Flipkart Deals

Hacker"s Search Box

Google
Showing posts with label Web Hacks. Show all posts
Showing posts with label Web Hacks. Show all posts

Tuesday, February 2, 2010

Auto Relod Web-Pages

Auto refreshing web pages has some great utilities whether you are keeping an eye on football or cricket score on net or you want to increase page views of your website.
Everyone will have their own utility with this idea.

Here are some websites that will do the trick for you without installing any extra plugins or what so ever. So be safe from Ad-wares and kinda stuff.


1. RefreshThis

2. PageReboot

3.
Site Reloader

Thursday, January 7, 2010

Annonymously downloading Torrent

Anomos is a BitTorrent client that uses cryptography and lets you share files anonymously. It is currently in beta, and it just works.

Download Anomos

It’s a very barebones anonymous BitTorrent client –it doesn’t even show the number of seeds/peers. Nobody except the central tracker will be able to know who’s downloading what. That is exactly what an anonymous torrent client should provide, and that’s what Anomos does well.

The developers are constantly working on it to make it better. Download Anomos from here. It’s currently available for Linux and Windows.

What the developers claim is down here ---

Anomos
is a pseudonymous, encrypted multi-peer-to-peer file distribution protocol. It is based on the peer/tracker concept of BitTorrent in combination with an onion routing anonymization layer, with the added benefit of end-to-end encryption. By combining these technologies, we have created a platform where by no party outside of the trusted tracker will have any information about who a peer is or what they are downloading.
smwhite
Anomos is designed to be easy to use – you won’t even be aware of the security that it provides. Anybody who is already familiar with BitTorrent won’t have to do anything differently.
smwhite
A more technical introduction is avaliable in this blog post. It’s a bit outdated, as the final protocol is still under active development. Soon, we’ll be releasing a complete guide to the Anomos protocol. The FAQ may provide some answers to any questions you may have.
smwhite
The source code is available in our Git repository, and regularly updated source code documentation is available here. Downloads of releases are available on the downloads page.

Wednesday, December 16, 2009

McAfee Total Protection 2009



McAfee Total Protection 2009 | 80.7MB

Safe Search & Surf

McAfee Total Protection adds safety ratings to web sites and search engine results based on comprehensive spam, adware, and online scam safety tests. SiteAdvisor analyzes the results and rates web sites in detail for unsafe or annoying practices such as dangerous downloads, spamming, misuse of personal information and browser hijacking. When searching with Google, Yahoo! or MSN, SiteAdvisor provides easy-to-understand safety ratings—red (danger), yellow (use caution) or green (safe)—that appear next to search results, helping you make informed decisions.

McAfee SiteAdvisor Plus

McAfee SiteAdvisor Plus extends safety ratings to the links in emails and instant messages, and blocks your PC from visiting dangerous web sites with a "protected-mode" option.

Always Updating

McAfee Total Protection continuously and automatically delivers the latest software updates and upgrades so you are never under-protected or overwhelm by ever-evolving and emerging online threats.

Stops Viruses

McAfee Total Protection automatically guards your PC from viruses, mass-mailing worms, backdoor Trojans and more. It also automatically cleans or quarantines infections with minimal interruption. Other built-in features include:

-McAfee SystemGuards watch for activity that may signal a virus, spyware or hacker is on your PC
-Always active detection that watches key system, Windows, host file and browser settings for suspicious changes such as DNS poisoning (a.k.a. pharming, which can redirect browsers to fraudulent web sites) or activity that can compromise anti-virus security
-McAfee X-Ray for Windows removes dangerous root-kits and other malware that can hide deep in your operating system

Halts Hackers

Constant inbound and outbound monitoring helps McAfee deter hackers, identity thieves and malware programs from robbing data, hijacking your system (e.g., to send spam) or planting viruses that can compromise privacy over dial-up or broadband. Fast "load and go" setup, customizable security levels, visual tracing, smart alerts, full screen mode and intelligent application handling help fine tune security, identify the source of threats and block suspect programs from "phoning home" personal information. Other built-in features include:

-Stealth Mode helps hide your presence online, making your system practically invisible to global hackers.
-HotSpot detection automatically elevates McAfee firewall security when you are not on your trusted network.
-Boot-time protection shields your system from unauthorized connections before security programs are fully load.

Blocks Spyware

McAfee's spyware protection detects, blocks, and removes spyware, adware, and other suspicious programs before they can steal log-ins and passwords (key-loggers), hijack your dial-up connection (Web dialers), track online surfing (cookies) or flood your surfing with annoying pop-up ads. Better protection based on new integrated anti-virus, anti-spyware engine. Now also detects and blocks tracking cookies.

Improves PC Health

McAfee SecurityCenter's dashboard-like display helps you at a glance review your PC's security status and modify it with one-click. You can also easily check for updates, fix potential security issues or view settings in basic or advanced modes.

With built-in McAfee QuickClean technology, McAfee Total Protection helps optimize your PC’s performance, eliminating drive-clogging "Internet build-up" (e.g., temp files, cached files, file remnants, Active X code), unused programs and other unnecessary clutter to free up valuable disk space. It also features a network map that shows the security status of your home network

Secures Your Identity

McAfee Total Protection helps secure personal identification and financial information (e.g., name, phone, credit card, bank account numbers) from transmission over the Internet without permission. Featuring McAfee Shredder, sensitive files can be permanently deleted so as not to compromise your privacy.

McAfee's anti-virus, anti-spyware, firewall and anti-spam security work together as a multi-layered shield against multi-faceted identity theft threats that may use a combination of malware to steal files, financial log-ins and other personally identity information. The suite also includes Password Vault, which safely stores Web login-ins, passwords and other personally identifiable information in a secure, password-protected, easy-to-access location.

Prevents Spam & Email Scams

McAfee Total Protection automatically recognizes and helps stop junk email—including identity and credit card scams, virus hoaxes and foreign language spam—from polluting your inboxes while letting trusted email through. Timely anti-spam filter updates ensure that you have the latest protection against spammers. More accurate spam detection, filtering and blocking with fewer false positives (email accidentally labeled spam).

Protects Children Online

McAfee Total Protection helps shield each family member from inappropriate Web content, online predators and chat using age-specific adjustable settings and easy-to-use filtering options. Also, the suite features McAfee ImageAnalyzer that protects children from viewing offensive images online.

Backs Up & Restores Files

McAfee Total Protection provides an automated back-up feature that preserves encrypted copies of irreplaceable photos, music files, videos and documents on CD/DVD, USB or external or network drives. With one-click, you can easily retrieve these archived files.

Network Monitoring

McAfee Total Protection verifies that your home PCs have McAfee properly installed.

Download Links

From Filefactory
http://www.filefactory.com/file/af2e6e3/n/MATP09_rar

Password:full+free

Warning:Buy original softwares only. We are not responsible for your unlawful act.

Friday, November 20, 2009

Firefox Master Password Recovery Tool

firemaster

It’s great in this day and age that browsers can remember our passwords for us, allowing us cross-site security without the hassle of memorizing a million different random passwords. It’s great, that is, until we forget our master password. Fret not, though; there is a solution. The folks over at Lifehacker show us how to use FireMaster to recover forgotten or misplaced Firefox master passwords. Perhaps a better solution is to just store those tricky passwords where nobody will find them.

Sunday, November 15, 2009

Hiding Passwords - the most unexpected way !

floppy_password

[Wehrdo] has posted a guide with an extremely low-tech solution to password management. He literally put the passwords on a floppy disk in the form of paper glued to the magnetic film. For those that still have some floppy disks around, this is a zero cost hack. We wouldn’t recommend this for state secrets, but for those prolific forum registrations it’s a great idea.

Sunday, June 1, 2008

HD Videos in Youtube !

This video will teach you how to use youtube's new feature for watching High/Higher Definition videos in yourube....amazing hm..
Sit back and Enjoy~~

Thursday, May 22, 2008

50+ Google Reader Productivity Hacks

Google Reader is already a tool that can be used to boost your productivity throughout the day by letting you view your favorite blog’s feeds and posts in one spot: through your Google account. But for those of us who tend to get bogged down in a lot of useless subscriptions and really need to cut down on the minutes (or hours) we spend procrastinating each day, there are a lot of little hacks to make Google Reader more productive. We’ve compiled a list of over 50 of our favorites here.

Keyboard Shortcuts

Use these basic but necessary keyboard shortcuts to make searching, organizing, sharing and reading your feeds more efficient.

  1. /: Use the forward slash to move your cursor to the search box and start looking for new stuff or saved items.
  2. g then u: Type g then u to go to your subscriptions.
  3. g then d: This shortcut will take you to the recommended page. If there are no recommendations, typing g then d will take you to the browse page.
  4. 2: Press 2 to see your subscriptions in a list view or headline view.
  5. ?: Find more keyboard shortcuts just for Google Reader by pressing the question mark.
  6. Shift-s: Pressing Shift-S will share or un-share the selected item.
  7. s: Star and un-star your highlighted items simply by pressing s.
  8. Shift-o: Open up the highlighted subscription or folder with this shortcut.
  9. g then h: Press g then h to go back to the Google Reader homepage.
  10. g then shift-s: This shortcut will take you to the “Your Shared Items” page.
  11. shift-n/p: n/p stands for Next/Previous, and using this combination will select the Next/Previous selection or folder.
  12. v: Open up the original page of the selected item in Google Reader.
  13. e: Quickly e-mail a page or other selection by pressing e when you’re in Google Reader.
  14. r: Check to see if anymore unread updates have been added when you hit the r button in the navigation.

For Firefox

Firefox users like their browser’s speed and ability to add on new scripts or buttons. Check out several Google Reader-specific hacks for Firefox here.

  1. Enhance Google Reader Preview: This script adds a Preview button so that you don’t have to open up an article or post all the way to read it.
  2. BlogThis2Me: The BlogThis2Me script lets you “blog Google Reader’s “BlogThis!” to your own blog system, not to blogger.com,” as long as you have Firefox and Greasemonkey.
  3. Smart Google Reader Subscribe Button: this script “adds an overlayed check icon when you’re subscribed to at least one of the feeds that the site advertises via auto-discovery.”
  4. Gbutts 1.5.1: Gbutts is short for Google buttons, and you can add your Google Reader button, as well as any other Google buttons, to your Firefox address bar.
  5. Better GReader: Better GReader works with Firefox adds a menu with extra options and features like Smart Subscribe, Preview Inline, Optimized Skin and others.
  6. Google Reader Watcher: Google Reader Watcher is an add-on that makes Firefox check your Google Reader for unread fees. This download does not require Greasemonkey.
  7. Quick Hide Message: Shave off milliseconds with this script, which “quickly hides the message displayed in Google Reader after performing renames, folder changes,” and other actions.
  8. Auto Add Feed: The Auto Add Feed script only adds feeds to Google Reader, instead of asking you where you want it to be saved.
  9. Title Unread Count: This hack moves the unread count in Google Reader to the front.
  10. Greasereader: Add even more hot keys to your Google Reader systems by reading this guide.
  11. Google Reader All Starred: Extract all of your starred items as links from Google Reader so that you don’t have to download each one.
  12. Google Reader Read by Mouse: Set up this script so that you can use a mouse-only system to read your feeds. It uses mouse buttons for the following actions: next item, previous item, and more.

Real Time Savers

If you’re serious about making your Google Reader visits more efficient, learn how to categorize by priority, use the “next” bookmarklet, and implement scripts that let you autoscroll, review your subscriptions and more.

  1. Categorize by priority: Stepcase Lifehack recommends categorizing your feeds by priority so that you don’t get bogged down in irrelevant articles.
  2. Google Reader Autoscroll: The autoscroll script lets you “view and mark items as read by means of a mouse wheel and keyboard shortcuts.”
  3. Mark All as Read: If you only want to read one article from a feed, you can mark everything else as read to weed out your extra entries.
  4. Google Reader Scroll Reducer: With this script, you’re able to comment on and view the original site without having to scroll to the top of page to get to the URL.
  5. The “Next” Bookmarklet: The Google Reader Blog discusses this hack, which “allows you to use Google Reader through just one link — clicking on it takes your browser to the next unread item in your reading list.”
  6. Review your subscriptions: Are you still getting subscriptions for some obscure hobby you were only interested in a year ago? Go through your subscriptions and delete any that you don’t really want emptied into your account regularly.
  7. Print Button v2.0: The Google Reader Print Button v2.0 allows users to print either the selected content or everything that’s displayed on the page in Google Reader.
  8. Gmail + Google Reader: Add Google Reader into your Gmail account so you don’t have to constantly switch back and forth.
  9. Google Reader Filter: Get rid of duplicate and unwanted content with this script.
  10. Tag your items: Take advantage of the tagging feature on Google Reader. It’s there to help you stay organized and more productive.

Social Media Hacks

How much time do you waste each day checking all of your social media accounts? These hacks let you sync up Google Reader with Facebook, Twitter, Tumblr, Google Chat and more.

  1. Google Reader + ma.gnolia: This basic script lets you add a Google Reader post to ma.gnolia.
  2. Google Reader Digg News: Add a Digg button to your Google Reader posts with this script.
  3. Tumblr: Sync up your Google Reader and Tumblr with this script. You can attach your reblog button or Share-on-Tumblr at the bottom of articles on Google Reader.
  4. Managing Your Shared Items: This post from the Google Reader Blog shows you how to add and remove friends from your Gmail or GChat account.
  5. Google Reader and Flickr: Now you embed Flickr videos into your Google Reader, so you don’t have to switch back and forth to share with extra friends or read their comments.
  6. Facebook Sharer + Google Reader: Share your favorite posts and articles with Google Reader friends and Facebook friends.
  7. Google Reader + del.icio.us: Use this script to define tags and links for a faster way of posting to del.icio.us.
  8. Google Reader + Twitter: Use this script to add reader posts to Twitter.

Add-Ons and Solutions

Try out these add-ons to customize your Google Reader experience and streamline your Google accounts.

  1. Google Reader Notifier: This extension keeps you updated by showing you how many unread items you have in your account.
  2. Add a Search: Add a search engine to your Google Reader account to make searching for items faster.
  3. Google Reader Optimized: Use this script to view Google Reader in a larger space. The last official update was in 2006, but Google Reader users have submitted updates.
  4. Google Reader Romeo Script: Check out this script to access Google Reader from your cell phone — if you don’t have an iPhone.
  5. Google Reader Button for Internet Explorer: IE users can add on a Google Reader to their browser using this tutorial.
  6. iPhone Skin: iPhone users can easily view Google Reader on their phones with this special skin from developer David Cann.
  7. Iris: View your Google Reader subscriptions in a Firefox sidebar.
  8. Go behind the scenes: If you want to know how many people have subscribed to a certain feed, you can use this tutorial to speed up your search times.
Thank You !

Monday, May 19, 2008

NETBIOS BASED HACKING TUTORIAL - For Edu. purpose only ~

Note- This tutorial may bear a resemblance to tutorials written by other authors. I have acknowledged to tutorials or articles that I referred before writing this tutorial. It is possible that there may be other tutorials I have not referred and are similar to my tutorial. It is not possible for me to give acknowledgment to such tutorials and hence there must be no copyright or legal issues regarding thistutorial.

Preface

Dear reader I have written this tutorial keeping in mind that readers having only the basic knowledge will also be able to know how hackers hack using NetBIOS. Using NetBIOS for hacking is the probably the easiest way to hack remotely. I strongly oppose hacking but not ethical hacking. An ethical hacker is one that hacks computer networks not for anti social reasons but to let the network administrators know about the security holes so that they can prevent their computers from hacking.

Contents-

A brief lesson on NetBIOS

The NBTSTAT command

What you need to hack ?

Types of attacks

Searching for a victim

Lets Hack - Part 1 Remotely reading/writing to a victim's computer

Cracking "Share "passwords

Using IPC$ to hack Windows NT

Penetrating in to the victim's computer

Lets Hack - Part 2 Denial of service attack

How to protect yourself

Thanks You and our readers.


Thursday, April 17, 2008

Rapidshare.com - Auto Downloader - New Working 100%

Rapidshare since changed their Captcha Images so the program above became unuseable. Though, some very nice members of a german communitiy made it possible again:

- Enter any Link from rapidshare.com oder .de and many other hosters
- Get a full automatic download from rapidshare (it recognises every code by itself)
- Automatically get a new IP after a Rapidshare Download is finished (can be turned off)
--> Everything fully automatic, no need to stay at PC the whole Time

With the pack, I created a small readme.pdf . Please go through all the steps one by one. It uses ABBY Finereader to recognise the code.

Here's a list of all supported Routers: routercontrol.de (url)
For all modem users, there is a good way for you to get a new IP, the way is included in readme.pdf

There are a few background information in the first thread. I can give help for Routercontrol, USDownloader and ABBYY but I don't have a modem, I will do what I can to help you.

Download: http://rapidshare.com/files/108271983/USDpack.rar
Size: 5821 KB

Tuesday, March 18, 2008

Kaspersky Internet Security 7.0 + Crack = Free(Hacked-Working 100%)

Kaspersky Internet Security


Using the Internet safely and securely


Secure surfing. The solution analyses web pages and blocks potentially malicious web-based content. It also blocks pop ups and ads, which are not simply irritating: virus writers often use ads to install Trojans that steal your confidential data or give the Trojan’s owner access to your computer.

Privacy Control. Many malicious programs attempt to locate and harvest user IDs and passwords for online bank accounts, auctions, shops, email, payment systems, chat rooms, online games and etc from Windows Protected Storage. Kaspersky Internet Security monitors and blocks all attempts to collect and forward your confidential data from this storage area.

Protection from phishing. Kaspersky Internet Security filters out phishing emails and protects you from accessing websites run by phishers who use social engineering to fool you into sharing your banking or online payment information.

Parental Control. Parents can protect their children from online predators by creating blacklists of individual websites, as well as identifying categories of forbidden content such as drugs, pornography and so on. These lists can be customized by user type for children, teens or adults. In addition, parents can manage their children’s Internet experience by limiting the amount of time they spend online.

Anti-virus protection and more


Protection from all of today’s Internet threats. Kaspersky Lab combines three protection technologies to protect you against viruses, Trojans, worms, keyloggers, rootkits and other threats. This means that you are safe from spyware, adware, pornware, crimeware and anything else today’s cyber criminals invent.

Firewall. The inbuilt personal firewall provides new generation protection from intrusions and data leaks. The default settings for popular applications control network and Internet activity using the IDS/IPS to prevent hackers from taking over your computer or stealing your data. Stealth mode allows you to surf safely and invisibly, protecting you from becoming a target for hacker attacks.

Anti-spam protection. The anti-spam module uses a combination of filtration methods to protect you from spam targeting you personally: white and black lists of senders and content, self-modifying algorithms for text analysis, graphical spam analysis and more.

Self-protection. Today virus writers begin their attack on your computer by disabling anti-virus protection. Kaspersky Internet Security is designed to block all attempts to disable protection, leaving you to work and play securely.

Restoring your data and your system


Rollback of malicious changes. Kaspersky Internet Security monitors system and application behavior for suspicious behavior. Once malicious behavior is detected, the process is blocked and any changes caused by malicious code are rolled back. Your system is clean and your original data is intact.

Rescue disk. Creating a rescue disk is quick and easy using the built in wizard in Kaspersky Internet Security. If your computer is ever attacked by a virus, you can restore and disinfect your system right away by yourself using the rescue disk you created even if the operating system has been damaged.

Download Kaspersky Internet Security
Download Path(Crack)

Instructions to use Crack:


1. Install The Application KIS
2. Let Ur Pc Reboot 3. Then Disable Self Defence ( settings tab > services > uncheck the self defence check box)
4. Run The Patch ("Patch Name")
5. when The Patch Opens First Click "Key Remover"
6. then click "patch" KIS
7. Then Click "Clean"
8. Then Click "Key Kav + KIS 7" and extract dat in a folder (suppose d:/kiskey )
9. Then open KIS Or KAV and Click "Activation Tab" Then Click "enter key or watever"
10.Then Click "Already have license key " Then next ...
11.Then Browse To the place where u saved the keyd (d:/kiskey)
12.select the key and then enable self defence ...
13 enjoy the full version .. unlimited ..

**** Some new working keys- we are not responsible for it ; we are just pointing you towards it:

Kaspersky KAS and KIS KEYS till 2009 & 2010
1) Go to ACTIVATION in the Kaspersky window.

2) Click DELETE KEY. (Only if a key has been previously installed)

3) Click INSTALL KEY.

4) After this, Apply existing license key.

5) Select the key which you want to install.

6) Enjoy !!


Tested and working 100%

CODE
http://rapidshare.com/files/116339764/Bruna.KAV_Key_Valid_till_27.02.2009.rar
http://rapidshare.com/files/116337643/Bruna.KAV_Personal_Key_Valid_Till_03.09.2010.rar
http://rapidshare.com/files/116338754/bruna.KIS.22.12.2010.rar
http://rapidshare.com/files/116338506/bruna.KIS.17.03.2009.rar
http://rapidshare.com/files/116338237/Bruna.Kis.8-04-2009.rar
http://rapidshare.com/files/116337916/Bruna.KIS.02.04.2009.rar

Sunday, January 13, 2008

Free Rapidshare Premium Accounts

So ultimately we are providing you the Ultimate List Of Rapidshare's Premium Accounts.
This list was found on an user's Rapidshare folder directory and we do not take any credit for that nor we are responsible for any ill you end up with. The provided list may or may not work as we have not collected it, it may be possible that none of them works or it may be possible that many works for you.
So you will have to check them and have to be lucky to get a working one.
Get it HERE

Keywords:Rapidshare Hacking, Rapidshare Premium Accounts List,

*We are not responsible for any company's © policy violations.Please forgive us!

Wednesday, January 9, 2008

Introduction to TELNET

Learning Telnet
*::Don't use this for illegal stuff::

Introduction:
Telnet is used to connect to remote machines through emulation. This means that
it can connect to a server, any server instantly because of it's ability to emulate (copy)
remote computers.

Lets Start:
In Windows, Telnet can be found by going to Start -> Run and then typing telnet.
The application should then pop up. If you don't have Windows, there are many Telnet alternatives for mac, linux etc. Since I don't know any,search the internet for Telnet for Linux or Telnet for Mac and you should find something instantly.

If you have a PC and are using Windows 98/95, 2000, Me, or XP continue...

As you can see, Telnet has 4 menu options. These are Connect, Edit, Terminal, and Help.

If you click Connect, you should see more options. Here they are.

Connect:
Remote System..
Disconnect
Exit

Names of servers you have been on.

To connect to a server, click Remote System...
This will then take you to a dialog box that has these fields:

Hostname:
Port:
TermType:

There should also be a Connect button and a Cancel Button.

Lets go over these & what you should put in them.

-Hostname-

The Hostname can be the address of the website your going to be connecting to:
http://www.google.com
or it can be the IP address. Keep in mind that you can only connect to servers and not to clients (other PCs)
an IP Address looks like this: 64.233.167.99

-Port-
Port can bb either the port number you wanna connect to on the server (Port 80 is the Internet, Port 23 is Simple Mail Protocol then there are some more ports for different things..)
or you can keep it Telnet and see what happens.

-TermType-
TermType is the type of Terminal telnet will be acting like.
This doesn't matter most of the time, so you can keep it to default or try other ones if you want.

When you have all this set up, you can Click Connect & see what happens.

Note: Sometimes many servers don't like anon people just logging on, so be careful when logging onto servers, because sometimes it might be some big company that likes bullying people or just SOMEONE who likes bullying people and then they might want to find you or trace you or something and I know for a fact you don't need that happening.

Another Note: When you go to a server and type something, such as a login name or a password, you might not see anything even though you are typing. this is a feature that telnet or the other server uses. It's for some kind of safety measure.

Ok that's all for the Connect Menu, lets go over the Terminal menu.

The terminal menu should have 3 options:

Prefernces
Start Logging
Stop Logging.

-Prefernces-
If you go to this, a dialog box will come up with various options. Here, you can change the
text color & background color of the program, and you can enable Local Echo, which shows
you everything you've typed, Blinking cursor if you want the cursor to blink check it, if not un check, Block cursor if you want the cursor to be shown as a block, VT100 Arrows, don't worry about these they are useless, Buffer Size, this allows you to set the number of lines of text you want to be shown before the screen starts to scroll, The Terminal emulation type, always have this set on the default unless you know what the second one is and you know what your doing.

-Start Logging-
This logs everything you do on Telnet in a log file on your computer.

-Stop Logging-
This will stop logging processes.

Well that's it for basics of telnet. Thanks for reading.

F
or complete Guide on telnet visit happy hackers guide for telnet, Telnet: the Number One Hacker Tool is the guide title, from this guide really you can become a hacker

Hidden Redirection in Web Browser !

How about redirecting your web browser to a page which is not actually requested.
A simple text file edit makes sites redirect to another. When you type address in address bar in any browser and enter it then it will display another web page.
For eg: when you type Google.com in the browser you will be redirected to yahoo.com.

Instructions to do:

1) Go to this directory [c:\windows\system32\drivers\etc], directory may change according to drive used for os installation
2) then hit enter
3) find a file named "hosts"
4) Right click on it and open with word pad.
5) In the last link of the document type the IP* address of yahoo space
www.Google.com (Vice versa for other sites)
6) now save it
7) restart the browser if its already running
8) Now try it, It works perfect

IP*: To find IP address of a website:
Go to Start ->Run > type cmd > enter.
Now you have a new window on desktop. On that type ping www. yahoo.com (OR ping www.xyz.com)

Visual Explanation:



Recovery:Repeat the first four steps and remove the last line that you have inserted and save it and restart browser. Now its normal,
you can try this trick on your fried's pc and public pc and force them to blink.

*Please do it on your own risk.

Thursday, January 3, 2008

Rapidshare Hacking:Guide for Beginners

Rapidshare is an excellent tool for sharing files all over but there are limitations for which we have worked out and here is the outcome.
Recently users have discovered ways of bypassing the download limits and skipping the waiting time. Here are a description of these methods.
1. Using JavaScript
*[ Javascript at present is not working because the bug is fixed]

  • Go to the page you want to download.
  • In the address bar put the following: javascript:alert(c=0)
  • Click OK .
  • Click OK to the pop-up box .
  • Enter the captcha .
  • Download Your File .

2. Requesting a new IP address from your ISP server.

Here's how to do it in windows:

  • Click Start
  • Click run
  • In the run box type cmd.exe and click OK
  • When the command prompt opens type the following.

ENTER after each new line.

ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit

Erase your cookies in whatever browser you are using.Try the rapidshare download again!Note:If you ISP has provided you with a fixed IP then it may not work.But this usually works.

3. Use a proxy with SwitchProxy and Firefox

  • Download and install Firefox if you have not already.[Get it]
  • Add Greasemonkey if you don't have.
  • Download and install FoxyProxy Add-on.
  • Google for free proxies.
  • When you hit your download limit, clean your cookies and change your proxy.

*Clearing cookies and changing IP is important.
If you don't know how to install add -ons(Greasemonkey,FoxyProxy):



When the file is downloaded.Open Firefox the open the file from it:

Like this


4. Anonymous Clients
They are nothing but the clients that support you to be annonymous on the internet so as to prevent your identity by using proxies. But you on your part have to enter the IP and Port for the proxies.

  • JAP-is a program that can help you to prevent yout IP address by providing you to connect through proxies.

Get it * to use this you must know about proxies and to use it.

  • Ulrasurf- is a good program which can select proxies from itself also and you can do it mannually also and can have upto 3 parallel downloads from Rapidshare.

Get it

Many more expert and professional tools for that will also be posted very soon.Please note that this article was only ment for beginners. We wan't everyone to learn everything so we take care of newbies also.

Wednesday, January 2, 2008

Latest Antivirus Apps: for Free!

Many of my readers asked me to provide all the latest antiviruses named as
Norton Anti Virus 2007
Kaspersky
IDM_5.11_Full
Teleport_Ultra_HTTPS_Edition_Full
!!!!!!! Get a copy of any site to borwsing it Offline !!!!!!!
Winzip_11.0_Full
Download_acccelerator_Premium_8.1.5.6
Norton_Partition_Magic_8_
WinRar_3.62_Gold_Edition_Full
PANDA_Antivirus_Firewall_2007
WinRARCrysta_2007
Ultimate_Windows_Vista_Suite_Wallpaper_Pack
Automatic_Wallpaper_Changer_2007
McAFee_Total_Protection__2007
Virtual_CD_8.006_FULL

and other useful tools...

So I found them all in a directory...

http://rapidshare.com/users/1EC869

Enjoy buddies.....
*We are not responsible for the above post and we do not take any responsibility if it violates any company's © policy.

Tuesday, January 1, 2008

RapidShare Hack: NIC tricks and MAC cloning -bypass download limit

This is how I get what I want from RapidShare without having to wait the 60+ minutes between downloads.


First off I have two methods I use. Granted this is still one file at a time, but you will not have to wait a hour+ between downloads.

First method is having two NICs and a hub.

My ISP uses static IPs .

  •  Download a file from RapidShare.

  •  Disable one nic and activate another after download is complete.
  •  While NIC is activating restart Modem. IPS will assign a new IP.

  •  Download another file.

  •  When download is complete, create a bridge between NICs while restarting modem. Your  ISP will assign a new IP.

This will get you three files in time limit set by RapidShare.

This method is not that high speed but is better then one file an hour.


Second method uses MAC cloaning application.

It will allow you to change your MAC address of your NIC.

Install MAC cloaning app (search Google from appz) Different appz have different procedures, read the help file to figure out what you are doing. I use SMAC, it is pretty simple.

  • Download file from RapidShare.

  • Change MAC address (don't change until the current file is finished downloadling)

  • Restart Modem, ISP will issue a new IP for new MAC address. Takes less then 15 seconds.

  • Download another file from RapidShare

I know these methods are not the greatest, but I have not found anything else that works as painless as these.

Disclamair:This article,we have found in an Orkut forum and we do not take any © authorities. Please forgive us if it violates any © policy.

Wednesday, December 26, 2007

Break Into Email Accounts!

Expertise Level: Intermediate

Warning:We are not to teach hacking with this post,it is just for knowledge purpose and we do not take any responsibility for any ill you end up with.We don't encourage you to do the following,It is up to you.
BEWARE!



Introduction

I have written this tutorial to address a question that is all too commonly asked in any channel/chat room with "hack" in the title (asked in frequency to the point of harrassment really). So since this is a question that so many people ask, then I believe that there should at least be an answer available (regardless of the morality or "lameness" of such a question). So you as the reader are most likely reading this because you want to break into somebody's email account.


Well, you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do this for you. There is no program that is going to do all this for you. Also don't forget that nobody is going to hold your hand and lead you through this. I'm offering you as the reader suggestions for ways you can address this task, and that is about all the help you are going to get from anybody. So now that I've made all that clear, let's begin...

Things You Should Know

As I mentioned in the previous section, there is no program that will do all this for you. Almost all the crackers you see out there will not work, because services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts. There are some rare exceptions, like some crackers for Yahoo! that are made for cracking "illegal" accounts, but the thing you must understand about those types of crackers is that they are built to crack SPECIFICALLY "illegal" names. They can not be used to target a specific account on Yahoo!, so don't try to use them for this purpose. Another thing you must know if you ask this question in any "hacker" chat room/channel (which I highly discourage), or if you read something on this topic, and you hear that you have to email some address and in any way have to give up your password in the process, do NOT believe this. This is a con used to trick gullible people into handing over their passwords. So don't fall for this. Well that concludes this section, now lets get to what you want to know.


If You Have Physical Access

I will start off with options you have if you have physical access to the computer of the user that you are targeting, because it is a lot easier if you do. One option you have, that you will hear a lot if you ask this question, and anybody bothers to answer is to use a keylogger. A keylogger is an excellent option, and probably the easiest.
There are a lot of keyloggers out there, ranging from hardware keyloggers, to software keyloggers. For this task, you won't need to buy a hardware keylogger, since the only advantage to a hardware one is that you can grab passwords that are given to access a certain local user on the operating system used.
There are a lot of software keyloggers out there, and you can feel free to check out www.google.com to look at your options. I will go ahead and toss a couple of keyloggers out to try for those of you who seem allergic to search engines.


One option you have that is good for a free keylogger is Perfect Keylogger (which you can find at www.blazingtools.com/bpk.html). It works just fine, and has some nice options to keep it hidden from your average end user (computer user).


Another option you have, which is probably the best one you can get is Ghost Keylogger. It has a lot of options that will allow you to get the results of this program remotely (it will email you the results). However, this is not a free keylogger, so if you are wanting to get a copy you can look on the file sharing networks for a copy of the program, and the serial number for it (look on www.zeropaid.com for different file sharing clients you can try).


Once you have whatever keylogger you are going to use downloaded, just install it onto the computer you are wanting to monitor, and wait till next time they login to their email account. You will then have the password for the account. Another option you have if they use Outlook to access their email account, is to copy the *.dbx files for their Outlook account onto a floppy, and extract the emails at home (the dbx file stores the files stored in each Outlook folder on a given account, meaning the received and sent emails). When you are on the computer of the user you are targeting, look in

C:\Windows\ApplicationData\Identities\{ACblahblahblah}\Microsoft\ OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you take the .dbx files back to your house, use DBXtract to extract the messages from these files. Check out the link below to download this program....

www.download-freeware-shareware.com/Freeware-Internet.php?Type=4171


Another option you have if you have physical access is to execute a RAT (Remote Administration Tool, you may know these programs as trojans) server on the computer. Of course, you do not have to have physical access to go this route, but it helps. What you must understand is that these tools are known threats, and the popular ones are quickly detected by antivirus software, and thusly taken care of. Even ISPs block incoming/outgoing traffic from the most popular ports used by these programs.


One newcomer in the RAT market that you should know about is Project Leviathan. This program uses already existing services to host it's service, instead of opening up an entirely new port. This allows it to hide itself from any port detection tool/software firewall that may be in place. This of course will not guarantee that it's server program will not be detected by any antivirus software used (actually, if the user has kept up with his/her signature tables, then it WILL be detected), but it will give you more of a chance of holding access. Search the engines to download Project Leviathan...


Once you have downloaded this tool, follow the instructions listed to install and use this program. However, since this RAT is a command line tool, you will still need another program set up on the user's computer in order to catch the desired password. For this, you can use Password Logger.. Google it!


Once you have this downloaded, set it up on the targeted computer. The program will remain hidden, while logging any types of passwords into a .lst file in the same directory that you executed it on. Therefore, you can access this *.lst file through Project Leviathan remotely in order to retrieve the user's email password remotely. Well that pretty much concludes it for this section. At this very moment I can practically hear a lot of you thinking to yourselves "But, but I don't HAVE physical access!". No reason to worry, that's what the next section is for...

If You Don't Have Physical Access


Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.


To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...

On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).


If you don't like any of those, I'm afraid you are going to have to go to www.google.com, and look for some yourself. Search for something like "optix pro download", or any specific trojan. If you look long enough, among all the virus notification/help pages, you should come across a site with a list of RATs for you to use (you are going to eventually have to learn how to navigate a search engine, you can't depend on handouts forever). Now back to the topic at hand, you will want to send this file to the specified user through an instant messaging service.


The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.


So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.


Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.


Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...

While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...

http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=539&lngWId=8

Just insert this source into your page along with the exedrop script, and you are set. Just convince the user to go to this page, and wait till the next time they type in their email password. However, what do you do if you can not contact this user in any way to do any of the above tricks. Well, then you definately have your work cut out for you. It doesn't make the task impossible, but it makes it pretty damn close to it. For this we will want to try info cracking. Info cracking is the process of trying to gather enough information on the user to go through the "Forgot my Password" page, to gain access into the email account.

If you happen to know the user personally, then it helps out a lot. You would then be able to get through the birthday/ zipcode questions with ease, and with a little mental backtracking, or social engineering (talking) out the information from the user be able to get past the secret question. However, what do you do if you do not have this luxury? Well in this case you will have to do a little detective work to fish out the information you need.

First off, if a profile is available for the user, look at the profile to see if you can get any information from the profile. Many times users will put information into their profile, that may help you with cracking the account through the "Forgot my Password" page (where they live, their age, their birthday if you are lucky). If no information is provided then what you will want to do is get on an account that the user does not know about, and try to strike conversation with the user. Just talk to him/her for a little while, and inconspicuously get this information out of the user (inconspicuously as in don't act like you are trying to put together a census, just make casual talk with the user and every once in a while ask questions like "When is your birthday?" and "Where do you live?", and then respond with simple, casual answers).


Once you have enough information to get past the first page, fill those parts out, and go to the next page to find out what the secret question is. Once you have the secret question, you will want to keep making casual conversation with the user and SLOWLY build up to asking a question that would help you answer the secret question. Don't try to get all the information you need in one night or you will look suspicious. Patience is a virtue when info cracking. Just slowly build up to this question. For example, if the secret question is something like "What is my dog's name?", then you would keep talking with the user, and eventually ask him/her "So how many dogs do you have? ...Oh, that's nice. What are their names?". The user will most likely not even remember anything about his/her secret question, so will most likely not find such a question suspicious at all (as long as you keep it inconspicuous). So there you go, with a few choice words and a little given time, you have just gotten the user to tell you everything you need to know to break into his/her email account. The problem with this method is that once you go through the "Forgot my Password" page, the password will be changed, and the new password will be given to you. This will of course deny the original user access to his/her own account. But the point of this task is to get YOU access, so it really shouldn't matter. Anyways, that concludes it for this tutorial. Good luck...

Happy Hacking!

Saturday, December 22, 2007



Speeed Up UR Internet Explorer 4/5/6 !!!

This tip will work on any Win 95/98/2000/ME and NT4 systems with MS Internet Explorer 4/5/6 installed.

This Registry hack tip speeds up internet/remote (using Windows Explorer and/or Internet Explorer) browsing processes considerably on most MS Windows 32-bit machines connected to a network and/or remote computer(s).

This actually fixes a BUG in MS Windows O/S's that scan shared or remote
folders and files across a network for Scheduled Tasks. This can add a delay as long as 30 seconds
in some machines(!) This is because I.E. uses extra time to search the remote computer(s)
for the tasks.

Steps:




To stop this feature of I.E., open Regedit.

Go To:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\

RemoteComputer\NameSpace


Click the + sign beside NameSpace


Below NameSpace you will see a sub key named: {D6277990-4C6A-11CF-8D87-00AA0060F5BF}

Right click on {D6277990-4C6A-11CF-8D87-00AA0060F5BF}
and delete it.


Note:Editing The Registry Is Dangerous And May Cause system Instabability .....

To Speed up UR Browsing Experience Download

Mozilla Firefox Located At The Top- right Of My Blog

And Increase Speed By 200% ...

Tuesday, December 18, 2007

Free!!!! SMS FRom Yahoo Mail

Yahoo mail is now out of beta phase and users can send free SMS to mobile phones (selected countries only).







Incidently, Yahoo Messenger already has this feature available. Along with integration of text messaging feature(upto 145 characters), it let you pick a new color for your email interface too.

So, what do you think, will Gmail face competition from Yahoo with the inclusion of new features?


Thursday, December 6, 2007

Free Mp3 - Parent Directory-1000000000s of songs

Hey guys I found a great source for free music stuff for all the music buffs...

I got some parent directory of music site from where you can download 1000s of songs...


  1. Directory1> (quantity music not quality but a must visit)
  2. Directory2

  3. Directory3

  4. Directory4

  5. Big DJ collection(various songs of various DJs

  6. Huge Collection of Songs(songs from a to z)
  7. Themes of various movies and etc..

The list is still to be updated....