Sunday, 27 October 2013

How To Hack Windows Admin Account Using KON-Boot


Have you ever re-installed Windows again just because you forgot your Administrator Account password? Well you don't need to do that again, using this simple trick you can easily get into your Administrator Account and reset your password.
This trick can be used to hack ANY PC or Laptop, no matter what version of Windows are you using, you just need to know how to access the boot-menu and *Boom*.



I know there are also some other methods to do this job, but i believe that this is the easiest trick for a normal user without any technical knowledge of computers.
So before you continue reading, i want you to know that this tutorial is for educational purpose only, please DON’T use it to harm anyone.

Things you need:

  1. A USB Pen-drive (Memory Card can also be used, as Computer recognizes it as a USB device)
  2. KON-Boot

Step 1:

Download this little tool called KON-Boot from here and Extract it using WinRAR.


Also Read    Hack Windows XP/7/8 admin password easily without any software

Step 2:

Connect the USB and Format it.

Step 3:

Now go to the extracted KON-Boot folder and run “unetbootin-windows-323.exe
 

Step 4:

Select Discimage option, and Browse to the same extracted files and select “D0-konboot-v1.1-2in1.img” file.

Step 5:

In the bottom section of the window, choose the Drive Name (letter) of your USB Pen-drive, click Ok and wait for the process to complete.
This will install KON-Boot on your USB drive.
The Drive letter might be J: , K: or any other alphabet, depending on the number of partitions, DVD Drives and Other connected memory devices on your computer.

Step 6:

Now the best part :) Plug the USB into the PC you want to access, go to the BIOS settings and choose USB Flash Drive as the primary boot device.
e.g. In DELL you can simply press F9 while booting and select the USB FLASH DRIVE as boot device.





Also Read    Hack Windows XP/7/8 admin password easily without any software

Step 7:

When the PC boots from the USB device you’ll see the KON-Boot screen and the Windows will get started normally.

Step 8:

When the login screen comes up, just leave the password empty and hit Enter!! You’ll be logged into the administrator account without entering any password. :)
Leave comments below if you have any questions or need any help.


KON-Boot Free Download





Description

KON-Boot is an efficient tool that enables you to silently bypass Windows Administration authentication and lets you access the administrator account without entering any password.

A detailed tutorial can be found here: How To Hack Windows Admin Account Using KON-Boot

System Requirements

OS:
Windows 8
Windows 7
Windows 2008
Windows Vista
Windows XP
Windows 2000

-Supported 32-bit and 64-bit systems
Size: 
3.93 MB

Password: allyouhack.blogspot.in



http://095faca4.linkbucks.com
 

Hack Windows XP/7/8 admin password easily without any software

Hack Windows XP/7/8 admin password easily without any software


Hello guys. Here's a new 100% working trick to hack windows password .
I know there's a lot of softwares out there to get it done . But thats not geeky & also not time consuming . The real fun is when you can hack this manually within just a few minuets .

So here are the steps to do it.

Required things:

1) Windows 98 bootable USB drive ( We will learn to make it as we proceed) .
2) Basic knowledge of DOS commands .
3) Basic knowledge of how to boot your PC from a USB drive .

Theory:

Now you may wanna know the theory behind this hack . So here's how we do it .
In windows we can change the password of the PC with command prompt very easily .
with the command line net user username password . (replace username & password with the credentials you want ) . But this can be possible only if you have admin access to the command prompt . A command prompt with admin access is called elevated command prompt . When you simply open a command prompt window it brings you to the C:\users\username directory . But in an elevated command prompt you are brought to the C:\windows\system32 directory .

So if we can start an elevated command prompt window in the windows login screen, then we can run the above said command and change the password to what we want . So the main problem is how can we do this .

There are some programs which we can run directly from the login screen. These are our keys to hack a windows password .
The programs are:
1) sethc.exe ( windows xp , windows vista )
2) narrator.exe ( windows 7 , 8 )
3) magnify.exe ( windows 7 ,8 )
There are more but these will be enough for us . In windows 7 & 8 we can access them by clicking on the " Easy of Access " button in the login screen & then selecting "narrator" or "magnifier" then "apply" & then "OK"

All these files are stored in the C:\windows\system32 folder . And also the file for command prompt is stored in this folder ( named cmd.exe ).

So if we can replace one of those above mentioned files with cmd.exe & then if we start those programs in login screen, we can get an elevated command prompt & then type the net user command to change the password & we can gain access to the system .

Now the question is how to replace those files with command prompt when we have no access to the system ? The answer is by using a live OS which we can boot from an external USB drive & then accessing the file system through it. Most people will suggest you to use a Ubuntu live CD . But Ubuntu is near about 800 MB in size . So I'll suggest you to use MS-DOS 98 with an external usb drive which is 3 MB in size .

Now here are the steps to make a Bootable MS-DOS 98 usb drive:

1) Download DOS 98 from the link given below .
2) Download HP USB Disk Storage Format Tool form the below link .
3) Unzip & install the HP USB Disk Storage Format Tool .
4) Unzip DOS 98.zip and extract the folders ms-dos & ntfs dos . Remember the location .
5) Plug in your USB drive ( pen drive ) in your pc . ( make sure you backed up your contents of the pen drive, because your pen drive will be formatted . )
6) Now run HP USB Disk Storage Format Tool . ( in windows 7 right click on it & run as administrator ).
7) Now on the device window select your pen drive . In my case it's kimgston data travelar...



8)now in the file system select FAT . & tick both "quick format" & "Create a dos startup disk" .
9) now click on the 3 dots next to the box & select the ms-dos folder you extracted earlier . & press ok .









10) Now press start . Let the process complete .
11) Now copy the contents of NTFS folder in your pen drive .
Thats it . Now your bootable USB pen drive is ready .

Now here comes the main part.

Booting the target PC with this pen drive:

Switch on the target pc with the pen drive pluged in . And wait until a black ( sometime blue ) screen appears . There you will see some options like ** to enter setup , ** boot menu etc . In my case it's like F10 - to enter setup , Esc - Boot menu . Press the button which says Boot menu ( in my ps it's Escape button ) & select the pen drive from the list of available devices. Now you should see the dos window .

*Check your PC's BIOS manual for more info on accessing boot menu. Some PCs don't have the Boot menu . In such cases you need to Enter Bios setup by pressing the particular key ( in my case it's F10 ) & then change the boot device order as Removable media in the first place .

**To know more about how to change boot order of a PC follow these links or refer to the BIOS manual.

http://lifehacker.com/5991848/how-to-boot-from-a-cd-or-usb-drive-on-any-pc
http://pcsupport.about.com/od/fixtheproblem/ss/bootorderchange.htm


Real Hacking Begins Here:

If you booted correctly from the usb drive, you should now see the dos prompt. something like this with the C:\ prompt .



Now the first thing to do is to find out the windows instalation directory .
For this just change the drives serially , check for the windows directory in that drive with dir command .

Your commands should look like this:
C:\> D:  (press enter)                                              --------- Changes the prompt to drive D.
D:\> dir (press enter)                                               ---------  Lists all the files and folders in the drive D .
D:\> some results with files & folders.                       --------  Search for the windows folder here.

You should probably find it here in the drive D . If not then change the dir again to E . 

D:\> E:   (press enter)                                                --------- Changes the prompt to drive E.
E:\> dir   (press enter)                                               ---------  Lists all the files and folders in the drive E.
E:\> some results with files & folders                          --------  Search for the windows folder here.

If not found repeat the process with F , G , H , drives serially untill you get the windows folder .
In the below image the windows folder is in C drive . We get the below result after executing the following command .
C:\> dir (press enter )



 Now suppose you get the windows folder in D: drive .
You should return on the D:\> prompt automatically .

Now type the command cd windows\system32 (press enter).
You should now see D:\windows\system32> on the prompt .
Now type the following commands exactly as they are.

copy narrator.exe c: ( press enter )

copy cmd.exe c: (press enter)

del narrator.exe  (press enter)

ren cmd.exe narrator.exe (press enter)

 This should look like this.



 Thus we replaced the narrator.exe file with cmd.exe .

Now whenever we start the narrator process we will get the Elevated Command Prompt .

Changing The Password:

 
Now restart your PC normally . without the pen drive plugged in .
Now when you are on the login screen . Click on Easy of access on the left bottom corner . And tick the narrator > Apply > OK . In no time you'll get a command prompt window . Like DOS .

Now type in the command net user your_username your_new_password .
Suppose the user name is computer , then type net user computer 12345 (enter) . And the new password will be 12345 .
Now close the command prompt & enter your new password in the box & go . Bingo ! now you have access to the system .

***Note
In windows xp there's no "easy of access button" so you have to change the commands a little .


copy sethc.exe c: ( press enter )

copy cmd.exe c: (press enter)

del sethc.exe  (press enter)

ren cmd.exe sethc.exe (press enter) 

 And then on the login screen press "shift" key five times in a row & the command prompt will appear . Least of tutorial is same for windows xp .

If i was not clear at any point please let me know to help you out in the comments section.

This hack was successfully tested on win 7 & 8 . But i hope the above said WIN XP hack will also work . Let me know if it works.

I'm posting this tutorial only for the password recovery purpose in case you forgot your windows password . I'll not be responsible for any kind of illegal usage of this tutorial .  

 

Download links to the files:

 


                    HP USB Disk Storage Format Tool

                               MS-DOS 98+NTFS DOS

How To Scan a Website for Vulnerabilities In ( Backtrack / Kali Linux )

Hello guys, today I'm going to show you how to scan for vulnerabilities in a website, or all the websites in the server. In this tutorial I will use a program in BackTrack called UniScan. it's very easy to use, but very good in scanning. First of all, open your terminal and type this command: 

cd /pentest/web/uniscan && ./uniscan.pl



Something like this will be printed on your terminal. Now all we have to do is follow the instructions. First of all we need a target to scan, I've chose one already and I will use it in my pictures. To start the scan, first you have to check the options which you want to use in your scan.
 # HOW TO USE OPTIONS: Check the letter beside your option, and include it after the URL like this:

 ./uniscan.pl -u http://www.website.com/ -b -q -d -w

or put them all together.

 ./uniscan.pl -u http://www.website.com/ -bqdw 

This will start your scan with all the different options you included.
  NOTE:- NEVER FORGET THE FORWARD SLASH AT THE END OF THE LINK IN THE COMMAND!! Now the scan will start, and the terminal will look something like this:


This scan will scan for vulnerabilities like SQL-i / LFI / RFI and so on. It also searches for Webshells, backdoors, PHP info disclosure, Emails, and much more. Here are some examples: PHP.info() disclosure:



External Links/Hosts:



Source Code disclosure:



Dynamic Scan, Vulnerability Identification:


This program can also get all the sites in a server, and then you will be able to scan all of them. To do that, run this command:

 ./uniscan.pl -i "ip:127.0.0.1"

 Change 127.0.0.1 to your target server. All the websites will be stored in "sites.txt" in the same directory. Now to scan those sites in the list, run this command:

 ./uniscan.pl -f sites.txt -bqwd 

You can change the options to whatever you want.

I Hope You Enjoyed  , thanks to Zamil for this Great Tutorial  ...!!!
If You Have any Question or Problem Comment Below

Social Engineering Toolkit ( Backtrack / Kali Linux )

The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. Originally this tool was designed to be released with the http://www.social-engineer.org launch and has quickly become a standard tool in a penetration tester’s arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community in incorporating attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted a focused attacks against a person or organization used during a penetration test.
 
Features of SET
 
  1. Spear Phishing Attack vector
  2. Website Attack Vector
  3. Infectious media generator
  4. Create a Payload and Listener
  5. Mass Mail Attack
  6. Teensy USB HID Attack vector
  7. SMS Spoofing Attack Vector
  8. Wireless Access Point Attack Point
  9. Third Party Modules

How to Use Social Engineering Toolkit in Backtrack 5

 

Open your backtrack  console & Type cd /pentest/exploits/set
 


Now type ./set 
 



Spear-Phishing Attack Vector: The spear-phishing attack menu is used for performing targeted email attacks against a victim. You can send multiple emails based on what your harvested or you can send it to individuals. You can also utilize fileformat (for example a PDF bug) and send the malicious attack to the victim in order to hopefully compromise the system.

Website Attack vector: The web attack vector is used by performing phishing attacks against the victim in hopes they click the link. There is a wide-variety of attacks that can occur once they click. We will dive into each one of the attacks later on.
 
Infectious Media Generator: The infectious USB/DVD creator will develop a Metasploit based payload for you and craft an autorun.inf file that once burned or placed on a USB will trigger an autorun feature and hopefully compromise the system. This attack vector is relatively simple in nature and relies on deploying the devices to the physical system.
 
Create a payload and Listner: The create payload and listener is an extremely simple wrapper around Metasploit to create a payload, export the exe for you and generate a listener. You would need to transfer the exe onto the victim machine and execute it in order for it to properly work.
Mass mailer Attack: The mass mailer attack will allow you to send multiple emails to victims and customize the messages. This option does not allow you to create payloads, so it is generally used to perform a mass phishing attack.
 
Teensy USB HID Attack vector: The teensy USB HID attack is a method used by purchasing a hardware based device from prjc.com and programming it in a manner that makes the small USB microcontroller to look and feel exactly like a keyboard.
 
SMS Spoofing Attack Vector: This module allows you to specially craft SMS messages and send them to a person. You can spoof the SMS source.
 
Wireless Access Point Attack Vector: it Can be used to set up a rouge wireless access point, Spoof DNS and redirect all traffic to attacker.
 
Third Party Modules: This attack vector consists of Third party module – RATTE (Remote Administration Tool Tommy Edition) which is a HTTP tunneling payload. This can be used in the same way as website attack vectors but with an added advantage of beating security mechanisms like local Firewall and IPS.

We Hope That You Learned Something Very Useful From This Tutorial...!!!

If You Have any Question or Problem Simply Just Comment Below

How to setup njrat 0.6.4 step by step 2014


Few year ago keylogger is most famous tool for hack account password and in keylogger many types available for send keylogger to victim like a remote keylogger but this all hard and limited to screenshot and keywords only
Change in technology demand to hack victim easy in 1 click

Today we learn here how to hack full computer using software / tool in few easy steps


njrat-0.6.4-rat


Njrat 0.6.4

Download Bf3 Keys Generator


Features :-

  • Process Injections
  • Hooks
  • USB Spreader feature 
  • Little Stub Size 100kb <
  • Easy To Crypt the files 
  • Stubsrc.rar is the source code of the stub if you're a decent applied scientist you'll be able to add practicality

Note:Don't delete file (stub.exe) and additionally do not execute it it is necessary to make a replacement bin .


How to Setup :-




  • Make no ip account here :- Click here
  • Now login no ip account and go in Host/redirects > Add host > 
  • Choose name of your no ip url Example :- xyz.zapto.com


no-ip-setting


  • Add Host and Download no ip client
  • Install no ip client and run client
  • Click on edit and put your no ip login details and Click Ok


login-no-ip


  • Now click edit host And tick/select url you created in account and click Save


host-selection


  • Now you almost done no-ip setting here


no-ip-login-done

Lets start rat setting


  • Run njrat.exe and click Builder


njrat-builder 

  • Put details same as photo
  • Just change host url with your url and Build own rat virus file


njrat-hacked-computer


You are done anything now

Send your server.exe file to friend or victim and when victim run your virus he/she automatically connected to your rat server


Note:- This tutorial only for learning purpose please do not damage any person, We are not responsible for any damage or action 

Saturday, 26 October 2013

List Of 105 Useful Websites




1. screenr.com – Record movies of your desktop and send them straight to YouTube.
2. bounceapp.com – For capturing full length screenshots of web pages.
3. Goo. gl – Shorten long URLs and convert URLs into QR codes.
4. untiny.me – Find the original URLs that’s hiding behind a short URLs.
5. localti.me – Know more than just the local time of a city
6.copypastecharacter.com– Copy-paste special characters that aren’t on your keyboard.
7. topsy.com –A better search engine for twitter.
8. fb.me/AppStore –Search iOS apps without launching iTunes.
9. iconfinder.com –The best place to find icons of all sizes.
10. office.com –Download templates, clipart and images for your Office documents.
11. woorank.com –everything you wanted to know about a website.
12. virustotal.com –Scan any suspicious file or email attachment for viruses.
13. wolframalpha.com– Gets answers directly without searching .
14.printwhatyoulike.com– Print web pages without the clutter.
15. joliprint.com –Reformats news articles and blog content as a newspaper.
16. isnsfw.com – When you wish to share a NSFW page but with a warning.
17. eggtimer.com – A simple online timer for your daily needs.
18. coralcdn.org – If a site is down due to heavy traffic, try accessing it through coral CDN.
19. random.org – Pick random numbers, flip coins, and more.
20. mywot.com –Check the trust level of any website .
21. viewer.zoho.com –Preview PDFs and Presentations directly in the browser.
22. tubemogul.com –Simultaneously upload videos to YouTube and other video sites.
23. truveo.com – The best place for searching web videos.
24. scr.im – Share your email address online without worrying about spam.
25. spypig.com – Now get read receipts for your email.
26. sizeasy.com –Visualize and compare the size of any product.
27. whatfontis.com –quickly determine the font name from an image.
28. fontsquirrel.com –A good collection of fonts – free for personal and commercial use.
29. regex.info – Find data hidden in your photographs .
30. tineye.com – This is like an online version of Google Googles.
31. iwantmyname.com– Helps you search domains across allTLDs.
32. tabbloid.com –Your favorite blogs delivered as PDFs.
33. join. me – Share your screen with anyone over the web.
34. onlineocr.net –Recognize text from scanned PDFs and images – see other OCR tools.
35. flightstats.com –Track flight status at airports worldwide.
36. wetransfer.com –For sharing really big files online.
37. pastebin.com – A temporary onlineclipboard for your text and code snippets.
38.polishmywriting.com –Check your writing for spelling or grammatical errors.
39.awesomehighlighter.com– Easily highlight the important parts of a web page.
40. typewith.me –Work on the same document with multiple people.
41.whichdateworks.com –Planning an event? Find a date that works for all.
42. everytimezone.com– A less confusing view of the world time zones.
43. warrick.cs.odu.edu– You’ll need this when your bookmarked web pages are deleted.
44. gtmetrix.com – The perfect tool for measuring your site performance online.
45. imo.im – Chat with your buddies on Skype,Facebook, GoogleTalk, etc from one place.
46.translate.google.com– Translate web pages,PDFs and Office documents.
47. youtube.com/leanback – Sit back and enjoy YouTube videos in full-screen mode.
48. similarsites.com –Discover new sites that are similar to what you like already.
49. wordle.net – Quicksummarize long pieces of text with tag clouds.
50. bubbl.us – Create mind-maps, brainstorm ideas in the browser.
51. kuler.adobe.com –Get color ideas, also extract colors from photographs.
52. followupthen.com– Setup quick reminders via email itself.
53. lmgtfy.com – When your friends are too lazy to use Google on their own.
54. tempalias.com –Generate temporary email aliases, better than disposable email.
55. pdfescape.com –Lets you can quickly edit PDFs in the browser itself.
56. faxzero.com – Send an online fax for free– see more fax services.
57. feedmyinbox.com –Get RSS feeds as an email newsletter.
58. isendr.com –Transfer files without uploading to a server.
59. tinychat.com –Setup a private chatroom in micro-seconds.
60. privnote.com –Create text notes that will self-destruct after being read.
61. flightaware.com –Live flight tracking service for airports worldwide.
62. boxoh.com – Track the status of any shipment on Google Maps – alternative.
63. chipin.com – When you need to raise funds online for an event or a cause.
64.downforeveryoneorjustme.com – Is your favorites really offline?
65. example.com – This website can be used as an example in documentation.
66.whoishostingthis.com –Find the web host of any website.
67. google.com/history– Found something on Google but can’t remember it now?
68.errorlevelanalysis.com– Find whether a photo is real or aphotoshopped one.
69. google.com/dictionary – Get word meanings, pronunciations and usage examples.
70.urbandictionary.com –Find definitions of slangs and informal words.
71. seatguru.com –Consult this site before choosing a seat for your next flight.
72. sxc.hu – Download stock images absolutely free.
73.download.com.np-Get all softwares.
74. wobzip.org – Unzip your compressed files online.
75. vocaroo.com –Record your voice with a click.
76. scribblemaps.com– Create custom Google Maps easily.
77. buzzfeed.com –Never miss another Internet meme or viral video.
78. alertful.com –Quickly setup email reminders for important events.
79.encrypted.google.com– Prevent your ISP and boss from reading your search queries.
80. formspring.me –You can ask or answer personal questions here.
81. snopes.com – Find if that email offer you received is real or just another scam.
82. typingweb.com –Master touch-typing with these practice sessions.
83. mailvu.com – Send video emails to anyone using your webcam.
84. ge.tt – Quickly send a file to someone,they can even preview it before downloading.
85. timerime.com –Create timelines with audio, video and images.
86. stupeflix.com –Make a movie out of your images, audio and video clips.
87. aviary.com/myna –An online audio editor that lets you record and remix audio clip.
88. noteflight.com –Print music sheets, write your own music online (review).
89.disposablewebpage.com– Create a temporary web page that self-destruct.
90. namemytune.com– When you need to find the name of a song.
91. homestyler.com –Design from scratch or re-model your home in3d.
92. snapask.com – Use email on your phone to find sports scores, read Wikipedia, etc.
93. teuxdeux.com – A beautiful to-do app that resembles a paper diary.
94. livestream.com –Broadcast events live over the web, including your desktop screen.
95. bing.com/images –Automatically find perfectly-sized wallpapers for mobiles.
96. historio.us –Preserve complete web pages with all the formatting.
97. dabbleboard.com –Your virtual whiteboard.
98. whisperbot.com –Send an email without using your own account.
99. sumopaint.com –An excellent layer-based online image editor.
100. lovelycharts.com– Create flowcharts, network diagrams, Sitemaps, etc.
101. nutshellmail.com– Get your Facebook and Twitter streams in your Inbox.
102.The Hype Machine -Web-based music discovery site based on the music posted to blogs http://hypem.com/
103.SimpleWash -A site to help you clean up old content you may not want to show on your social media profiles anymore (currently Facebook only, Twitter is coming soon) SimpleWash™
104.ListenToYouTube.com -Converts YouTube videos to mp3sYouTube to MP3 Converter - Fast, Free - ListenToYouTube.com
105.PushBullet -Easily send notes, links, lists, files, etc. to your Android phone https://www.pushbullet.com/

How To Unlock Android Pattern

Today many android phone user use the inbuilt unlock pattern for give security to there phones this is very easy to use but some time to take many wrong attempts it locked permanently after that you need to enter the user id you enter in the google play store to unlock phone but there is some problems to unlock again if u stop data usage in your so it can’t be connected with internet and then you cannot unlock phone without this trick. sometime user needs to go to Samsung care center and then give some money to unlock it again so this is costly you need to pay here i gonna give you a trick How To Unlock an Android Pattern  Just follow these simple steps to unlock your phone and use again free of cost.

Steps




     Enter the user email id you enter in the play store.
     If you don’t know the email id , then just don’t worry just follow these steps.
  1.     just switch off you android phone and then wait for second to switched of it.
  2.     then first click Up Volume Key and hold it.
  3.     then click on home button and hold it.
  4.     then press the power button and after is started just release it.
  5.     and then you can see you enter in the secret android menu you never see it before.
  6.     just click on home button for up and down in the menu.
  7.     then just go to third option named as DELETE ALL USER DATA.
  8.     then it takes some time.
  9.     the phone will be started and the unlock pattern problem is fixed.


    Note : Your all messages , apps other data will be deleted .

How to disable Facebook seen feature


Do u hate when someone messages you in Facebook and they will know that you have viewed that relevant message, but not replied? yeah! we everyone hate that facebook's annoying "Read Receipt" or "Seen" feature for messaging.

Oky, by your luck, there is a way to disable this feature from facebook :D

Just Download These Extension :

For Chrome users ,
FB Unseen Extension

For All other users,
The Chat cheater

Facebook App,
Unseenly App

Now Just download, it will install itself. Then it will ask to RESTART your browser and TADA !

Enjoy :) !!

Top 4 inspiring windows 7 themes for Hackers

1st of all you need to install rainmeter on your computer, for installing these themes, rainmeter is best desktop customization software, download rainmeter from here, these themes are Made for windows 7, but you can use it on windows xp too. 


1- Jarvis (iRon Man Skin)

Jarvis is a Iron main inspired rainmeter skin, you can convert into hackers theme using new widgets and changing background image,Jarvis skin's centrel interface is damn cool.



Download
 

2-Tron Legacy ( 3D desktop )



 

3- Alien 3d Rainmeter Skin

alien 3d is amazing skin, it will give a 3d Look to your desktop


Download


5- Blue HDD


 4- Blue HDD



Download


Experiment : You can Make your desktop more amazing and awesome, by merging all skins's widgets/pulgins together , take a look, i've made it with blue vision alpha and jarvis 


How To Install These Themes :



There are two ways to install
Rainmeter skins which are
Automatically and Manually. If
you have a Rainmeter skin with
extension .rmskin then you
automatically install the skins
with double click. Again you have
a skin with extension
like .zip/.rar/.7z archive then you
have unzip the skin archive put
the unzipped files into the
Rainmeter skin folder. Here I’m
going to show the two ways to
install Rainmeter skins.
Install Rainmeter Skins
Automatically
You can easily install a Rainmeter
skin automatically if it comes
with extension .rmskin.
The .rmskin is a skin format of
Rainmeter skin packager.
The .rmskin skin extension is
associated with Rainmeter skin
installer so, when you double
the skin it get installed
automatically.
Generally a Rainmeter skin
with .rmskin extension may
contain different components if
the author of the skin associate
those components. These
components may include Skins,
Layouts, Plugins, Fonts, Addons
and so on.
Install Rainmeter Skins
Manually
Rainmeter skins which comes in
a archive with extension like
.zip/.rar/.7z and other. To install
these types of skins you have to
unzip the skin archive. To extract
the skin archive you must have a
archive extractor installed on
your computer. You can use
Winrar, 7-Zip or other software
to extract the skin archive. After
extracting the skin archive copy
the extracted folder paste into
the Rainmeter skin directory. You
access Rainmeter skin directory
following the path below:
Windows 7: C:
UsersYourNameDocumentsRain
meterSkins Windows XP:
C:Documents and
SettingsYourNameMy
DocumentsRainmeterSkins
Finally, right-click the Rainmeter
icon from the notification area
and select Refresh all. The new
skins you installed will now be
available to load from the
Manage window or context
menus.
1-  BlueVision Alpha
Blue vision aplha v2.0 is one of the best rainmeter skins, you'll Get lot of attractive widgets in this theme, you can make it more awesome by changing background.
blue+vision+alpha.jpg (1167×647)
- See more at: http://cyber-worldd.blogspot.in/2013/06/top-5-inspiring-windows-7-themes-for.html#sthash.2gIv4VET.dpuf

Download Windows 8 Pro Fully Activated with Serial Key


Windows 8 Pro Fully Activated with Serial Key

Download Windows 8 and it incorporates the Xbox Music application, which gives you gain entrance to to an entire universe of music.Sign in with your Microsoft record to any of your PCs running Windows 8 and you’ll promptly see your particular underpinning, presentation inclination, and settings.


Windows 8 Security

Stay exceptional and progressively secure with Windows Defender, Windows Firewall, and Windows Update.

Windows 8 Performance

Windows 8 begins up quicker, switches between applications speedier, and utilizes control more prudently than Windows 7
Every tile on Start is joined with an individual, application, online site, organizer, playlist, or whatever else is imperative to you. Bind the same amount tiles to Start as you like and move them around so its just the way you need it.
This isn’t the normal divider of static symbols: Tiles enliven with the most recent informative content. Announcements, climate gauges, Tweets, and more—you’ll see exist upgrades before you even open a specific application.
Your photographs, online sites, that amusing movie you just saw: Pretty much anything you’re checking out is available in windows 8 professional, you can offer to others. Right away. There’s no compelling reason to interfere with what you’re doing, duplicate what you need to impart, open an additional application, and glue it in. Only swipe in from the right and tap or click Share to instantly send it in message or present it on Facebook.

Windows 8 system requirements

If you want to run Windows 8 on your PC, here's what it takes:

    Processor: 1 gigahertz (GHz) or faster with support for PAE, NX, and SSE2   RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
    Hard disk space: 16 GB (32-bit) or 20 GB (64-bit)
    Graphics card: Microsoft DirectX 9 graphics device with WDDM driver


 

How to Install Serial/Product Key ?

  •     Product key:
           XKY4K-2NRWR-8F6P2-448RF-CRYQH 
  •     Run cmd as administrator and type in  "almgr -ipk  XKY4K-2NRWR-8F6P2-448RF-CRYQH " without      quotes.
  •     Press Enter  , then type " almgr -ato " without quotes.
  •     Again Press Enter and you are done.


Download Windows 8 and it incorporates the Xbox Music application, which gives you gain entrance to to an entire universe of music.Sign in with your Microsoft record to any of your PCs running Windows 8 and you’ll promptly see your particular underpinning, presentation inclination, and settings. - See more at: http://cyber-worldd.blogspot.in/2013/08/download-windows-8-pro-fully-activated.html#sthash.90GBzvJa
Download Windows 8 and it incorporates the Xbox Music application, which gives you gain entrance to to an entire universe of music.Sign in with your Microsoft record to any of your PCs running Windows 8 and you’ll promptly see your particular underpinning, presentation inclination, and settings. - See more at: http://cyber-worldd.blogspot.in/2013/08/download-windows-8-pro-fully-activated.html#sthash.90GBzvJa.dpu

Download Windows 8 and it incorporates the Xbox Music application, which gives you gain entrance to to an entire universe of music.Sign in with your Microsoft record to any of your PCs running Windows 8 and you’ll promptly see your particular underpinning, presentation inclination, and settings. - See more at: http://cyber-worldd.blogspot.in/2013/08/download-windows-8-pro-fully-activated.html#sthash.90GBzvJa.dpuf
 
Windows 8 Pro Fully Activated with Serial Key


Download Windows 8 and it incorporates the Xbox Music application, which gives you gain entrance to to an entire universe of music.Sign in with your Microsoft record to any of your PCs running Windows 8 and you’ll promptly see your particular underpinning, presentation inclination, and settings.
- See more at: http://cyber-worldd.blogspot.in/2013/08/download-windows-8-pro-fully-activated.html#sthash.90GBzvJa.dpuf

Windows 8 Pro Fully Activated with Serial Key


Download Windows 8 and it incorporates the Xbox Music application, which gives you gain entrance to to an entire universe of music.Sign in with your Microsoft record to any of your PCs running Windows 8 and you’ll promptly see your particular underpinning, presentation inclination, and settings.
- See more at: http://cyber-worldd.blogspot.in/2013/08/download-windows-8-pro-fully-activated.html#sthash.90GBzvJa.dpuf

Windows 8 Pro Fully Activated with Serial Key


Download Windows 8 and it incorporates the Xbox Music application, which gives you gain entrance to to an entire universe of music.Sign in with your Microsoft record to any of your PCs running Windows 8 and you’ll promptly see your particular underpinning, presentation inclination, and settings.
- See more at: http://cyber-worldd.blogspot.in/2013/08/download-windows-8-pro-fully-activated.html#sthash.90GBzvJa.dpuf

 

Subscribe to our Newsletter

Contact our Support

Email : ajai199@gmail.com