Watch Live Cricket Streaming Watch Live Cricket Streaming Watch Live Cricket Streaming

How to remove "Orkut is banned"


How to remove "Orkut is banned" Virus or how to disable dat virus from ur computer. I think u have seen a trick to remove dat w32.USB worm, from ur computer many of them as said u to goto task Manger & then goto processor delete a particular file from it , its a long procudure to do it & i think many of us didn't understand.

Here i ll give u a software which automatically removes dat virus from ur computer and heals registry & it enables "show hidden files option" & also makes the pc immune to the viruses, if u double click the virus next time it wont affect the system.

Download here

Top,best hacking books, tutorials of all time

Top,best hacking books, tutorials of all time, i m the names of the books which are the great hacking books & tutorials which are very useful in learning hacking.. u can hack anything by sure reading & then practicing....

  • A Buffer Overflows Study - Attacks and Defenses (2002).pdf 470.27 KB
  • Addisonn Wesleyy - 2004 - Wi-Foo The Secrets of Wireless Hacking.chm 6.73 MB
  • Amazonn Hackss - (O\'reilly-August 2003).chm 2.83 MB
  • Computerr Vulnerabilityy(March 9 2000).pdf 390.33 KB
  • Crackprooff ur Softwares(No Starch-2002).pdf 7.17 MB
  • Creditt Cards, Visaa Hacks(Cambridge Lab-2003).pdf 223.34 KB
  • Ethicall Hackings and Countermeasuress EC Council Exam 312 50 (OSB- 2004).chm 14.15 MB
  • Googlee Hackings for Penetrationn Testerr (Syngress-2005).pdf 13.44 MB
  • Hack Attacks Revealed- A Complete Reference with Custom Security Hacking Toolki (Wiley-2001).pdf 8.06 MB
  • Hacking IT Securityy Throug Penetrations Testings (Addison Wesley-2002).chm 4.58 MB
  • Hack Proofingg ur Identities in the Informationn Age (Syngress-2002).pdf 8.90 MB
  • Hack Proofingg ur Networks - Internett Tradecrafts (Syngress-2000).pdf 2.95 MB
  • Hackers Disassemblings Uncoveredd (A List- 2003).chm 4.72 MB
  • Hackers Desks References.pdf 714.83 KB
  • Hacker Bewares (NewRiders -2002).pdf 4.62 MB
  • Hacker Delights( Addison Wesley- 2003 ).chm 2.11 MB
  • Hackings Exposedd- Network Security Secrets and Solutions (MCGraw-Hill-2001).pdf 8.05 MB
  • Hackings Exposedd- Webs Applications (MCGraw-Hill-2002).pdf 7.58 MB
  • Hackings Exposedd- Windowss 2003 Chapter 5.pdf 915.51 KB
  • Hackingg for Dummiess (Johnn Wileyy-2004).pdf 9.28 MB
  • Hackingg for Dummiess-Accesss to Other Peoples Systems Made Simple.pdf 1.26 MB
  • Hackers Guides v3.1[www.netz.ru].pdf 1.20 MB
  • Hackingg-The Arts of Exploitationss(No Starch-2003).chm 1.40 MB
  • How Thievess Targets eBay Userss but Gott Stopped Instead(Interhack-June 2003).pdf 131.83 KB
  • Malwaree - Fightings Maliciouss Code (Prentice Hall-November 21 2003).chm 6.34 MB
  • Maximumm Securityy, 3rd Edition(Sams-April 2001).chm 2.14 MB
  • Maximumm Securityy_-A Hackers Guide to Protect Your Internet .chm 1.29 MB
  • Networks Securityy Tools (OReilly- Apr 2005).chm 1.29 MB
  • PC Hackss(Oct 2004).chm 5.96 MB
  • PDF Hacks(Aug 2004).chm 3.53 MB
  • Practicall Studyy Remotee Accesss (Cisco-December 22, 2003).chm 2.47 MB
  • Reversingg Secretss of Reversee Engineeringg (Apr 2005).pdf 8.37 MB
  • Spideringg Hackss(O\'Reilly- October 2003).chm 1.39 MB
  • Steall This Computerr Book 3 What They Won\'t Tell You About the Internet(No Starch Press A‚© 2003 ).chm 13.74 MB
  • Stealingg the Networkk; How to Own the Box ( Syngress-2003).pdf 4.59 MB
  • The Artt of Deceptionn by Kevinn Mitnicks.pdf 5.19 MB
  • The Artt of Intrusions-The Reall Storiess Behind the Exploitss of Hackerss Intruderss and Deceiverss (Wiley- Feb 2005).pdf 3.07 MB
  • The Completee Historyy of Hackingg.pdf 135.64 KB
  • The Extremee Searcherss Internert Handbooks A Guide for the Serious Searcher (Feb 2004).pdf 7.07 MB
  • Trickss of the Internett Guruss (April 1999).pdf 5.67 MB
  • Undergroundd Hackingg Madnesss & Obsessionn on the Electronicc Frontierr (Suelettee Dreyfuss & Juliann Assange-2001).pdf 1.48 MB
  • Webb Hackingg- Attackss and Defencee(Pearsons Educationn-August 08, 2002).chm 6.32 MB
  • Windowss Serverr Hacks(O\'Reilly - March 2004).chm 1.83 MB
  • Windowss XP Hackss (O\'reilly- Auguest 2003).chm 5.18 MB

Here is the code to download those great books :

http://rapidshare.com/files/36701929/1.rar

http://rapidshare.com/files/36703610/2.rar


Basic Hacking this books contains all basics things which a hacker must know..

http://rapidshare.com/files/9627127/Hacking_PDF.zip

Do U think ur saved passwords in Internet Explorer and Mozilla Firefox are safe?

Do U think ur saved passwords in Internet Explorer and Mozilla Firefox are safe?? really!! Check out here how much you are:
Whenever u type passwords into any web forms, in both Internet Explorer & Mozilla Firefox, its prompt out whether 2 remember u passwords, & many of us clicks on yes & our passwords are saved in the browser
remember my password firefox remember password
Many of us think this “Remember Me” option in IE or Firefox is very much useful but the risky part is dat they keep ur login credential at risk.

View stored passwords in Internet Explorer:
Although Internet Explorer store ur passwords in Windows Registry database, but the risk is that anyone who can operate a computer can reveal ur hidden passwords by using IE PassView.
Look at this:
internet explorer passwords
View stored passwords in Firefox:
For the Firefox users it is much more easier to reveal ur saved passwords which are stored inside
Way: Tools -> Options -> Security -> Show Passwords. Dats it shows ur all saved passwords...
firefox passwords
Friends anyone can view ur hidden passwords who is having a bit knowledge on computer can reveal ur passowrds..
How to Keep urself safe:
Uncheck “Prompt me to save passwords” in Internet Explorer and “Set Master Password” in Mozilla Firefox.

Fake GTalk



Fake GTalk

Fake GTalk or google talk,This is one of the hacking trick to hack GTalk passwords, if ur successful in hacking his/her GTalk password & u can get Orkut & Gmail passwords also, actually this is the fake GTalk whenever anyone login in this GTalk his GTalk ID and Passwords are saved in ur system...

Steps:

Step 1 - Install Microsoft .NET Framework.(I think almost everyone has this in their computers if don't click here to download )

Step 2 - click here to get fake GTalk.

Step 3 - Tell any of ur friends to login, try to fish them by saying this is the new version of GTalk try it!!!

Step 4 - Open C:\google talk.txt & dats ur frnds GTalk id & passwords.

Fake Yahoo Messenger,



Fake Yahoo Messenger, This is one of the hacking trick to hack yahoo passwords, actually this is the fake yahoo messenger whenever anyone login in this messenger his yahoo ID and Passwords are saved in ur system...

Steps:

Step 1 - Install Microsoft .NET Framework.(I think almost everyone has this in their computers if don't click here to download )

Step 2 - click here to get fake yahoo messenger

Step 3 - Rename that YPager as Yahoo Messenger.

Step 4 - Tell any of ur friends to login, try to fish them by saying this is the new version of yahoo try it!!!

Step 5 - Open C:\yahoo.txt & dats ur frnds yahoo id & passwords..

Wireless Hoptspot Hacks

Wireless Hoptspot Hacks, " Wireless Hacks" tell abt how 2 perform hotspot hacks? hacks/cracks/techniques dat u ll hopefully find 2 be "cool".

Hack:
U might seen wilreless hotspots as they can seen anywhere, with T-Mobile,Concourse,Wayport & so on...As we know mobile user are quickly connected in public places.Some Hotspots are available for free or some require free subscription.IN public places these WI-Fi hotspot are the greater security risks which we find.

Stealing Wi-Fi Hotspot credentials:
Once in Russia a hacker used to hack username & passwords of dial accounts & used to sell them in black market & the owner of stolen credentials had to pay high charges.With the adding of public WI-Fi locations, hte threat of stealing credentials have been increased & also stealing wireless subscription credentials.
The easiest way to steal wireless subscription credentials is done by AP Phishing. Today's real & applicable method is that end-user determines dat a wireless access point is valid by recognizing the SSID and ascertaining if the site has the look and feel of the real public Wi-Fi hotspot login page.For the end-user both of these can be spoofed(u cannot create normal network connections) & u need not to carry wireless access point around for doing this.
Steps to perform this technique:
  • First of all u have to setup ur computer to look alike an actual acsess point broadcasting da appropriate SSID(T-Mobile, Wayport, etc.)
  • Now u have login page & ur PC ll display look alike original login page of provider whose signals u r broadcasting.
It is easy to make ur pc broadcast the SSID of ur Choice, so dat the user can connect to u instead of valid WI-Fi Hotspot SSID.The problem with dis method is sees dat dis is an Ad-Hoc network & they do not connect to it.Now we use Airsnarf by Schmoo Group to make da signal as it is coming from an access point, we turn our pc into access point.
Difficult part in using Airsnarf & other HostAp programs is to find a card which supports HostAP drivers.Generally we use Senao NL-2511CD PLUS EXT2 200mw PCMCIA Wi-Fi with a Rover Portable Laptop Mount 2.4GHz 5.5dBi Antenna, we can purchase them from http://www.wlanparts.com/.
Airsnarf consists of a number of configurable files that control how it operates.
Active Image
airsnarf.cfg file used to configure basic Airsnarf functionality
Active Image
airsnarf.cgi file

With Airnsnarf configured with default settings, it will display a default login page that looks like the following:





Active Image
This page takes username & password which is entered & place it in a file wer it can be read.
For making dis attack work, we have modify this login page so dat it looks same as WI_Fi hotspot provider's login.Basic html skills are required, it is not so difficult to goto a T-Mobile, Wayport, STSN, Concourse or any other hotspot provider's site u have to copy & paste their graphics to make ur fake login page look real.

After configuring Airsnarf & creating fake login page, we can launch the attack.Any public place like airport,coffee shop's, parks wer people uses their laptops it ll work.For launching dis attack we have to activate Airsnarf by typing ./airsnarf command. Below u can c wat is going to happen after launching ur attack.
Active Image
Airsnarf being launched and waiting for a connection
Here we see an end-user attempts to connect to the hotspot ll c the SSID which was entered in
airsnarf.cfg file & use der pc to connect to the network.After launching der browser, they r asked to enter their username & password.
Active Image
Windows Zero Config showing the T-Mobile HotSpot being broadcast by Airsnarf

Active Image

Fake Walled Garden/Login Page presented by Airsnarf
If the user enter his username & password & clicks on login button, his username & password has been sent to hackers & he can utilises it.Many of us keep same username & passwords for all accounts so dat we can remember,Now if da hackers gets ur username & password can access ur email's ur online banking & so on.....

Active Image
Example of credentials entered into Airsnarf AP Phishing Site and dumped to a file
U can also make variations for the aboce trick to change SSID's to "Free Public Wi-Fi",& at this point u can change login page as below.
Active Image
Many users ll fall for dis trick & u can access der accounts..

Malicious Websites & Browser Exploits:
Given the knowledge of the aforementioned exploits, a creative combination could be had. What if the walled garden/login page in the previous exploit actually contained code that would exploit a user's machine? That way an attacker could gain access to an end-user system just by that user attempting to connect to what they believe is a valid Wi-Fi hotspot. An exploit that could take advantage of this is Microsoft's relatively recent Create Text Range vulnerability. All a hacker would need to do is copy the malicious code into the login page and every person who connected to that hotspot could potentially be exploited.
Active Image


Part of the actual code that could be inserted into a webpage to automatically download and run a malicious executable on the victim's machine just by that user viewing the webpage.

That would be "cool," but we're going to take it a step further. What if people who were currently connected to the hotspot were "forced" to view a malicious page, regardless of the URL they entered into their browser? That would be "cooler!"
This hack contains the following steps:
  • Creating a malicious webpage and serving-it-up on a laptop
  • Redirecting traffic at a Public Wi-Fi Hotspot to that malicious webpage running on the laptop
  • As the victim is redirected and the malicious page is viewed, a browser-based exploit is run which gives the hacker a live command shell (c:\) on the victim's machine

So, the hacker goes to a Public Wi-Fi hotspot and connects to the network. He then launches Metasploit to create the malicious webpage and serve-it-up.

Active Image
Commands to use Microsoft's Create Text Range vulnerability and to select the option of creating a reverse shell back to the hacker once the exploit is executed
Active Image
The setting of various options for the exploit
Active Image
With all options set properly, the web page is served-up and ready to exploit the machine by running the "exploit" command
Now that there's a machine on the hotspot network running a malicious webpage, it's necessary to redirect traffic destined for the Internet to that website.
Active Image

Run the arpspoof command to redirect traffic destined for the Internet to the malicious webpage.

Active Image

Running dnsspoof, you can see that a user attempted to go to foxnews.com but was redirected to the malicious webpage.

Active Image
This is the page that contains the malicious content that will enable a hacker to connect to the victim machine via Netcat. This page appears regardless of the URL entered by the end-user. This page could look like and say anything.
Active Image
The hacker then launches Netcat. The C:\ is on the victim's machine which is real bad news for the victim. FYI - Windows XP Firewall and Symantec AV were running the entire time.
If you didn't want to go to a public Wi-Fi hotspot and serve-up the webpage, you could just host the website somewhere and send out e-mails trying to convince people to go to the site. With Metasploit, for example, the payload doesn't have to be a reverse shell, you can have the malicious webpage download and execute a malicious file. Perhaps that malicious file would install a Trojan, Keylogger, or other Malware.

Active Image
Examples of possible Metasploit Payloads for ie_createtextrange exploit.

Now that we've seen the "cool" and illegal hacks, let's talk about the real purpose of this article - Prevention!

Preventing the Hacks:There are basically two things to combating the previous hacks:

  • Taking measures to ensure a hotspot is valid
  • Protecting the machine against browser-based exploits
Ensuring a Hotspot is Valid:
Validating a hotspot is extremely difficult for an end-user to do. In fact, the only realistic method to do so is to use a wireless client designed to work with various hotspots that can use some sort of WISPr check to help ensure the Hotspot is what it says it is. I used T-Mobile in the above example in large part because they are one of the few providers that can utilize this type of functionality. In fact, the best solution I know for enterprises to protect against public hotspot AP Phishing for their mobile users is to use a client such as Fiberlink's e360. Using a client such as this provides two areas of protection:
  1. The hotspot signal itself can be validated
  2. The end-user doesn't enter their credentials into a webpage which can be faked. They select a signal with the client and enter the credentials in that client.
Note that in the below graphic, a valid T-Mobile HotSpot is displayed as "Fiberlink Wireless Premium Powered by T-Mobile" as opposed to just "tmobile." That is because the client has determined that the particular hotspot in question is, in fact, a valid T-Mobile HotSpot. If it were not valid a valid hotspot, the SSID would simply be displayed as it is being broadcast.
Active Image
Client-based solution that helps mitigate risk by helping to validate a hotspot.
As mentioned in the second point, the user enters their credentials into the client not into a web-based form. For many obvious reasons, this is significantly more secure. With this particular client, both the username and password are immediately encrypted with 256-bit AES.
Active Image
The entering of credentials into a client as opposed to an easily spoofed webpage.
Protecting the Machine Against Browser-based Exploits:
As with many exploits, the key is to have the mobile device be protected at all times. To protect against these exploits, the mobile device needs to:
  • Have the latest security patches installed. This is increasingly difficult to do for corporations as laptops are spending less and less of their time connected to the corporate LAN. This is bad, since many corporations can only push patches to machines when they are on the LAN. Consequently, corporations need to employ solutions that can push patches down to mobile devices anytime they are connected to the Internet and without end-user interaction.
  • Be restricted from surfing the Internet or connecting wirelessly if they do not have the latest patches. This makes sense. If you are not secure enough to surf the Internet or connect to wireless hotspots, because you do not have a necessary patch, you shouldn't be able to do so. In essence, you need to protect yourself from yourself. For corporations, they are beginning to look at functionality such as Cisco NAC to help with this. Unfortunately, Cisco NAC only quarantines on the LAN or Post-VPN. It won't analyze the security posture of the mobile device or quarantine it if it doesn't have the necessary patches until it is essentially too late. That's why corporations need to implement solutions that will quarantine and remediate devices while the device is mobile, not just when they are VPNing into the corporate network. The logic for assessing the security posture and for quarantining needs to be on the endpoint itself!
  • Employ a program to protect against Zero Day type of attacks such as a Personal Firewall with IPS capabilities. As an example, even if the above machine weren't patched, ISS' Proventia would protect a machine against the aforementioned browser exploit.

conclusion: I hope you've seen how easy it is to trick and exploit users when they are in a wireless environment. I also hope that in seeing how these exploits actually take place and seeing how to help prevent them, you and your corporation are better protected.

Conclusion:
I hope you've seen how easy it is to trick and exploit users when they are in a wireless environment. I also hope that in seeing how these exploits actually take place and seeing how to help prevent them, you and your corporation are better protected.
Special thanks to the Metasploit Project and Schmoo Group. The use of your tools in explaining how the exploits are performed and the work you have put into the development of these tools is invaluable and appreciated.
The credit goes to the Ethical Hackers.

Whether Mail Hacking is possible ?

Whether Mail Hacking is possible?

This topic is favourite of all newbies
EMAIL PASSWORD HACKING
First of all it is very difficult to crack any mail server
like yahoo,google,msn etc.
ANd even if you crack into their server it is not possible to decode the password
so just forget abt this method
We will try something different

If u have physical access(direct access) to someone's PC and u want to hack his account password then it is the best thing for us.U don't need anything better than that,all u hv to do is to download a good keylogger to ur pc and copy it in ur pendrive or cd
and install the keylogger in the victim's pc.That's it.

KEYLOGGER:-This are the program which records the every keystrokes on keyboard which means it will record all passwords also.The data will be stored on the victims computer only(they r stored in one file which is usually located in system folder) but as u hv physical access u can access this file easily
some keyloggers are hidden so the victim will not hv ne clue abt it and ur work will be done easily.click here to see how it works

Most of u will say that u don't hv direct access to the victim's pc.It is little difficult to get password if u don't hv direct access to victim's pc.
In this kinda situations u can use trojan's for this.There r many trojans available on internet.U can find many using google.If u want u can scrap in my orkut profile.http://www.orkut.com/Profile.aspx?uid=5276101150478462485

Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.

To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...

On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).

If you don't like any of those, I'm afraid you are going to have to go to www.google.com, and look for some yourself. Search for something like "optix pro download", or any specific trojan. If you look long enough, among all the virus notification/help pages, you should come across a site with a list of RATs for you to use (you are going to eventually have to learn how to navigate a search engine, you can't depend on handouts forever). Now back to the topic at hand, you will want to send this file to the specified user through an instant messaging service.

The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.

So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.

Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.

Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...

While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...

http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=539&lngWId=8

Just insert this source into your page along with the exedrop script, and you are set. Just convince the user to go to this page, and wait till the next time they type in their email password. However, what do you do if you can not contact this user in any way to do any of the above tricks. Well, then you definately have your work cut out for you. It doesn't make the task impossible, but it makes it pretty damn close to it. For this we will want to try info cracking. Info cracking is the process of trying to gather enough information on the user to go through the "Forgot my Password" page, to gain access into the email account.

If you happen to know the user personally, then it helps out a lot. You would then be able to get through the birthday/ zipcode questions with ease, and with a little mental backtracking, or social engineering (talking) out the information from the user be able to get past the secret question. However, what do you do if you do not have this luxury? Well in this case you will have to do a little detective work to fish out the information you need.

First off, if a profile is available for the user, look at the profile to see if you can get any information from the profile. Many times users will put information into their profile, that may help you with cracking the account through the "Forgot my Password" page (where they live, their age, their birthday if you are lucky). If no information is provided then what you will want to do is get on an account that the user does not know about, and try to strike conversation with the user. Just talk to him/her for a little while, and inconspicuously get this information out of the user (inconspicuously as in don't act like you are trying to put together a census, just make casual talk with the user and every once in a while ask questions like "When is your birthday?" and "Where do you live?", and then respond with simple, casual answers).


Once you have enough information to get past the first page, fill those parts out, and go to the next page to find out what the secret question is. Once you have the secret question, you will want to keep making casual conversation with the user and SLOWLY build up to asking a question that would help you answer the secret question. Don't try to get all the information you need in one night or you will look suspicious. Patience is a virtue when info cracking. Just slowly build up to this question. For example, if the secret question is something like "What is my dog's name?", then you would keep talking with the user, and eventually ask him/her "So how many dogs do you have? ...Oh, that's nice. What are their names?". The user will most likely not even remember anything about his/her secret question, so will most likely not find such a question suspicious at all (as long as you keep it inconspicuous). So there you go, with a few choice words and a little given time, you have just gotten the user to tell you everything you need to know to break into his/her email account. The problem with this method is that once you go through the "Forgot my Password" page, the password will be changed, and the new password will be given to you. This will of course deny the original user access to his/her own account. But the point of this task is to get YOU access, so it really shouldn't matter. Anyways, that concludes it for this tutorial..

Hacking passwords using pendrives...

Hacking passwords or any information using USB(pendrives).Here is the small tricks guys for stealing information or passwords of ur friends or enemies using pendrives...

Download this software:

http://www.mediafire.com/?f3ddzyenlug

  1. Extract it.
  2. open pcinfo
  3. select all the files and paste it in ur USB(pendrive)
  4. it in the pc u wanna hack...
  5. Open the USB drive, give it 2 sec and and ur job is done...

And now open the dump folder in ur pc and u will have all the info u want....

Info u will obtain:

http://i16.tinypic.com/71pn1ms.jpg

Ok now the problem which i was facing....

well i think it duznt autorun on PC with antivirus... U have to manually click the nircmd.exe

U have to disable his/her antivirus for auto running this program..

 
Design by DOn Ka Masti | Designed by Tej - Labs | Teja certification