[Guides] Hacking/Tips & Tricks menu

Shout-Out

User Tag List

Results 1 to 3 of 3
  1. #1
    Zeroi9's Avatar Banned
    Reputation
    286
    Join Date
    Aug 2008
    Posts
    911
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    [Guides] Hacking/Tips & Tricks

    Hey, here i'll post guides about hacking and some tips and trick about your computer, lets start off easy...

    [What I know this ONLY works on XP!]
    Tired of the Windows key, tabbing you out to your desktop everytime you missclick ctrl and click the windows key instead? Want to fix it? That's very easy!
    All we need to do is :

    1). Create a .txt file, and copy this text inside it :
    Code:
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]
    "Scancode Map"=hex:00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b,e0,00,00,5c,e0,\
    00,00,00,00
    2). go to File -> Save as -> name it anything.reg to your desktop
    3). run the .reg file, now you dont have to worry about the windows key anymore.

    Rename your icons to anything


    This is very easy, just rightclick the program, press "Rename" And hold the alt key, press 255 at the NumPad Panel.
    Done.


    Summary of FBI's computer system
    >From the Illumi-Net BBS Decatur, GA
    Conspiracy Theory Conference 404-377-1141



    Code:
    Summary of FBI Computer Systems
    
     The FBI maintains several computer systems.  The most common of which is
    call NCIC (National Crime Information Computer). NCIC maintains a database of
    information about such things as stolen cars, stolen boats, missing persons,
    wanted persons, arrest records. It provides quick access to these records by
    State, Local and Federal law enforcement agencies.  NCIC is directly linked
    with the Treasury Department's TECS computer and many State computer systems.
    According to William H. Webster, Director of the FBI:
    
    When a police officer stops a car and is uncertain about who he's going to
    meet when he gets out, he can plug into this system [NCIC] and in a matter of
    a few seconds he can find out whether that person is a fugitive or the
    automobile is stolen. Incidentally, we receive almost 400,000 inquires of
    this nature each day in the NCIC system.
    
     When an agency determines that a subject is a fugitive, it supplies the FBI
    computer with as much of the following information as possible: 1) Name and
    case number; 2) Alias; 3) Race; 4) Sex; 5) Height; 6) Weight; 7) Color of
    hair; 8) Color of eyes; 9) Description of any identifying scars, marks and
    tattoos; 10) Date of birth; 11) Place of birth; 12) Social Security Number;
    13) Passport Number; 14) Last known address; 15) Nationality; 16) If a
    naturalized U.S. Citizen, date, place, and certificate number; 17)
    Occupation; 18) The criminal violation with which subject is charged; 19)
    Date of warrant; 21) Type of warrant -- Bench, Magistrate, etc.; 22) Agency
    holding warrant; 23) Any information as to whether the subject is considered
    dangerous, is known to own or currently possess firearms, has suicidal
    tendencies, or has previously escaped custody; 24) Driver's license number,
    year of expiration and State issued; 25) License number of vehicle, aircraft
    or vessel subject owns or is known to use, include the year and State; 26)
    Description of vehicle, aircraft or vessel subject owns or is known to use;
    27) Associates of the subject*1; 28) FBI number; 29) Name and telephone of
    the person to contact when subject is apprehended.
    
     One of the major problems with the system is that the agency that submits an
    entry is responsible for keeping it up to date. Once an entry has been made,
    there is little motivation for the originating agency to ``waste'' its time
    keeping it up to date, so many entries become incorrect with the passage of
    time.
    
     Another FBI computer system is their Investigative Support Information
    System (ISIS). This system is only used to provide support for major
    investigations that require the handling of a large volume of complex
    information.  It is limited to handling a maximum of 20 cases at a time.
    
     The ISIS system was used during the investigation of the murder of Federal
    Judge John Wood in San Antonio, Texas. In this case, the FBI entered 300,000
    pieces of information, including 6,000 interviews, hotel registration
    information from every hotel in the area, etc.  The accused, while on trial,
    claimed he was several hundred miles away.  The FBI cross referenced his name
    & known alias with the hotel registration database and got a match. Contact
    with the hotel employees resulted in a positive identification and conviction
    of the subject.
    
     The FBI has a system called the Organized Crime Information Systems (OCIS)
    of which director William Webster is ``particularly proud.''  The system was
    started in 1980 in Detroit, Michigan and is one of their most sophisticated
    computers. The system is now functions in over 40 locations.
    
     The OCIS system allows agents in different field offices to share and
    analyze information collected in each other's areas.  This system was used to
    identify some of the United States citizens who were released from Cuban
    prisons in 1984 that had criminal histories in the United States. An OCIS
    link was recently opened in Rome, where it's used to support drug
    investigations.
    
     The OCIS system was used in the major Sicilian mafia heroin investigation,
    commonly referred to as ``The Pizza Connection.'' According to Webster,
    ``OCIS support ranged from direct assistance in collating information for
    Title III court-authorized wiretaps to the analysis of the case for grand
    jury presentation.''
    
     Currently under development is the Field Office Information Management
    System (FOIMS). The purpose of this system is to fully automate the
    administrative and record keeping functions of the field and resident offices.
    
    *1 One of the basic freedoms in this country is the First Amendment right to
    freedom of association.  The Privacy Act was enacted to stop government
    invasions of privacy, and includes a provision specifically prohibiting the
    collection of information on the exercise of First Amendment activities.



    Window Shortcuts - f0r n33wbZ

    Code:
    CTRL+C (Copy)
    CTRL+X (Cut)
    CTRL+V (Paste)
    CTRL+Z (Undo)
    DELETE (Delete)
    SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
    CTRL while dragging an item (Copy the selected item)
    CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
    F2 key (Rename the selected item)
    CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
    CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
    CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
    CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
    CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
    SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
    CTRL+A (Select all)
    F3 key (Search for a file or a folder)
    ALT+ENTER (View the properties for the selected item)
    ALT+F4 (Close the active item, or quit the active program)
    ALT+ENTER (Display the properties of the selected object)
    ALT+SPACEBAR (Open the shortcut menu for the active window)
    CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
    ALT+TAB (Switch between the open items)
    ALT+ESC (Cycle through items in the order that they had been opened)
    F6 key (Cycle through the screen elements in a window or on the desktop)
    F4 key (Display the Address bar list in My Computer or Windows Explorer)
    SHIFT+F10 (Display the shortcut menu for the selected item)
    ALT+SPACEBAR (Display the System menu for the active window)
    CTRL+ESC (Display the Start menu)
    ALT+Underlined letter in a menu name (Display the corresponding menu)
    Underlined letter in a command name on an open menu (Perform the corresponding command)
    F10 key (Activate the menu bar in the active program)
    RIGHT ARROW (Open the next menu to the right, or open a submenu)
    LEFT ARROW (Open the next menu to the left, or close a submenu)
    F5 key (Update the active window)
    BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
    ESC (Cancel the current task)
    SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
    Dialog Box Keyboard Shortcuts
    CTRL+TAB (Move forward through the tabs)
    CTRL+SHIFT+TAB (Move backward through the tabs)
    TAB (Move forward through the options)
    SHIFT+TAB (Move backward through the options)
    ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
    ENTER (Perform the command for the active option or button)
    SPACEBAR (Select or clear the check box if the active option is a check box)
    Arrow keys (Select a button if the active option is a group of option buttons)
    F1 key (Display Help)
    F4 key (Display the items in the active list)
    BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
    Microsoft Natural Keyboard Shortcuts
    Windows Logo (Display or hide the Start menu)
    Windows Logo+BREAK (Display the System Properties dialog box)
    Windows Logo+D (Display the desktop)
    Windows Logo+M (Minimize all of the windows)
    Windows Logo+SHIFT+M (Restore the minimized windows)
    Windows Logo+E (Open My Computer)
    Windows Logo+F (Search for a file or a folder)
    CTRL+Windows Logo+F (Search for computers)
    Windows Logo+F1 (Display Windows Help)
    Windows Logo+ L (Lock the keyboard)
    Windows Logo+R (Open the Run dialog box)
    Windows Logo+U (Open Utility Manager)
    Accessibility Keyboard Shortcuts
    Right SHIFT for eight seconds (Switch FilterKeys either on or off)
    Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
    Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
    SHIFT five times (Switch the StickyKeys either on or off)
    NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
    Windows Logo +U (Open Utility Manager)
    Windows Explorer Keyboard Shortcuts
    END (Display the bottom of the active window)
    HOME (Display the top of the active window)
    NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
    NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
    NUM LOCK+Minus sign (-) (Collapse the selected folder)
    LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
    RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
    Shortcut Keys for Character Map
    After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
    RIGHT ARROW (Move to the right or to the beginning of the next line)
    LEFT ARROW (Move to the left or to the end of the previous line)
    UP ARROW (Move up one row)
    DOWN ARROW (Move down one row)
    PAGE UP (Move up one screen at a time)
    PAGE DOWN (Move down one screen at a time)
    HOME (Move to the beginning of the line)
    END (Move to the end of the line)
    CTRL+HOME (Move to the first character)
    CTRL+END (Move to the last character)
    SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
    Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
    CTRL+O (Open a saved console)
    CTRL+N (Open a new console)
    CTRL+S (Save the open console)
    CTRL+M (Add or remove a console item)
    CTRL+W (Open a new window)
    F5 key (Update the content of all console windows)
    ALT+SPACEBAR (Display the MMC window menu)
    ALT+F4 (Close the console)
    ALT+A (Display the Action menu)
    ALT+V (Display the View menu)
    ALT+F (Display the File menu)
    ALT+O (Display the Favorites menu)
    MMC Console Window Keyboard Shortcuts
    CTRL+P (Print the current page or active pane)
    ALT+Minus sign (-) (Display the window menu for the active console window)
    SHIFT+F10 (Display the Action shortcut menu for the selected item)
    F1 key (Open the Help topic, if any, for the selected item)
    F5 key (Update the content of all console windows)
    CTRL+F10 (Maximize the active console window)
    CTRL+F5 (Restore the active console window)
    ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
    F2 key (Rename the selected item)
    CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
    Remote Desktop Connection Navigation
    CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
    ALT+PAGE UP (Switch between programs from left to right)
    ALT+PAGE DOWN (Switch between programs from right to left)
    ALT+INSERT (Cycle through the programs in most recently used order)
    ALT+HOME (Display the Start menu)
    CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
    ALT+DELETE (Display the Windows menu)
    CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
    CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
    Microsoft Internet Explorer Navigation
    CTRL+B (Open the Organize Favorites dialog box)
    CTRL+E (Open the Search bar)
    CTRL+F (Start the Find utility)
    CTRL+H (Open the History bar)
    CTRL+I (Open the Favorites bar)
    CTRL+L (Open the Open dialog box)
    CTRL+N (Start another instance of the browser with the same Web address)
    CTRL+O (Open the Open dialog box, the same as CTRL+L)
    CTRL+P (Open the Print dialog box)
    CTRL+R (Update the current Web page)
    CTRL+W (Close the current window) 
    How to remove time limits on your account
    Code:
    To restrict a users logon hours , use the net user command. These commands are used from the Command Prompt. (Start - RUN - and type CMD, or hold windows key and press R and write CMD)
    
    Below are some examples:
    
    1 - net user Zeroi9 /time:M-F,05:00-14:00
    
    2 - net user Wille /time:M-F,5am-2pm
    
    3 - net user Zeroi /time:M,4am-5pm;T,1pm-3pm;W-F,8:00-17:00
    
    4 - net user KuRIoS /time:all (this one means this user can always log on)
    Create a file with any size.
    Code:
    You can create a file of any size using nothing more than what's supplied with Windows. Start by converting the desired file size into hexadecimal notation. You can use the Windows Calculator in Scientific mode do to this. Suppose you want a file of 1 million bytes. Enter 1000000 in the calculator and click on the Hex option to convert it (1 million in hex is F4240.) Pad the result with zeroes at the left until the file size reaches eight digits—000F4240.
    
    Now open a command prompt window. In Windows 95, 98, or Me, you can do this by entering COMMAND in the Start menu's Run dialog; in Windows NT 4.0, 2000, or XP enter CMD instead. Enter the command DEBUG BIGFILE.DAT and ignore the File not found message. Type RCX and press Enter. Debug will display a colon prompt. Enter the last four digits of the hexadecimal number you calculated (4240, in our example). Type RBX and press Enter, then enter the first four digits of the hexadecimal size (000F, in our example). Enter W for Write and Q for Quit. You've just created a 1-million-byte file using Debug. Of course you can create a file of any desired size using the same technique.

    How to see all hidden files.

    Code:
     Run command prompt (CMD) by presssing the windowskey + r, and then write "CMD" or by going to start -> Run... -> CMD.
    ******************
    at command prompt just type
    dir /ah
    if the list is too long u can use
    dir /ah/p/w
    *******************

    I'm coming with more, but I dont really now what I should post now. I'm going to post database hacking and stuff like that soon!

    [Guides] Hacking/Tips & Tricks
  2. #2
    x13's Avatar Member
    Reputation
    13
    Join Date
    Nov 2008
    Posts
    36
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Sorry but this is all common sense if you're not completely computer illiterate.

    None-the-less, mmowned has a 99.9% population of computer illiterate people. So thank you for taking the time to type this.

  3. #3
    Gripen2's Avatar Contributor
    Reputation
    226
    Join Date
    Jan 2008
    Posts
    1,056
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Seeing hidden files can just by made by My Computer > Tools ?

Similar Threads

  1. Prospecting Guide & Tips N Tricks
    By Eski in forum World of Warcraft Guides
    Replies: 22
    Last Post: 02-11-2009, 09:56 PM
  2. [Half Guide/Half Tip] How to avoid getting your Server's SQL hacked!
    By The_Zealot in forum WoW EMU Guides & Tutorials
    Replies: 3
    Last Post: 10-04-2007, 06:34 PM
  3. Replies: 11
    Last Post: 04-26-2007, 02:09 AM
All times are GMT -5. The time now is 08:49 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search