Most of us would like to know/track peoples location chatting with us over Messengers.
When you are busy chatting with some and you want to know where exactly he is chatting from then you have to locate his IP address first.
To locate his IP address you have to type "netstat -n" in command prompt
Go to the COMMAND PROMPT START>>>RUN>>>CMD>>netstat -n
This will list out all the connections established with this computer to the other computers over internet. There you will be able to find few IP addresses (ignore IP address such as 127.0.0.1). To identify which IP address is yours and which is victims, you have to identify your IP.
To check your own IP, go to URL http://whatismyip.com, this will list your IP address. By this you will come to know which is victims IP address.
Now it’s time to find the Geo-location of IP address, for this we have different tools and online URLs which will locate IP address to Geo-locations. Try the below URL http://www.ip2location.com/demo.aspx, which will help you in finding the Geo-location of an IP address. Enter the IP address, that you want to track in the dialog box and click on “Find Location”, this will show you Victims Geographical- location.
Sunday, September 19, 2010
How to find location of a person chatting with us..
Posted by ntheja@sify.com at 11:20 PM 0 comments
Labels: Hack
Sunday, February 8, 2009
How to Keep Your Computer Virus Free?
Hello Friends, I am back after a long gap to provide you valuable information.
You will be really happy to know about the article I am writing about, a virus free system. Yes, you heard it correct, “A VIRUS FREE SYSTEM”.
I have wasted hours and hours in formatting my system, because of the third party utilities I install for R & D and always land at system crash.
To avoid frequent system formats I have started using VMware to safe guard from the Viruses, Worms, and Malicious software’s. Now I am using Deep freeze Software. Deepfreeze Software will be helpful to all those who complain about the viruses, frequent system failures, who ever run’s Internet cafes , any computer training institutes /Colleges and even in personal computers.
When and How to use DeepFreeze [DF]?
Once you think your system is working perfect and you have installed all the application and software’s you use in regular, install Deep Freeze and configure it only to the Drive where your operating system exists.
You have to be little careful at the time of configuring Deep freeze. Please select only the C or D drive [where a windows OS is installed]. Now your computer is a Virus free computer.
Though DeepFreeze allows users / Viruses to have the comfort of virtually modifying the system as they like, but when the computer is rebooted it will come to its original state.
You browse any worst virus site / download any dangerous Scripts / install any dangerous virus unknowingly, all these will be get cleared after a system reboot, because DF will freeze the selected drive at a point and after system restart it will come again to the same point [Just like system restore point but more powerful].
Thus this tendency of restoring system to its first best system working state and not allowing files modification / any files to save on the freeze disk, there is no chance of getting any Virus to the drive we freeze.
Remember CTRL + ALT + SHIFT + F6 combination of keys will open up the DF window.
Use boot Thawed to release the freeze. You need to release the freeze at the time of software updates or if you thought to install any third party software.
If your Hard disk has only one single partition C drive it is not recommended to install the DF, because if DF fails, then it will not allow you to save any thing on drive C. Which will screw up your system.
Hope you love to know about DeepFreeze. If you need any further information about the DF you can e-mail me. However, I am now providing you some informative links below.
Download able at: http://deep-freeze.en.softonic.com/
Informative site: http://en.wikipedia.org/wiki/Deep_Freeze_(software)
Main Site for DF: http://www.faronics.com/
Posted by ntheja@sify.com at 1:00 AM 0 comments
Sunday, January 27, 2008
Orkut is banned you fool.........Fixed
Most of the people love orkut and think of a situation where "orkut got banned" on your system.I know how difficult the situation is.
Error : MessagesOrkut is banned you fool , is a INTERNET EXPLORER U DOPE Heap41a / win32.USBworm Worm - It will block Firefox, Orkut and YouTube. Here is the solution to fix the issue.
Download Patch to Unblock Orkut.
Posted by ntheja@sify.com at 1:23 PM 0 comments
Thursday, January 17, 2008
Desktop.ini & Folder.htt virus HTML.Redlof.A is a Virus
Remove Desktop.ini & Folder.htt virus HTML.Redlof.A
We normally think that Desktop.ini and Folder.htt are the windows supporting file because the naming convention is in such a way. However, they are one of the most annoying viruses.
Most of us after use pen drives for data transfer and they are the one carry dangerous viruses. Here is trick how to remove Desktop.ini and Folder.htt
Redlof is polymorphic virus that embeds itself without any attachment to every e-mail sent from the infected system. It executes when an infected email message is viewed The HTML.Redlof.A is a very pestering virus. Amazingly it doesn’t create any loss of data or it doesn’t any personal information across the net.
However, the terrified thing is, It actually comes in the form of a script. The script is copied onto several other .htm, .html, .vbs, .asp, .htt, .jsp files on your hard drive. Then whenever any of these files are executed, the script is copied onto more files which create more files and so on.
VBS/Redlof.A@m executes directly from an infected message by using security vulnerability in Internet Exlorer known as Microsoft VM ActiveX Control Vulnerability.
Vulnerability and a fix is available from Microsoft:
The virus also infects files with extensions "htm", "html", "asp", "php", "jsp", "htt" or "vbs".
Redlof drops the following infected files:
\Program Files\Common Files\Microsoft Shared\Stationery\blank.html
\Windows\System\Kernel32.dll
\Windows\web\kjwall.gif
\Windows\system32\desktop.ini
"blank.html" is used to replace the default stationeries for both Outlook and Outlook Express via registry causing that the every message sent from an infected system will carry the virus.
The "Kernel32.dll" is also set to registry so that it will be executed on the system restart:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Kernel32
Download Virus Removal tools:
1) Download from softpedia.com
2) Download from Gdata.pl
Posted by ntheja@sify.com at 12:48 AM 0 comments
Wednesday, January 2, 2008
How to Send Secret messages over the internet.
Type the file you want to send secretly and keep the file ready. Now you have to attach this file to image file and send the image file to your secret friends or the one you prefer.
It looks like image file but nobody will identify the file as a secret hidden text file bounded with image file. Hope you understand what exactly we are doing. Follow the below steps.
1. Gather the file you wish to bind, and the image file, and put them in a folder. For the sake of this demonstration, I will be using C:\My Folder
-The image will hereby be referred to in all examples as MyPic.jpg
-The file will hereby be referred to in all examples as MyFile.txt
2. Add the file/files you will be add (injecting) into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)
3. Open command prompt by going to Start > Run > cmd
4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\ My Folder]
5. Type [copy /b MyPic.jpg + secret.rar MyPic.jpg] (remove the brackets)
Good Luck, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your secret file.
In order to view/extract your file, there are two options that you can take.
a) Change the file extension from MyPic.jpg to MyPic.rar, then open and your file is there
b) Leave the file extension as it is, right click, open with WinRar and your file is there
Posted by ntheja@sify.com at 2:22 PM 0 comments