Archives

23

How Make your Windows 7 Genuine

Matovu George William
Windows 7 users have reported that immediately after log on, they were presented with a Windows Activation window: “Windows is not genuine. Your computer might not be running a counterfeit copy of Windows. 0x80070005, and more….” Microsoft explained that its caused by lack of permissions in the registry key HKU\S-1-5-20. “The Network Service account must have full control and read permissions over that registry key. This situation may be the result of applying a Plug and Play Group Policy object (GPO). Computer Configuration / Policies / Windows Settings /Security Settings / System Services / Plug and Play (Startup Mode: Automatic).” Customers affected by this issue can turn to one of two workarounds detailed by Microsoft, documented below:

Method A: Disable the Plug and Play Policy
  1. Determine the source of the policy. To do this, follow these steps:
    • On client experiencing Activation error, run Resultant Set of Policy wizard by clicking Start, Run and entering rsop.msc as the command.
    • Visit following location: Computer Configuration / Policies / Windows Settings /Security Settings / System Services / If Plug & Play service is configured through a Group Policy setting, you see it here with settings other than Not Defined. Additionally, you can see which Group Policy is applying this setting.
  2. Disable Group Policy settings and force Group Policy to be reapplied.
    • Edit Group Policy that's identified in Step 1 and change setting to “Not Defined.” Or, follow the section below to add required permissions for Network Service account.
    • Force Group Policy setting to reapply: gpupdate /force (a restart of the client's sometimes required)
Method B: Edit the permissions of the Group Policy:
  1. Open Group Policy that's identified in Method A, Step 1 above, and open corresponding Group Policy setting.
  2. Click Edit Security button, and then click Advanced button.
  3. In Advanced Security Settings for Plug & Play window click Add and then add SERVICE account. Then, click OK
  4. Select following permissions in Allow section and then click OK: Query template
    Query status
    Enumerate dependents
    Interrogate
    User-defined control
    Read permissions
    Note: Previous rights’re the minimum required permissions.
  5. Run gpupdate /force after you apply previous permissions to Group Policy setting.
  6. Verify that appropriate permissions're applied with following command: sc sdshow plugplay
    following’re the rights applied to Plug & Play service in SDDL:
    D:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)
    (A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)
    (A;;CCLCSWLOCRRC;;;IU)
    (A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
    (A;;CC LC SW LO CR RC ;;;SU is an Access Control Entry (ACE) that allows the following rights to "SU" (SDDL_SERVICE – Service logon user)
    A: Access Allowed
    CC: Create Child
    LC: List Children
    SW: Self Write
    LO: List Object
    CR: Control Access
    RC: Read Control
    SU: Service Logon User
    Note: If there’re no GPO's in place, then another activity may’ve changed default registry permissions. To work around this issue, perform following steps:
    1. On computer that’s out of tolerance, start Registry Editor.
    2. Right-click registry key HKEY_USERS\S-1-5-20, and select Permissions...
    3. If NETWORK SERVICE isn’t present, click Add...
    4. In Enter object names to select type Network Service and then click Check Names and OK.
    5. Select NETWORK SERVICE and Grant Full Control and Read permissions.
    6. Restart computer.
    7. After restart, system may require activation. Complete the activation.
1

USEFULL GSM SECRET CODES

Matovu George William
Type *#61# and press call - Check redirection status.
Cancel all redirections: ##002#
*43# to activate call waiting, to deactivate #43#.
If your phone doesn't have incoming call barring and outgoing call barring, you can try this.
For outgoing call barring dial *33*barcode*# and pres OK. To deactivate it dial #33#barcode*#.
On any phone on any network type in **43# to enable conference calls. You can make up to 7 calls at once
If you need to block SMS reception (if you are spammed by someone) just press this code:
*35*xxxx*16#
xxxx is your Call Barring code (default is 0000).
To remove this barring type: #35*xxxx#
If you want to hide/show your phone number when calling, put one of these codes below in front of the number that you are going to call.
(*#30# / *#31# or *31# / #31# ) Works on some networks.
Typing *0# or *nm# on the beginning of a txt message gives you detailed delivery report on some networks.. But turn off reports in message settings before.
When the sim card-pin blocked type **042*pin2 old*newpin2*newpin2*
Airtel Secret Codes
Dial *123# to see your credit balance. Dial *110# and follow the options.
Dial *109*9898631902# to display the call cost after each call.
If you are in Indiausing IDEA Pre or Postpaid connection then dial *101# you will get a secret menu that will let you to activate or deactivate any supported Idea package for your mobile.
 Software version: *#9999#
IMEI number: *#06#
Serial number: *#0001#
Battery status- Memory capacity : *#9998*246#
Debug screen: *#9998*324# - *#8999*324#
LCD kontrast: *#9998*523#
Vibration test: *#9998*842# - *#8999*842#
Alarm beeper - Ringtone test : *#9998*289# - *#8999*289#
Smiley: *#9125#
Software version: *#0837#
Display contrast: *#0523# - *#8999*523#
Battery info: *#0228# or *#8999*228#
Display storage capacity: *#8999*636#
Display SIM card information: *#8999*778#
Show date and alarm clock: *#8999*782#
The display during warning: *#8999*786#
Samsung hardware version: *#8999*837#
Show network information: *#8999*638#
Display received channel number and received intensity: *#8999*9266#
 *#1111# S/W Version
*#1234# Firmware Version
*#2222# H/W Version
*#8999*8376263# All Versions Together
*#8999*8378# Test Menu
*#4777*8665# GPSR Tool
*#8999*523# LCD Brightness
*#8999*377# Error LOG Menu
*#8999*327# EEP Menu
*#8999*667# Debug Mode
*#92782# PhoneModel (Wap)
#*5737425# JAVA Mode
*#2255# Call List
*#232337# Bluetooth MAC Adress
*#5282837# Java Version
18

How to Install VPN Client to Access Asycuda++ System for CFAs [ U.R.A ]

Matovu George William
Asycuda++ is a computer system provided by Uganda Revenue Authority to make your
work as an agent more efficient, more productive and more accurate. Their aim is to work
with you towards reducing delays in processing of goods to the market place and ultimately
increasing profit margin.
Minimum requirement to access Asycuda++ by using VPN client are as follows;
I. Internet Access
II. MS Windows XP or higher with web browser i.e. internet explorer
III. MS Word (Optional)
IV. Asycuda++ Password
How to Obtain Username and Password
In order for an agent to access Asycuda++ he/she must have;
I. TIN
II. Asycuda++ Password
To request a password please fill system access request form available at URA offices

How to Install VPN Client
The following are step by step instructions on how to install a VPN client in a PC. The
instructions assume that Asyscuda++ is installed in agent’s PC.
1) Insert a CD VPN Client into the CD ROM drive
2) Open the folder VPN Client folder in the CD inserted
3) Click setup to install the program
4) Follow the instruction in you computer screen and accept all default settings
5) Complete the installation processes by clicking finish button.

How to Configure the VPN Client
1) Click Start button in your desktop PC
2) Go to programs and select Cisco Systems VPN Client and select VPN Client., Click on the New tab
-On the Connection Entry tab type URA-DTI
-On the Description type Uganda Revenue Authority DTI Network
- On theHost type 196.0.18.162
3) On the Authentication tab select Group Authentication radio button
4) On the group authentication type the following;
Name: URA-DTI
SEE IMAGE BELLOW;

5) Save the configuration by clicking save button

Now Click Connect button

9) Type the user-name and password obtained from URA Asyscuda++ office and click ok to
connect.
10) Once the connection has established you can now be able to load your files in
Asycuda++ system.

NOTE: This is an the only official online manual for URA Asycuda++ and VPN network any changes in the configuration will always be updated here. Please just comment back in-case you find any bug/problem or difficult in using the instructions above. GOOD LUCK
8

SIMPLY CRACK ANY PROGRAM [Offset Comparison Tool method]

Matovu George William
Good evening dear friends, Many times I’ve seen and heard arrogant people claiming that they are hacker and they can crack programs. OK, cracking a software is VERY easy if use a patcher released by crackers. But what if there are no ready patchers for them to use? Can they find the weakness in the software protection system and know which byte to patch in order to turn the trial software into a registered version? Perhaps not…
Usually when a program is updated, the patcher to crack the program will no longer work because most cracks will verify filesize and has CRC32 checks. Although the patcher won’t work, it is possible for you to create your own patcher to crack the latest version of program “BASED” on the previous crack.
Here is how you can create your own crack based on previous the crack. I am teaching you this because I want to show you the logic. Do take note that this method will not earn you the title “CRACKER” or “REVERSE ENGINEER” but it does make you a bit smarter ;)
A crack usually works on specific version of a software. For example, a crack that is made for version 2 usually won’t work for version 3. Even a crack for subversion of program such as 2.1 can’t work with software version 2.2. That’s because most of the time when a bug is found on a software, the developer will fix the bug and recompile the code. The place(offset) where the crack is supposed to patch is no longer at the original place, thus making the crack useless. Most of the cracks has filesize and CRC32 check feature to make sure you’re using the crack on the correct version of a software. Simply patching any version will result in the software itself become unstable.
OK, let’s get started with a scenario. You have a software called RayCalculator v2.2 and there’s already a crack for it. Now the updated RayCalculator v2.3 is out but currently there’s no crack. The RayCalculator v2.2 crack can’t be used to crack the RayCalculator v2.3 because it failed the filesize and CRC32 check. Here’s how you can POSSIBLY create your own working crack for RayCalculator v2.3 based on the RayCalculator v2.2 crack.
Most cracks can create a backup of the original file in case you need to restore it back. You need to check the program’s folder to find out the backup filename. If the original filename is raycalc.exe, most probably the backup filename would be raycalc.exe.bak , raycalc.exe.old , raycalc.old or raycalc.bak.
What you need to do now is use dUP 2 to find where is the location/offset that the crack patch.
1. Download dUP 2 from the link at the end of this article, extract and run dup2.exe
2. Click New Project button located at the right side of the dUP 2, and click Save button on Patch Info window.
3. Click Add button, select Offset Patch and click OK.
4. You will notice that [Offset Patch] will appear at the main (Patch Data) window.
Double click on [Offset Patch] and you’re now in Offset Patchdata window.5. Load original file and patched file by clicking the “” button at the Compare Files area and click Compare button. Remember, the original file is always the one with .bak or .old extension at the programs folder.
Now you’ll know where the RAW Offset being changed with what byte.6. Open up the original file(raycalc.exe.bak) with a hex editor. You can use Cygnus Hex Editor which is free.
7. Press CTRL+G, enter the RAW Offset that you see from dUP2. Select Hexadecimal and click OK. You’re now at the offset where the crack patches.
IF the programmer did not update the registration security protection, the old version raycalc.exe.bak data to crack is the same as the updated raycalc2.3.exe. Now, look for noticeable data around the data where the crack is suppose to patch. For me, I see “hkJGHRF*&(&$KLJSDFLKJ“. Do NOT find something like “.U..E….” because it’s confusing and tough to identify.
8. Use your mouse to select the data, right click and copy.
9. Open raycalc2.3.exe in hex editor, press CTRL+F to bring out the Find box and paste the data by pressing CTRL+V. Try to find the data to patch by referring the old raycalc.exe.bak. I found mine which is the exact same data.
10. In dUP2, I can see that the old byte 74 and 14 is being replaced with 90 and 90Go back to Hex Editor, change the data 74 14 to 90 90 for raycalc2.3.exe and save it.Voila! It works! I’ve just cracked the latest updated program based on the previous crack. With dUP2, I can also create my own patcher for the latest updated RayCalculator version 2.3 program.
[ Download diablo2oo2's Universal Patcher - dUP ]

PLEASE DON'T FORGET TO COMMENT BACK UPON ANY SUCCESS OR FAILURE




1

SIMPLE TIPS FOR MAKING A STRONG PASSWORD

There are key considerations for system security that apply no matter which general-purpose operating system platform you happen to be using. You should always consider the following precautions when securing your systems against unauthorized access and unfortunate disasters:
  1. Use strong passwords. One of the simplest ways to improve security is to use a password that isn’t easily guessed by brute force attacks. A brute force attack is one where the attacker uses an automated system to guess passwords as quickly as possible, hopefully finding the right password before long. Passwords that include special characters and spaces, use both capital and lowercase letters, avoid words in the dictionary, as well as numbers, are much more difficult to crack than your mother’s name or your anniversary date. Remember as well that increasing the length of your password by one single character multiplies the total number of possibilities by the number of valid characters that can be used. In general, anything less than eight characters is considered far too easy to crack. Ten, 12, or even 16 is better. Just don’t make it too long to remember or too difficult to type.
  2. Invest in good perimeter defense. Not all security occurs on the desktop. It’s a good idea to use an external firewall/router to help protect your computer, even if you only have one computer. At the low end, you can purchase a retail router device, such as the commercial Linksys, D-Link, and Netgear routers that are available in stores such as Best Buy, Circuit City, and CompUSA. Higher up the scale, you can get managed switches, routers, and firewalls from “Enterprise” class vendors such as Cisco, Vyatta, and Foundry Networks. Starting somewhere in the middle and moving all the way up to direct competition with the major “Enterprise” class vendors, you can put together your own firewalls either “from scratch” or using prepackaged firewall/router installers such as m0n0wall and IPCop. Proxy servers, antivirus gateways, and spam filtering gateways can all contribute to stronger perimeter security as well. Remember that in general switches are better for security than hubs, routers with NAT are better than switches, and firewalls are a definite necessity.
  3. Update your software. While concerns such as patch testing before deployment to production systems may be of critical importance in many circumstances, ultimately security patches must be rolled out to your systems. Ignoring security updates for too long can result in the computers you use becoming easy targets for unscrupulous security crackers. Don’t let the software installed on your computers fall too far behind the security update schedule. The same applies to any signature-based malware protection software such as antivirus applications (if your system needs them), which cannot be any more effective than the degree to which they are kept up to date with current malware signature definitions.
  4. Shut down services you don’t use. Often, computer users don’t even know which network accessible services are running on their systems. Telnet and FTP are common offenders that should be shut down on computers where they are not needed. Make sure you’re aware of every single service running on your computer, and have a reason for it to be running. In some cases, this may require reading up on the importance of that service to your particular needs so that you don’t make a mistake like shutting off the RPC service on a Microsoft Windows machine and disallow logging in, but it’s always a good idea to have nothing running that you don’t actually use.
  5. Employ data encryption. Varying levels of data encryption coverage are available to the security-conscious computer user or sysadmin, and choosing the right level of encryption for your needs is something that must be decided based on circumstances. Data encryption can range from use of cryptographic tools on a file-by-file basis, through filesystem encryption, up to full disk encryption. Typically, this doesn’t cover the boot partition, as that would require decryption assistance from specialized hardware, but if your need for privacy is great enough to justify the expense, it’s possible to get such whole-system encryption. For anything short of boot partition encryption, there are a number of solutions available for each level of encryption desired, including both commercial proprietary systems and open source systems for full disk encryption on every major desktop operating system.
  6. Protect your data with backups. One of the most important ways you can protect yourself from disaster is to back up your data. Strategies for data redundancy can range from something as simple and rudimentary as periodically saving copies to CD to complex, staggered, periodic automated backups to a server. On systems that must maintain constant uptime without loss of service, RAID can provide automatic failover redundancy in case of a disk failure. Free backup tools such as rsync and Bacula are available for putting together automated backup schemes of arbitrary complexity. Version control systems such as Subversion can provide flexible data management so that you can not only have backups on another computer, but you can keep more than one desktop or laptop system up to date with the same data without a great deal of difficulty. Using subversion in this manner saved my bacon in 2004 when my working laptop suffered a catastrophic drive failure, emphasizing the importance of regular backups of critical data.
  7. Encrypt sensitive communications. Cryptographic systems for protecting communications from eavesdroppers are surprisingly common. Software supporting OpenPGP for e-mail, the Off The Record plug-ins for IM clients, encrypted tunnel software for sustained communication using secure protocols such as SSH and SSL, and numerous other tools can be had easily to ensure that data is not compromised in transit. In person-to-person communications, of course, it can sometimes be difficult to convince the other participant to use encryption software to protect communications, but sometimes that protection is of critical importance.
  8. Don’t trust foreign networks. This is especially important on open wireless networks such as at your local coffee shop. If you’re careful and smart about security, there’s no reason you cannot use a wireless network at a coffee shop or some other untrusted foreign network, but the key is that you have to ensure security through your own system, and not trust the foreign network to be safe from malicious security crackers. For instance, it is much more critical that you protect sensitive communications with encryption on an open wireless network, including when connecting to Web sites where you use a login session cookie to automate authentication or enter a username and password. Less obviously, make sure you don’t have any network services running that are not strictly necessary, as they can be exploited if there is an unpatched vulnerability. This applies to network filesystem software such as NFS or Microsoft CIFS, SSH servers, Active Directory services, and any of a number of other possibilities. Check your systems both from the inside and the outside to determine what opportunities malicious security crackers may have to attempt to compromise your computer, and make sure those points of entry are as locked down as reasonably possible. In some respects, this is just an extension of the points about shutting down unneeded services and encrypting sensitive communications, except that in dealing with foreign networks you must be especially stingy with the services you allow to run on your system and what communications you consider “sensitive.” Protecting yourself on a foreign, untrusted network may in fact require a complete reworking of your system’s security profile.
  9. Get an uninterruptible power supply. You don’t just want a UPS so you won’t lose files if the power goes out. There are other, ultimately more important reasons, such as power conditioning and avoiding filesystem corruption. For this reason, make sure you get something that works with your operating system to notify it when it needs to shut itself down, in case you aren’t home when the power goes out, and make sure you get a UPS that provides power conditioning as well as battery back-up. A surge protector simply isn’t enough to protect your system against damage from “dirty” power. Remember, a UPS is key to protecting both your hardware and your data.
  10. Monitor systems for security threats and breaches. Never assume that just because you’ve gone through a checklist of security preparations your systems are necessarily safe from security crackers. You should always institute some kind of monitoring routine to ensure that suspicious events come to your attention quickly and allow you to follow up on what may be security breaches or threats to security. This sort of attention should not only be spent on network monitoring but also integrity auditing and/or other local system security monitoring techniques.
Other security precautions may apply depending on the specific OS you use. Some operating systems provide additional challenges to security because of design characteristics that produce a less-than-optimal security profile, and some operating systems grant the knowledgeable sysadmin capabilities for increased security that may not exist elsewhere. All of this should be kept in mind when securing your system, whether using proprietary systems such as Microsoft Windows and Apple Mac OS X or open source systems such as your favorite Linux distribution, FreeBSD, NetBSD, or even the very security-conscious OpenBSD.
Only in the very rarest of circumstances is a default install of your OS of choice, with no further thought to securing the system, truly sufficient. Start with the above enumerated security concerns regardless of your operating system, then consider the specific security needs and opportunities of your platform. Don’t leave the integrity of your system’s security up to luck.
0

DOWNLOAD ANY MP3 SONG DIRECTLY ON YOUR PHONE

Matovu George William
Many of you have always found this difficult and I've always received questions on this from friends but today lets take a quick survey on how to easy do this from any Web enabled Mobile phone.
NOTE: It also works on almost any gadget that can download, ie, Tablets, P.C , Pads, etc

1. Type ww.google.com in your phone's browser
Now let's say you want to download " Stereo hearts by Gym Class heroes"
2. Now type "Stereo hearts by Gym Class heroes.mp3 with out quotes and hit search
3. Scroll through the Search results and click on one of the first 5 results.

I KNOW YOU WILL HAVE THE FILE DOWNLOADING.

NOTE: The trick is the file extension which is " mp3 "

ENJOY
8

ICON 225 ORANGE MODEM UNLOCKING INSTRUCTIONS

  1. Install python 2.6.x (32 bit version): http://www.python.org/download/releases/2.6/ 
   2. Install pywin32 for python 2.6: http://sourceforge.net/projects/pywin32/files/
   3. Install pyserial: http://sourceforge.net/projects/pyserial/files/
   4. Download the unlocker (mms-unlocker-v1.6) and unpack it (e.g. into the directory C:\msm)
   5. Download a firmware update for the 3G modem from Option or T-Mobile Here XP Vista
   6. Unpack the firmware update into the directory used above (e.g. C:\msm)
   7. IMPORTANT: The superfire.exe file of the update is packed. Unpack the Superfire.exe file of the firmware update once again (e.g. WinRAR can do that). For the newest update, the superfire.exe can be used as it is.Download (13 MB)
   8. Remove the SIM card from the modem and plug it in . Make sure that you have the latest drivers from the option website installed before you start msm_unlock.py. Also, close all the tools for the stick ('connection manager' etc.). then open the black msm_unlock.
   9. Write down the unlock code. Unplug the stick, replug it and apply the unlock code with msm_apply.py. If the unlock code is not accepted, search the comments for a posting by "muxx" - he has given detailed instructions on how to manually enter the unlock code.
  10. Unplug and replug the stick once more and you've got yourself an unlocked 3G modem.


 
Copyright 2016 Strictly Technology
Strictly Technology Blog Theme by Wills Jojo Senior