Pages

Thursday, March 31, 2011

Command Prompt Hacks |How to hide partition

1.Select Start , then Run , in Run option type cmd. (or  start->All Programs->Accessories->Command Prompt)
2.In Command Prompt (cmd) type DISKPART


DNN (DotNetNuke) Hacking

DNN (DotNetNuke) Hacking
Hello Friends,
Today I will explain a new hacking technique known as DNN (DotNetNuke). I will show you how to hack a DNN website. Is it easy? Yes. It is easy compared to other hacking attacks such as SQL-Injection and Cross Site Scripting. I will teach you how to find your target and how to enter into the target website and upload your files.

How to get your own Rapidshare Premium Account

How to get your own Rapidshare Premium Account
Hello Friends,
Everybody wants a personal Rapidshare premium account but not all can afford it. If you are one of those people who can’t afford it or don’t want to ask your parent to buy you one then there are only 2 ways of getting a Rapidshare premium account. First one is to hack a Rapidshare premium account of some other user. But Rapidshare guys are very smart. They provide users with a feature of locking their account due to which you will need access to the email account of that victim to change the password of that Rapidshare account. Thus you can only use that hacked account till the owner of that account changes the password. This one seems to be a temporary solution. Second way is to earn some easy bucks online and buy your own Rapidshare account. The second way may seem difficult at first but to tell you the truth its very easy.

Customize Google to Improve Search Results

Google is indisputedbly the best search engine out there on the Internet, however there are a few ways by which you can customize Google and make it even better. I have got 3 best free Firefox extensions using which you can customize Google by adding extra useful information to your search results andremove unwanted informationlike ads, spam and click tracking so as to improve the overall searching experience. The following are the 3 best extensions for Firefox using which you can improve the search results.

10 Tips for a Total Online Security

the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online security.

Sunday, March 27, 2011

Sniffing Wireless Data

Whether you are directly connected to a wireless network or not, if there is wireless network in range, there is data flying through the air at any given moment. You will need a tool to be able to see this data.

How to hack someone Facebook account

Facebook Hacking Software APR v.7.4.11 released !! You can use this hacking software to hack Facebook password. We call it Advanced Password Retriever (APR) because the hacking software can hack not only Facebook account but can help you to hack into someone's MySpace account password, also to hack any Email password. The whole hacking process takes only few minutes, just watch our video demo to see how fast the software can get the password for you.Kindle DX Wireless Reading Device, Free 3G, 3G Works Globally, Graphite, 9.7" Display with New E Ink Pearl Technology

A Virus Program to Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.

How to Create a Computer Virus?

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.

Domain Hijacking – How to Hijack a Domain


Domain hijackingIn this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.
Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).

How to Become a Hacker

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a samilar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me ”How to Become a Hacker”. In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.

How to Hack a Gmail Account

With Gmail being one of the most widely used email services across the globe, it has also become a favorite place for many to engage in secret relationships and exchange cheating messages. As a result, sometimes it becomes inevitable for people to hack the email account of their spouse or girlfriend so as to reveal the secret. So, it’s no wonder why many people want to know “how to hack a Gmail account”.
In this post, I am going to tell you some of the Real and Working ways to hack a Gmail account. However, before that, I want to make you aware of the common myths and scams associated with email hacking.
1. There is no readymade software program that can hack Gmail with just a click of a button. So, stay away from those websites that are waiting to rip off your pockets by selling fake products.
2. Most of the email hacking services on the Internet claim to hack Gmail password for just a small fee of say $100. I have personally tested many of those services and all I can tell you that they are nothing more than a scam.
With my experience of over 8 years in the field of ethical hacking and security, I can tell you that there are only two ways to hack Gmail password. They are:
1. Keylogging
2. Phishing

Keylogging: Easiest Way to Hack Gmail

Keylogging is the easiest way to gain access to any email account. Keylogging involves the use of a small program/software called the keylogger (also called as a spy software). This keylogger, when installed on a given computer, will capture each and every keystroke typed on the keyboard including passwords. Keylogger operates in a complete stealth mode and thus remains undetected.
The use of keyloggers doesn’t demand any special knowledge. So, anyone with a basic knowledge of computer can install and use the keylogger. To hack the password, all you need to do is, just install it on the computer of the target user. Once the victim logs into his Gmail account from his/her computer, the login details (username & password) are captured and stored instantly. You can later access the stored logs to find out the password.

How to Hack an Email using Hardware Keylogger

Did you know that keyloggers are the simplest way to hack an email password?. Today I’ll be giving you a detailed information on hardware keyloggers and their use. I will also teach how to hack an email using hardware keylogger. If you are new to the concept of keyloggers or haven’t read my previous post about email hacking then you must refer my previous post Hacking an email account. Here I’ll give a breif description about keyloggers.
A software keylogger (or simple keylogger) is a stealth computer program that captures every keystroke entered through the keyboard.
Now I’ll tell you what is a hardware keylogger and how it can be used for hacking an email.

Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.
So by looking at the above images we can come to know that hardware keyloggers look just like any USB or PS/2 device. So it is very hard to identify it as a keylogger.

Insatalling a Hardware Keylogger to Hack the Email Password

The hardware keylogger must be installed between the keyboard plug and the USB or PS/2 port socket. That is you have to just plug in the keylogger to your keyboard’s plug (PS/2 or USB) and then plug it to the PC socket. The following image shows how the keylogger is installed.
Once you install the hardware keylogger as shown in the above two images the keylogger starts recording each and every keystroke of the keyboard including email passwords and other confidential information. The hardware keylogger has an inbuilt memory in which the

What to Do When Your Email Account is Hacked?

How to Recover Hacked Email Accounts?

Email Hacked?It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

Saturday, March 26, 2011

Multi Google Talk Login without any software

       Just follow the simple steps Below:
1) Right click on the Google Talk shortcut.
2) click on Properties.
3) Go to Shortcut tab on Google Talk Properties window.
4) On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).
“c:\program files\google\google talk\googletalk.exe” /nomutex
5) Click on OK.
  I didn't have to do anything after this and clicking on the shortcut multiple times just gave me different Google talk window.

SURF ORKUT WHERE IT IS BLOCKED


              Here are some proxy website links using which you can browse not only orkut but many other sites. Proxy sites are the websites, that hide your web identity from other websites. Mainly Ip address is Hidden

ACCESS INTERNET THROUGH UR MS CALCULATOR

This trick will allow you to access internet through Calculator. Calculator can be used as a web browser.

1. Open your MS Calculator. This is normally found in Start => All Programs => Accessories => Calculator.

2. Open the help-window by pressing the F1 key.

Skip or bypass Rapidshare, Megaupload Waiting time

Yes, you are reading it correctly, its not a prank or joke, now you can easily avoid the waiting time or usually we say time limit when you download as a free user from the file sharing services such as rapidshare, megaupload, deposifiles, hotfile. Normally you have to wait for 20-60 minutes to download the second file after downloading the first one. They implement ways to invite users to purchase a premium service. But this way of limiting Free download limit and asking free users to wait for long time to start another download can be annoying one.

Hacking Windows SEND TO MENU


  How often do you copy songs from a CD? Or some photos from a CD?

What do you do? You select the required files and do a CTRL –C. Open the destination folder and do a CTRL-V. Here is something you can benefit time from. Customize your SEND TO MENU.

Multiple login in yahoo Without Using any Software

  Multiple login in yahoo Without Using any Software

You can login with multiple id's on the same yahoo messenger without any download or patch .
Follow these steps :
 
1.   Go to Start ----> Run . Type regedit, then enter .

2.  Navigate to HKEY_CURRENT_USER --------> Software ---> yahoo  --->pager---->Test

3.  On the right page , right-click and choose new Dword value .

4.  Rename it as Plural.

How to find the IP address of the sender in Gmail, Yahoo! mail or Hotmail

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding IP address in Gmail

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is

65.119.112.245.
That is be the IP address of the sender!
5. Track the IP address of the sender

Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail
5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender!
6. Track the IP address of the sender

Finding IP address in Hotmail

1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail
5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
9. Track the IP address of the sender

How to crack IIS FTP password using Brute-Force

FTP is an application or service or protocol  which can be used to transfer files from one place to another  place ,it really comes very handy  during transfer of files from a local box to a remote one .Suppose someone get access to your FTP then he/she can cause nightmare for you by uploading  unappropriate images or files etc.Here we will discuss how we can crack the password of IIS installed FTP service in Windows.

How to Increase Speed UP PC Computer Speed

Increase Speed UP PC Computer Speed

One of the most effective and useful tool to speed up the performance of your computer is to defragment your hard drive. Defragmentation of the hard drive is referred to rearranging the scattered files stored in your hard drive. Actually the data you store in your hard drive increases with the course of time. Then data becomes scattered in the hard drive and needs arrangement so that computer can easily access and run programs from the hard drive. If data is arranged with the help of defragmentation then computer easily access the data and thus requires less time to access and run the programs. Remember that the files stored on the hard drive are in fragmented form. These files are very hard for the computer to open and run. That is why computer supports the defragmentation tool because it helps a lot to let the computer open and run the files.

Stop Autoplay In USB Flash Drives By Pressing One Keyboard Button

Most of the virus enters the computer through USB Flash drives, when we open the drive through autoplay the viru is a simple tip with which you can stop autoplay in USB Flash drives. Not only flash drives, it also stops autoplay for CD and DVD also.