How to hack wifi

An internet connection has become a basic necessity in our modern lives. Wireless hotspots (commonly known as Wi-Fi) can be found everywhere!
If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly most of these networks are secured with a network security key.
Have you ever wanted to use one of these networks? You must have desperately wanted to check your mail when you shifted to your new house. The hardest time in your life is when your internet connection is down.
Cracking those Wi-Fi passwords is your answer to temporary internet access. This is a comprehensive guide which will teach even complete beginners how to crack WEP encrypted networks, easily.
If it's WPA2-PSK passwords you need to crack, you can use aircrack-ng or coWPAtty.

Table of Contents

  1. How are wireless networks secured?
  2. What you'll need
  3. Setting up CommView for Wi-Fi
  4. Selecting the target network and capturing packets
  5. Waiting...
  6. Now the interesting part... CRACKING!
  7. Are you a visual learner?

Step 1: How Are Wireless Networks Secured?

In a secured wireless connection, internet data is sent in the form of encrypted packets. These packets are encrypted with network security keys. If you somehow manage to get hold of the key for a particular wireless network you virtually have access to the wireless internet connection.
Broadly speaking, there are two main types of encryptions used.

WEP (Wired Equivalent Privacy)

This is the most basic form of encryption. This has become an unsafe option as it is vulnerable and can be cracked with relative ease. Although this is the case many people still use this encryption.

WPA (Wi-Fi Protected Access)

This is the more secure alternative. Efficient cracking of the passphrase of such a network requires the use of a wordlist with the common passwords. In other words you use the old-fashioned method of trial and error to gain access. Variations include WPA-2 which is the most secure encryption alternative till date. Although this can also be cracked using a wordlist if the password is common, this is virtually uncrackable with a strong password. That is, unless the WPA PIN is still enabled (as is the default on many routers).
Hacking WEP passwords is relatively fast, so we'll focus on how to crack them for this guide. If the only networks around you use WPA passwords, you'll want to follow this guide on how to crack WPA Wi-Fi passwords instead.

Step 2: What You'll Need

  • A compatible wireless adapter:
This is by far the biggest requirement.The wireless card of your computer has to be compatible with the software CommVIew. This ensures that the wireless card can go into monitor mode which is essential for capturing packets.
  • CommView for Wi-Fi :
This software will be used to capture the packets from the desired network adapter. Click here to download the software from their website.
  • Aircrack-ng GUI:
After capturing the packets this software does the actual cracking. Click here to download the software from their website.
  • A little patience is vital!!

Step 3: Setting Up CommView for Wi-Fi

  • Download the zip file of CommView for Wi-Fi from the website. Extract the file and run setup.exe to install CommView for Wi-Fi. When CommView opens for the first time it has a driver installation guide. Follow the prompts to install the driver for your wireless card.
  • Run CommView for Wi-Fi.
  • Click the play icon on the top left of the application window.
Start scanning for wireless networks.
CommView now starts scanning for wireless networks channel by channel. After a few minutes you will have a long list of wireless networks with their security type and signal. Now it is time to choose your target network.

Step 4: Selecting the Target Network and Capturing Packets

A few things to keep in mind before choosing the target wireless network:
  • This tutorial is only for WEP encrypted networks, so make sure you select a network with WEP next to its name. If you need to crack a WPA encrypted network, follow this tutorial instead.
  • Choose a network with the highest signal.
  • Each network will have its details in the right column.
  • Make sure the WEP network you are choosing has the lowest dB (decibel) value.
Once you have chosen your target network, select it and click Capture to start capturing packets from the desired channel.
Now you might notice that packets are being captured from all the networks in the particular channel. To capture packets only from the desired network follow the given steps.
  • Right click the desired network and click on copy MAC Address.
  • Switch to the Rules tab on the top.
  • On the left hand side choose MAC Addresses.
  • Enable MAC Address rules.
  • For 'Action' select 'capture' and for 'Add record' select 'both'.
  • Now paste the mac address copied earlier in the box below.
We need to capture only data packets for cracking. So, select D on the bar at the top of the window and deselect M (Management packets) and C (Control packets).
Now you have to save the packets so that they can be cracked later. To do this:
  • Go to the logging tab on top and enable auto saving.
  • Set Maximum Directory Size to 2000.
  • Set Average Log File Size to 20.

Step 5: Waiting...

Now the boring part- WAITING!
NOTE: The amount of time taken to capture enough data packets depends on the signal and the networks usage. The minimum number of packets you should capture should be 100,000 for a decent signal.
After you think you have enough packets (at least 100,000 packets), you'll need to export them.
  • Go to the log tab and click on concatenate logs.
  • Select all the logs that have been saved.
  • Do not close CommView for Wi-Fi.
  • Now navigate to the folder where the concatenated logs have been saved.
  • Open the log file.
  • Select File- Export -Wire shark tcpdump format and choose any suitable destination.
  • This will save the logs with a .cap extension to that location.

Step 6: Now the Interesting Part... CRACKING!

  • Download Aircrack-ng and extract the zip file.
  • Open the folder and navigate to 'bin'.
  • Run Aircrack-ng GUI.
  • Choose WEP.
  • Open your .cap file that you had saved earlier.
  • Click Launch.
  • In the command prompt type in the index number of your target wireless network.
  • Wait for a while. If everything goes fine, the wireless key will be shown.
You may also receive a request to try with more packets. In this case wait until more packets have been captured and repeat the steps to be performed after capturing packets.

How to hack someones facebook

How to hack any facebook account without NO keyloging pishing required, PASSWORD HACKING by MR.PIVOT
How to hack any facebook account easily by Reverting/Reseting pass of your victim NO keyloging pishing required
Here is one more interesting tip on how to hack a Facebook account by the method of reverting the password.This method does not involve any skill or anything just a brain would be enough to get you through this trick ! Well,you might think that it is impossible but it is actually true that you can hack any facebook account ! So before we start i would like to tell you what “Reverting” actually means…

What is Reverting ?
Reverting is the process of resetting a password without the knowledge of the actual user ! So this is basically a low level of hacking but it does the job for you !
For more on reverting go here : What exactly is reverting ?
How do I hack my friend’s Facebook ?
Make sure your not logged in to your account.If you are then make sure you sign out and then follow the following methods
1.Go to this link: /
That is the form that you will be using in order to hack your user.
2.Then in “Your E-mail Address” type your E-mail address.
3.Then apply the following options as in the image below.
4.Once you have done that,You will have a question asking “Email associated with the compromised account.” – In that just type “No” and nothing else other than that !
5.In “Your contact email address.” – Type your own email for you to receive the Password Reset Link.
6.In the “Full Name of the Account.” – Type the Name of your victim if you know.If you don’t then:

a.Try finding the Name of the victim by just searching his/her e-mail on Facebook.
b.If that doesn’t work then google the E-mail address of your Victim,that might give you some details.
c.If that also doesn’t work then use the following sites to get them
So if you follow one of the above methods you should be getting the Full Name of your victim.Now lets move on to the next step
7.”Date Of Birth” – In this column you have to enter the Birthday of your Victim.If you know him personally then you should be knowing it.If not you can just social engineer him and somehow make him tell it.Once you get it you have to enter it in that.
8.”URL (web address) of your compromised profile.” – This is just the profile URL of your Victim which can be got easily(Usually of the form:
9.Now your all set ! Before you submit the form just make sure you recheck the whole form if you have done the right thing.Once you do so just click on “Submit”
10.Thats it ! You have done it ! Now you just have to wait for Facebook team to look up for your request ! Once they approve it they will send a link to reset your victim’s Password !

Are Wireless Signals Dangerous to your Health?

As we found out in a previous article, we have this electromagnetic radiation pumping around the home. This electromagnetic radiation is in the form of Radio Waves, and is coming from the wireless router and wireless adaptor. The wireless signals are Radio Waves, and the Radio Waves are electromagnetic radiation. What we want to find out is this: Are Wireless Signals dangerous to your health?

The Hypersensitive

There is a group in Britain called ElectroSensitivityUK, who are campaigning for a greater awareness of electro-sensitivity. According to this group, some people are hypersensitive to electromagnetic radiation. The group has been campaigning for some time on the issue. Recently, people have been contacting them claiming that wireless signals in the home are causing them to fall ill. Symptoms include nausea, exhaustion, headaches, sleepless, stomach upsets, tinnitus, short-term memory loss, and I forget what else.
Respected author Kate Figes is one such sufferer. After installing a spanking new wireless system in her home, Kate began to feel ill. She felt sick, run-down, and experienced a sensation she describes as like "being prodded all over your body by 1,000 fingers". Getting rid of her wireless equipment cured her illness. Being the mother of two children, she's naturally concerned about the dangers that these wireless signals may pose.
Kate Figes is certainly not alone in her suffering. Many others have reported feeling ill when around wireless equipment. Rod Read, of ElectroSensitivityUK, thinks that between 1 and 3 percent of the population could be hypersensitive to the electromagnetic radiation pumped out by things like wireless signals and mobile phones.

The Scientific View

However, the scientific view on this, and the one adopted by governments around the world, is that the Radio Waves emanating from the likes of wireless routers and mobile phones are harmless. Wired magazine and website quotes one such scientist (Ed Mantiply, of the FCC's radio frequency safety program):
"There is no conclusive evidence that electromagnetic fields hurt health. We have a standard for exposure, which is essentially like a speed limit --there's no guarantee that you're safe below it or unsafe above it."
Mantiply goes on to say, "I believe a good number of people who complain about these things have trauma or obsessive disorders."
Note that he doesn't say "everyone", but a "good number". After all, if there's no guarantee that you're safe below the "exposure standard" then you can't dismiss entirely those who claim to be failing ill from the electromagnetic radiation received from wireless equipment.
One thing that does stand out, however, from Ed's quote is mention of an "exposure standard". What is this? And who set's this standard?

Exposure Standards

An Exposure Standard is how much of a phenomenon (like Radio Waves) you can be exposed to before it is deemed unsafe. Safety guidelines, in other words. The body who oversee these safety standards in the US are the FCC (Federal Communications Commission).
The FCC listened to two august bodies: the NCRPM (National Council on Radiation Protection and Measurements) and the IEEE (Institute of Electrical and Electronics Engineers). These two organisations in turn gathered evidence from scientists and engineers from a wide-range of fields. They came up with something called the Specific Absorption Rate (SAR).
SAR is a measure of how much Radio Frequency energy is absorbed by living tissue. It is measured in Watts per Kilogram, or Milliwatts per gram. So a value of 1.6 W/Kg for mobile phones means that your head can receive up to this amount of Radio Frequency energy with the phone in use. High levels of Radio Wave exposure causes tissue to heat up. So the higher the level of SAR the more dangerous it is considered to be. A value of 1.6 is considered safe for American heads, but European heads are considered tougher (or denser), so a value of 2 Watts per Kilogram was set. Any higher than about 4 Watts per Kilogram and brain cells tend to bail out. Some people think that even 1.6 and 2 are too high.
For those in the UK, you may be delighted to know that there is no legislation that deals with compliance to any Electromagnetic Frequency guidelines. Though the Health and Safety Executive do acknowledge the SAR values above, and some sort of slap-wrist policy is in the pipeline for 2008. Or possibly not.
In the US, meanwhile, you can be reassured that there is a government body responsible for protecting you from the harmful electromagnetic effect of microwave ovens, television sets and computer monitors - it's the Food and Drug Administration!
To see why this energy is being closely observed, you have to understand the two types of radiation.

Ionising and Non-Ionising Radiation

Radiation is broken down into two categories: Ionising and non-ionising. Ionising radiation is the kind that strips electrons from your body, and is dangerous. Very. Non-ionising radiation doesn't strip away electrons, and is considered sort of safe. Think of these terms as the difference between an X-Ray machine and a toaster. The toaster can be harmful if you stick you fingers in the grill while it's warming up your muffins; the X-Ray machine, meanwhile, can be so harmful that the person operating it has to hide behind protective shielding. So, X-Rays are ionising, toaster non-ionising.
The wireless signals in your home, you'll be glad to hear, are a form of non-ionising radiation - Radio Waves.
The Radio Waves emanating from your Wireless router and Wireless adaptor are about 15 to 20 times lower than that from a mobile phone. However, the SAR values for phones were derived from short bursts to the head. Wireless signals are constant, so it is difficult to compare the two. But the energy intensity is considered to be fairly low. Nevertheless, I couldn't find any SAR values for wireless routers and adaptors, in the same way that mobile phones usually include the SAR value somewhere. The best I could come up with is reassurances from wireless manufacturers that their devices "meet the safety guidelines".


After all this research, we're not that much the wiser, I'm afraid! The jury still seems to be out on whether or not wireless signals are a cause for concern.
A World Health Organisation report into the issue concluded:
" ... there is no convincing evidence that exposure to Radio Frequencies shortens the life span of humans, induces or promotes cancer.
... further studies are needed to draw a more complete picture of health risks, especially about possible cancer risk from exposure to low-levels of RF exposure."
Unless you're one of the unlucky Hypersensitives, try not to worry about it!

What are wireless signals?

We have these boxes in our living room that send wireless signals to the computers. The computers then sends wireless signals back to the box. But what's being sent? Just what, exactly, is a wireless signal?

Electromagnetic Radiation

Think of the Sun. It blasts out energy. This energy is called Electromagnetic Radiation. It is electrical and magnetic.

The energy is given different names: Gamma Rays, X-Rays, Ultraviolet, Radio waves. The length of each wave is what gives rise to the names. In the image below, we see the depiction of a wave. Notice the crests and troughs. A wave is measured from one crest to another. Gamma Rays will have a very short distance between the crests; radio waves have a longer distance.

Radio Waves

So the wireless signals in the home are radio waves. Radio waves from a wireless router are pumped out at between 2.4 and 2.5 Gigahertz (GHz). This means 2.4 to 2.5 billion waves per second. The width of the wavelength, though, will be about the same.
Waves of the same length can interfere with each other. If you have a Microwave oven, for example, the distance between the crests will be the same as the signals from your wireless router. Your wireless signals will be disrupted if they meet those of your Microwave oven, say.
Other electric devices know to clash with your wireless signals are:
  • Digital phones
  • A Baby's cot monitor
  • Bluetooth gadgets
  • Other wireless router
This is because the distance between the crests of the waves is more or less the same for all these devices, and so they clash. To solve this problem, you can change the frequency of the radio waves. On a wireless router, this is called changing the channels. What you're doing here is changing the number of waves per second. The changes you're allowed to make are from 2.4 to 2.5 GHz. You make these changes from the router's control panel (called the configuration page). So channel 1 will mean 2.41 GHz, channel 2 will mean 2.42 GHz, channel 3 will mean 2.43 GHz, and so on.
Other problems are objects getting in the way. If a signal is sent to your computer then it may get bounced off walls, windows, glass mirrors, carpeted floors, and many other objects, before it reaches your computer. At the PC end, this can mean a slow connection. The radio waves are travelling at the same rate but, due to signal bounce, it's taken longer to reach its destination. Things that can cause problems for your wireless router are:
  • Glass doors, glass mirrors, glass in windows
  • Shiny metallic surfaces
  • Fish tanks (it's the water)
  • Internal walls made of brick
  • Stud partitioning in walls
  • Carpets


So, the wireless signals bouncing around the home are radio waves. And radio waves are a form of electromagnetic energy.
It may not be such a comforting thought that we've introduced electromagnetic radiation into the home, and that's it's travelling back and forth between the computer and the wireless box! Which begs another, far more important, question: Are these radio waves a danger to your health? In the next article, we'll investigate that very worrying possibility.

SNIT Business School Mauritius

Review of SNIT Business School.

Is SNIT business School really worth?

SNIT Business school offers a wide variety of NCC ABE courses. Being a student there, I thought I would have a bright career by attending courses offered there. Beginning, there were problems which I thought would resolve. However, little by little, SNIT Business school began to deteriorate in the quality of education it was providing.

Seeing so much problems, finally all my friends decided to write a petition against the direction for the QoS. It was to our great surprise, that all our request was not treated. Problems occurred there are: almost all of the lecturers never give lectures, they just sit with students and talk futile talks, students never get internet connections, however staffs are always online on facebook. SNIT Business School lacks professionalism in its service. Recently, it was confirmed by the Student Administrator that SNIT will not have third year course for students. Almost all students have lost all their years of studying, and now they should search for another university to complete their Degree. SNIT Business School gerants are money-minded people.

Its really a shame. Its all a Business for them. NCC Education offers quality courses, but SNIT isn't on the level required to give such courses. I now wonder how come, NCC approved SNIT for such courses like diploma, advanced diploma and all that. Its a good thing that UoG (University of Greenwich) cancelled all the contract with SNIT Business School. They know very well how the stafss and administrators of this institution are.

I hate SNIT Business School as much as my friends hates this institution. I would never recommend anyone to follow any type of course there. You will lost your money as well as your time. Don't go there!! There are many problems which are in actuality which I didn't mention, but hopefully I definitely will update it within the few days to come.!

How to Bypass BIOS Passwords

 How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.

Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

589589 589721 595595 598598

AMI BIOS backdoor passwords:


PHOENIX BIOS backdoor passwords:



ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj


Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
Siemens SKY_FOX
Toshiba Toshiba


Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot


Press both mouse buttons repeatedly during the boot

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.

Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

Hide Drives and Partitions

Hide Drives and Partitions

Do you have data on a partition or hard drive that you don't want tampered with or easily accessible to other users? Well, you can hide any drive/partition in Windows XP, NT, and 2000. That means that they won't show up in Explorer or My Computer.

If you want access to that drive from your user account you should create a desktop shortcut before proceeding. Once hidden, you can still access by typing the drive letter and a colon in Start/Run—for example, "D:" will bring up a folder of the contents on your D drive.

The easiest way with Win XP is to use the TweakUI power toy from Mcft. Go to Start/Run and type in "tweakui" (without the quotes).

Go to My Computer/Drives and uncheck the drive/partition(s) you want hidden. Click "Apply" or "OK" when finished.

If you have XP but not Tweak UI you can download it here...

For Win NT, 2000, and XP you can use the following Registry edit:

*Be sure to back up the Registry before proceeding

Open the Registry Editor by going to Start/Run and typing in "regedit" (without the quotes). Find your way to...


Click on "Explorer".

Double-click the "NoDrives" key in the right column. If you don't find a "NoDrives" registry key, just right-click in the right pane and choose "New/DWORD Value" then name the key "NoDrives".

You'll see a value like "0000 00 00 00 00". This is where the fun starts. The four sets of double zeros (after the "0000") are where you'll enter the values for the drive/partitions. Now, stay with me on this—it's not as complicated as it sounds:

The first column is for drives A-H, the second for I-P, the third for Q-X, and the fourth for Y-Z.

The values for each drive are as follows:

1 - A I Q Y
2 - B J R Z
4 - C K S
8 - D L T
16 - E M U
32 - F N V
64 - G O W
80 - H P X

So, let's say you want to hide drive D. In the first column you would put "08". For drive K you would put "04" in the second column.

But what if you want to hide more than one drive in a column? Simply add the values together: D+E = 8+16 = 24. So in the first column you would put "24".

Still baffled? If you have XP then go get TweakUI and save yourself the math.

Whichever method you use, you can rest easy knowing that the files on that drive or partition are less accessible to other users.