Preview

Hacking Is Not a Crime

Powerful Essays
Open Document
Open Document
5141 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking Is Not a Crime
Top 5 Most Awesome Computer Pranks
Posted by JIGAR TANK on 03:3411 Comments and 0 Reactions

Hello Everyone, We All Love To Play Computer Pranks With Our Friends And Collegues. We Enjoy it Unless and Untill We are On The Recieving End.
Today We Will See 5 Awesome Computer Pranks Which Not only You will Learn To Play Them But Also You Can Avoid Being Pranked By Other.

Surely The Old But The Best Prank May Be Setting The Blue Screen Of Death(BSOD) Picture As Screensaver, This Will Make The Victim Mad For Sure.

Some Awesome Pranks are as Follows :
Note: Many Of the Below Pranks Requires You To Access Victims Computer Physically.

-------------------------------------------------
1. Changing The Keyboard Layout.
If You Really Want to Give Your Friend a Headache Then Change Thier Keyboard Layout, This Dont Require anything To be installed On Victims Computer.

How To Change The Keyboard Layout ?
To Change The Victim's Keyboard layout, Head to Control Panel > Region and Language > Keyboards > Change Keyboards Now Add Any Keyboard Layout That You Find The Best.

For Win 8 Users > Control Panel > Clock, Language, and Region > Change Input Method.

I Would Recommend You To Choose "Dvorak Layout " Most geeks are also Unaware Of This Layout and it will Confuse The Victim Surely.

You Can Flip over to the Language Bar Tab and Set that as hidden so that they Won't Be able to Figure it That easily.

-------------------------------------------------
2. Make Mouse Pointer Look Like Busy Always.
This is So Much Fun , All you have to Do is Change The Mouse Pointer Which Looks Like The Pc Is Hanging and The Victim Will Wait Wait And Just Wait .

How To Change The Mouse Pointer ?

To Change The Pointer Of Victim's Mouse Pointer, Just Goto Control panel > Mouse > Pointers now Select The Pointer Which says Busy Or Browse Select Busy and Click on Apply .

For Win 8 users = Contral Panel > Hardware and Sound Then Select

You May Also Find These Documents Helpful

  • Better Essays

    Peripherals Module Quiz

    • 910 Words
    • 4 Pages

    In a situation where a handicapped person can only input data into the computer using a stylus or light pen, which keyboard configuration might be the solution?…

    • 910 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    hrtr ya gp

    • 580 Words
    • 3 Pages

    In a situation where a handicapped person can only input data into the computer using a stylus or light pen, which keyboard configuration might be the solution?…

    • 580 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    c. Look for QEZBKTMXXX (XXX for the day) and put a 4 beside it and hit F4. This will open a new screen find the *CNTRLD and change this to *IMMED and hit enter…

    • 206 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Yeaaaaaaaaaa

    • 1168 Words
    • 5 Pages

    To enable screen reader support, press CTRL + ALT + Z. To learn about keyboard shortcuts, press CTRL + FORWARD SLASH.…

    • 1168 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Carter, David. (1995, July). Types of computer crimes. The FBI Magazine, Retrieved from http://www.lectlaw.com/files/cri14.htm, doi: The Lectric Law Library…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 4 Lab Report

    • 818 Words
    • 4 Pages

    Then add a space. Next, type in “dd”.Then, press the “Ctrl” key, “v” key, and “esc” key at the same time to map this key. FInally, press the “Enter” key.…

    • 818 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Pt1420 Unit 7 Study Guide

    • 582 Words
    • 3 Pages

    Write a program to put the biggest one in CX and also display it. Page: 97…

    • 582 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    After perusing the internet Mr. Anderson’s home laptop started to perform commands on its own, without Mr. Anderson’s input. An ad for Spy-Wiper appeared on his laptop warning him that if he wanted to protect his laptop he had to sign up for the program that would clear his system of any rogue software. When Mr. Anderson arrived at work the following day he discovered that his office computers displayed similar messages from Spy-Wiper. Spy-Wiper was using coercion tactics to intimidate users into signing up for their software, holding the user’s computer hostage until they complied. Spy-Wiper created the threat and supplied the solution.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Computer hope (1010), [Online] How to prevent unauthorized computer access, Computer hope, Available from: http://www.computerhope.com/issues/ch000464.htm [Accessed 20 April 2010]…

    • 1788 Words
    • 6 Pages
    Best Essays
  • Satisfactory Essays

    A computer keyboard is an input device used to enter characters and functions into the computer system by pressing buttons or keys.it is the primary device used to enter text. A keyboard is used to enter text . a keyboard typically contains keys for individual letters, numbers and…

    • 1042 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Itq Coursework

    • 6612 Words
    • 27 Pages

    When working within Microsoft Office applications such as Word or Excel certain key combinations allow you to perform commonly used tasks using the keyboard instead of clicking buttons or menus with the mouse - some users prefer to do this as it can be quicker.…

    • 6612 Words
    • 27 Pages
    Good Essays
  • Powerful Essays

    A normal way of adding text into a computer is through a keyboard that usually comes with the computer itself. All keyboards are laid out in near enough the same format. You press…

    • 973 Words
    • 4 Pages
    Powerful Essays

Related Topics