Noteable Posts

Sunday, April 29, 2007

Free WebHosting, Free Domains and Making Money from your Site

You can get free hostings at many sites including following:
There are some special kind of site building mechanism available at www.blogger.com, www.myspace.com, www.wordpress.com etc some ppl even making money from webblogs like this.
Besides free hosting you can get free domain name facilities at www.dot.tk (will show ads) and www.co.nr (without any sort of ads, which also allow hosting space) And there is www.biz.ly available for popular site with like 100 visitor per day. If you have a free site which is this much popular u can get a free domain which will be like www.bikikini.biz.ly with full control like a commercial domain.
And making money from site is not easy but possible. You have to make a popular site which will gather lots of daily visitors. And when ur site is popular u can utilize the popularity by advertising on products of companies. Google, Yahoo, adbrite.com etc also allows webmasters to earn from visitors.
Thats it for now.. :)

Tuesday, April 10, 2007

How do you enable Registry Editing again if it has been disabled by your administrator?

A way to get into the registry editor if its been disabled, heres how you do it:

1. Disable as much as you can from your startup. Remove programs from your startup folder and such, so as not to lag down the bootup process.

2.Create a new shortcut on your desktop, point it to "C:\Windows\regedit.exe"

3.Log off, then log back on

4.As soon as you see your desktop, double click on the shortcut. The system does not check for policies until a few seconds after it booted up. If you click on the icon fast enough, it should let you get in.

After that, do all you need. After you close it though, it will not open unless you redo step 3 and 4.

There's one vbs script to enable the registry editing. and below is the link.

www.dougknox.com/security/scripts_desc/regtools.htm

HaXxOr Simple

The way to get into registry editing is simple. Open your start menu click Run and paste in the folowing command: REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f Submited By HaXxOr.

Answer

Administrator does not disable registry editing its the bloody virus called rontokbro@mm. you can remove the virus but enable registy editing you will need the tool provided by symantec on their web site http://securityresponse.symantec.com/avcenter/venc/data/tool.to.reset.shellopencommand.registry.keys.htmlyou can also learn about rontokbro@mm on this site. 1)download the inf file 2)rightclick it and choose install appearently nothing happens but amaizingly registry editing is enabled type regedit on command prompt or RUN and enjoy. muzammal baig.

This section is for technical experts who want to know more.

W32/Brontok-C is an email worm that sends itself to the addresses gathered from the infected computer, skipping email addresses that contain the following strings :

PLASA,TELKOM,INDO,.CO.ID,.GO.ID,.MIL.ID,.SCH.ID,.NET.ID,.OR.ID,.AC.ID,.WEB.ID,.WAR.NET.ID,ASTAGA,GAUL,BOLEH,EMAILKU,SATU

W32/Brontok-C may arrive attached with a filename randomly chosed from the following :

winword.exe kangen.exe ccapps.exe syslove.exe untukmu.exe myheart.exe my heart.exe jangan dibuka.exe

The email is sent with a blank subject line and the following message text :

-- Hentikan kebobrokan di negeri ini -- 1. Penjarakan Koruptor, Penyelundup, Tukang Suap, & Bandar NARKOBA ( Send to "NUSAKAMBANGAN") 2. Stop Free Sex, Aborsi, & Prostitusi ( Go To HELL ) 3. Stop pencemaran lingkungan, pembakaran hutan & perburuan liar. 4. SAY NO TO DRUGS !!! -- KIAMAT SUDAH DEKAT -- Terinspirasi oleh: Elang Brontok (Spizaetus Cirrhatus) yang hampir punah By: HVM31 -- JowoBot #VM Community -- !!! Akan Kubuat Mereka (VM lokal yg cengeng & bodoh) Terkapar !!!

When first run W32/Brontok-C copies itself to:

\Local Settings\Application Data\csrss.exe \Local Settings\Application Data\inetinfo.exe \Local Settings\Application Data\lsass.exe \Local Settings\Application Data\services.exe \Local Settings\Application Data\smss.exe \Local Settings\Application Data\winlogon.exe \Empty.pif \Templates\Brengkolang.com \ShellNew\sempalong.exe \eksplorasi.exe \repclient1's Setting.scr

W32/Brontok-C will create a remote task in the following location in order to run a copy of itself on a daily basis to maintain infection :

\Tasks\At1.job

W32/Brontok-C attempts to download files from a remote website to the following location :

\Local Settings\Application Data\ListHost11.txt \Local Settings\Application Data\Update.11.Bron.Tok.bin

At the time of writing these files were unavailable from the remote website. The following registry entries are created to run W32/Brontok-C on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run Tok-Cirrhatus \Local Settings\Application Data\smss.exe

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Bron-Spizaetus \ShellNew\sempalong.exe

The following registry entry is changed to run eksplorasi.exe on startup:

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell Explorer.exe "\eksplorasi.exe"

(the default value for this registry entry is "Explorer.exe" which causes the Microsoft file \Explorer.exe to be run on startup).

The following registry entry is set, disabling the registry editor (regedit):

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System DisableRegistryTools 1

Registry entries are set as follows:

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer NoFolderOptions 1

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System DisableCMD 0

HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Hidden 0

HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced HideFileExt 1

HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced ShowSuperHidden

Saturday, April 7, 2007

Google's April Fool



Believe
it or not Google made u an April Fool :-)


See also this :D


Google TiSP - Google's April Fool's Joke
Stands for Toilet Internet Service Provider, Google TiSP is a clever April Fool's joke by google. It is a FREE in-home wireless broadband service with a witty tagline - Want WiFi around? Just flush it down.

Not Found
The requested URL was not found on this server. There are so many reasons that this might have happened we can scarcely bring ourselves to type them all out. You might have typed the URL incorrectly, for instance. Or (less likely but certainly plausible) we might have coded the URL incorrectly. Or (far less plausible, but theoretically possible, depending on which ill-defined Grand Unifying Theory of physics one subscribes to), some random fluctuation in the space-time continuum might have produced a shatteringly brief but nonetheless real electromagnetic discombobulation which caused this error page to appear. Or (and truth be told, this is by far the most likely scenario) you might have reached a page that we meant to create but didn't get around to it, since this year's April Fool's joke got hacked together at the last minute, more or less the same way this one did. And this one. And this one, and this one, and this one...

Tuesday, April 3, 2007