jan 12 18:01 software
       -r--------    1 0        0         2359296 Jan 12 18:01 system
       dr-x------    1 0        0            4096 Sep  8 11:37 systemprofile
       -r--------    1 0        0          262144 Sep  8 11:53 userdiff
      
       Select which part of registry to load, use predefined choices
       or list the files with space as delimiter
       1 - Password reset [sam system security]
       2 - RecoveryConsole parameters [software]
       q - quit - return to previous
       [1]
      
    7. Hit "Enter" with the default option selected "[1]". Then ...:
       =========================================================
       . Step THREE: Password or registry edit
       =========================================================
       Loaded hives:   
      
         1 - Edit user data and passwords
         2 - Syskey status & change
         3 - RecoveryConsole settings
          - - -
         9 - Registry editor, now with full write support!
         q - Quit (you will be asked if there is something to save)
      
       What to do? [1] -> 1
      
    8. Hit "Enter" with the default option selected "[1]". Then ...:
       ===== chntpw Edit User Info & Passwords ====
      
       RID: 01f4, Username: <Administrator>
       RID: 01f5, Username: <Guest>, *disabled or locked*
       RID: 03e8, Username: <HelpAssistant>, *disabled or locked*
       RID: 03eb, Username: <pnh>, *disabled or locked*
       RID: 03ea, Username: <SUPPORT_388945a0>, *disabled or locked*
      
       Select: ! - quit, . - list users, 0x<RID> - User with RID (hex)
       or simply enter the username to change: [Administrator]
      
    9. Hit "Enter" with the default option selected "[Administrator]", or select another user account. Here you can enter the full user account surrounded by < and >, CASE-SENSITIVE, or enter the RID number (i.e. 0x1f4). Assuming you select the Administrator account, you should see the following screen:
       RID     : 0500 [01f4]
       Username: Administrator
       fullname: 
       comment : Built-in account for administering the computer/domain
       homedir : 
      
       Account bits: 0x0210 =
       [ ] Disabled        | [ ] Homedir req.    | [ ] Passwd not req. | 
       [ ] Temp. duplicate | [X] Normal account  | [ ] NMS account     | 
       [ ] Domain trust ac | [ ] Wks trust act.  | [ ] Srv trust act   | 
       [X] Pwd don't expir | [ ] Auto lockout    | [ ] (unknown 0x08)  | 
       [ ] (unknown 0x10)  | [ ] (unknown 0x20)  | [ ] (unknown 0x40)  | 
      
       Failed login count: 0, while max tries is: 0
       Total  login count: 3
      
       * = blank the password (This may work better than setting a new password!)
       Enter nothing to leave it unchanged
       Please enter new password: *
      
    10. At the prompt "Please enter new password", Enter the * for a blank password (HIGHLY RECOMMENDED!) then press Enter
       Please enter new password: *
       Blanking password!
      
       Do you really wish to change it? (y/n) [n] y
      
    11. At the prompt, type in "y", then press Enter. Note that the default option is "n".
       Do you really wish to change it? (y/n) [n] y
       Changed!
      
       Select: ! - quit, . - list users, 0x - User with RID (hex)
       or simply enter the username to change: [Administrator] !
      
    12. Enter the "!" to go back to the main menu. Then select "q" at the following menu to quit:
       <>========<> chntpw Main Interactive Menu <>========<>
      
       Loaded hives:   
      
         1 - Edit user data and passwords
         2 - Syskey status & change
         3 - RecoveryConsole settings
          - - -
         9 - Registry editor, now with full write support!
         q - Quit (you will be asked if there is something to save)
      
       What to do? [1] -> q
      
    13. A prompt to save changes displays, enter "y" to save:
       =========================================================
       . Step FOUR: Writing back changes
       =========================================================
       About to write file(s) back! Do it? [n] : y
      
    14. The changes are saved! You should see the following screen, press Enter, and reboot your computer.
       Writing  sam
      
       ***** EDIT COMPLETE *****
      
       You can try again if it somehow failed, or you selected wrong
       New run? [n] : n
      
     

    Convert Any Document or Web Page to PDF

    Somebody just told you that you need to have Adobe Acrobat (Writer) to create a PDF file? Guess what, you can get away from that pricey piece of software if you just need to convert some documents to pdf, without a need of fancy editing the pdf document.
    Here's how. Thanks to the BullZip, who provides a Free Pdf printer. With this free tool, you can simply "print out" your document or webpage to a pdf file, just about the same way as you print it out to a printer.
    You can visit BullZip.com for more information about the software.
    Here the direct link to BullZip downloads page: Downloads
    1. To get started, first follow the link above and download Free Pdf Printer from BullZip, then install it to your computer.
    2. Once you're done, you might need to close the program (or the web browser) which you're currently viewing the document. This helps refreshing the list of available printers on your computer.
    3. Once you get back to the document you want to convert, perform the same steps are you print out the document, i.e. File > Print ...
    4. When you see the Print window pop-up, select "Bullzip PDF Printer" under "Printers", then click "OK".
    5. BullZip PDF Printer will then start to analyze your document and display a new pop-up window, where you can direct it to the location you want to save the pdf file.
    6. Follow the pop-up windows and.. hola! The PDF document is created!