Well, in this method, we are going to add an application key to the Registry manually. So, follow some of the simple steps given below to open any program through the RUN dialog box.
Step 1. First of all, Press Windows Key + R on your keyboard.
Step 2. This will open up the RUN Dialog Box.
Step 3. On the RUN dialog box, type in ‘Regedit’ and hit Enter.
Step 4. Now you will see the Registry Editor.
Step 5. There you need to locate to the following path –
Step 6. Right-click on the ‘App Paths’ and click on ‘New’ and then click on ‘Key’. There set the key name to your desired application name along with the extension like Skype.exe.
Step 7. Again select the key that you can create in Step 6 from the right-side pane and set value to the ‘Default’. In the next pop-up box, enter the path of the executable like
C:\Program Files\Skype\Skype.exe
Step 8. Again from the right side pane, right-click on the empty spot and select New > String Value. Name the new key as ‘Path’ and double click on it. Next, give it the value as the folder path like –
C:\Program Files\Skype\
That’s it! You are done. Now open the Run dialog box and enter ‘Skype’ it will open the Skype application.
It is one of the most modern OS that is being used by hackers for pen testing and lots of security exploits. This is a Linux based OS that provides you privacy and safety from the vulnerabilities that other OS have in it. So you must try out this cool OS on your PC.
Features:
Full Customisation of Kali ISOs
The Kali Linux ISO of doom – an excellent example of the flexibility of live-build, and the types and complexity of customizations possible.
Kali Linux Live USB persistence with LUKS encryption
Kali Linux Full Disk Encryption
Kali Linux on a Raspberry Pi and a bunch of other interesting ARM devices
2. Backtrack
The other well-known Linux based Operating system is backtrack that is being used from a few previous years and best known as the OS for network cracking and pen-testing. And it’s also one of the best OS that can perform various network hacks with privacy.
This is one of the best OS for hackers that is just in the form of Live CD. In this, you just have to create a bootable USB of this OS and then simply boot on your PC, and there is no requirement to install it, you just have to run it on your PC and do hacking attacks.
Features:
Available in 32-bit and 64-bit versions, the latter having a significant speed increase from 32bit
Includes the required environment to crack passwords using GPGPU with OpenCL and CUDA configured ‘out of the box'[5][6][7]
Built on hardened Linux, including a hardened kernel and toolchain A hardened kernel with extra patches[8]
It uses a pentoo overlay, which allows tools to be built on top of a standard gentoo build.
Another good operating system that every pentester would love to try out on their PC. This OS is being developed after the great necessity of many things that are not present in another Linux based OS.
Parrot Security is an operating system based on Debian GNU/Linux mixed with Frozen box OS and Kali Linux to provide the best penetration and security testing experience for the attackers and security testers. It is an operating system for IT security and penetration testing developed by the Frozen box Dev Team.
Features:
Custom hardened Linux 4.3 kernel, rolling release upgrade line
Custom Anti-Forensic tools
Custom interfaces for GPG
Custom interfaces for crypt setup
“Forensic” boot option to avoid boot automounts
Most famous Digital Forensic tools and frameworks out of the box
Step 1. First of all, right-click anywhere on the desktop and select New > Notepad.
Step 2. On the notepad, you need to enter the following command:
@echo off net user hidden password abc /add net local group Administrators Myname /add
Step 3.In the above command, you need toreplace ‘abc’ with the passwordof your wish.Step 4.At the next line,replace ‘Myname’ with the nameyou would like to have your account.
Step 5. The final results would look like this.
Step 6. Now you need to save the file with .bat extension like hidden.bat
Step 7. To create the administrator account, right-click on the .bat file and select ‘Run as administrator’
Step 8. To verify the new account, open command prompt, and type in 'net users' and press enter.
Step 9. You will find the new hidden account there.
Step 10. To hide the new net user administrator account, enter net user hidden /active:no on the command prompt.
Step 11. To access the hidden admin account, type in net user hidden /active:yes on the CMD.
That’s it, you are done! This is how you can create a secret hidden user account in Windows 10.
Tor Browser is definitely the best anonymous Browser that you can use right now. The best thing about Tor Browser is that it’s available for almost every platform including Android, Linux, and Windows. With Tor Browser, you don’t need to use any other VPN app because it has everything that you need for anonymous web browsing. However, the browsing speed is comparatively slow compared to other anonymous browsers.
Epic Browser is the second addition to the list which is known for its interface. The best thing about the Epic Browser is that it’s based on Chromium or Chrome. Not just that, but Epic Browser also shares a similar look as of Chrome Browser. The browser by default blocks all ads and web trackers which makes you fully anonymous. Not just that, but it connects you to the internet with the most private connection possible.
Well, if we talk about the features, Comodo Dragon Browser comes nowhere close to the Tor Browser, but it has lots of tools that can make you fully anonymous. The best thing about Comodo Dragon Browser is that it by default blocks all trackers, web spies, cookies, and every other thing that is responsible to explore your identity. Not just that, but Comodo Dragon Browser also comes with a built-in domain validation technology that effectively detects weak SSL certificates.
SRWare Iron Browser calls itself ‘The browser of the Future’. Guess what? SRWare Iron Browser is one of the best and most interesting web browsers that you can use right now. The best thing about SRWare Iron Browser is that it’s based on Chromium and its available for almost all major platforms including Windows, Mac OS X, Linux, etc. The great thing about SRWare Iron Browser is that it has a tool for blocking web spies, trackers, and ads. Apart from that, the browser also guarantees the level of privacy and security while surfing the web.
Brave Browser is the last one on the list which is pretty much popular amongst Android users. The great thing about Brave Browser is that it’s available on almost all major platforms including Windows, Mac, Linux, Android, and iOS. The browser offers everything that you need to browse the web anonymously. Apart from that, the browsing speed on Brave Browser is comparatively fast compared to other browsers listed in the article. The web browser blocks ads, web-trackers, web spies automatically which makes you fully anonymous.