Tuesday 3 March 2015

Internet Crime


Internet Crime is on the rise with the culprits coming up up with new ways to misuse the Internet. Here is some more information about Internet crime...

If you think the world is not a safe place anymore and try to seek solace in the virtual world of Internet, you will be disappointed to find out that the Internet is not devoid of crime, debauchery and exploitation. The Internet is not a safe place with the increasing number of virtual criminals that lurk behind the virtual walls awaiting their victims to log on to the net and fall prey to their malicious tactics and easy baits. Here is all the information that you would need to know about Internet crime…

What exactly is Internet crime?

Internet crime is a recently escalating form of crime that started with the rise of the Internet era. Any criminal activity, which is carried out on the Internet or by means of the Internet, is generally termed as Internet crime.

What are the various threats in the cyberspace that I should be aware of ?

There are various ways in which criminal minds can use the power of Internet to abuse and cheat people. Here is a list of some of the most dangerous criminal activities over the Internet:

1. Hacking: The process where someone attempts to exploit the security settings of a computer system is known as hacking. The hackers can hack into several websites or personal accounts and threaten the security on the Internet.

2. Phishing: This is a process where the culprit poses as an official entity and tries to acquire important financial or personal details like credit card number, social security number, home address or telephone number.

3. Internet extortion: Threatening emails exploiting people and blackmailing them on the internet to pay money or other favors is another identity theft, child pornography, password trafficking, spamming, virtual stalking, fake auctions and other internet scams are some of the threatening criminal activities that exist on the Internet.

4. Pornography: Abuse of children for generation of pornographic content over the web is one of the most disgusting cyber crimes. Also misusing personal photographs of people to generate forged pornographic content is also a malicious activity in the Internet crime world.

5. Cyber-terrorism: When people try and break into national and international security system to access undisclosed matters of national and international importance, this accounts to cyber terrorism.

Where should I report an Internet crime?

The Internet Crime Complaint Center, which is a joint initiative of the Federal Bureau of Investigation and the National White Collar Crime Center, aims to serve as a medium to receive, develop, and refer criminal complaints in Internet crime. The Internet Crime Complaint Center also provides the cyber victims an easy-to-use reporting mechanism. Other organizations that could be of help are Department of Homeland Security's National Infrastructure Coordinating Center, U.S. Computer Emergency Readiness Team, National Association of Attorney General's Computer Crime Point of Contact List.

Are there any laws to protect the citizens against Internet crime?

Yes there are several laws that safeguard the interests of the Internet users and have severe penalties for cyber criminals. Here is a list of some important laws:
The Counterfeit Access Device and Computer Fraud and Abuse Act of 1984
The Electronic Communications Privacy Act of 1986
The National Information Infrastructure Protection Act of 1996
The No-Electronic Theft Act of 1997
The Communications Decency Act of 1996
The Child Online Protection Act of 1998
The Protection of Children from Sexual Predators Act of 1998
The Patriot Act of 2001

What are the ways to protect myself from Internet crime?

Safe and anonymous Internet browsing is the key to stay away from cyber crime. One should avoid giving away personal details like credit card number, social security number, home address, telephone number, and account passwords on the Internet. Financial transactions should be carried out over the Internet only when you are assured about the credibility of the website. Online shopping from suspicious websites should be avoided.

Tips and Tricks to Improve Computer Speed


This is an article about my experience in improving my computer speed. It is more focused on the startup process rather than over clocking the system.
A Little Bit of My History

The very first time I have my hands on computer was almost 18 years back or so. It was an Apple computer given by my uncle who thought that I might be interested in it. The computer had no hard drive but with two 5 and a half inches floppy drive. The colors supported were black and green. All I did with the computer is to play games.

Later on, my father bought a 80286 system which came with a DOS system menu. I am particularly interested in games and since we had a DOS system, I started borrowing games from my friends. The computer was not considered fast because there were 80486 in the market at that time. Thus, some of the games are either not compatible or too slow to play a 80286 system.

At that time, I discovered that memory is one of the important components to increase the computer speed. Knowing that it was impossible for me to buy additional RAM to add-on, I started looking at DOS utilities. There was a Memory Maker tools which aimed to increase the memory similar of having a virtual memory but there was no significant improvement or I should say there was no improvement at all.

Later on, my father bought a Pentium 133 system with Windows 95. I upgraded it to Windows 98 myself. I went on to study computing in college and had another Celeron 300A system. I tried over clocking but the system just hangs after 333MHz. An increase of 33MHz did not improve much to the overall speed.

The tools

MSCONFIG

This is one of the most common tools that you can find in all Windows system. Run the tool by typing 'msconfig' from Start Menu --> Run, and a system configuration windows will appear. Click on the startup tab and it contains a list of startup program on your computer. Thus, one of the ways to improve your computer startup speed is to have the least programs to startup automatically with Windows.

Of course, you will want your antivirus to startup together but other than that, I believe that MSN, Skype and other similar tools will slow down your startup tremendously. You might be saying that you will always need to run MSN and Skype but a good practice is to enable them in the startup but prevent them from signing in automatically.

I like my system to startup fast because sometimes I may just want to type some documents or playing games without using other tools. Thus, shortcuts at the desktop are good enough for me as I can choose to launch any programs after startup.

After a fresh installation, the startup tab is normally blank. Hence, you are safe to untick all the programs listed. If you find that your system is not working properly after that, you can always run the system configuration and tick all the startup programs.

Windows Defender

This is a free spyware tool from Microsoft itself. Other than that, it is also a startup manager. Browse through the tools option, and there is a Software Explorer link. It works like a combination of startup manager and task manager. You can view currently running programs, network connected programs, winsock service providers and startup programs. You can choose to remove, disable or enable the programs listed.

However, Windows Defender is available for Windows XP and Vista only.

CCleaner

As time goes by, your copy of Windows may work slower and slower. This is because of the amount of software and games that you have installed in your computer but are not removed properly during uninstallation. During an of software or game, not only the files are installed in the specified folders; several records are also added into Windows registry. Unfortunately, not all the records in the registry are always removed during uninstallation.

"The Windows registry is a directory which stores settings and options for the operating system for Microsoft Windows 32-bit versions, 64-bit versions and Windows Mobile. It contains information and settings for all the hardware, operating system software, most non-operating system software, users, preferences of the PC, etc. Whenever a user makes changes to Control Panel settings, file associations, system policies, or most installed software, the changes are reflected and stored in the registry." - Wikipedia

CCleaner is a piece of freeware which can be used to check any broken links from the registry and thus, offers the option to remove the invalid registry entries. A lot of people are saying that it is dangerous to change registry settings. Indeed, it is dangerous. But I have been using this piece of freeware for quite sometime and I have not encountered any serious problems with it. However, I do notice some improvement in my system speed especially during startup.

As I am using Vista at the moment, I reckon that the software does not work quite well with Vista because some of the options a greyed out. System Mechanic of IOLO Technologies is a piece of software that done a better job than CCleaner. Well, of course because it is not free. If you manage to get hold of a copy of System Mechanic, you will be surprised how it performed and all the functions it has.

Advance System Properties

If you like the fancy appearance of your Windows right now, you may choose not to change any of the settings here. But there are a few options which you might want to disable and it does not affect the overall appearance of your Windows. To go to the Advance System Properties, right click My Computer and click on properties. For Windows XP, click on the Advance tab while Windows Vista users need to click on the Advance System Properties link at the left column.

In the advance tab, there are three frames, Performance, User Profiles and Startup and Recovery. Click on the Settings button in the Performance frame and you will be shown the Visual Effects tab. To choose for the best performance will untick all the options below and mostly likely, you will get better speed when navigating through Windows. However, if you prefer to have the fancy appearance, you may want to just untick the options for fading and sliding or untick everything except the bottom two options to keep the option of having drop shadow for icon labels and visual styles for windows and buttons.

Files in Desktop and User Account

The size of you user account has some effect on the speed of your computer during startup. You can view your user account size from the User Profiles frame mentioned above. Click on the Settings button in the User Profiles frame and you will see a list of users and the size of each of the users.

My own practice is to avoid storing files such as documents and pictures in my user account folders. Even though the user account has come pre-created with different folders for different types of documents such as the musics, pictures, bookmark favorites, documents and saved games, but I have dealt with problems that resulted from corrupted user profiles and the only way to recover the files is to connect the hard drive to another working machine. Well, that is way too troublesome for some people. In addition, some viruses attack through user profiles. Desktop files are stored in User Profiles. The more icons and files stored in the desktop, the slower startup you get. Thus, it will be wise to store the files to another drive or partition which will secure your files and also speed up your system slightly.

Disk Cleanup

Using Disk Cleanup will help you to clean your Internet Temporary Files, Downloaded Program Files, setup Files and compress files. This is another step to clean up your system and it may not help to speed up your system. Well, at least that you know a place to find the files that can be deleted safely. By the way, having enough of free disk space is equally important for your computer to run smoothly.

How To Protect Your Computer From Viruses


Anti-virus software is a necessity today to ensure the security of your computer and personal information. It is essential that you understand how viruses get into your computer and know how to prevent them from getting in.
Unfortunately for us, there are many people out there who get a rise out of writing small programs that find ways onto our computers and in most cases destroy personal file, data or steal out identity. This article explains some steps we can take to defend ourselves.

What is a computer virus?

A computer virus is a small program that piggybacks on legitimate programs. It is called a virus because it shares the traits of a biological virus where is passes from one computer to another in the same manner a biological virus passes from one person to another person. Once a computer virus is running, it can infect other programs and documents.

Types of computer viruses:

There are many types of viruses but the most common are:

- Viruses: a small software program that attaches itself to other programs and/or documents
- E-mail viruses: these viruses move around through email and usually replicates itself by automatically mailing itself to people in the victim's address book
- Trojan horses: this is a computer program that claims to do one thing but instead does another such as erase your hard drive
- Worms: this is a program that finds a small hole in computer network security and replicates itself on to other computers on that network.

How does a virus get into our computer and how do they spread?

Some of the most common ways a virus can get on your computer are:

- Downloading a program from an unknown source and running it
- Opening a file attachment from an e-mail
- Sharing infected files from one computer to another on a floppy disk
- Opening an electronic greeting card, audio and video files

What are the signs of a virus, am I infected?

- Your computer runs slower than normal
- The computer stops or locks up
- Your computer crashes and restart every few minutes
- The computer restarts on its own and does not run properly
- Applications on your computer do not run properly
- Hard drives or disk are not accessible
- Your computer cannot print properly
- Unusual error messages appear
- Menus and dialog boxes are distorted

What kinds of damage can a virus do?

The damage a computer virus can do depends on the type of virus it is. Here are some common threats.

- They can delete or change files. Some viruses will delete all your files or even reformat your hard drive making your computer unusable
- Other viruses will steal personal information like credit card numbers, account numbers and passwords
- Some viruses will slow down your computer dramatically
- Some viruses change security settings allowing hackers to gain access to your computer and steal information
- Other viruses like worms infect computers on a network

What you can do to protect your computer from viruses?

There are number of ways to protect your computer from a virus:
- Do not open any attachments your received in an e-mail even if you know the person who sent it. That person may not be aware they are sending an infected files.
- If you receive an e-mail with an attachment from some one your do not know, DELETE the e-mail right away.
- Before you copy a file to your computer, scan it with an anti-virus program
- If you download a file from the Internet, copy it to your hard drive first, scan it with an anti-virus program before to open the file or run it.
- if some sends you a greeting card or a joke that you have to launch to view, be awry and stay on the safe side and do not open it
- The best defense against computer viruses and to use an anti-virus program that will scan your e-mail, act as a firewall, hard drive and keep up-to-date with the latest viruses. It is reported that there are over 500 new viruses discovered each month.

Fortunately for us, there are a number of software programs available to prevent, detect and kill computer viruses. I recommend the one below, I use it and it is one of the most popular anti-virus programs around.

How to Hack



Hacking can be difficult and there are many different ways to hack and many different exploits to use. Hacking is neither defined nor limited by exploitation or exploration. Hacking into someone else's system may be illegal, so don't do it unless you are sure you have permission from the owner of the system you are trying to hack.

Hacking was primarily used for learning new things about systems and computing in general, 'in the good ol' days'. In recent years it has taken dark connotations and in general has been looked down upon. Likewise, many corporations now employ "hackers" to test the strengths and weaknesses of their own systems. These hackers know when to stop, and it is the positive trust they have built that earn them large salaries.

There is a major difference between a hacker and a cracker. A cracker is motivated by malicious reasons; a hacker is attempting to gain knowledge through exploration.



Steps

Learn a programming language. C++ is very useful, although difficult to learn. Python is much easier to learn, although less flexible. In order to break into web systems, learning server side languages such as PHP will help you immensely. Perl is also a very useful language to learn, as it can be used in many situations, and once you are familiar with the syntax (which is similar to that of C), you will be able to create perl scripts very quickly.
Use Cygwin for Windows or *nix. Plain Windows and DOS are more difficult to work with. The tools in this article can be found for Windows based machines. Nmap particularly, uses WinPCap to run on Windows and does not require Cygwin. However, Nmap works poorly on Windows systems due to the lack of raw sockets. You should also consider using unix or linux, which are both more flexible, more reliable, and more secure. Most linux distributions come with many useful tools preinstalled, including the previously mentioned nmap.

Know your target, the process of gathering information about your target is known as 'enumeration'. Can you reach the remote system? You can use the ping utility (which is included in most operating systems) to see if the target is 'alive', however, you can not always trust the results of the ping utility, as it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators.
Determine the OS (operating system). This is important because how can you gain access to a system if you don't know what the system is? This step involves running a scan of the ports. Try pOf, or nmap from www.insecure.org. nmap runs a port scan, showing you the ports that are open on the machine, the OS, and can even tell you what type of firewall or router they are using so you can plan a course of action. You can activate OS detection in nmap by using the -O switch.
Find some path or open port in the system. Common ports such as FTP (21) and HTTP (80) are often well protected, and possibly only vulnerable to exploits yet to be discovered. Try other TCP and UDP ports that may have been forgotten, such as Telnet and various UDP ports left open for LAN gaming. An open port 22 is usually evidence of an SSH (secure shell) service running on the target, which can sometimes be bruteforced.

Crack the password. There are several methods for cracking a password, including brute force. Using brute force on a password is an effort to try every possible password contained within a pre-defined dictionary of brute force software. Rarely is a password cracked through brute force, because using a password that is a word in any language is poor security practice. Users are often discouraged from using such 'weak' password.
Get super user (su) privileges (if targeting a *nix machine). Most information that will be of vital interest is protected and you need a certain level of authentication to get it. To see all the files on a computer you need super user privileges. This is a user account that is given the same privileges as the "root" user in Linux and BSD operating systems. For routers this is the "admin" account by default (unless it has been changed), for Windows, this is the Administrator account, etc. Just because you have gained access doesn't mean you can access everything, only a super user, the administrator account, or the root account can do this.
Use various tricks. Often to gain super user status you have use tactics such as creating a "buffer overflow" which is basically causing the memory to dump and allowing you to inject a code or perform a task at a higher level then you're normally authorized. Only writing or finding an insecure program that you can execute on their machine will allow you to do this.



Tips

Read books discussing TCP/IP networking.
This article discusses what is known in the hacking world as "cracking". Hackers are those that built the internet, made Linux, and work on open source software. It is advisable to look into hacking, as it is respected and less likely to get you arrested.
Using these tactics on a popular corporate or government computer is asking for trouble unless you're a professional hacker. Keep in mind there are people a bit more knowledgeable than you who are protecting these systems for a living. Once found, they sometimes monitor intruders to let them incriminate themselves first before legal action is taken. This means you might think you have free access after hacking into a system, when in fact, you're being watched, and may be stopped at any moment.



Warnings

Misuse of this information may be a local and/or federal crime. This article is intended to be informational and should only be used for ethical purposes.
Do not delete entire logfiles, instead, just remove the incriminating entries from the file. What do you think would look more suspicious; logs with a few entries missing, or the entire log file destroyed?
Be extremely careful if you think you have found a very easy crack or a crude mistake in security management. An experienced hacker that protects that system maybe have just set up a trap (honeypot) for you.
Stay away from breaking into government networks. If you do find a vulnerability in such a network, the best plan of action is to inform the system administrator, and perhaps help them in patching the vulnerability.



Things You'll Need

A computer with a connection to the internet.
A proxy is always a good idea.

Patience.

How Search Engines Work

In order to assess how search engines work from the viewpoint of how they rank sites we need to examine three areas, how they find pages, what they look for on a page and how they compare different pages against a users search criteria.

Search engines find pages in one of two methods. They generally have an ADDURL link on the home or Help page which allows users to submit either a web page or their siteSome engines ask you to just submit the domain ie. http://www.yourdomain.com/ while others allow individual page submissions. Always read the submission guidelines before submitting as doing it wrong may get a site banned.

Once a page has been submitted, the search engine uses a software SPIDER to look at the site. This program extracts different pieces of information from the site such as MetaTags content, the text on each page, text contained in comment tags, image alt tags and form tags. Each search engine looks for the information they require and each is different. They also look at links on each page and may add those links to their database for spidering at a later date. Spiders prefer text links rather than image maps and redirected links such as those used in redirection scripts. Any links with variable identifiers such as ? will not be followed as these could lead the spider into infinite loops within the site, or to hundreds of different versions of the same page.

The search engine spider examines the code on the page and extracts text from the programming code. The text is then examined to assess the theme of the page. They look at which words appear regulary throughout the page. Words appearing in Metatags, link anchor text and emphasised text such a bold or italic words on the page. These give the engine an indication of the overall theme of the page so that a search for 'cars' will bring back lots of pages with cars appearing in them.

After matching the users search query with those pages in the search engine database, it has to decide which pages are most likely to be of use to the surfer. Each search engine has it's own ALGORITHM or mathematical calculation which gives more importance to words appearing for instance in Metatags than words on the page. Each engine is looking for what they believe is the best match for the user. By grading each page according to their algorithm the engine is able to decide that page A is a closer match than page B for this user.

Engines also look at off-page criteria such as the number of links pointing to a site and whether those linking pages are also relevant to the search. Other factors include the age of the page and whether it is listed in edited directories such as Yahoo and Looksmart.

In order to achieve top ranking pages it is necessary to reverse engineer the algorithm used by each engine by examining top ranking pages in popular searches. So by looking at the top 20 sites for a phrase such as 'LOANS' a pattern will emerge which may give an indication about the different factors that search engine is looking for. Factors such as the number of words on the page (word count). How frequently the keyword appears on the page (keyword density) and how near the start of the page the keyword appears (keyword prominance). By examining more searches and more pages the pattern of results will become clearer.

Unfortunately, some sites are able to hide the real code used by delivering different pages to search engine spiders than the normal user. They achieve this by examining the IP address and User agent of the visitor before serving an appropriate page. A high ranking page may also be swapped for a differently coded page as soon as it appears at the top of the search result by switching the page. Therefore be careful that the page you look at is in fact the same page that got the top position. You will often be able to spot this because the description on the search engine may appear different to that on the page.

Pages which contain little text because of the use of images or flash animation are unlikely to do well on search engines as they give the spider little to read and therefore little to assess what the page is about. Search engines cannot read text contained within an image or animation, Similarily they struggle as words become more deeply buried within lots of tables. Your web site designers may have created a fabulous looking site, but is it search engine friendly?

Text is king for the search engines. Anything which gets in the way of descriptive text about your products will affect the position achievable on the engines. A search engine friendly site consists of plain text with the targeted phrases repeated throughout the page. However, compromise is always necessary in the design. Some techniques though demolish any chance of a top ranking site and the sales this would produce.

It is often worth considering creating a text only version of the site to run alongside the main site so that search engines have a chance of picking up the site content. This should be designed as if for a text only browser such as Linx. Try viewing a page from your site at http://www.delorie.com/web/ses.cgi to see how it looks to a search engine, you may be surprised.


Handle Ever-Heavier Data Loads


As demand for streaming video over the Web, voice over Internet protocol (VoIP) calling services and other forms of Internet-based multimedia communication skyrockets, content creators and consumers are counting on fiber-optic networks to handle these increasing loads quickly and efficiently. One way to ensure this happens is to enhance the ability of such networks, which transmit data over glass or plastic threads, to capture and retain data even for very brief intervals.

Toward that end, a team of researchers from Duke University and University of Rochester's Institute of Optics recently reported in Science that it successfully transferred encoded information from a laser beam to sound waves and back to light waves, a breakthrough that could speed development of faster optical communication networks. Swapping data between optics and acoustics allows it to be stored in pockets of acoustic vibration created when laser beams interact along a short strand of optical fiber.

The research is significant, because it addresses how memory can be created for optical pulses. "The primary thrust is investigating slow light via stimulated Brillouin scattering, where we slow down a pulse as it propagates through an optical fiber," says study co-author Daniel Gauthier, chairman of Duke's department of physics. Brillouin scattering occurs when light traveling through a medium, such as glass, changes its path as it encounters varying densities.

The main goal of the research is to pave the way for better fiber-optic communication systems, which today consist of fiber placed underground and linked by routers. The typical way to send data over an optical network is to break it up into chunks called packets. When a packet comes into a router, its address information is read. The problem with routers is that they each contain a single switch that can only process one packet at a time. As a result, some packets are dropped unless others coming in are buffered (saved) or can wait until it is their turn to be routed. "If you drop the packet, you reduce the throughput of the entire network," Gauthier says. "If you buffer, then the packets are processed one after the other."

As greater demands are placed on telecommunication infrastructures, "it's important to start to investigate parallel technologies," he adds.

Gauthier and his colleagues discovered that when two laser beams of slightly different frequencies are pointed at one another along a piece of glass fiber, they create acoustic vibrations called phonons. When co-author Zhaoming Zhu, Gauthier's postdoctoral research associate, encoded information onto one of these beams, the data could be imprinted on these newly created phonons and retained for 12 billionths of a second, long enough to be transferred back to light again by shining a third laser through the fiber.

"When thinking about how to store light in optical fibers," Zhu says, "we realized that we can convert optical information to acoustic vibration, something that hasn't been done before."

The researchers are seeking ways to create longer storage times and reduce the peak power of the laser beam needed for retaining and reading out the information, a process that will take years before a commercial version of the technology is available.

"There is still a great need for developing new strategies for optimizing the flow of information over the Internet," says Robert Boyd, a professor of optics and physics at the Institute of Optics and a research co-author. "If two data packets arrive at a switch at the same time, you need to store one until the other packet clears the switch, maybe 100 nanoseconds later. Our technique is aimed at … building buffers for high-speed telecommunications."



During the first phase of the project—which is part of the Defense Advanced Research Projects Agency's (DARPA) Defense Sciences Office slow-light program—Zhu says he learned that pulses could be stored and read out at a later time. The second phase was the actual experiment in which data pulses were stored (as acoustic waves in an optical fiber) and retrieved after a certain period of time.

"We really want to demonstrate that methods for storing optical information are much broader than people thought," Gauthier says. "In the current telecommunication systems, you turn the optical signal into an electronic signal and store it in RAM. The optical data pulses are then regenerated by using the electrical signals to turn on and off an auxiliary laser source. But this process generates heat. The faster this is done, the more heat is generated."

For this to work in the real world, the scientists say the communication fibers must be made of a material that provides an acoustic time frame long enough to allow the information to move from optical to sound, then return to optical. One option, Gauthier says, is to work with a new type of glass made from a chalcogenide, which has good semiconductor properties and contains one or more elements from the periodic table's chalcogenide group, also known as the "oxygen family," which includes oxygen, sulfur, selenium and tellurium.


Another option that researchers are exploring is to run the laser beams through a hollow optical fiber filled with gas (such as xenon), which would allow them to use a less powerful laser to induce longer lasting sound waves in the gas. This could potentially create a sound wave 50 times longer and allow the lasers used to be 100 times less powerful—and less energy intensive—thereby delivering more data more quickly at a lower cost.

-By Larry Greenemeier

How to Hack Windows


If you ever needed information on hacking Windows, then here you go. However, keep in mind that this is for learning purposes only.

Steps

When the computer starts up, hold down F8 before you see the "Windows Starting" screen. This will bring you to a screen with choices. Your best bet will be "Safe Mode with Command Prompt". You can then do as you wish.
Dialog will appear: you're going to want to go down to the bottom and select "All Files". Then you are going to name the file: Batch.bat. After that, go to where you saved it, and open it. That will open up Command Prompt.
However, if the computer has notepad blocked, you can easily go to any web page and then go to "View>View Source". That will easily open up Notepad.
After that, you will be able to do as you wish inside command prompt. Here is how to add or delete accounts:
Add Account: C:>net user USERNAME /add
Change Accounts password: C:>net user USERNAME * then you'll be able to enter a new password for the account. If you just press enter without typing anything, the account password will be reset.
Delete Account: C:>net localgroup Administrators# # another way is to open up notepad, (if its not blocked), and type in "command.com". Then goto File->Save As. A USERNAME /ADD


Tips

Don't be dumb and mess up someone else's computer. Only do anything like this if you need access to the root of Windows. It was written for learning only. Also, don't try anything unless you know something about DOS.
Its much more fun to use the Emergency Boot CD... check it out.



Warnings

Doing this stuff on a computer other than yours is illegal, so don't do it on someone else's, unless you have been given the permission to do so.

Don't even think about trying this at school. Really, that's just stupid. Not to mention it's not cool to get expelled because you pulled a dumb hacker stunt.