Monday, August 30, 2010

Know Your Laptop Or Pc Male or Female

Hi all dear visitor, today i want to share some new trick .
Do you know your laptop GENDER ??? Do you believe that laptop or pc also got Male or Female ??? In here i want to share some Visual Basic ( VB ) code that can know your laptop or pc gender . I not pro in visual basic . I just a newbie that still learn it .

1) Open your " notepad "
2) Then you copy this script :
{ CreateObject("SAPI.SpVoice").Speak"I love YOU" } ( just copy that word i bold )
3) Then save it , please make sure change your save as type to "ALL FILE" , then save as "i love you.vbs" , make sure that you save it as .vbs , because if u don save it as .vbs that word will be not working .

( Make sure you save the file will become like this, if your icon are not like this that i will surely you save the file in wrong format )

4) After save all you go to place that u save and double click on it , it will out a sound that u can know your laptop or pc gender .

" If not working please leave a comment that i will try my best to help you "
Thanks for spend your time to visit and read in my blog .

Tuesday, August 24, 2010

Xiao Tian World Famous Hacker


"Xiao Tian"

Google's recently expressed readiness to withdraw from China and close all their operations there. The reason, the search engine giant that was no resistance to the wave of hacker attacks launched by the bamboo curtain is the country of origin.

David Drummond, Senior Vice President, Corporate Development and Chief Legal Officer of Google says, the institute found that there is' a very sophisticated attack "that originated from China on Google's infrastructure.

"The attacks made us decide to review the feasibility of our business operations in China," said Drummond is Google's official blog, January 12, 2010.

Google's step back from China who chose to show fierce hacker community in the country.

Until July 2008, an estimated 4 thousands people there are hackers who are members of various hacker community. One of them is a special group of hackers calling themselves women Cn Girl Security Team.

Hacker group is led by a girl born in Hunan, 6 September 1989 named Xiao Tian.

In mind, we might imagine that a hacker is a typical teenager growing up, with modest appearance - if not exactly a bad way - with thick glasses, heavy smoker, unkempt hair unkempt and rarely shower for spending most of his life in front of the computer .

Apparently not the case with Xiao Tian. Although she mentions often stay up and occasionally smoked, but it looks very slick. At a glance, see the appearance, you may be surprised that she was a leader of a group of hackers whose members reached more than 2,200 women hackers.

Xiao Tian said, she made the group because she felt that there should be no place for teenage girls like she, who felt left out from the crowded world of hackers hackers hackers man who thinks that women do not have enough skill.

Slowly but surely, Xiao Tian and hacker group started through the dominance of men in the world of hacking. They target the celebrity status that carried by hackers in China as well as open opportunities 'career' which is available tempting for hackers who have a high reputation.


Although members of the club hacker Xiao Tian still relatively small compared with the population of hackers in China, but the 'organization' hackernya may be one of the biggest female group of hackers in China.

Scott Henderson, a retired U.S. soldier who is an observer and author of The Dark Visitor: Inside the World of Chinese Hackers never mentioned in the Indian DNA. "Unique Aspects of China's hackers is a sense of nationalism and collectivism. This contrasts with the western stereotype that hackers are generally independent and work individually in the basement of their residence, "he said.

However, lately, the trend is happening is 'cyber army' is fragmented and forming a criminal capitalists and start to leave their sense of nationalism.

Still, Henderson says, a time when there is a conflict involving China, the hacker would have to mobilize their group and engage in cyber war. And when the time comes, 'generals' Xiao Tian will probably be one of the leaders of China's army.

I hope 1 day i also can be like she ...
Thanks for spend your time to read and visit my blog .

Setting Facebook E-Mail Notifications

When you open your E-Mail account must be many or full with facebook e-mail right ??? But all the e-mail are come from Facebook right ??? u must be boring or lazy to delete it .

So in this tutorial i will give some tutorial to setting in facebook that not all notifications at facebook are e-mail to you .

1) Go to Account Setting


2) Go to Notifications

Now you just choose all the point that u want only . For me the important is the pdate of the Facebook , that must be got use to read . So, if you no do this setting at your facebook account you just think that Facebook is a spammer at your E-Mail inbox .

Thanks for spend your time to read my tutorial .

Friday, August 20, 2010

DDOS Attack

DDOS ( Denial Of Service )

A Denial of Service ( DoS) attack is an attack which attempts to prevent the victim from being able to use all or part of their network connection.

A denial of service attack may target a user, to prevent them from making outgoing connections on the network. A denial of service may also target an entire organization, to either prevent outgoing traffic or to prevent incoming traffic to certain network services, such as the organizations web page.

Denial of service attacks are much easier to accomplish than remotely gaining administrative access to a target system. Because of this, denial of service attacks have become very common on the Internet.

Types of Denial of Service (DOS) attacks

These are a few of the classic denial of service attacks. Most of these rely upon weaknesses in the TCP/IP protocol. Vendor patches and proper network configuration have made most of these denial of service attacks difficult or impossible to accomplish.

Flood Attack
The earliest form of denial of service attack was the flood attack. The attacker simply sends more traffic than the victim could handle. This requires the attacker to have a faster network connection than the victim. This is the lowest-tech of the denial of service attacks, and also the most difficult to completely prevent.

Ping of Death Attack
The Ping of Death attack relied on a bug in the Berkeley TCP/IP stack which also existed on most systems which copied the Berkeley network code. The ping of death was simply sending ping packets larger than 65,535 bytes to the victim. This denial of service attack was as simple as: ping -l 86600 victim.org

SYN Attack
In the TCP protocol, handshaking of network connections is done with SYN and ACK messages. The system that wishes to communicate sends a SYN message to the target system. The target system then responds with an ACK message. In a SYN attack, the attacker floods the target with SYN messages spoofed to appear to be from unreachable Internet addresses. This fills up the buffer space for SYN messages on the target machine, preventing other systems on the network from communicating with the target machine.

Teardrop Attack
The Teardrop Attack uses IP's packet fragmentation algorithm to send corrupted packets to the victim machine. This confuses the victim machine and may hang it.

Smurf Attack
In the Smurf Attack, the attacker sends a ping request to a broadcast address at a third-party on the network. This ping request is spoofed to appear to come from the victims network address. Every system within the broadcast domain of the third-party will then send ping responses to the victim.

Distributed Denial of Service (DDOS) attacks
A Distributed Denial of Service (DDOS) attack is a denial of service attack which is mounted from a large number of locations across the network.

DDOS attacks are usually mounted from a large number of compromised systems. These systems may have been compromised by a trojan horse or a worm, or they might have been compromised by being hacked manually.

These compromised systems are usually controlled with a fairly sophisticated piece of client-server software such as Trinoo, Tribe Flood Network, Stacheldraht, TFN2K, Shaft, and Mstream.

The Mydoom worm attempted DDOS attacks against SCO and Microsoft from the systems which it infected.

DDOS attacks can be very difficult to defend against.

Here are a picture that DDOS working .

Tuesday, August 17, 2010

6 Google Secret

Google got secret . Do you know it ??? maybe still not many people know that google got secret. In here i will give you 6 google secret :

  1. Fill in " googoth " in the google search box , then press "I'm Feeling Lucky". Then u will see a dark search engine by google .
  2. Fill in " ewmew fudd " in the google search box , then press "I'm Feeling Lucky". Then u will see a google search engine version Elmer Fudd from Warner Bros .
  3. Fill in " xx-klingon " in the google search box , then press "I'm Feeling Lucky". Then u will see a google search engine in Quarter Klingon Languese .
  4. Fill in " google bsd " in the google search box , then press "I'm Feeling Lucky". Then u will see a google logo search engine become bsd icon .
  5. Fill in " google linux " in the google search engine , then press "I'm Feeling Lucky". Then u will see google logo change to google linux logo .
  6. Fill in " google easter egg " in the google search engine , then press "I'm Feeling Lucky". Then u will see google search engine in game mode that u also can control and play it .
Thanks for spend your time to read and visit this blog .

Monday, August 16, 2010

Second Password At Login Page

HI all visitors , today i got some new tutorial about facebook ...
We know that our facebook account are got many way to a hacker to hack into our facebook so in here i got new tip to now that our facebook have been hack or not , so in this tutorial if our facebook have been open by a hacker oor someone else we can be know , it because at the login page we must enter our computer name or some name that just you know . After you enter it a e-mail from facebook that will go to our e-mail inbox say that our facebook have been open by your selt or someone.

Here are some tutorial to setting it ...

1) Just like last facebook tutorial go to account setting .

2) Find account security .

3) Choose YES and Submit it.


4) You will see this box after apply the setting and log out and login it again .

Thanks for spend your time to read and view my tutorial. If got anything wrong please leave a comment.

Friday, August 13, 2010

Speed Up Your Mozilla Firefox

Made your mozilla firefox loading faster

For who use mozilla firefox browser you will feel a bit slowly when you playing on internet it because some proxy are cancelled or make your browser abit slowly . So now let we hack in to mozilla firefox browser and make your mozilla faster .
  1. Open Your Mozilla Firefox
  2. Put this "about:config" ( without this symbol " " ) in your browser address bar .
  3. Scrool down and find "network.http.max-connections", double click on it , then put "64" .
  4. Find "network.http.max-connections-per-server" , double click on it , then put "21" .
  5. Find "network.http.max-persistent-connections-per-server" , double click on it , then put "8" .
  6. Double click on "network.http.pipelining" then change it to "true".
  7. Find "network.http.pipelining.maxrequests" , double click on it , then put "100" .
  8. Double click on "network.http.proxy.pipelining" then change it to true .
  9. Last step , Right-click anywhere and select New > Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it shows you the information it receives.
  10. DONE !!! Now close the tabs and restart your mozilla firefox browser .

Alternate Method for Broadband Users

1. Type “about:config” into the address bar and hit return. Scroll down and look for the following entries:
  • "network.http.pipelining","network.http.proxy.pipelining", "network.http.pipelining.maxrequests" .
  • Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.
2. Alter the entries as follows:
  • Set “network.http.pipelining” to “true”
  • Set “network.http.proxy.pipelining” to “true”
  • Set “network.http.pipelining.maxrequests” to some number like 30. This means it will make 30 requests at once.
3. Lastly right-click anywhere and select New-->Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives. If you’re using a broadband connection you’ll load pages MUCH faster now!!!

Tuesday, August 10, 2010

107 command prompt command

1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System Troubleshooting Utility - drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) - gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad - notepad
65. Object Packager - packager
66. ODBC Data Source Administrator - odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor window32 - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests - ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) - rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility - wabmig
107. Windows Explorer - explorer

This command NOT 100 % work in window 7 . If window XP it may be work 100% because i already try some of it.

Sunday, August 8, 2010

Welcome ... Thanks for Visit .

Welcome to all visitor to Cyber_World blog .
08-08-10 this date very meaning full to me, so i choose this day to publish my first blog ...
This blog is want to tell you about cyber world tip and tricks in cyber world, about hacking security.
I still a newbie in IT or in computer security, so if got any wrong please let me know . Thanks You .

Change Facebook ID Tutorial

Hi all visitor , i still a newbie in IT , if i got do anything wrong please tell me.

Here i want to share something about cyber world tip & trick that we can run for to be a victim in cyber world.

1st you all will be know that "Facebook" right ??? So many people say that the Facebook account profile are can't be hack
it because is world wide using the facebook, my friend also got say to me that are imposible to hack a account profile in Facebook, so my friend are WRONG ,in here i want to share to all visitors in this blog about safely in our facebook account .

1. Do u know that your account URL are got your facebook ID ??? Here is the sample of facebook user ID .

This ID can be a code for the hacker crack you e-mail and password easily . Because now using a little bit money in cyber world to pay for the victim password and e-mail address .


2. so, u must change your ID to your nickname or your name , it because without the ID it will be a little bit hard to hacker to hack to your profile , here a some step that are to change your ID to your nickname . Here are some step to change your Facebook ID to your name.

Step 1


Step 2


Step 3


Step 4


Step 5




So , after all change are done , your facebook account are more safe .