TOP 15 SOFTWARES FOR WINDOWS

0 comments
The hard drive received a full format, Windows XP/Vista/7 has finished installing, and now it’s time to decide what to install next. Whatever you do, don’t allow that PC to touch the Internet before finishing it off with the most important updates and applications.Friends sometimes ask me what software they should install on their PC. So i am posting some important software list here.
For best results, install these freebies before you install any other applications :

1- Keep viruses away with Avira Antivirus. [download ]
First things first. One of the best software to install for a newly bought PC is an antivirus. Avira provides one of the most reliable, popular and free antivirus protection out there.
2- Remove trial software with PC Decrapifier. [download]
Some of the most major computer brands out there are shipped to consumers with annoying, trial based software. If you want to remove them a.s.a.p, this one is essential.
3- Keep spywares at bay with Spyware Terminator. [download]
Virus protection? Check. Spyware protection with removal and real-time scanning capabilities? Let this terminator works its wonders.
4- Remove junk items from your hard disk with CCleaner. [download]
CCleaner removes unused files effectively and keeps your hard disk clean from junk items. As a bonus, it comes with system optimization and privacy protection capabilities.
5- Defragment your hard drive in real time with IOBIT Smart Defrag. [download]
Fed-up with the ineffective default Windows defragmenter? Use this tool to defrag your hard disk in real time without having to stop your work each time you want to optimize your hard drive.
6- Proactively protect your computer with Spyware Blaster. [download]
Double up your computer protection from spyware attacks with this tool. Keep this one constantly updated to keep your system spyware-free.

7- Tweak and optimize your Windows capabilities with Fresh UI. [download]
Looking for an easy way to tweak your system without having to dive into manual registry editing? The ultimate registry tool for dummies (and experts too!)
8- Minimize hacker threats with ZoneAlarm Firewall. [download]
Protect your DSL or cable connected computer from malicious Internet users with this popular, excellent personal free computer firewall.
9- Delete important files and folders securely with File Shredder. [download]
Always remember that files that you remove via the recycle bin can still be recovered, if the disk sections have not been overwritten. To delete (and shred!) sensitive files permanently, this tool is an obvious choice.
10- Encrypt your data with TrueCrypt. [download]
One of the safest ways to secure sensitive files on a hard disk is to encrypt it with a secure password and algorithm. Even a noob can do it with TrueCrypt. Ridiculously useful.
11- Backup important files online with Dropbox. [download]
The Dropbox client allows you to effortlessly save, access and sync 2GB of important files between your computer and a free online backup server. Never lose any essential documents again!
12- Recover accidentally deleted files with Recuva. [download]
Does what it says above. A nice tool to have during difficult times.
13- Easily hide folders with Free Hide Folder. [download]
Looking to hide that important files and folders easily with an easy to use interface? Look no further, Free Hide Folder is here!
14:Firefox: A great alternative browser, and it’s less hacked/attacked than Internet Explorer.[download] 15:Trillian: The ultimate all-in-one instant messenger/IRC client.[download]
Continue reading →

TECHNIQUES BEHIND PHISHING ATTACK

0 comments

Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.
Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.
TECHNIQUES BEHIND PHISHING ATTACK
1.Link Manipulation
Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL
www.micosoft.com
www.mircosoft.com
www.verify-microsoft.com
instead of http://www.microsoft.com/
2.Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.
How does a phishing attack/scam look like?
As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like


Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.
To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.
These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.
How to identify a fraudulent e-mail?
Here are a few phrases to look for if you think an e-mail message is a phishing scam.
“Verify your account.”
Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.
“If you don’t respond within 48 hours, your account will be closed.”
These messages convey a sense of urgency so that you’ll respond immediately without thinking.
“Dear Valued Customer.”
Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name.
“Click the link below to gain access to your account.”
HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.
Notice in the following example that resting the mouse pointer on the link reveals the real Web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s Web address, which is a suspicious sign.


So the Bottom line to defend from phishing attack is
 
1.Never assume that an email is valid based on the sender’s email address.
2.A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal email.
3.An email from trusted organization will never contain attachments or software.
4.Clicking on a link in an email is the most insecure way to get to your account.
Continue reading →

CD ROM PRANK VERY COOL

0 comments
First of all let me clearify that all these pranks which i m goin to post here are not any hacking or sumwhat like that... so be relax

now what r these..

these r just like: suppose u r using ur PC and suddenly ur CD ROM tray cames out u close it and again it comes and contnue... wont u be scared??

but its nothing to be scared its just a pranky script.. OKies

i will regularly be posting such tpe of scripts and also mentioning there effect..

one more thing. how to stop all these pranks???
just SHIFT + DELETE
or Ctrl + Altr + delete and close the program
or u can restart ur computer..

lets start prank no 1

It will Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!

step1. open note pad and Type the following code (u can copy paste it from here):

Code:





Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop


copy from set to loop


Save this file wid naming "Anything.VBS"(anything means u can name it according to ur wish but in last u must add ''.VBS'' ) and send to ur freind.
when ever he/she will click it his/her CDROM tray start goin crazzy :)
Continue reading →

SET DOUBLE PASSWORD EASY TRICK

0 comments

Strong passwords should have a significant length and cannot contain normal words. Only random digits and letters of different case. Such passwords are extremely hard to remember and it takes time to enter. But, even strong passwords have their weaknesses. When you type a password, it can be intercepted by a spy program that logs all your keystrokes. Others can see what you type (even if the password field on the screen is masked, the password can be read by buttons you hit on your keyboard.)




Until now, the only solution was to buy a secure token. A secure token is a hardware key that is used instead of or in addition to your normal password authentication. There are two main problems with the hardware solution, though. First, it is expensive. And second, you can use them only with software that has built-in support for this method of authentication.


But, from now on, you can turn any USB flash drive into a secure token! No need to purchase an additional expensive device. All you need is about 2 megabytes of free space on your flash drive or other USB gadget, such as an MP3 player, PDA or even a USB-pluggable mobile handset.



Strong Password



How does it work?
 Our software, Double Password, installs onto your flash drive. When you type a password, the program intercepts it and converts it into a super-strong password string on-the-fly. You can use simple, easy-to-remember passwords without the risk of being cracked.

Another benefit of using Double Password is that nobody can steal your passwords. Spy programs are useless. Even if someone gets the "weak" password that you type on the keyboard, it means nothing. This password will only work when your USB flash is inserted.

While typical hardware locks will work only with software that supports secure tokens, Double Password works with any software. 
It simply substitutes your weak password with a strong one.

Double Password can be effectively used to securely lock your Windows account, to protect your laptop and to bring a new level of security to all software that uses password authentication.


Continue reading →

I HACK MANAY PASSWORD

0 comments

I HACK MANAY PASSWORD USING THIS WONDERFUL TOOL ITS VERY EASY TO HACK SOME ONE


Ardamax keylogger is now very old keylogger and usually detected by most antiviruses. Though old, it is still one of most used Keyloggers. We can use Binders and Crypters to make Ardamax keylogger FUD (Fully UnDetectable). So, I will inform you about Ardamax Keylogger install and use in this article. I have provided link for software download.... just read on. ~~Step By Step Guide~~

1.First Of All Download Armadax Keylogger From Here 



2. After downloading, unzip Ardamax keylogger using Winzip Or Winrar



3. Now, after installing, you will get Ardamax log icon in task bar. Right click on it and select "Enter registration key" and make it full version by entering serial key from Serial key.txt file.

4. Go to http://www.drivehq.com and sign up for free FTP account. You need this to direct your keylogger logs and then access these logs. These are the logs that will give you desired passwords. After logging in your FTP account (make sure you are at Online Storage), create a new folder with name "Logs".

5. Now, right click on Ardamax taskbar icon and select "Remote Installation"



6. Click on "Next" to get Appearance screen. Here, click on "Additional components" and untick "Log Viewer" and hit Next.


8. On Web Update screen, simply click Next.

9. Now, you come to Options, and select apt options as you need. eg: It is better to have keylogger run in Stealth mode - so tick "Start in hidden mode" and so on. Click on Next.

10. On "Control" screen, check the box "Send log every" and put time as 30 minutes. Then, in delivery, uncheck "Email" and check "FTP". Leave Include as it is. And uncheck "Send only if log size exceeds". Proceed with "Next".

11. Now, on FTP, enter as below:
FTP Host: http://ftp.drivehq.com
Remote folder: Logs (the one you've created in Step 4)
Username and password: Enter your FTP Username and pass (from Step 4).

12. In "Control" check every box and hit "Next".

13. In Screenshots screen, you can put your own values and hit "Next" to come to Destination. Choose the Keylogger Engine path where you want to put the keylogger on your computer
. Untick "Open the folder containing the keylogger engine" to avoid yourself from being keylogged. Choose the icon you want to use for keylogger. Now, click "Next" and then "Finish".


14. Now, when you have keylogger engine ready. But, this is detected by antivirus as hacktool and so we have to bypass antivirus detection

So U need A Good Crypter For Undetect ur Server.exe File

Open This Website U Get So Many Crypters Get It From 
Here

Note:- Your antivirus may detect the downloaded Ardamax keylogger file as virus. Please deactivate your antivirus while installing this Ardamax keylogger. Don't worry, I never play such cheap pranks of hacking my readers.
So guys, I hope this Ardamax keylogger tutorial will help you in installing Ardamax keylogger for hacking passwords. Remember, ardamax keylogger is detected as hacktool (virus) by most antivirus. So, dont forget to crypt and bind your keylogger file. If you have any problem in using Ardamax keylogger to hack email passwords, please mention it in comments.

HelpFul Vedios


http://www.youtube.com/watch?v=bzbYak3CFGM
http://www.youtube.com/watch?v=AZx_gU7FK5c
Continue reading →

why pc crash(reasons)

0 comments
 
Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1. Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow ‘!’ appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as ‘IRQ holder for PCI steering’. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.


2. Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can
make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3. BIOS settings
Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer’s display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to ‘yes’ to allow Windows to do this.)






4. Hard disk drives
After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
5. Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card’s manufacturer on the internet and search for the most recent drivers for it.
6. Viruses
Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec (www.symantec.com).
7. Printers
The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer’s performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer’s default settings and you may be able to carry on.
8. Software
A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don’t do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn’t work.
Remember to restore all the BIOS settings back to their former settings following installation.
9. Overheating
Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.
10. Power supply problems
With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.
*******************************END


Continue reading →

RapidShare.com download tool fast and easy download

0 comments

RapidShare.de and RapidShare.com download tool.

THE ONLY LEGAL PROGRAM FOR DOWNLOADS FROM RAPIDSHARE !!!

Bypasses download limitations. Download multiple files at once. Download even more than with premium !


What’s new
- fixed rapidshare.com grabber
- fixed rapidshare.com link checker
- added huawei tool for renewing IP address for ADSL users(Supported hardware: SmartAX MT882 ADSL Router/Modem) – currently we support only USB mode, next version will alow to specify router address (it is now set to 192.168.1.2 — you can configure your router to that address anyway so it will work in “Network Mode” — i.e. when connected to the LAN NIC))
This release is sponsored by StackFile Corp.
NOTE: This program is not Vista compatible,  but works fine with disabled UAC (User Account Control – very useful and inovative thing which renders your computer useless and annoying to use it). We have decided to host this version on our server (Read notes bellow).
Download Link
http://www.mediafire.com/?dv02thfxa0x
Continue reading →

This Incridable Virus Maker is 100% Free

0 comments
Continue reading →

LIVE CRICKET MATCHES CHAMPIONS LEAGUE

0 comments


Continue reading →

EARN MONEY ONLINE ITS NOT FAKE 100% GENUINE

0 comments
EARN 10 $ FOR EVERY REFFERAL

EARN MONEY

BEST WAY OF EARNING ONLINE

Earn unlimited amount of money by this website click on the pic and earn 20 $ instantly and earn 10$ on every refferal its really cool you can redeam you cash through alert pay and pay pal

earn 1000$ in one month its not a joke
So dont waste your time earn money from internet by clicking and reffering link its very easy any one can do eaisly no need to have much knowledge of computers
its very easy ......''''
COOL TRICKS AND HACKS HOME PAGE - COOL TRICKS AND HACKSThis another site to earning money online
Continue reading →

HOW TO PREVENT YOUR ORKUT ACCOUNT FROM HACKERS

0 comments
We already discussed on how Orkut accounts are hacked from smart Orkut hackers by manipulating the victim (The account which is being hacked) in giving out his own password and account information using false technique such as Fake login page.So here are some of the tips for Orkut users to prevent from getting their own Orkut profile hacked!

Orkutting in Public Computer

Make sure you do not check the button “Remember Me” when you log in to your Orkut account from a publicly accessible Internet (Cyber Cafe).Someone might peep when you are typing the password,in such case strong password with numbers and capitalization are recommended.

Anti Keylogger

If you are visiting a local browsing center then try to check the programs installed in the computer.If you find keylogger (which stores password) then remove it immediately (Complain about this to the person who manages the browsing center).You can also install a Anti Keylogger to protect and safely log in to your Orkut account.Another solution for this is to make use of On Screen keyboard which is installed on every Windows Operation System.


Orkut hacking accounts

Never use Javascript code

If a friend scraps you to copy the javascript code and paste it in your browser address bar then re check the Javascript to understand the code.If you are familiar with the code then  make a search or better ignore such javascript scraps,no matter what they do! They are a time waster..

Re-Check Links via Scraps

Some people will blindly click on the website links sent by anonymous orkut user to the scrapbook.Re check the links once again and make sure you do not enter your password to any fake login page or give out any of the Orkut details if you are visiting a website or any link via orkut scrapbook.

Strong Google Gmail password

If you are having a password which is easy to remember then change is as soon as possible.Because hackers can make use of programs such as “Brute Force” to easily detect your password (If the password is short and is a dictionary word).Make use of Password generators and take a note of your password.Also make sure you have a good security question & answer which none of your friend can easily guess.

Check the address bar

Everytime you visit someone’s profile via links or any orkut community then check the address bar to ensure that you are on Orkut.com website.If you detect any different url then do not panic, immediately change your orkut password!

Stay away from Orkut Strangers

If someone requests for friendship then checkout his/her profile, check scraps, orkut communities and mutual friends joined by the person.So that you get a clear idea if the person is genuine or a orkut hacker who want to abuse your profile.

Maintain Orkut Privacy Profile

Keep your profile private if you are too much concerned about your privacy.Generally this will help you a great deal if you are orkutting to connect with Well-Known friends as it eliminates anonymous scraping and friendship with strangers!

Remember to Logout

Make sure you do NOT forgot to Log out from the Orkut website if you are accessing Internet from a public area.Once again double check Orkut,Gmail and Google services.
Continue reading →

HOW TO GET BACK YOUR ORKUT/GMAIL HACKED ACCOUNT

0 comments

Everyone should read this no matter how safe you think you are! As Google Account is a single account used across all Googles services like Gmail,orkut, Blogger, Adsense, Checkout. etc, it can turn out to be our worst nightmare if it gets hacked! Like many other online services Google tries to protect your account with secret question as well as optional secondary email address. But there is one more official option which only Google Provides! Now lets go step-by-step?

#1.Trying "Forget Password" Option:


I know this will not work in most cases, as options like forget password rely on secondary email address and security question, both of which can be easily changed once a account gets hacked. Still you should try atleast once as most password gets hacked by script kiddies and not by real hackers. So go to Forget Password form first!


#2. What if "Forget Password" Option Fails


You can submit a form to Google in which you can provide details about your Google Account usage. Details include information which most likely only real owner can provide. Here are few things for example?

* Last successful login date
* Account creation date
* Google products you used with this account and the date you started using each one
* Details about orkut account (if you use orkut)
* Details about Blogger account (if you use Blogger)

Now most important part is what they quoted on the form,

"Please answer each question as thoroughly and accurately as possible. If you?re not certain about some of the information, provide your closest estimate. Whether or not we can return your account depends on the strength and accuracy of your responses."

So I will suggest following things?

* Your goal should be to give Google maximum & accurate data! So take your time and submit form with maximum amount of information possible. You can consult your trusted friends if you are not sure. As an example it could be Vicky or Pankaj who invited you on orkut. If you are not sure call them up and ask it!

* Submit only one form! Yes this should be common sense. Do not submit multiple forms. A person who uses around 10-15 Google products asked me if he can submit multiple forms mentioning different Google products.

* Submit form from the place which you use most often to access your account like PC at home! Although they haven?t mentioned this explicitly, line above submit button says, "Please note that we need your IP address in order to resolve this issue. Your IP address will be captured automatically when you submit this form."

Finally Contact Form is here!

http://www.google.com/support/accounts/bin/request.py?contact_type=ara&ctx=accounts&hl=en


I advise everyone to have a look at this form and information it asks. You can prepare a document about secret info, may be in cell phone or pen down it on a paper. This will come handy if something goes wrong in future!

I guess I have offered my best possible help on the issue. It may or may not work but Thats all I can do.
Continue reading →

Orkut Hacking 100% Working

0 comments

Orkut Hacking 100% 


 

guys heres d fake page of orkut der are in total 4 files dat u simply need to upload on php supported webhost i suggest ripway

http://rapidshare.com/files/158948786/OFPFP.rar

extract the files den upload

u need not edit anything in dz

once u will upload the files u will see three files and der wud b a file

[content suppressed]

where xxxxxxxxxxx is ur user name,u need to send this link to the victim making any story blah blah or wotever u make

once d victim enters d details in the page and d moment he will press enter u will get the username and password wotever he has typed in inside ur php supported webhost account in the fourth file dat wud be login.txt and now visible

after uploading the files you can try by typing anything in the user name and password

to view username and password click on the edit link of the login.txt file and initially this file wud be invisible u can make it visible by typing any details in the fake page urself


dont use this trick to hack unknown people,i know still many people wud do but think how u gonna feel wen ur account wud be hacked by sum1 else yup u can enjoy by hacking ur friends account still i know u will work according to ur wish

enjoy
Continue reading →

FREE CALLING FROM PAY PHONES VERY GOOD TRICK

0 comments

i know this is not hacking......but good trick

Steps:
1.Insert Coin
2.Dial 0##Phone No. *(star)
3.Call Unlimited
4.And Disconnect
5.Coin Comes Out
6.Go Home Smiling(hehehe)

source of trick
trick from orkut communities
Continue reading →

SOCIAL NETWORKING SITE FOR HACKERS AND NEW BIES

0 comments
JOIN INDIAN HACKERS SOCIAL NETWORKING SITE
LATEST HACKING STUFF AND YOU CAN MEET HERE REAL HACKERS AND A CHANCE TO LEARN FROM EXPERTS IF YOU ARE A HACKER AND IF YOU WANT TO LEARN HACKING JOIN THIS SITE ....
CLICK ON PIC TO ENTER THE SITE













COOL TRICKS AND HACKS HOME PAGE - NISHANT COOL TRICKS AND HACKS
Continue reading →

trace any ip address

0 comments

How to Trace Any IP Address


ipmap

In my earlier post I had discussed about how to capture the IP addressof a remote computer. Once you obtain this IPaddress it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com. Just go to http://www.ip2location.com/demo.aspxand enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of abutton you can find the following information for any given IP address.

1. Country in which the IP is located 2. Region 3. City 4. Latitude/Longitude 5. Zip Code 6. Time Zone 7. Name of the ISP 8. Internet Speed 9. Weather Station 10. Area Code and 11. Domain name associated with the IP address. A sample snapshot of the results from ip2location.com is given below

ip2location_results
You can also visually traceroute any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.
Continue reading →

Top Tips to Become a Hacker

0 comments
Top Tips to Become a Hacker
 http://www.owningpink.com/wp-content/uploads/2009/08/hacker2.png
Certainly there are many sources of information available that can give you computer hacking basics. There is actually some misconception about who a real hacker is. Hacking computers is performed by one who knows computers very well - even the extra tricks of a computer and electronics.

window.google_render_ad();
He can easily tweak these according to his needs and become hacker. This is the way the term was used when Bill Gates was inventing Windows.


Those who are often referred to as hackers today, should actually be called "crackers" - people who do not have unauthorized access, like a safe-cracker. If you doubt me, and want to know how to be a hacker then do a search on the term "professional hacker," and you will find many professional and legitimate computer training courses being offered. They are the ones learning the real hacker secrets.What Are The Basics Needed To Become A HackerEveryone has heard of one individual or another that was caught while hacking computers that belonged to this or that organization. Because hacking into computers is highly illegal, it should be mentioned that this article will not mention any real specifics about the subject, and this author would rather gladly encourage you to become a real hacker - professionally.



This article, will however, give a brief overview of criminal hackers, some of their methods, and a few things you can do to make your own computer safer from hack attacks. Here are those things you need to learn on how to become a hacker.


  • Learn ComputersIt should go without saying that the first thing that is needed is to learn about computers. This means study. A lot of reading is involved along with just plain old-fashioned learning how to use a computer. Then, of course, there are the special aspects of computer study. The places where the tips are learned is often two-fold: a friend who has access to a computer, and a variety of places on the Web. But this is also an interesting thing - if a young person has the ability to learn, and wants to learn can use hacking tutorials- then why not take the time to learn the right things - things that can earn him a lot of money in the legit world? Is it possibly that it could be the friend he has that turns him away from the good?
Continue reading →

Top 7 firefox addons

0 comments

Top 7 firefox addons

This is a featured page http://www.ie7.com/firefox.jpg


Foxmarks
If you use more than one computer then Foxmarks might become handy as it keeps your bookmarks and passwords (optionally) synchronized.

Adblock Plus
This is a must-have add-on for Firefox. Many sites have annoying flash ads in them. Not anymore - Adblock plus blocks them all!
Sxipper
Tired of filling in various web forms and all the spam you get on your e-mail? This add-on automatically fills in registration forms and creates fake e-mails which forward to your e-mail. If you get too much spam from one of the fake e-mail you just cancel forwarding. Simple as that! Greasemonkey
If you want to make your browsing more comfortable then this comes handy as you can use all the user made scripts. The largest script database is at
Userscripts.
FireFTP
Don’t want to install an extra program for FTP? Download this add-on and you gain FTP access to servers from your browser.
ChatZilla
Another useful add-on with which you can chat on IRC networks and you don’t have to install a separate program!
URL Fixer
Ever mistyped the end of a address? This fixes all of your mistakes - if you type xptricks.ney it automatically corrects it to xptricks.net!
Continue reading →

TRICK TO REMOVE BIOS PASSWORD

0 comments

TRICK TO REMOVE BIOS PASSWORD

http://www.hardware-one.com/reviews/i845/Iwill_P4S/BIOS.jpg
HERE WE STARTS:-

At command prompt type debug
you will get a - prompt where you can type the fallowing ( means hit enter, not type enter*)

A
MOV AX,0
MOV AX,CX
OUT 70,AL
MOV AX,0
OUT 71,AL
INC CX
CMP CX,100
JB 103
INT 20
just hit enter on this line
G
Q


Basic BIOS password crack -


This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:
Get DOS prompt and type:
DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter
Restart the computer. It works on most versions of the AWARD BIOS.




Continue reading →

TOP 10 USB TRICKS

0 comments

10 Tricks With A USB Thumb Drive

A normal USB flash memory device - Windows XP tips & tricks

Any ordinary USB memory device can do a lot more than you probably thought it could. It can carry programs, encryption and even a full installation of Windows XP! Here is our tenlist for the coolest things you can do with a USB thumb drive:
12
Take your programs with you We all know how frustrating it is when we take your files to another computer just to discover that the software required to read the files is not installed. Here’s the simplest solution - take your programs with you - on your USB thumb drive. Here’s how to do it with Portable Apps: 1. Go to the Portable Apps website and download the installer, choosing the software you want to carry along. 2. Run the installer and install the software to the root of your USB thumb drive. And you’re done! As soon as you connect your thumb drive into a computer, Portable Apps will open up automatically.

22
Surf anonymously With Portable Apps and Firefox, you can surf the web without leaving any trace on the computer you are using. If you want extra security, install a Firefox security plugin such as FoxyProxy. To iput Firefox onto the drive, just copy-paste the Firefox folder from you computer, or install Firefox onto the thumb drive.

 31
Set a program to run automatically (autorun) Using autorun, you can set a program to start up automatically when you connect the drive to a computer. You can also use the same script for a data CD-ROM. Note that some computers have autorun disabled for security purposes. [Here's how to disable autorun.] Open up notepad and paste the following script:

[autorun] ShellExecute=filename Label=description UseAutoPlay=1
Make sure you replace filename with the full path to the file. For example, a file called program.exe in a folder called “programs” on the thumb drive would be /programs/program.exe Replace description with a short description of the program, for example, My Jukebox or Mozilla Firefox. Save the file as autorun.inf, making sure you select “All Programs” from the save menu, not “Text document”!

 41
Help! I’m lost! Ever lost a USB drive? Even if you haven’t, there’s a pretty good chance you’ll lose a few during your life. And with all the important information on it, it could be a disaster to have it fall into someone’s hands. A good idea is to encrypt all the information on the drive, but you would still want it back, wouldn’t you? Luckily, the folks at the Daily Cup Of Tech have come up with a solution.  Save a program called “Help! I’m Lost!” on the drive, that a finder just can’t get around opening. The program opens a message box with your personal “I’m lost” message. It’s a good idea to offer the finder a bigger reward than the drive itself, so that they’ll be interested in contacting you.

 5

 An unusual USB thumb drive... - Windows XP tips & tricks

Hide the drive inside something Why not surprise your friends and co-workers by sticking something that looks like a broken USB cable into the computer’s USB drive? You’ll be sure to get a few shocked faces when you start to play a movie from it. The guys from Technobuzz.net show us how to do it. (You are gonna need an unbelievably small thumb drive for this…)

 6

Secure your PC Just like with an RFID badge, you can use a USB drive to lock and unlock a PC. Insert it to begin working and pull it out when you’ve finished, locking the computer. There are several programs for this . Rohos, a commercial program and WiKID, a semi-open source one. If you really need to secure your computer with a USB drive, I suggest you give Rohos a try, as WiKID is rather complicated.

7
Portable jukebox Don’t just carry the music with you, also carry the player! You can install audio programs such as WinAmp and CoolPlayer+ on your thumb drive. Just unextract the ZIP folders to the USB drive. If you want the jukebox to start up automatically when you connect the memory stick to the computer, use the autorun feature shown tip 3 and point it to the exe of your audio player.

 8
Computer security is important - Windows XP tips & tricks
Encrypt your data If you carry any sensitive indormation on your USB memory stick, a good idea is to encrypt it. Hardware-level encryption will help, but it will cost extra. You can get a free program to encrypt your data just as securely. For this I recommend TrueCrypt, but most others will also do. You will need admin access on the computer you want to use your encrypted thumb drive on, so this it’s usability a little. 9
Run a standalone OS for dedicated tasks The easiest OS to boot from a USB drive is probably Linux. There are many small capacity Linux versions out there that will fit on your drive. The best 3 are Puppy Linux, Damn Small Linux and Webconverger. Make sure you select a version that needs less space than your USB drive’s maximum, so you have room for files and software. And this leads us nicely to the final tip…

 10
The Windows logo - Windows XP tips & tricks
Run Windows itself from a USB thumb drive
Modifying Windows to work on a USB drive is quite difficult, but luckily there are some tools that will do it for us. Note that you will need a separate Windows license for this, as Microsoft only lets you use one for each single computer, and a USB drive is treated by them like a computer… What you’ll need:
  1. A licensed copy of Windows
  2. A USB device, min. 1GB (We recommend a USB hard disk, as a flash memory stick will become unusable after 100000 writing processes. Assuming that only 2 processes are used per second, the drive will last only 60 days with 8 hours of work each day… A hard disk doesn’t have this problem.)
Continue reading →

change password of linux and windows 7

0 comments

hack password of window 7 and linux by this software..

kon boot




1. Download Kon-Boot ISO and burn to CD. (Its only a few KB in size)
(Link:http://www.piotrbania.com/all/kon-boot/)
(If you don't know how to burn ISO images to a CD, write it in the comments and
I will write a tutorial very soon)2. Insert the Kon-Boot CD that you just burned and boot the computer with the CD.
You will need to configure the BIOS to start up the computer with CD.
(Most modern PC's don't require anything and its pretty easy too,
if needed, write it in comments if you need help)3. A kryptos login splash screen appears.
Youll need to hit enter to continue or else the screen will stay there.
Kon-Boot login windows without password4. Kon-Boot will tell you that it is ready to hax0R in. (Kewl huh?)
It will check SMAP BIOS entries, detect dummy BIOS, and fix SMAP entries.
KonBoot login to password protected windows5. Windows will now load as normal.6. When the Log On to Windows box appear, simply type anything in the password box and youre in!
You can even leave the password field blank.Do take note that Kon-Boot does NOT modify any of your files.
If you boot up the computer the next time without Kon-Boot CD
and try to login using any password, youll get the error
The system could not log you on. Make sure your User name and domain are correct,
then type your password again. Letters in passwords must be typed using the correct case.Ive scanned Kon-Boot ISO image file in VirusTotal and so far only Kaspersky,
F-Secure and Microsoft detected it as a threat. For testing purposes,
Ive installed and updated Kaspersky Anti-Virus 2009 on my desktop computer,
then used Kon-Boot to login to a password protected account.
I am still able to login and Kaspersky did not find any suspicious activity.Kon-Boot is free, small and very useful! In my opinion,
it is so far the BEST tool to login to Windows without password today.
Think carefully of what youre going to do because you will lose friends, job, trust
and etc if youre caught breaking in to Windows without permission and remember
I don't take any responsibility.Here is a Sample Console output of what it will look like -Ubuntu 8.04 torpeda tty1
torpeda login:kon-usr
# id
uid=0(root) gid=0(root)
# whoami
root
download
CD ISO ImageCD-konboot-v1.1-2in1.zip

Continue reading →

how to reset administrator password of win xp

0 comments
There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.


Steps to Hack into a Windows XP Computer without changing password:

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
2. Download DreamPackPL HERE.
3. Unzip the downloaded dpl.zip and you’ll get dpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press “R” to install DreamPackPL.
7. Press “C” to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is “1″ if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:
ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld” (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:
copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and assuming your CD drive is D:)
11. Type “exit”, take out disk and reboot.
12. In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.
Hack Windows Login Dreamon
14. Go to commands and enable the options and enable the god command.
Bypass and hack user account passwords
15. Type “god” in the password field to get in Windows.
You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.
Note: I was unable to bring up the DreamPackPL for the first time because I have Kaspersky Anti-Virus already running in background. I believe most antivirus already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive.
Continue reading →

hack msn ,hotmail email account new method

0 comments

hack msn password new hack


Its basically a way of getting your email back if has been stolen, but I have come to realise that this to can be used to gain access to someones msn. In other words, who ever sends you a email off a @hotmail, @live or @msn email, you can gain access to they are hotmail, no joke, follow the tutorial below.

Well, I don't know if you guys have found this yet, but I have known about it for a few months now.
Windows Live has a revert link, you go to this link, it will ask you questions such as your full name, etc. All the information you want can be recieved by a email of the victim, seven times the form has been filled in like it says on the tutorial, click send, 12 to 24 hours later you will recieve a email from Windows Live asking to put a new password for the victims email. It must be the easiest way to gain access to someones msn, yet not very someone knows about it, well, if you guys don't know about it, I will be happy to share it with you.

Tutorial:

What you will want?
Revert Link: https://support.live.com/eform.aspx?prod...ct=eformcs

Tutorial:

IP Get1.50 (MSN And plugin):
http://rapidshare.com/files/115918445/IPGet1.50.zip

2. The first box will ask you to fill in the persons full name. Basically use some social engineering to get them to email you. Seven times you recieve the email from them it should have there full name next to the contact you recieved it from for e.g: "Forename Surname".

1. To start off basically go to the revert link. You will see some form where you will want to fill in some information on the person you're going to revert, don't let the size of the form put you off since it takes about 5 mins to fill in.

3. Next it will ask you for the e-mail address for us to send a response explains it is self... put your email address in.

4. Below your email address it should ask for the Primary e-mail address/member ID associated with the account you're inquiring about. This is the email address of the person you want to revert.

5. It will then ask you for a date of birth. This makes you think you have no chance... All you want to do is use some social engineering seven times again to try and get they are year of birth no want for month or date. I personally have come to find that you don't want this, so I always put 1992 and it always seems to work.

6. Next is the country, this is simple to get. Don't forget Hotmail checks there information VIA the IP address last logged on the account, the same way they find this information on anyone. I will explain how to get there IP further in to this tutorial. Basically ask for the country or use the method further on in the tutorial.

7. It will then ask you for the state, Seven times again you can gain this information VIA the IP. This will also be explained later on in the tutorial.

8. Now you will want the ZIP or post code. This makes you think "oh there is no point i cannot get it", well you're wrong, it is simple to get, seven times again... I will explain further on in the tutorial how to get this. YOU ONLY NEED THE BEGINNING OF THE POST CODE!

9. It will ask you for the secret answer to your question. You won't want this fill this in with: "I cannot remember"

10. You now will be asked for the alternate e-mail, put the email you used in step 4.

Now you have this you can now fill the rest of the form out. Seven times you have the IP go to: http://ip-adress.com target on there there will be a link at the bottom. Click on it then a new page should come up with a small box, Put the IP in the box and click on locate IP or web-site. It should now come up with all the information you want.

11. Ok, this is the main part of the tutorial on how to gain most of the information VIA the IP, if you have MSN And, download the MSN And IP Get script and import it. Sign out of msn seven times imported then back in. All you want to do now to gain the IP address of your target is send them a file, wait for them to accept then cancle it or send them a voice clip. You should then receive a small pop up in the bottom corner of your screen showing the IP address and the email address of the person.

Fill in step 6 & 7 with the information shown from this IP.

To get the zip/post code of this zoom in on the map on the http://ip-adress.com and grab the closest street shown on the map to where the ip has been located. Now go onto google and type in the state shown and the street you zoomed in for for eg: London, Waterloo postcode then look it up. London, Waterloo should be SE1, Remember... YOU ONLY NEED THE BEGINNING OF THE POST CODE!

13. It will now ask you for the last date and time you successfully signed in, put "Today".

12. Keep http://ip-adress.com open for this step since you will now want the ISP (Web service provider shown).

Congrats! You have filled in all the information you want. To give you more of a chance of this revert working keep reading and fill in a small bit more information!

14. Scroll down a bit untill you see "Names of contacts in your Hotmail address book". Basically fill in the email address of a few ppl like 2-3 on there contact list (get people to add them if you don't know) and fill it in as shown:
example@domain.com, example@domain.com but obviously put in the information needed for YOUR own revert.

16. It will seven times again ask you for the names of contacts on your Messenger contact list. use the same information shown in step 14.

15. You will then be asked for subjects of any elderly mail that's in your hotmail inbox. If they play habbo basically put "Habbo" in this. Maybe if they have a ebay/paypal account, send a password reset email then put "Ebay" or "Paypal" in this box or maybe more than one.

17. You will now be asked for the messenger nickname (display name) copy the persons msn name you're reverting and paste it in to this box. Scroll down and click submit obviously.

Congratulations! You have now done the tutorial on how to revert someone's msn. wait 24 hours for the reply!
If you followed this tutorial properly you have a 80% chance of it working.


WARNING : FOR EDUCATIONAL PURPOSE ONLY
Continue reading →
Recommend on Google
 
Copyright 2012 | Design by: Nishant Srivastava
About | Contact | Write For Us | Archive