Category: Click me


To pop a banner which can contain any message you want to display just before a user is going to log on, go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon

Now create a new string Value in the right pane named LegalNoticeCaption and enter the value that you want to see in the Menu Bar.

Now create yet another new string value and name it:
LegalNoticeText

Modify it and insert the message you want to display each time Windows boots. This can be effectively used to display the company’s private policy each time the user logs on to his NT box.

It’s .reg file would be:

REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon] “LegalNoticeCaption”=”Caption here.”

Advertisements


Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.

There are two types of keystroke loggers:

1. Software based and
2. Hardware based.

Spy ware: Spector (www.spector.com)
Spector is a spy ware and it will record everything anyone does on the internet.
Spector automatically takes hundreds of snapshots every hour, very much like a surveillance camera. With spector, you will be able to see exactly what your surveillance targets have been doing online and offline.
Spector works by taking a snapshot of whatever is on your computer screen and saves it away in a hidden location on your computer’s hard drive.

Hacking Tool: eBlaster (www.spector.com)
eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.
eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.
Within seconds of them sending or receiving an email, you will receive your own copy of that email.

Hacking Tool: (Hardware Keylogger) (www.keyghost.com)

eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.
eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.
Within seconds of them sending or receiving an email, you will receive your own copy of that email.

Hacking Tool: (Hardware Keylogger)
The Hardware Key Logger is a tiny hardware device that can be attached in between a keyboard and a computer.
It keeps a record of all key strokes typed on the keyboard. The recording process is totally transparent to the end user.


With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.

1.Block USB Viruses

Invest in an excellent anti-virus program that has built in USB virus scan and remover. These anti-USB virus scan programs not only protect your computer from USB Autorun viruses but can also clean worms, Trojans and viruses in your USB memory sticks.You can try anti-virus programs for USB virus such as USB Virus Scan, USB Drive Antivirus and so on.

2.Disable Your Computer’s Autorun Feature

When you plug in a USB drive stick into your system, the Autorun feature initiates automatically. If your USB contains any virus programs, it’ll use the Autorun feature to infect your computer. To protect your computer, disable the Autorun feature.You can disable the Autorun feature via the Control Panel.
Alternatively, you can use antivirus software to disable and enable the Autorun feature whenever you want. Additionally, these USB blocking softwares allowsystem administrators to specify which removable storage drives users can access.

3.Update Your Device Driver

Keeping your USB device driver updated is a good way to ensure greater stability for your USB drives. While this won’t help eradicate USB viruses, USB device drivers are constantly updated to block viruses and deliver timely warnings. You can update your USB device drive from your Windows Computer Management feature in the Control Panel.

4.Use USB Firewall Software

USB firewalls prevent Windows OS from processing malicious programs when a virus infected portable USB device is opened. USB firewalls monitor only your USB devices, and not your CD and DVD drives. By using USB firewalls, you’ll be enabling a basic level of protection from the autorun.inf viruses that spread from portable USB devices.

5.Always Safely Remove USB Devices

Viruses are sometimes created via damaged documents. If you are transferring a set of files to your USB drive, make sure the transfer is complete before you eject the device. Always use the Safely Remove Hardware feature of Windows OS. This is because partially transferred or damaged files can in turn corrupt other files on your USB drive.

This article will show you some of the top ways the best hackers use to keep themselves hidden and out of jail and survive as a hacker,First of all i want to make one thing clear to all that this is not a site which exite hackers but this is developed to help innocent people not getting trapped by hackers,Most of hackers do not take care of the following things and get caught and result in troubling their selves and also their families so below are 15 tips to survive as a hacker,Educational purposes only,written for begineers

How to survive as a hacker – Tips

Never Disclose your Identity:
Never tell any body that you are a hacker even your friends or your relatives,you must keep it a secret

Use Proxy:
Never hack without a proxy

Be Careful:
Never let FBI enter your house without a search warrant.

Never Hack from your home:
Never hack from your home always use net cafe for these purposes

Always:
Wave to cops

Use Fake information:
Never use your real name in any sort of conversation or in any signup

Never keep weak passwords:
Do not keep a password which is already present in the dictionary or a password which is very common
etc your pet name,Your country name etc

Password tip:
Dont use same password twice for maximum security

Of course:
Never hack from the same computer twice if possible

Hide your Ip:
Hide your Ip address to avoid your chances of being traced,i have made a post on Hide your IP address

Use Firewall:
Always use a Good firewall such as zonealram

Change your Ip:
Change your Ip address daily if possible,I have wrote an article on How to change your Ip address

Use fake information while signing up:
Dont enter your personal information eg your address,your number etc while
Using social networking sites like orkut,Facebook etc

Most importantly:
Always have a panic button that mass deletes your questionable content

OF course:
Never let the FBI in period.

Yet again:
Always use a Proxy when doing anything remotely illegal

You must say to yourself that you do not follow one of these rules your chances of getting caught are high,This is why the most hackers are caught they forget to hide their identity,hope you liked the post.If you think that this article is worth kindly pass the comments

Telnet is a service gives the users to access a host and perform as if they were working, If you call yourself a Hacker you must be able to do telnet.It can be done in many ways, be careful not to try from your home because a tons of hackers have been busted for doing this.
Hack a remote computer with telnet Method 1:

Before looking at this method to Hack with telnet you must know that what are ports?There are two kinds of ports-Physical(HardWare) and Virtual(Software)You may be thinking of ports to be the slots behind your CPU to whichy ou connect your Mouse or Keyboard or your monitor. These sockets are called physical ports .We are here interested in only virtual ports.It is nothing physical but it is kind of a virtual pipe through which information can go in and out of the computer.

A particular computer can have a large number of ports. All ports are numbered .Now at each port a particular service is running. A software which runs on a port is called service . For interchanging different kinds of information different ports are used. A typical list shows the various ports.
Ping : 7
Systat : 11
Time : 13
NetStat : 15
SSH : 22
Telnet : 23
SMTP : 25
Whois : 43
Finger : 79
HTTP : 80
POP : 110
Method 2

You can connect to a remote computer at a particular port. When you are connected to that port then you can interchange information related to that particular port only. Ports can be open or closed. If a particular port of a computer is closed then you can not connect to that computer
on that port. Generally most of the computers have atleast 5 or 6 ports open

First goto run and type telnet:
Once the Telnet windows pops up click on Connect->RemoteSystem then in the host name type the host i.e. the IP address of the remote computer or the website you want to connect to . Then in the Port select the port you want to connect to . You can only connect to ports which are open on the host computer.Almost always leave the TermType to vt100.We use vt100 as it is compatible with most monitors .

Then click connect and you will be connected to the remote machine in some time. The syntax of the telnet command from DOS prompt is C:\>telnet.
By default port is taken as 23. Scroll down and read more about ports

The first thing you have to do if you want to hack with Telnet, is find your local Telnet phone number.This can be done many ways. One way that always works, is to call up your local computer store, tel them that you recently purchased The Source or something like that, but that you lost the sheet that has the phone no. written on it.They’ll tell it to you. (People who work in computer stores usualy aren’t very smart
about that sort of thing.)

Call the number with your computer. Once the connection is established,
press twice. the computer will display “TERMINAL=” Type again. The computer will then display an at sign: “” Type in the access code here.:below are some access codes listed

(But please don’t misuse it)
————————————————————————
Telemail
——–
To use the Telemail feature of Telenet, type mail at the “” prompt.
User id’s are usually the first initial of the user’s first name, plus
the last name.
eg- William gates= Wgates
————————————————————————-
C 20120 – VM 370 ONLINE
C 20124N- NEW YORK TIME INFORMATION SERVICE
C 20125 – NJIT ELECTRONIC INFORMATION
C 20130
C 20133
C 20138
C 20148
C 20154
C 20165
C 20166
C 20167 – WARNER COMPUTER SYSTEMS
C 20168 – WARNER COMPUTER SYSTEMS
C 20171
C 20182 – BANKERS TRUST CUSTOMER SERVICE
C 20184
C 20222
C 20225 – COMSHARE “COMMANDER II”
C 20246
C 20247 – GSD TIMESHARING
C 20270 – GSD TIMESHARING
C 202124- GENERAL MOTORS WARREN
C 202133
C 202138- (TYPE .HELP *)
C 202139- (TYPE .HELP *)
C 202140- (TYPE .HELP *)
C 202143
C 202144- (TYPE .HELP *)
C 202148
C 202149
C 202175 – HONEYWELL
C 202222 – GM PARTS
C 202229 – PRIMENET
C 20321 – WYLBUR
C 21221 – PRIMENET
C 21224 – PRIMENET
C 21225 – INTERACTIVE MARKET SYSTEMS
C 21226 – INTERACTIVE MARKET SYSTEMS
C 21228 – BURROUGHS NYC DATA CENTER
C 21229 – LANDART SYSTEMS
C 21231 – E.F.HUTTON
C 21233 – UNIVAC 1100
C 21247
C 21248
C 21252
C 21253 – VM/370 ONLINE
C 21256 – CITIBANK CASH MANAGER
C 21264 – CITICASH MANAGER INTERNATIONAL
C 21265 – CITICASH MANAGER INTERNATIONAL
C 21269
C 21281 – BANKERS TRUST CUSTOMER SERVICE
C 21284 – DATAMOR TIME SHARING
C 21288 – S-K WDC SYSTEM 1/ONLINE
C 212136 – (TYPE NEW/TSC)
C 212141
C 212142
C 212151 – CITICASH MANAGER INTERNATIONAL
C 212152
C 21255 – PRIMENET
C 21256 – PRIMENET
C 212160 – TELSTAT SIGMA 6
C 212167 – RSTS V.7.0-07
C 212168 – RSTS V.7.0-07
C 212171
C 212172
C 21284 – DATAMOR TIME SHARING
C 21325 – PRIMENET
C 21335 – MARKETRON RESEARCH AND SALES
C 21336 – MARKETRON RESEARCH AND SALES
C 21341
C 21360
C 21365
C 21366
C 213170 – DIALOG
C 21370 – XCC-WEST SYSTEM X2
C 21371 – XCC-WEST SYSTEM X3
C 21372 – XCC-WEST SYSTEM X3
C 21373 – XCC-WEST SYSTEM X1
C 21375 – XCC-WEST SYSTEM X2
C 21379 – INTERACTIVE SYSTEM/ONE
C 21384
C 21385
C 21386 – IAS PROGRAM DEVELOPMENT SYSTEM
C 21388
C 213105
C 21520 – TPF&C ONLINE
C 21534 – PRIMENET
C 21538
C 21722
C 21725
C 21726 – U OF I COMPUTING SERVICES
C 30121 – NASA RECON
C 30124 – SOURCE SYSTEM 10
C 30126 – DISTRIBUTIVE NETWORK
C 30128 – SOURCE SYSTEM 13
C 30134 – INTERACTIVE(GAITHERSBURG)
C 30135
C 30136
C 30138 – SOURCE SYSTEM 11
C 30147 – SOURCE SYSTEM 12
C 30148 – SOURCE SYSTEM 15
C 30149 – SOURCE SYSTEM 14
C 30320 – COMPUTER SHARING SERVICES
C 30330 – COMPUTER SHARING SERVICES
C 30335
C 30337 – PRIMENET
C 30339 – PRIMENET
C 30340 – PRIMENET
C 303125
C 30520
C 30522
C 30531
C 30532 – C.S.I. TIMESHARING SERVICE
C 30523 – C.S.I. TIMESHARING SERVICE
C 31231 – C.I.C. TIMESHARING
C 31232
C 31235
C 31236
C 31240
C 31247
C 31248
C 31249
C 31250
C 31254
C 31279
C 31289
C 312124
C 312127
C 31325
C 31327
C 31340 – ADP NETWORK
C 31341 – ADP NETWORK
C 31345 – PRIMENET
C 31359 – GENERAL MOTORS WARREN
C 31360 – GENERAL MOTORS WARREN
C 31361 – GM PARTS
C 31363 – VM/370 ONLINE
C 31370 – GM DECSYSTEM-20 TIMESHARING
C 31422
C 31423
C 31424 – MCAUTO VM/370 ONLINE
C 31425 – MCAUTO VM/370 ONLINE
C 31426
C 31432
C 31435 – PRIMENET
C 31444
C 31726 – RSTS V06C-04
C 40420
C 40434
C 40822
C 41520 – DIALOG
C 41527 – STANFORD IBM-3033A
C 41548 – DIALOG
C 41556
C 41560
C 41561
C 41562
C 41567
C 41580 – HARPER GROUP INFORMATION NETWORK
C 41587 – BUSSIPLEXER
C 51632
C 51633
C 51634
C 51638
C 51646
C 51647 – VM/370 ONLINE
C 51729
C 60320 – DARTMOUTH COLLEGE COMPUTING
C 60322
C 60324
C 60328
C 60331
C 60720
C 60942
C 60945
C 61114
C 61115
C 61118
C 61120
C 61221
C 61724
C 61735 – (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK CONTROL
C 61748 – PRIMENET
C 61750 – PRIMENET
C 61760 – (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK CONTROL
C 61766 – PRIMENET
C 61767 – PRIMENET
C 61770 – NDC-SYSTEM#
C 61774
C 61776 – NDC-SYSTEM#
C 61777 – NDC-SYSTEM#
C 61778 – PRIMENET
C 617120
C 617121
C 617124
C 617125
C 617127
C 617133
C 617135 – VM/370 ONLINE
C 61737 – VM/370 ONLINE
C 617138 – MASSACHUSETTS INSTITUE OF
C 617139 – MASSACHUSETTS INSTITUE OF
C 617140 – VM/370 ONLINE
C 617151
C 617152
C 617159
C 61763
C 61769 – (TYPE D FOR SYSTEM) APPLIED LOGIC NETWORK
C 61770 – BPL-INFORONICS
C 617171 – INTERACT LINE
C 617177 – ERT ENVIRONET
C 617178
C 617179 – ERT ENVIRONET
C 61780 – (TYPE HELP)
C 71424 – GLOBAL DATA TIMESHARING
C 71431 – (TYPE HELP)
C 71620 – UNION CARBIDE
C 80331
C 80423 – CONTROL DATA INTERCOM
C 80424 – CONTROL DATA INTERCOM
C 80426 – BABCOCK AND WILCOX
C 81623
C 81625 – UNINET
C 81626 – UNINET
C 90995D – TELENET NEWS SERVICE
C 91930
C 91931
C 91933 C 91934

Hope you liked the post,Pass the comments


Due to a rapid increase in the number of porn websites across the Internet, finding porn is as simple as Googling the word ‘sex’. Exposure to pornography can have a serious impact on children since it has the ability to easily distort the tender minds. If you are a parent, then you are most likely reading this because you are in search of a Porn Blocker to block Internet Porn. In fact, it is the responsibility of every parent to take every necessary step to prevent your child from being exposed to porn. In this post, I will introduce you to an excellent porn blocker/porn filtering software using which you can block Internet porn and keep your computer Porn-Free. Here is the best Porn Blocker tool that I have ever used

My Porn Blocker – No1. Porn Filtering Software

My Porn Blocker main features

1. Block Porn Before it Appears – My Porn Blocker silently works in the background and stops harmful sites before they appear.

2. Integrates with all Search Engines – My Porn Blocker blocks links to porn sites from even appearing on search engines.

3. Works in Complete Stealth Mode – My Porn Blocker runs silently by hiding itself from the taskbar, process list, start menu and add/remove programs.

4. Blocks all Chat Softwares – Using My Porn Blocker it is possible to restrict your child from getting exposed to porn world via chatting.

5. Block/Limit Access to Social Networking sites – My Porn Blocker offers a feature by which you can block or limit access to inappropriate services like MySpace and Facebook.

6. Automatic Screenshot Capture – My Porn Blocker has the ability to take high quality screenshots which shows what your children do on the PC when you are away.

7. URL Logging- My Porn Blocker keeps neat and simple logs of every URL visited.

This is only a small list of it’s features. Visit My Porn Blocker Official Website for more information on this product.

Why My Porn Blocker is the Best?

The patented design of My Porn Blocker has a prominent advantage over the usual way most similar porn blocker software applications function. Most Porn Blockers fail to provide a complete solution to the problem caused by pornographic content. Hundreds to thousands of new porn websites are added to the Internet every minute and hence most porn blockers fail to filter the porn effectively. However, after testing a number of porn filter programs, I found out this excellent porn filter software called My Porn Blocker. It proves an easy but still a very effective tool to combat porn and keep your child away from pornographic content on the Web. It also contains many additional handy features which no other program on the Internet will offer. So we recommend this as the best porn filtering software on the Internet.

The Verdict – If you are really serious to keep your PC out of porn and are in search of the best porn filtering software, then My Porn Blocker is the tool you should go for. So go grab My Porn Blocker now…


Here are the step-by-step instructions to do this.

For Gmail

1. Login to your account

2. At the top-right corner, click on Settings

3. Under Settings, click on Filters

4. You’ll now see an option “Create a new filter“, click on it

5. Now in the From field enter the email address from which you do not want to receive the emails

For ex. you may enter john@gmail .com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.

6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.

For Yahoo

1. Login to your account

2. At the top-right corner, click on Options

3. A drop down menu appears, now click on More options

4. In the left panel select the option Filters and click on create or edit filters

5. Now click on Add

6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.

Fox ex. john@gmail.com or if you want to block an entire domain then just enter @xyz.com. Dont enter *@xyz.com. Select the option Move the message to: Trash and click on Save Changes.

For Hotmail

1. Login to your account

2. At the top-right corner, click on Options

3. A drop down menu appears, now click on More options

4. Click on Safe and blocked senders link under Junk e-mail

5. Now click on Blocked senders

6. Type in the email address that you want to block under blocked e-mail address or domain field.

For ex. Enter john@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain.

That’s it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy. I hope this post helps. pass your comments!


Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of BCC then this is the post that you should definitely read!

What is BCC?

BCC stands Blind Carbon Copy. It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those addresses in the To: filed. When emails are sent in this way, each receiver is able to see the complete list of recipient email addresses to which the same message if being sent to. Unlike To:, the BCC: option allows you to hide the recipients in email messages. In other words, when emails are sent using BCC:, the receiver will not be able to see the list of recipient email addresses. Thus using BCC is a smart way to protect the privacy of the recipients.

Why should you use BCC?

Here are the reasons for using BCC:

Privacy – BCC provides an easy and simple option for protecting the privacy of your recipients. Under many circumstances it is necessary for us send an email without letting the recipients know who else is receiving the same message. Also it is highly recommended that you use the BCC: while forwarding a joke or a funny email to a list of your friends. If you are sending email on behalf of a business or organization, it may be especially important to keep lists of clients, members, or associates confidential. So don’t forget to use BCC: in instances wherever privacy matters.

Respect for you recipients- While forwarding email messages, people often do not bother to remove the list of previous recipients. As a result, messages that are repeatedly sent to many recipients may contain long lists of email addresses. This makes it easy for the spammers to collect and target those emails for spamming.

In order to avoid the risk of spammers, it is necessary that you encourage people/friends to use BCC: while forwarding any message to you. This prevents your email address from appearing in other people’s inboxes thereby keeping yourself less exposed to spammers.

How to BCC an email message?

Most email clients provide the BCC: option under a few lines below the To: field. All you have to do is just enter the list of recipients in the BCC: field instead of entering in the To: field. You may enter only your own email address in the To: field. Once you do this just hit the Send button.

The moral is that you should use BCC: while sending bulk messages so as to protect the privacy of your recipients.


Most of the email forging tutorials on internet will teach us how to

send fake email connecting to SMTP server of the ISP or any other

domain. But this is not possible since these hacks will no longer work

today because SMTP of remote server will reject any attempts for

unauthorised access.

Also many of the websites offer you to send fake email from their sites

where none of them work. So we have to run our own SMTP server on our

computer to successfully send a fake email. SMTP server is a simple

software program which can be installed on your computer in few

seconds. SMTP server allows you to send fake email right from your

desktop easily and effectively.
Download QK SMTP server
This is the SMTP server i am using in my tutorial. Once you download

and install the server on your comp then you are all set to send fake

email successfully.

PART A: CONFIGURING SMTP SERVER

Once you have installed the QK SMTP server on your comp you must

perform the following configuration.

1. Click on “Settings” button on the main screen,the Settings window

pops up

2. On Settings window click on “Basic Parameter” tab

3. Set binding IP to “127.0.0.1″

4. Set port to “25″

PART B: SENDING FAKE EMAIL (EMAIL FORGING)

1. Click on SMTP server icon on your desktop to start your SMTP server

to run(The icon is shown on the notification area of the taskbar if it

is running). If it is already running then this step can be ignored

2. Goto command prompt(Start-Accessories-Command prompt)

3. Type exactly as follows

C:\>telnet 127.0.0.1 25

Here 127.0.0.1 is the default IP of every computer.25 is the port

number. SO you are connecting to the SMTP server running on your own

computer. This step is very importand to send fake email.

NOTE: The IP 127.0.0.1 should not be substituted by any other IP.

Heres the snapshot of what you see after step 3.

4. After typing the telnet command in the command prompt you get entry

to the server which displays the following message. The response of a

OK SMTP server is given below. Message within Green color is only

explanation.

220 Welcome to QK SMTP Server 3
helo hacker (Type helo & any name followed by space)
250 Hello hacker (Server Welcomes You)
mail from:billg@microsoft.com (email ID can be anything of your choice.

This is the ID from which fake email appears to have come from)
250 billg@microsoft.com Address Okay (Server gives a positive response)
rcpt to:admin@gmail.com (Type any valid recipient email address)
250 admin@gmail.com Address Okay (Server gives a positive response)
data (type this command to start input data)
354 Please start mail input
From:Gates
To:admin@gmail.com
Date:Sat Jan 5,2008 9:45 PM
Subject:Test to send fake email
You can create as many headers followed by the “:” symbol.

NOTE: HEADERS SHOULD NOT CONTAIN A LINE GAP. IF SO IT IS CONSIDERED AS

BODY OF THE EMAIL. Press enter twice so that there is a line gap

between the header & body data

End the body of email by pressing [ENTER] .(dot)

[ENTER]

250 Mail queued for delivery (Sever indicates that the email is ready

for sending)
quit (Type this command to quit from server)
221 Closing connection. Good bye.
Connection to host lost
(You will get the above 2 lines of message after typing “quit” command)
(Your fake email is sent to the recipient)
*****END OF EMAIL FORGING*****
Here’s the screenshot for your convenience

Can you create a folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?

The answer is NO and YES!

NO because when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message “The specified device name is invalid”.

What is the reason for this? Simple, these names represent the internal devices and hence we cannot create folders with the above names.

YES because it is still possible to create these folders using the command prompt. Here’s the instructions to create it.

1. Go to command prompt

2. Type in prompt (FOR EG. TO CREATE CON FOLDER IN E: DRIVE)

C:\>md \\.\e:\con

NOTE: “con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.

3. To delete the folder use the following command

C:\>rd \\.\e:\con

NOTE: The folder can only be deleted from the command prompt.You cannot remove it by right-click delete.