Thursday, 31 August 2017

C++ 17: A Newer Version of C++ to bring more power and simplicity

There is no programmer in the world who don’t know about C++ programming language. The updated version of C language with object orientation. In this article, I’ll be talking about newer version C++ 17 which will be released in 2017.

C++ was introduced 33 years ago by Bjarne Stroustrup and for that, he deserves our big salute. As long as you keep it simple C++ is a good and reasonably modern object-oriented language that is still close enough to the machine architecture to produce programs that run about as fast as possible.

But every programming language needs to be updated time to time. In the case of C++, New features have to be introduced in such a way that they don’t break existing programs. This has resulted in a less-than-perfect development of the language, where there is often more than one way of achieving the same result.

It has been discussed at the recent standards meeting in Oulu, Finland where the actual and final features list of C++ has been finalised. The new C++ 17 standards are introducing new features like structured bindings and if initialisers, making this vintage programming language “feature complete”.

The C++ community is calling C++17 the start of a new era that will bring powerful technical specifications and overcome the known issues. The non-C++17 features will be released later as add-ons in future releases.

Here’s the list of the most features that will be on C++ 17:

  1. C++17 is based on C11
  2. Dynamic memory allocation for over-aligned data
  3. Guaranteed copy elision
  4. Forward process guarantees (FPG)
  5. Structured bindings
  6. if (init; condition) and switch (init; condition)
  7. constexpr if
  8. Inline variables
  9. A weaker version of fixed order-of-evaluation for expressionsTemplate argument deduction for class templates

http://amzn.to/2wDtr0U
According to the c++ community, this major update aims to make C++ an easier language to work with and brings powerful technical specifications.

Tuesday, 29 August 2017

Move Pre-Installed Internal Apps To SD Card Without Rooting

Move Pre-Installed Internal Apps: You might already know “how to move internal apps on your SD card” to free up space on your Android internal memory so that it speedup your device. There are hundreds of tutorials floating all over the internet. Some of them work and some of them don’t. But this guide is different from the others which you have definitely found once on the Internet.

In this tutorial, we will be talking about how to move your pre-installed or internal applications into the SD card and that too without rooting.


Move Pre-Installed Internal Apps To SD Card Without Rooting



Prerequisites

Now before diving into the tutorial, let us first have a look at the prerequisites.

  1. You should be using Android Marshmallow to move the apps. Now with Android marshmallow, you will be able to move your apps without even rooting your Android device. And if you are not using Android Marshmallow then I will recommend you to update your Android to marshmallow if possible otherwise this tutorial will not work for you.
Note: You can root your Android device to have Android Marshmallow 6.0

If you have Android Marshmallow already then let’s just get straight into the tutorial


How to move Apps to SD Card without Rooting 
  • Go to settings, find “Storage & USB” and tap on it.
  • Move to SD Card under portable store and tap on the three dots which you will find on the top right corner.
  • Select Internal as a format and then backup your data.
  • Tap on “Erase and Format” and then your data will be formatted in few seconds
  • After the formatting process ends, you will see a move now option. Tap on it
  • Select the app you want to move to the sd cards and then tap on change and select sd card
  • Tap on move and your app will move to the SD card
In this way, you can move your apps to the SD card without rooting. Follow the same procedure for different apps so that you can free up space as per your requirements. But still, remember your device should be running Android Marshmallow otherwise the tutorial might not work for you.

If you find the tutorial helpful then like this article and share it with your friends. Facing any problem then let us know in the comment section below. 

Sunday, 27 August 2017

The Hacker Search Engine “Shodan” Is The World’s Scariest Search Engine

https://www.shodan.io/

The world’s scariest search engine- Shodan

“When people don’t see stuff on Google, they think no one can find it. That’s not true.”That’s according to John Matherly, creator of Shodan. While Google crawls through web pages, Shodan is a search engine that searches the web for servers, webcams, printers and other such internet connected devices that make up the Internet of Things (IoT). Shodan runs and collects information on around 500 million of such devices every single month.

 

The Scary side of the ” WWW “

It is surprising what people have found on Shodan – from traffic lights, security cameras, home automation devices and heating systems to control systems for a water park, a gas station and even located command and control systems for nuclear power plants. While its abilities might awe you right now, it also shows how little security is enabled in such devices. A quick search of the term “default password” will direct you to printers, servers and and other devices that use “admin” as their username and “1234” as their password. Imagine finding and accessing your own machine in one such search to realize the seriousness of the problem. 

The question that comes to mind – why are these devices so vulnerable ? Quite a big number of these devices should not even be on the internet. When companies design products, such as a heating system that can be controlled from your laptop, instead of connecting them directly they host the device on a web server – thereby unknowingly allowing everyone with access to the internet an opportunity to access it. Convenience comes first, security is usually an afterthought. The rapid rise of the IoT market has caused companies to increase production of such devices while security has not managed to catch up.

Shodan searches for devices using Real Time Streaming Protocol (RTSP port 554)  while crawling the web and it captures devices that do not have any security in place or have the default usernames and passwords. Fortunately for us though, Shodan only captures a snapshot instead of broadcasting a live feed of data. What that means for you and I, is that we need to begin taking our security seriously – even with devices we usually ignore.

Money usually lies at the root of such security vulnerabilities. Consumers will often choose the cheaper option that serves their purpose rather than the more expensive and secure models. Also, like we’ve mentioned, most users simply fail to change the default passwords. Even such a simple gesture will keep the device out of reach from Shodan.

On the business side, there is no authority that can set rules and regulations for IoT devices. Companies and vendors will often take benefit of this, thereby ignoring the best and safest practices which in turn lead to a lower price tag and higher profits. It is possible in the future that the US Federal Trade Commission (FTC) might come in and define regulations, but until then, we need to start taking our security seriously.

Tuesday, 15 August 2017

Sarahah will not reveal your identity?


This app was created with the intention to receive an honest feedback from people around you, but anonymously. Sarahah means ‘honesty’ in Arabic.

Are you aware of Sarahah? If not, then go on your social media platform and look for the Sarahah. If you go through your timelines, then you will see the various posts from your friends, where they post the good and bad messages on their timelines. So, if you are still wondering from where those posts are coming from, then we will help you to dig deeper into Sarahah.

Sarahah is the free app which is available on the Android and iOS platform with over 5 million downloads in just two months of time. This mobile app is in trend presently, and it is liked by many of the users. Sarahah, means “frankly” or “expressly” in the Arabic language, the basic use of this app is to exchange the messages. Now, you might wonder that there are so many messaging apps, what is so unique about this app, and then this app allows you to exchange the messages without letting your identity revealed.

The concept of exchanging your messages to the anonymous users has become so famous that people think that they can speak their heart out through this app. You cannot trace the identity of the sender as there are no traces available of the sender. 

The app developer says “You can’t respond to messages now. We are studying this option,”

The motive of this app is to let yourself know that how much open you are for the feedback's and how well you can take it in a constructive manner. Also, there is no option available to reply to the message, which makes it difficult to trace the identity of the sender.

Thursday, 10 August 2017

Make money by solving school level PCM problems

With PCM I mean Physics, Chemistry and Mathematics. If you are a college student or a teacher or any other random person who loves to solve school level questions but now want to make money from this passion then In this post I will tell you How you can make money by solving questions of Physics, Chemistry and Mathematics.

Website Link - www.toppr.com

Now you are wondering what does the above image signifies.. Basically this Image is taken from a website named Toppr which is India's No. 1 website for preparation of JEE Mains as well as JEE Advance exam. This website is basically for students but thanks to Toppr community that they are providing opportunity to educators like you and me that they can do some freelancing work there too.
Actually there are only a few such genuine websites which provides freelancing opportunities to online educators and Toppr is one of them.

To be an online educator with them,You had to visit their website. After visiting their website you have to scroll down to the bottom where you will see an option Educators. You have to click on it and you will be redirected to a page as shown in the image above. Then from the Join now button, you can join this program. After that you can apply for the job on which you want to work on.

You can join Toppr basically as a typist or as a subject expert. If you joined Toppr as a subject expert  who will basically solve questions of a particular subject you will get a total of Rs. 15 for every question that you will solve. Note that before becoming eligible for becoming a registered  member when you will signup and register for them, they will send you a assignment or say a file that you have to solve and send back to them within one or two days period whatever specified in the Email you will receive.

Hence this is just like a demo interview you can say or you can say it as a test judging your knowledge as they cannot recruit any random person.

I hope your account got approved and you start earnings too. If you have any doubts for me, post it in the comments section.
I write about all the available ways of online money making.

Monday, 7 August 2017

Ethical Hacking Tools for Hackers

Most important tools:

 

1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online ‐ Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E‐mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E‐mailer
29) Simple Anonymous E‐mailer
30) Anonymous E‐mailer with Attachment Support
31) Mass E‐mailer
32) E‐mail Bomber
33) E‐mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE‐joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) extreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creator
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E‐mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto‐Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time
Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/
Control
95) Hash MD5 Checker
96) Port Connect ‐ Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and
Spyware)





101) Easy and Fast Screenshot Maker (also Web Hex Color
Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in
pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console.
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File
Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E‐mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net
Statistics, Interactive, Raw Packets, DNS, Whois, ARP,
Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols
supported)
141) Local E‐mail Extractor
142) Recursive E‐mail Extractor
143) Outlook Express E‐mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse
Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP
Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) Extra Tools (nmap console & win32 version) .

Saturday, 5 August 2017

Interesting C Programming Tricks You didn’t know before

In this article, I am going to share some rare tricks of C programming language. To be honest, I collected those tricks from various websites. Some of the tricks are really interesting because I never heard about them before and I’m sure you too. Next time when your professor starts boasting about his/her knowledge of C programming, simply ask about these tricks, If you get the right answer with explanation, he/she is the best teacher you’ll ever find.

 Interesting C Programming Tricks

1. Using the return value of “scanf()” to check for end of file: 
    
  while(~scanf(“%d”,&n)) {
/* Your solution */
 Very useful at online judges where inputs are terminated by EOF.

 2. “%m” when used within printf() prints “Success”:

    printf(“%m”);
%m only prints “Success” when “errno == 0”, it’s short for a string representation of the last observed error state. For example if a function fails before the printf then it will print something rather different. *


3. Implicit initialization of integer variables with 0 and 1.

    main(i){
    printf(“g = %d, i = %d \n”,g,i);
    } 


4. brk(0); can be used as an alternative for return 0;:

5. Print Numbers 1 to 200 wihout using any loop, goto, recursion .

#include<stdio.h>
#define STEP1 step();
#define STEP2 STEP1 STEP1
#define STEP4 STEP2 STEP2
#define STEP8 STEP4 STEP4
#define STEP16 STEP8 STEP8
#define STEP32 STEP16 STEP16
#define STEP64 STEP32 STEP32
#define STEP128 STEP64 STEP64
#define STEP256 STEP128 STEP128 

int n = 0;

int step()
{
if (++n <= 200)
printf(“%d\n”, n);
}


int main()
{
STEP256;
return 1;
}

7. C++ Sucks?

    #include <stdio.h>
    double m[]= {7709179928849219.0, 771};
    int main()
    {
    m[1]–?m[0]*=2,main():printf((char*)m);
    }
 
You will be amazed to see the output: C++Sucks 


8. Do you know “GOES TO-->” operator in C?
 
Actually –> is not an operator. In fact, it’s a combination of two separate operators i.e. — and >. To understand how “goes to” operator works, go through the below code snippet.

In the example, there is conditional’s code which decrements variable x, while returning x’s original (not decremented) value, and then compares the original value with 0 using the > operator. 

int _tmain(){
int x = 10;
while( x –> 0 ) // x goes to 0
{
printf(“%d “, x);
}
printf(“\n”);

  Output:9 8 7 6 5 4 3 2 1 0
Press any key to continue . . .

9. Scanf Magic 

    scanf(“%[^,]”, a); // This doesn’t scrap the comma

    scanf(“%[^,],”,a); // This one scraps the comma

    scanf(“%[^\n]\n”, a); // It will read until you meet ‘\n’, then trashes the ‘\n’

    scanf(“%*s %s”, last_name); // last_name is a variable 

10. Add numbers without ‘+’ operator

int Add(int x, int y)
{
if (y == 0)
return x;
else
return Add( x ^ y, (x & y) << 1);
}

Thursday, 3 August 2017

How To Hack DNS Server To Get Faster Internet speed?

The internet has become a part of our life. Internet plays the most important role in social development and technological progress.  But, the main problem begins when the internet speed becomes extremely slow and sluggish.

Well, there’re many ways to get faster internet on a PC. I am going to tell you simple DNS hacks that can boost your internet speed. Most of us are always blaming our Internet service provider (ISP) for slow internet connection. So, let me explain first about the DNS before the method to get faster internet speed.

How To Hack DNS Server To Get Faster Internet speed? 

 

What is DNS? 

 

DNS – Domain Name Server like a phone book for internet. If you know a person’s name but you don’t know about his phone number. You must see his number in the phone book. DNS provides the same service to the internet.
When you enter www.rrulebreaker.blogspot.com or (http://abc.xyz) in your browser address bar, then your PC or Computer uses DNS to retrieve the website’s IP address (like 172.16.28.20). You can also surf websites without DNS, visiting websites by IP address directly, like – http://172.16.28.20.


What is OpenDNS?

 

OpenDNS is a Domain Name System service that offers free and premium DNS for an individual or any organization to improve your security as well. OpenDNS offers better page loading and also avoid harmful, malicious web pages. OpenDNS also offers incredible features that include domain blocking, typo correction, secure DNS, provide botnet protection and more.


How to Boost Up Internet Speed Using DNS Hack?

To get faster internet speeds and better security, you have to use free “OpenDNS” service. Alternatively, you can use also use Google DNS services for boosting up your internet speed. Whereas OpenDNS is most recommended and completely free. Just follow the simple steps below. So you can use OpenDNS as an alternative DNS server instead of your default DNS. 

OpenDNS

Step 1: To get high speed internet using OpenDNS, you have to open the Control Panel First.

Step 2: Go to Control Panel>> “Network and Internet options.” 

 Step 3: Now, click on the “Network and Sharing Center.”








Step 4: Now, just click on “Internet connection” and then click on “properties.” 
 Step 5: Click on the Internet Protocol version 4 (TCP/Ipv4) and click on properties.
 Step 6: Now choose the following DNS server addresses to get faster internet speed.

Preferred DNS server: 208.67.222.222

Alternate DNS server: 208.67.220.220

 Step 7: Now, you’re using OpenDNS server that helps to get better Internet speed.
 

To Configure IPv6:
As you have configured IPv4 above, just highlighting the “Internet Protocol Version 6 (TCP/Ipv6)” and click on the properties and choose the preferred DNS server address.


  •     Preferred DNS server:2620:0:ccc::2
  •     Alternate DNS server:2620:0:ccd::2
 
 

 Google DNS        

If you’re not happy with OpenDNS you can alternatively use Google DNS to get faster speed.

For IPv4: 8.8.8.8 and 8.8.4.4.

For IPv6: 2001:4860:4860::8888 and/or 2001:4860:4860::8844
There’re so many advantages using OpenDNS and Google DNS other getting a faster internet speed. If your DNS server of internet service provider (ISP) goes down, then you’ll unable to make use of the internet. But, if you are using Google DNS or OpenDNS method, then you can peacefully browse the internet when your default DNS is goes down.

Both Google DNS and OpenDNS work well but, people prefer Google DNS over OpenDNS. You can choose anyone to boost up internet connection. You need to just follow the simple steps explained above.

Wednesday, 2 August 2017

Top 10 Best Operating System Used By Hackers In 2017

Wondering which is the best operating system for ethical hacking and pen testing purposes? For Solving this problem, We prepared a list of the most efficient Linux OS that is used for hacking purposes that you need to check out in 2017.

Hacking is something that nowadays most people want to do. Hacking has become one of the most searched topics on the Internet. People are curious about this subject; they have many questions like how it is done, how we can do this, what are things needed, where we can learn this etc.

So Today’s article is all about a comprehensive list of most popular operating systems that Hackers are using to achieve their goal. From the popular Kali Linux to Pentoo we have most the OS in our List. Do tell us if we have missed any in the comment section.


Top 10 Best Operating System Used By Hackers In 2017 

1. Kali Linux

Kali is one of the most famous and advanced operating systems that is used by hackers. Kali Comes from the creators of BackTrack that is Offensive Security Team. It is a Debian-Derived Linux distribution that is used for Forensics and penetration testing. It is available for many different platforms like VMware, Arm, etc.

2. Node Zero


Node Zero is considered as one of the handiest OS that can be used for Penetration testing. It is based on Ubuntu Distribution of Linux. Nodezero is famous for its inclusion of THC IPV6 Attack Toolkit which includes tools like alive6, detect-new-ip6, dnsdict6, dos-new-ip6, fake-advertise6, fake-mipv6, fake_mld6, fake_router6, implementation6, implementation6d, parasite6, recon6, redir6, rsmurf6, sendpees6, smurf6, toobig6, and trace6.

3. Parrot Security OS


This operating system is based on Debian GNU/Linux mixed with Frozen box OS and Kali Linux and with this combination it provides the best penetration and security testing experience. It has lots of features like Custom Anti-Forensic tools custom interfaces for GPG, custom interfaces for crypt setup.

4. Network Security ToolKit 

This operating system is based on Fedora, and it runs on both 32 as well as on 64-bit platform. It comes in the form of Live Cd and with this feature you don’t need to install the os you can directly boot it on your computer. The main reason of developing NST was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools.

5. Arch Linux

Arch Linux is a Linux Distribution, and it runs on both 32 as well as on 64-bit platform. The best thing about this is Os is it follows KISS principle(Keep it Simple and Short). Arch Linux uses its Pacman package manager, which couples simple binary packages with an easy-to-use package build system.

6. Back Box



Back Box is a Linux Distribution based on Ubuntu. You can easily run Black box on a low specs device. It has been developed to perform penetration tests and security assessments.The new version has cool features which include Forensic Analysis, Documentation & Reporting, and Reverse Engineering.

7. Samurai Web Testing Framework

Samurai Web Testing Framework is a live Linux environment that has been pre-configured to function as a web pen-testing environment. There are many essential tools included in samurai like WebScarab, rat proxy, w3af, Burp Suite, and BeEF.

8. Knoppix STD

If you are one of those who is completely new to Linux then this is the best way to clear your basics. It is a collection of hundreds if not thousands of open source security tools. The best thing about Knoppix is that it is meant to be used by both novice and professional security personnel.

9. GnackTrack

GnackTrack is basically a combination of penetration testing tools and the Linux Gnome desktop. Gnacktrack is both Live and installable, and it is based on Ubuntu. Just like backtrack, Gnacktrack comes with multiple tools that are helpful to do an effective penetration testing.

10. Pentoo

Pentoo is based on Gentoo Linux and is a pen testing distro that uses Enlightenment E17 as its desktop environment. It is a Live CD and Live USB designed for penetration testing and security assessment. It works on both 32 and 64 bit.

So this best 10 Operating System used by hackers even on 2017, hackers are always in a way to find things without being any complicated and get compromised so these OS helps them to work accordingly to their work. They have different OS for their different work, you can download these OS from its open source.

Tuesday, 1 August 2017

How to Recover Passwords for Windows PCs Using Ophcrack


There are loat's of reasons for somebody to want to recover a Windows password, and there are lots  of different ways of doing it. My favorite of all  of these ways is to use a piece of software called Ophcrack because:
  • The free tables are suitable for almost all uses (I've never been unable to recover a password with them),
  • There's a success rate of around 99%,
  • You can install it on a CD, USB flash drive, or directly onto the operating system,
  • If it's installed on removable media, then there is no need to boot Windows, and
  • It works on Windows XP, Vista and 7.
I'm going to say now that Ophcrack isn't perfect. Occasionally a password won't be cracked, there will be problems running it (but are easy to fix; I will explain the main one later in this guide), and it won't crack roaming passwords from a client.
 
 
Installing Ophcrack:

Step 1: Download
 
Go to Ophcrack's website and click on the "Download Ophcrack LiveCD" link, then select the link for "Ophcrack XP LiveCD" if you're using Windows XP and download it.     
 
Step 2: Installing to CD or DVD 
 
If you want to install Ophcrack to a USB flash drive instead of a CD, then skip this step.
To install Ophcrack on a CD/DVD, you need to mount the .ISO image you downloaded in the previous step onto the disk. On some versions of Windows, when you double-click the downloaded file, the Windows Disk Image Burner will open. Just select the drive you want to burn to and click "Burn". 
 
 
If your operating system doesn't have a built-in .ISO burner, there are plenty available as freeware on the Internet. Just Google it and look at the reviews to choose the best one.
 

Step 3: Installing to USB Flash Drive or Hard Drive
 
There are several ways of doing this, but I'm just going to cover the simplest(in my opinion).
 
The first step is to download the Universal USB Installer from Pen Drive Linux. After it's downloaded, run it and agree to the license agreement. Because Ophcrack has been update more recently than the installer, you will need to select "Try Unlisted Linux ISO (New Syslinux)" in the first box.
Next, browse to your file, select your USB drive letter and click "Create". The wizard should do the rest for you, with the occasional "OK". 

 
Step 4: Using Ophcrack
 
To use Ophcrack, you should boot from your CD or USB drive from the BIOS menu. If all goes well, then Ophcrack should open after a short period of time, and you just click "Crack" to crack the password. However, there can be some problems, the most common being a "Tables not found" or "No tables found" error. To solve this, you open the Linux terminal in the applications menu and type the following (each line is a new line and spaces must be included as they are here): 

su root
root
mkdir /mnt/usbkey
ls /mnt
mount /dev/sdb /mnt/usbkey
ls /mnt/usbkey
./launch.sh
 
Hopefully now, Ophcrack should start as intended. Any other problems can normally be solved by Google or you can ask in the comments and I'll do my best to help.
 
Warnings
  • This software should not be used for malicious purposes.
  • There may be laws regarding the use of this software in your area.