Registry Search Results

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 7 (Windows Sysinternals)

Welcome back, my aspiring hackers! In many of my earlier tutorials, I mentioned the complementary nature of hacking and forensics. Both disciplines, hacking and forensics, benefit from a knowledge of the other. In many cases, both disciplines will use the same tool. In this tutorial, we will use another tool that can be used in either discipline—Sysinternals—a suite of tools developed by Mark Russinovich.

How To: Search Amazon to find wish lists and wedding registries

Someone you know have a birthday or wedding coming up? Search Amazon to see if they've set up a wish list (wishlist) or registry! It's easy. And this brief video tutorial from the folks at Butterscotch will teach you everything you need to know. For more information, including detailed, step-by-step instructions, and to get started finding wish lists on Amazon yourself, take a look.

How To: Increase the maximum connections limit in Internet Explorer 8

Want to increase the maximum number of possible connections in version 8 of Microsoft's IE web browser? With this little registry hack, it's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just over two minutes. For more information, including step-by-step instructions, take a look.

How To: Remove malware from your Windows PC with HijackThis

Want to know how to make HijackThis, the popular malware scanning program, display only malicious registry entries? Learn how to use the Ignore List to acheive just that with this free home computing how-to from the folks at CNET TV, which offers complete instructions on how to tweak HijackThis to make removing viruses and spyware a breeze. For more information, and to get started protecting your own Windows PC from malicious software, watch this handy how-to.

How To: Change The Windows 7 Start Orb

In this video, we learn how to change The Windows 7 Start Orb. First, you will need to download Universal Theme Patcher to your computer, which you can find at: Freeware Geeks. Once you download this, install it to your computer and make sure you choose the right type to download. Also, download the registry files from MediaFire, click the "take ownership" option when you right click on this, then double click on it. When the window comes up, click to add the ownership option. Now, go to the ...

How To: Boot up your computer faster with boot defragment

This video tutorial is in the Computers & Programming category which will show you how to boot up your computer faster with boot defragment. Boot defragment places all the boot files together in the hard disk making it easier for the booting process to start. Click on start > run, type in 'regedit' and click OK. This will launch the registry editor. Here you double click on hkey_local_machine to open it. Then you double click on software > Microsoft > dfrg >BbootOptimizeFunction Click on 'ena...

How To: Bypass Windows Genuine Advantage notification

Steps adopted to bypass Windows Genuine Advantage Notification in Windows NT are:1. Open my computer2. Open the Local Disk (Where the Operating system is currently installed).3. Open windows folder and enter into the folder, system 32.(Shortcut: My Computer>Local Disk C>System 32)4. After entering system 32 (Folder), find and delete the file-wgatray.exe5. After deleting wgatray.exe file, go to the start menu and launch the run application6. In run, type in regedit and click OK,7. In regedit, ...

How To: Get the Classic Volume Controls Back in Windows 10

Windows 10 definitely has a sleek and modern look to it, but some of these visual changes have been made at the expense of functionality. For instance, the slider that appears when you click the volume icon in your notification tray now sports a completely minimalist look that lacks the quick link to the full volume mixer from past Windows versions.

How To: Speed up Windows Vista & free up ram

Start by clicking start and type regedit in the search box. Hit enter and when the screen opens go under hkey current user and click on control panel and then desktop. Under desktop go to menushowdelay. Under menushowdelay right click and then click modify. In the box that pops up set the value to zero and click ok. Then close the registry editor. Next you will want to download ram booster 2. 0. Once you have downloaded and installed the ram booster program you will want to edit your options....

How To: Delete entries from the Internet Explorer address bar

Ever wondered how to go about deleting individual entries from the Internet Explorer address bar? While it's possible, it's not particularly easy. You can do it all at once by purging your entire history through Internet Options or you can hack your Windows registry. For more information, or to try this hack for yourself, take a look!

How To: Enable the Hidden Dark Mode in Windows 10

Ah, the fabled dark mode. In the past, many users were delighted to find the existence of something called Royale Noir, a dark theme option that was available for Windows XP. Yet for reasons unknown, Microsoft had kept knowledge of Royale Noir a secret until some bright minds discovered its existence, and the rest is history.

How To: Tweak Aero Peek and Desktop Live Preview on Windows 7

In this video, we learn how to tweak Aero Peek and Desktop Live Preview on Windows 7. First, go to registry editor, then current user, then software, then Microsoft, and go down to Windows. After this, click on current version, explorer, and advanced. Now, right click on the white space and click "new keyword value" and name it "desktoplivepreviewhovertime". After this, double lick and change it to decimal, then change the value data to 10. Next, create another keyword value and name it "Exte...

How To: Protect a Windows PC from spyware & malicious software

In this tutorial, we learn how to protect a Windows PC from spyware & malicious software with Dave. You can get spyware from downloading random things, so a great way to make sure you don't download these things, is to use Firefox and search your items before you download them. If you do happen to get these, use SpyBot to find and destroy the viruses you have downloaded. It's free to download, you just have to search it on Google, then download and install it. This will help save your compute...

News: What to Expect from Null Byte in 2015

Welcome back, my greenhorn hackers, and happy New Year! Now that your heads have recovered from your New Year's Eve regaling, I'd like to grab your attention for just a moment to preview 2015 here at Null Byte. I hope you will add your comments as to what you would like to see, and I'll try to honor as many requests as I can.

Hack Like a Pro: Digital Forensics Using Kali, Part 1 (The Tools of a Forensic Investigator)

Welcome back, my greenhorn hackers! Lately, much of the discussion here on Null Byte has revolved around evading detection and not getting caught hacking. Several of you have written me asking for a series on evading detection and forensics, and while I began a series 5 months ago on just that, we have changed hacking platforms from BackTrack to Kali, which has a much more highly developed forensic toolset.

How To: Hack Windows XP into Giving You 5 More Years of Free Support

Windows XP will always have a special place in my heart—it's the operating system I grew up on. It guided me through the glory days of AIM, Napster, and MySpace, but now it's dead. The OS that had been supported by Microsoft for twelve years officially lost its support on April 8th, 2014. Just like that, Microsoft has killed the beast, but for those of you who stubbornly refuse to cooperate, you can resurrect the dead. If you have Windows XP, this little known hack will get you further suppor...

News: Why YOU Should Study Digital Forensics

As many of you know, I have been running a couple of series here on Null Byte about digital forensics called Digital Forensics for the Aspiring Hacker and Digital Forensics Using Kali. Although many readers have seemed to enjoy these series, just as many seem to be pondering, "Why should I study digital forensics?"

Botnets and RATs : Precautionary Measures and Detection (Part 2)

Hola my fellow hackers! I promised you the tutorials on setting up RAT's and Botnets, but before jumping into those, i want you to know about the precautionary measures and detection of RATs which might be on the system without your prior knowledge. Of course the Anti-virus do most of the job but there are some RATs which slips past the Anti-viruses (This is where Hacker's skill come into play).

How To: Reverse Shell Using Python

Hi Folks. This is my first post. I will teach how to create a server and client python reverse shell using sockets and python language. The script i'll post here is going to be very simple, and from here you'll have the possibility to adapt to your own purpose. For example, my original script can download files, upload files, make changes to registry, create user accounts and more. I'm sure you could do it on your own too.