Saturday, 29 November 2014

How To Make Your Laptop "A WiFi Hotspot"

Hi Fellas 

I have seen most of my friends sharing internet data by activating WiFi Hotspot option in their Smartphones.

Well internet makes life easy specially for students :D :D .

But yeah, I have also seen most of them facing problems if they want a WiFi Hotspot on their Laptops.

As we all know that there is an option for connecting your laptop to a WiFi Network but, there is no such option for making your laptop, a WiFi Hotspot

But Guys, it is possible for creating a WiFi Hotspot on your laptops. Just you have to follow some simple steps.

Steps

1. First of all your WiFi adapter should be switched on. It is either given as an external button or requires a simple click (Different for different laptops).

2. Go to Command Prompt (CMD) and run it as Administrator.

 

3. Then write a code as 

    netsh wlan set hostednetwork  mode=allow  ssid=id_name  key=Password

here in the above code in id_name you can give any name for your

WiFi Hotspot which will be visible to others and in Password, you are supposed to give a minimum eight character password.

 

4. Hit enter and you get an output similar to the screenshot given below.

 

5. Now write a code as 

    netsh wlan start hostednetwork

 

6. Hit enter and you get an output similar to the screenshot given below.

At this point you have successfully created a network. Now you need to provide internet on that network.

 

7. Goto Network and Sharing center and the screen will be like this as shown below

 

8. Here click on the connection which is the primary source of internet to your laptop. In my case its TATA Photon+.

9. You will get a screen as given below, in that click on properties

 

10. You get an output like as shown below, in that click on Sharing.

 

11. You will get a screen as given below, in it click on

 "Allow other network users to connect through this computer's internet connection"

 and then select the network connection which contains * from the drop down list. In my case the network connection which contains * is 

"Local Area Connection* 13"

Here the * shows the network you have just created using CMD.

 

12. Now click OK and you will see your created network's "Access Type: Internet" as shown below, this means that your WiFi Hotspot is ready. Now check your Smartphone's or other laptop's for your created WiFi Network :) .


Sunday, 12 October 2014

Rawalpindi.gov.pk, Pakistan's government website hacked by Bl@Ck Dr@Gon and ZuKr@in(INDIAN HACKERS) in the same fashion, as it was done earlier

But this time with an embedded audio as well :D.

The audio is clearly giving the proof that why Pakistan will not get Kashmir.

The audio is a telephonic conversation between renowned Radio Jockey RJ NAVED of DELHI, INDIA and a Pakistani politician Yaakub Sherwani :D :D .

One should listen that audio :D :D :D :D .

Pakistan got a reply there at the border and on internet as well :D :D :D 

You can still see that hacked website but i know soon it will be removed by Pakistani Government :D :D 

Here I am attaching the screenshots and the link of that audio, Enjoy guys 

And again the same suggestion from me to Pakistan

"BETA TU REHNE DE'

TUMSE NAA HO PAYEGA " :D :D :D :D 

 

The embedded audio and screenshots. http://104.131.72.100/1.mp3







 

Thursday, 9 October 2014

Pakistan Peoples Party's Official Website "HACKED" by INDIAN HACKERS GROUP (BL@CK DR@GON)

Recently Pakistan's Bilawal Bhutto who is getting spoon feeding by one of the prime political party i.e PAKISTAN PEOPLES PARTY said few words about JAMMU AND KASHMIR which were against INDIAN DEMOCRACY. 

This statement became a LAUGHING STOCK INTERNATIONALLY and so was for Pakistan :D :D. 

But this was not the end, again he said some few jokes and this time he and his party paid for it HEAVILY :D :D. 

This time, just after his statement, the official website of PAKISTAN PEOPLE'S PARTY GOT HACKED :D :D.

This activity was carried out by an INDIAN HACKER'S GROUP (BL@CK DR@GON)

This happened on 8th October 2014 at 11:34:47 GMT.

Right now if you try to see their website i.e

""www.ppp.org.pk""

you will see something like this 

And this happened because they have temporarily closed their website :D :D . 

But I will show you what it was in actual, as i am also a small hacker and i also need to show off :D :D 

Below you will see the pages :D :D one by one 






Now after seeing all these things i think the party should be named as "PAKISTAN POOR PARTY"

I would like to give some important tips to them :D :D 

"BETA TUM REHNE DO,

TUMSE NAA HO PAYEGA "

:D :D




 

Saturday, 6 September 2014

 I AM WHAT I AM

IF I HELP SOMEONE ,AND YOU DON'T LIKE IT
IT'S YOUR PROBLEM
IF I AM BEING KIND TO EVERYONE AND YOU TAKE IT AS A FAKE ME
IT'S YOUR PROBLEM
IF I AM WORKING AND BEING NORMAL, AND YOU THINK I AM RUDE
IT'S YOUR PROBLEM
IF YOU BELIEVE ONLY IN WHAT WRONG THINGS OTHERS SAY ABOUT ME DESPITE THE FACT THAT I WAS TRULY HONEST WITH YOU
IT'S YOUR PROBLEM
IF I GIVE YOU A FRIENDLY SUGGESTION AND YOU THINK OF IT AS A TRICK
IT'S YOUR PROBLEM
IF YOU SPREAD FAKE THINGS ABOUT ME AND YOU THINK THAT I DON'T KNOW THAT
IT'S YOUR PROBLEM
IF I SPEAK TRUTH AND YOU DON'T LIKE IT
IT'S YOUR PROBLEM
IF I AM NOT GIVING MY HAND FOR YOUR CORRUPT WORK
IT'S YOUR PROBLEM
IF I TELL YOUR MISTAKES AND YOU THINK THAT I WANT TO TAKE YOUR POSITION AND WANT TO INSULT YOU
IT'S YOUR PROBLEM
IF I ALWAYS FULFILL YOUR WISHES AND ONLY ONCE I DO SOMETHING FOR ME AND YOU THINK THAT I AM SELFISH
IT'S YOUR PROBLEM
IF YOU THINK THAT I AM HELPING YOU JUST BECAUSE I HAVE A MOTIVE BEHIND IT DESPITE THE FACT THAT I HAVE NEVER ASKED FOR ANYTHING IN RETURN AND HAVE HELPED YOU MANY TIMES
IT'S YOUR PROBLEM
IF YOU THINK THAT I AM GIVING EVERYTHING TO YOU BLINDLY AND YOU THINK OF ME AS A FOOL
IT'S YOUR PROBLEM
AND AFTER ALL THESE THINGS IF WE HAVE SOME DISPUTES AND I SAY SORRY AND APOLOGIZE TO YOU AND YOU THINK THAT I AM APOLOGIZING FOR MY MISTAKES
THEN YOU ARE MISTAKEN
AS I DO IT BECAUSE I KNOW THAT YOU CANT EVEN APOLOGIZE FOR YOUR OWN MISTAKES AND THEREFORE AGAIN
IT'S YOUR PROBLEM

Monday, 1 September 2014

Using Four 4's and all the Arithmetic operators bring 20 i.e(4,4,4,4 =20  using +,-,*,/)


Hi Fella's 

 

This is a very popular question and one of my friend asked me this question on WhatsApp . 

 

I answered it correctly and she was surprised and so was her Tuition Teacher. In reply she said that her teacher is asking my name and was asking about me :D :D :D. I diverted the topic and she forgot about that :D :D.

 

Soon I gave another solution as well :D :D.

 

Then I searched the same question on internet and then I realised that why they were shocked, there was no perfect answer on internet as well, but seeing this, I was shocked :D :D because the question was very simple :D :D. 

 

Well the answer for this is 

 

(((-4)/(-4))+4)*4=20  or

 

(((4^(-1))/(4^(-1)))+4)*4=20

 

If you will search for this question's answer now on the internet then in some of the first few searches of google pages, you will see my answer's as well :)

 

Till then Bye, Take Care and Keep Smiling :)

Saturday, 31 May 2014

HOW TO RECOVER LOST DATA

HI FELLAS 

Most of the time we are using our Pen-drives, Hard-Disks or any other media for data storage and carrying of data .It is really one of the most convenient, easy and cheap method for data storage, but there are many problems which we face most often. 
And on of the biggest problem is "LOSS OF DATA DUE TO VIRUSES" or due to any other problem.
Many times you people see that disk space has been used but when you open that drive of memory then there is nothing, even the hidden files option has been used but still one can see nothing.
Also sometimes you see that you plugged your Pen-Drive or any other source and the computer shows that "THE DISK CANNOT BE USED UNTIL THE DISK IS FORMATTED"and then, you format the disk. 


And most of the time, you take the ultimate decision to format the disk.
But friends this can be avoided
There are three methods to recover data
1) Using Command Prompt (CMD)
2) Using Linux Operating System (Ubuntu, Fedora e.t.c)
3) Using any recovery software
I will  explain each of them one by one.


USING COMMAND POMPT (CMD)


It is one of the most simple and easy methods of recovering data.
Just you have to do is to use commands like CHKDSK AND ATTRIB
For those who are new to use CMD, these are some easy steps to open CMD console.
Click Windows key + R key, a box named RUN will appear,

 type CMD in that, and then you get the CMD. 


Now after seeing the various images, we will use the commands and learn what they actually do 


We will start with CHKDSK command first.
This Command can be used with numerous modes
One of them is like this

             "CHKDSK G:"

Here in this command the disk drive G will be checked for errors and will produce a list of errors if they exist.
Also if you use it like this

             "CHKDSK /F G:"

then this will fix the errors present in the disk.


There are several modes of using CHKDSK command and are shown below.
You can get the list of operating modes for CHKDSK by simply writing

             "HELP CHKDSK"



Now I will tell you about ATTRIB command.
This command is used for reading the Files in different modes and using some combination of modes can bring back lost files from the drive.
Command for bringing back virus infected lost files is 

            "G: ATTRIB -S -H /S /D *.*"

Here G is the name of the infected drive.

Command for getting hidden files is 

             "G: ATTRIB -H -S -R"

There are more modes for ATTRIB as shown below



RECOVERING FILES USING LINUX

Its very simple, if you have lost any file due to virus in windows and you see that the disk space is utilised but you see nothing when you open it.
To see all those files, you open your disk drive in a Linux system, and there you see all the files, even the virus files as well.
This is because the Linux systems are immune to viruses and they don't have any effect on any Linux Operating system.

There are more methods for recovering data using LINUX TERMINAL, but it is very vast.
Therefore I will post a separate blog for it.

One of the Linux OS Console is shown below.

 



RECOVERING DATA USING A THIRD PARTY (SOFTWARE)

Recovering data using a software is easy and more efficient.
It can also recover lost data fragments and deleted data as well.
But most of the times the software is either a paid version or a trial version.
Also it takes lot of time and memory in some cases, but it is not important than the data which we lost,
Isn't it ? :D ;)
I am providing you a list of some third party software's.
these are as fallows


1)File Recover
2)WinUndelete
3)Recuva
4)Easy Recover


If you know some more methods for recovering data then please add your valuable comments below. :)


TILL THEN
KEEP SMILING :)



Wednesday, 28 May 2014

How To Send Mail From Someone Elses E-mail ID 

Hi Fellas 


Today I am going to tell you that by simply knowing somebodies E-mail ID, you can send messages to anyone using it, even to the same person :D









This is possible with the help of some websites which provide you to send fake mails.But yes, while using these websites, sometimes the reciever gets the message in spam or as a message in inbox with a warning.

But some good hackers are aware of these issues and they don't face such problems :D


Yeah, Even I don't face such problems  ;) :D


So here are the steps to send a fake mail to anyone from anybodies email ID


 Step 1

Go to one of the websites listed below
1) Emkei.com
2)Deadfake.com
3)Anonymailer.net
4)Fakemailgenerator.com

Here I am using deadfake.com beacuse it directly comes in Inbox 


Step2

Click on "Send Fake Mail" button
and then you get a page like this.














Step 3

Just type the e-mail ID from which you want to send the message and the email ID of the reciever.
Enter the captcha code.
And press send.
Thats it!
The mail has been sent to that person.

As you can see that you can also send files and pics to the rciever as well, and it provides all the tools which are present in a normal mailing application.



IMPORTANT NOTE

Do not use this for doing any bad activities, you can get caught if the aftereffects are adverse.
Make sure that you only use this trick just for knowing things or for fun.
Telling the reciever afterwards about this activity will be a best action.

Also the main purpose of writing this blog is to make people aware of such things so that they don't get fooled by such fake mails.

Therefore Play Safe.


TILL THEN

KEEP SMILING :)


Tuesday, 27 May 2014

MAKING WINDOWS-7 GLASSY 

HI FRIENDS 

As most of my Friends are still using Windows-7, so this blog is for them :)


Friends, we have seen some catchy features of Windows-8 and many times feel bad for not having it.
But you don't worry as Windows-7/Vista supports some special themes which are known as Aerothemes.


Usually a conventional interface of your PC looks like this 















And if you are using aeroglass, then it looks like this 

















Friends, here you can see the difference :)
The interface is looking transparent and more attractive than the previous conventional one.


Now you would ask me "How to do this?"


Well the answer is simple, use aeroglass themes and software's which are available for free on line.


And still if you dont find it then send me your mail id below as a comment or as feedback and i will send you the same.
Till then
 

KEEP SMILING :)





Sunday, 25 May 2014

HI Friends

Soon I will be posting some interesting tricks related to Computing.
I am sure those tricks will be eye catching one and you all will love them :)