What is your key that you are using:
I have searched in Internet for some activation removal tools like RESET 5 but I cant find any active online.
How to login in expired windows:
- click login try pressing WIN-U keys to bring out the Narrator dialog box. Then on the menu in the left, click About then click on the link for Microsoft website. IE will launch (not tested)
- Or you could just go into safe mode with a DOS prompt; type explorer.exe and have a full safe mode machine running allowing you to bypass the activation with a hack
The conclusion is:
Use the aways the latest windows version. Turn off the windows updates to be not surprised bad.
Today we think with my colegue Vergil what will happend if we make/prepare an ISO file for the latest Windows Vista, install a keylogger, trojans and antivirus software (patched/setupped to ignore the installed keylogger). Then put some good programs, make some fancy changes and upload it as free downloading version world wide.
Brrrr. That sounds awfull. I am using such boosted/patched windowses. Maybe my life belongs to someone
Recently I have found my first trojan on my hard disk.
it is called 300lv because one bastered have taken from me 300lv to buy me cheap fdd-diskets and forgets to return me the money and the disketts.
So I have written this small self-installing app in return.
here it is for free download …
Awards: It is honered by the Bulgarian Academy Antivirus software.
The story continues. This code has no self-replication code in it. But in Bulgaria it seems that people like to do tricks to themselfs so after 2 years I have infected with my own trojan :)
And another of my friends has gone with his infected computer in the police asking them to arrest me /he doesnt know that I am the author of the trojan/ I was lucky that it was before 1994 and the police is sleeping.
In my example I will try to find the best tools for debugging windows programs.
General plan for cracking a program
- install the program
- search for already made cracks for this version
- check what type of protection it has
- search for universal patch/cracks/dongle emulators
Define the right terms
- KERNEL – http://rr0d.droids-corp.org/
- Oly – http://www.ollydbg.de/download.htm
Symbols win32 http://www.microsoft.com/whdc/devtools/debugging/symbolpkg.mspx#d
- BackTrack is the most Top rated linux live distribution focused on penetration testing.
- Steganos Hacker Tools here ->
<- hidden text here
Metasploit – in ruby (huh?!) videos
exploit search list – > http://milw0rm.com/links/