Adding Drives or Folder in Send To option

This article is usefull those who copy files to particular FOLDER or DRIVE again & again.It may take time to navigate the folder to copy files again & again so in this tutorial i will show how to get rid of this problem.

In default SEND TO option by default it contains only some of the option (path)
ex: compressed (zipped)folder, Desktop (create shortcut, Mail Recipient etc
If you need to add extra option(path) to this list(SEND TO) then follow the simple steps as follows.

1. Open RUN

2. Copy & Paste the below address & Hit Enter

%USERPROFILE%\SendTo

3. Then Right click on the blank area & navigate to New >> Shortcut as shown below

4. When you click on the Shortcut a pop up menu opens in that browse the address of the folder or drive then click OK & FINISH. 

Cannot able to Delete Files or Folders ?

When ever we try to delete some files or folder in our PC some times it shows an error like this

* Cannot delete file: Access is denied
* There has been a sharing violation.
* The source or destination file may be in use.
* The file is in use by another program or user.
* Make sure the disk is not full or write-protected and that the file is not currently in use.

or some different errors like this when ever you try to delete files. For this problem Unlocker is the solution!. To get rid of this problem follow the simple steps as shown below


1. First you need to download a software called Unlocker & install it.
2. Simply right click the folder or file and select Unlocker
Deleting files
3. If the folder or file is locked, a window listing of lockers will appear


Unlocker2
4. Simply click Unlock All and you are done!
Works on: Windows 2000 / XP / 2003 / Vista

File Size
: 237.50 KB

Download: Unlocker

How to stop automatic url redirection in firefox

Url redirection are most commenly used by many webmasters to redirect there visitors to new blog from there old blog(website). If it is using for this purpose then it is ok, but many of the websites is not using for this purpose instead of this they are using to install malware on your computer automatically without noticing you or it can also used to redirect to Phishing site to steal sensitive data like passwords and credit card numbers from your pc. It always better to know in advance about where your being redirected.

Ok, in this post i will show how to get noticed about Url redirect.



This tutorial is only for Firefox browser users..

1. Goto TOOLS--> OPTIONS

2. In the OPTIONS window click ADVANCED TAB

3. In ADVANCED settings go to GENERAL TAB in GENERAL TAB look for ACCESIBILITY OPTION in that select

Warn we when web sites try to redirect or reload the page

As shown below


firefox settings


4. Then click OK

The below image is showing notification regarding url redirecting message.


url redirection

click ALLOW to go.

Firefox Keylogger from TrUe HaCkinG to save passwords

firefox-keylogger
Hello friends, After a long time, I am back with new hacking tool in this blog and this blog now opened for all readers now .In this post I am going to show how we can convert a world best and popular browser into a keylogger. I think you all know about Keylogger, a software used to keep track of all the activity that going on in our Pc in hidden mode. 

Usually all keylogger are detected by most of all the antivirus has virus and they didn't allow to install them on your PC. Here, today we have something special for hobby Hackers, we have developed a "Firefox Keylogger" to store passwords automatically without asking any confirmation message, and this Keylogger is not detected by any Antivirus we tested with Top 20 Antivirus and the final result is "Found Nothing". so, you're safe to use this Keylogger.

About Firefox Keylogger:

The name itself indicates used to save passwords in Firefox browser without any notification. By default all browsers, used to ask confirmation message before saving passwords in browser. Now, what we have done is we just find the particular bit of code which used to ask confirmation message to save passwords, and replaced that code with saving password function. So, whenever you Login any website with Firefox browser it stop showing "Remember", "Never for This Site" and "Not Now" option, instead it automatically start storing password without asking confirmation message. In this way our application/software works.

Installing Firefox Keylogger:

Installing Firefox keylogger is different form all other application/software. We designed this application in such a way that it only install by running the application/software by placing in "C:\" drive. So, if you need to install    
Wrong path to place "firefox keylogger.exe" to execute.
Right path to place "Firefox keylogger.exe" to execute.
"Firefox Keylogger" then you must place "Firefox Keylogger.exe" in "C:\" drive and run that application there. Even if you place "Firefox Keylogger.exe" in "C:\Program Files\" it will not install so, you must place Firefox Keylogger.exe in C:\ this address only. After running that application, it will install in Hidden mode and installation process will not be visible to you, within few seconds it will install and after installation you will see one command like below


Where it save password?

It saves passwords in default password saving option that is in Tools >> Options >> Saved Passwords to see saved passwords in Firefox browser.

Features of Firefox Keylogger:

  1. It is free from virus,spyware and malware
  2. It records site, username and password which you used to login after installing Firefox keylogger without any clue
  3. It won't use any system memory because, Firefox keylogger is used to modify the souce code of  Firefox browser
  4. This keylogger is designed in such a way that it is compactable with most of all versions of Firefox browser even upcoming version too! (Until developers modify Major structure change in Firefox setup file)
  5. Easy to use
  6. Small application
  7. Undetectable to Antivirus
  8. It disables "Remember", "Never for This Site" and "Not Now" notification option while login and more.

How we can use Firefox Keylogger for Hacking purpose?

This depends on you, you can use it in various ways, for example install it in your computer and whenever your friend comes to your home give some time to use Internet and on that he defiantly use that time to login to some of social networking sites like orkut, facebook etc., and thus you can used to hack his account. Are else install in cyber cafe and have a fun.

FAQ's:


1> Is it is purely safe to use?

Ans: Yes, it is completely safe to install and we scanned Firefox Keylogger with Top 20 Antivirus and all the scanned result "No virus found".

2> Freeware or Shareware?

Ans:  It is completely Freeware, you no need to pay single cents to use this application.

3>  Can we distribute it in our blog/website?

Ans: You're free to distribute this software by giving proper credit.


System Requirements:


Operating System: Xp,Vista and Windows 7

Browser: Firefox (any version)

Download: Firefox Keylogger 


Let me know what you feel about this application/software? and how you used this application for hacking? is it really helps?

RAR Password Recovery Magic 6.1.1.378 Full


RAR Password Recovery Magic is a powerful tool designed to recover lost or forgotten passwords for a RAR/WinRAR archives. RAR Password Recovery Magic supports the customizable brute-force and dictionary-based attacks.RAR Password Recovery Magic has an easy to use interface.
RAR Password Recovery Magic 6.1.1.378.Incl.Serial
Download : | FileSonic | DepositFiles | Turbobit |

Install phpVirtualBox on Windows & Linux

What is phpVirtualBox: How to Install phpVirtualBox on Windows & Linux

This article introduces phpVirtualBox, an open source, AJAX and PHP-based implementation of the Oracle VirtualBox interface.

oracle VirtualBox is a great enterprise ready virtualisation software. However, what it lacks is a powerful Web-based management interface. Usually, people prefer VMWare over VirtualBox, as it has good Web-based remote management interface.

phpVirtualBox provides an interface that"s a VirtualBox-look-alike for people who are not command-line savvy. Through phpVirtualBox, you can control a headless VirtualBox VM from a Web browser, including operations such as start/stop VMs, take snapshots, configure VMs, import/export VMs, and much more.

The requirements are:
  • Any Web server with PHP 5.2.0 or later; xampp will be good.
  • A working installation of Oracle VirtualBox 3.2.2 or later.
  • Any Web browser--- Firefox, Opera, Chrome or IE---will do the job.
Installation on Windows

Installation is very simple. Here , I"m using Windows XP SP3.

Install Oracle VirtualBox OSE 3.2.10, and then install xampplite-win32-1.7.3. Download phpVirtualBox 0.5 from here and extract the files/folder into htdocs directory. phpVirtualBox requires that vboxwebsrv.exe
must be running on the Oracle VirtualBox host machine. This file is located at C:\Program Files\Oracle\VirtualBox\.
Now, edit the config.php file and change it to the following settings:
Now navigate to the resulting folder in your Web browser. ( see the figure below)

Installation on Linux


The installation on Linux is also very simple. I am using Ubuntu 9.10 for this work, and installed xampp-linux-1.7.3. It comes with the latest PHP version. To install Oracle VirtualBox 3.2 on Ubuntu, first you have to add the repos for VirtualBox in your /etc/apt/sources.list:
After that, update your repository cache with the following command :
To install Oracle VirtualBox, run the code given below:
phpVirtualBox requires you to start the vboxwebsrv program, located under /usr/bin:
Here are the parameters :
  • -b : run the program in the background
  • -logfile : log file location for vboxwebserv
Now download phpVirtualBox 0.5:

Unpack it to /var/www or /usr/local/apache2/htdocs. In config.php, edit the following parameters:

Now navigate to the resulting folder in your Web browser.

NOTE: for the sake of tutorial, i have used a single physical machine for Oracle VirtualBox and phpVirtualBox. If you don,t want burden at your Oracle VirtualBox installation with a Web server, then you can host phpVirtualBox on another machine. In that case, you have to make some simple modifications.
Till then enjoy the post and keep visiting !!!

Avira Premium Security Suite 10.0.0.565 + Serial Key


Avira AntiVir Premium reliably protects you against all threats from viruses, worms, trojans, rootkits, phishings, adware, spyware, bots, and dangerous “drive-by” downloads. Best detection rates and top-class security with several updates every day.
Advanced protection: Includes basic antivirus protection PLUS: email protection (POP3) , AntiPhishing, AntiSpyware, AntiAdware and more.
With real-time on-access scanning, profile-based on-demand scans and scheduling of full system scanning and updates it offers premium protection. It includes a POP3 based MailScanner that scans emails before they are stored on your machine. With a user-friendly control center, quarantine management, fast performance and world leading detection rates the Avira AntiVir Premium provides essential protection for your PC.


AntiVir Personal offers effective protection against computer viruses for the individual and private use on a single PC-workstation. It detects and removes viruses and includes an Internet-Update Wizard for easy updating. The built in resident Virus Guard serves to monitor file movements automatically, for example when downloading files from the Internet. Heuristic scanning protects Protection against previously unknown macro viruses. Even though viruses have now grown very numerous, one thing hasn't changed: our commitment to provide you with all-round protection. The reliability of AntiVir is demonstrated in numerous comparison test and references featured in independent trade journals.

Premium Protection:
* AntiVir
* AntiAd/Spyware
* AntiPhishing
* AntiRootkit
* AntiDrive-by
* AntiBot
* EmailScanner
* WebGuard
* RescueSystem

Premium functions:
• Protection against viruses, worms and Trojans
• Protection against expensive dialers
• Detects and deletes rootkits
• NEW: Raised scan speed
• NEW: Redesigned visual appearance
• Protection against phishing
• Protection against spyware
• Special protection against email viruses (POP 3)
• Fast updates through Premium Server
• 5 Euro donation to Auerbach Foundation
• Protection against annoying adware
• NEW: System to create a Rescue-CD

Avira AntiVir Premium v10.0.0.624 Final.Incl.Key
Download : | FileSonic | DepositFiles | Turbobit |

Platinum Hide IP v3.0.4.6 Full



Use Platinum Hide IP to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more.
Key Features
• Anonymize Your Web Surfing
Your real IP is hidden when you surf on the Internet, keeping your online activity from being tracked by others.
• Protect Your Identity
Anonymous web surfing enables you to prevent identity thieves from stealing your identity or other personal information, and keep your computer safe from hacker attacks or other risks.
• Choose IP Country and Check IP
Proxy lists of many countries are enabled and you decide to select one country from the Choose IP Country window. You can check the current IP address directly.
• Send Anonymous Emails
Send anonymous emails through any web based mail system such as Gmail, Hotmail, etc.
• Get Unbanned from Forums and Blocked Websites
Change your IP address and then you can get unbanned yourself from any forums or other blocked websites that have ever banned you from.

Platinum Hide IP v3.0.4.6.Full.Cracked
Download : | FileSonic | DepositFiles | Turbobit |

Folder Guard Professional 8.3.2 Full Version


Folder Guard Professional is a powerful computer security software that you can use to control access to files, folders, and other Windows resources, such as Control Panel, Start Menu, and so on. You can use Folder Guard to lock your personal files and folders with passwords, to stop other users from peeking into your records. You can even completely hide your private folders from virtually all applications, and such folders would remain invisible until you enter a valid password. You can also protect sensitive system files from modification or destruction, disable access to the removable drives, restrict access to Control Panel, and more.

Folder Guard Professional Edition for Windows Vista, XP, 2000, Server (both 32-bit and 64-bit)
This edition combines the 32-bit and x64 editions of Folder Guard in one convenient package. When installed on the 32-bit versions of Windows it offers the same functionality as Folder Guard 32-bit Edition. When installed on the x64 versions of Windows, it works in the same way as Folder Guard x64 Edition. The older MS-DOS-based releases of Windows (such as Windows, 95, 98, Me) are NOT supported by this edition.

Why should you choose Folder Guard:

>> Folder Guard lets you password protect your files and folders.
You can protect with password virtually any folder or file, allowing only the authorized users to open the protected files or folders. You can protect an unlimited number of files and folders, each with its own password, or you can use the Master Password of Folder Guard to unprotect them all at once.

>> Folder Guard can hide your personal folders from other users.
You can set up Folder Guard to hide your private folders (or make them appear empty). The folder would be hidden from virtually any program, including Windows Explorer, Office, MS-DOS programs, etc.

>> Folder Guard can restrict access to Control Panel, Start Menu, Desktop, etc.
You can set up Folder Guard to allow only certain users to change the computer settings with Control Panel, while denying that to other users. You can control access to various settings of Start Menu, Desktop, Taskbar, and other Windows resources. You can remove the Run and Search commands on the Start menu, hide specific drives, lock the Internet settings, and more.

>> Folder Guard can protect access to the floppy, CD-ROM and other removable drives
You can configure Folder Guard to allow or deny access to the removable drives, restricting the user's ability to run or install unauthorized programs on your computer.

>> Folder Guard is suitable for a wide range of the computer security tasks.
You can stop other users of your computer from peeking into your personal files. You can protect the system files and folders from destruction by cyber-vandals. You can allow specific users to run a program while deny it to others. You can allow users to use the removable drives to store their documents while prevent them from running unauthorized programs from the removable disks.

>> Folder Guard protects your files without encrypting them.
There is no risk of losing your documents if you lose your encryption key: with Folder Guard all your files remain intact, without modification of any kind.

>> Folder Guard lets you quickly enable or disable the protection via a "hot key".
You can choose a specific keyboard combination as the hot key of Folder Guard, to be able to quickly enable or disable the protection of your computer. Of course, the "hot key" is protected with your password, too, only you can use it!

>> Folder Guard can operate in the "stealth mode".
You can set up Folder Guard to operate in the stealth mode, to hide its own files and shortcuts from being seen by other users. You would still be able to control Folder Guard via the "hot key".

>> Folder Guard supports easy recovery in case of emergency.
If you forget your password, or experience other problems, simply use the Emergency Recovery Utility (free download) to quickly restore access to your protected folder.

>> Folder Guard works with drives of any format.
If your computer can handle it, Folder Guard can protect it. You don't have to format your hard drive with the NTFS file system: Folder Guard can protect files and folders on both NTFS and FAT/FAT32 disks.

>> Folder Guard runs on a wide range of Windows platforms.
From Windows 2000 to Windows XP to Windows Vista and later, with all service packs and hotfixes, all are supported by at least one of the available editions of Folder Guard.

>> Folder Guard is easy to use.
Folder Guard sports one of the most intuitive user interfaces, that makes it easy to use for both novice users and computer professionals.

>> Folder Guard "speaks" plain English.
You don't have to be a computer professional to understand how to use Folder Guard. The Quick Start Wizard can guide you through the steps necessary to set up the password protection of your personal folders. Folder Guard Advisor warns you about situations that may require your attention and offers possible workarounds. Folder Guard User's Guide describes its commands and operation in plain English, without "pseudo-techno" or "geeky" talk. (And it does not baby-sit you either).

>> Folder Guard is not a toy.
Folder Guard is used by large corporations and small businesses, schools and police departments, universities and correctional facilities, libraries and hospitals (to name a few).

>> Folder Guard is widely used.
Hundreds of thousands of copies of Folder Guard have been downloaded by computer users from virtually all countries of the world.

>> Folder Guard offers the best value for the money.
None of our competitors offers a product that would come close to Folder Guard.

>> Folder Guard is flexible.
Although Windows lets you restrict access to folders located on a NTFS drives, it cannot hide them. With Folder Guard, you can not only restrict access to, but also hide folders, or make them look empty. Unlike Windows, Folder Guard lets you protect only some files within a folder, and keep the rest of the files visible and accessible, if you wish. Or, you can protect files and folders each with its own individual password, and then unlock them separately from each other (Windows cannot do that).

>> Folder Guard can be used with other disk tools.
You can designate your anti-virus and other disk maintenance tools to be the "trusted" programs, to make them able to work with your protected disks without restrictions.

>> Folder Guard is extensible.
You can fine-tune the access rules to the files and folders of your computer by creating appropriate filters.

>> Folder Guard will save you hours of learning time.
You don't have to learn how to use the Group Policies, user groups, Access Control Lists, privileges, and other built-in security features of Windows, because Folder Guard does the hard work for you: its visual and intuitive user interface lets you manage the restrictions with ease.

>> Folder Guard is actively maintained.
Since its first release back in 1997, we've been continuously extending, enhancing, and improving Folder Guard. Now in version 7.92, Folder Guard gives you more power than ever.

Folder Guard 8.3.2 Incl. Patch zoo
Download : | FileSonic | DepositFiles | Turbobit |

How to Create Your Own Phisher to Hack Any Website Account Password

Learn how to hack any website account password | Phishing Creator Tool
Previously i’ve posted how to hack websites using phishing, like eBay, Gmail and Facebook. Here i want to show you how to make a phishing page using a Phishing Creator – Super Phisher and get account information for various websites from many people. Тhis is the easyest and also a very effectively way to make a phisher and hack any website account password.
Here are some features of Super Phisher:
  • Fastest phisher maker tool ever
  • Makes phisher for almost any site
  • Useful for users who dont knows HTML, PHP coding
  • No manual work except entering URL of website, for which u want to make phisher
  • Fully automated tool
  • Small in size.
  • Instant access to phishers you created.
For example i will show you how to make a phishing site of Lockerz.com.
Here is a step by step guide to hack any website account password using phishing creator tool:
1. First of all download Super Phisher here.
2. In “Super Phisher” folder, open “Super Phisher.exe” file to get something like:

3. Now, in “URL of Login Page“, enter http://www.lockerz.com. This is the site you wanna hack.
4. In “Name of Log File” write password.txt or whatever you like. This is the place where all typed id and password are stored. In “Name of PHP File” also type anything you like, e.g. lockerz.php or login.php…
5. In field of “Site redirect to“, enter http://www.lockerz.com/myLocker, so that victim is redirected to original Locker site when he enters his email and password.
6. Click on “Build Phisher” and you will get Lockerz phisher created in “Output” folder in current directory.
7. Upload all of the phisher files to any free webhost site like:
  • www.yourfreehosting.net
  • www.esmartstart.com
  • www.110mb.com
  • www.drivehq.com
  • www.t35.com
8. Once you have uploaded the files in the directory, send this phisher link to your victim and make him login to his Lockerz account using your sent Phisher.
9. Once he logs in to his Lockerz account using Phisher, all his typed email and password is stored in “password.txt”.

10. Now you can see password in this .txt file and hack Lockerz account password.

Super Phisher is just awesome software to hack Lockerz account password. This software not only is used to hack Lockerz account password, but also can hack orkut, gmail, yahoo, myspace and many other emails.

How to Create Your Own Phisher to Hack Any Website Account Password

Learn how to hack any website account password | Phishing Creator Tool
Previously i’ve posted how to hack websites using phishing, like eBay, Gmail and Facebook. Here i want to show you how to make a phishing page using a Phishing Creator – Super Phisher and get account information for various websites from many people. Тhis is the easyest and also a very effectively way to make a phisher and hack any website account password.
Here are some features of Super Phisher:
  • Fastest phisher maker tool ever
  • Makes phisher for almost any site
  • Useful for users who dont knows HTML, PHP coding
  • No manual work except entering URL of website, for which u want to make phisher
  • Fully automated tool
  • Small in size.
  • Instant access to phishers you created.
For example i will show you how to make a phishing site of Lockerz.com.
Here is a step by step guide to hack any website account password using phishing creator tool:
1. First of all download Super Phisher here.
2. In “Super Phisher” folder, open “Super Phisher.exe” file to get something like:

3. Now, in “URL of Login Page“, enter http://www.lockerz.com. This is the site you wanna hack.
4. In “Name of Log File” write password.txt or whatever you like. This is the place where all typed id and password are stored. In “Name of PHP File” also type anything you like, e.g. lockerz.php or login.php…
5. In field of “Site redirect to“, enter http://www.lockerz.com/myLocker, so that victim is redirected to original Locker site when he enters his email and password.
6. Click on “Build Phisher” and you will get Lockerz phisher created in “Output” folder in current directory.
7. Upload all of the phisher files to any free webhost site like:
  • www.yourfreehosting.net
  • www.esmartstart.com
  • www.110mb.com
  • www.drivehq.com
  • www.t35.com
8. Once you have uploaded the files in the directory, send this phisher link to your victim and make him login to his Lockerz account using your sent Phisher.
9. Once he logs in to his Lockerz account using Phisher, all his typed email and password is stored in “password.txt”.

10. Now you can see password in this .txt file and hack Lockerz account password.

Super Phisher is just awesome software to hack Lockerz account password. This software not only is used to hack Lockerz account password, but also can hack orkut, gmail, yahoo, myspace and many other emails.
Learn how to hack any website account password | Phishing Creator Tool
Previously i’ve posted how to hack websites using phishing, like eBay, Gmail and Facebook. Here i want to show you how to make a phishing page using a Phishing Creator – Super Phisher and get account information for various websites from many people. Тhis is the easyest and also a very effectively way to make a phisher and hack any website account password.
Here are some features of Super Phisher:
  • Fastest phisher maker tool ever
  • Makes phisher for almost any site
  • Useful for users who dont knows HTML, PHP coding
  • No manual work except entering URL of website, for which u want to make phisher
  • Fully automated tool
  • Small in size.
  • Instant access to phishers you created.
For example i will show you how to make a phishing site of Lockerz.com.
Here is a step by step guide to hack any website account password using phishing creator tool:
1. First of all download Super Phisher here.
2. In “Super Phisher” folder, open “Super Phisher.exe” file to get something like:

3. Now, in “URL of Login Page“, enter http://www.lockerz.com. This is the site you wanna hack.
4. In “Name of Log File” write password.txt or whatever you like. This is the place where all typed id and password are stored. In “Name of PHP File” also type anything you like, e.g. lockerz.php or login.php…
5. In field of “Site redirect to“, enter http://www.lockerz.com/myLocker, so that victim is redirected to original Locker site when he enters his email and password.
6. Click on “Build Phisher” and you will get Lockerz phisher created in “Output” folder in current directory.
7. Upload all of the phisher files to any free webhost site like:
  • www.yourfreehosting.net
  • www.esmartstart.com
  • www.110mb.com
  • www.drivehq.com
  • www.t35.com
8. Once you have uploaded the files in the directory, send this phisher link to your victim and make him login to his Lockerz account using your sent Phisher.
9. Once he logs in to his Lockerz account using Phisher, all his typed email and password is stored in “password.txt”.

10. Now you can see password in this .txt file and hack Lockerz account password.

Super Phisher is just awesome software to hack Lockerz account password. This software not only is used to hack Lockerz account password, but also can hack orkut, gmail, yahoo, myspace and many other emails.

4 ways on How to hack facebook password

In my previous post How to hack facebook password i told you about hacking facebook with phishing,Today i thought to uncover all the methods used to hack facebook password,


I will cover 4 methods over here:
1. Facebook Phishing
2. Keylogging
3. Social engineering
4. Primary email address hack




Facebook phishing:
I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show “Phishing” as the most used method to hack facebook and to note…”Phishing is favorite method of facebook hackers”. So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose. I will not extend this topic over here as i have added more on Phishing in my article How to hack facebook password


Keylogging:
This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don’t have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password. I have posted detailed information of top keyloggers in the trade for more information see my password hacking softwares section


3. Social engineering:
This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on orkut and i got his gmail password very easily by this method. I think many of you might be knowing how what this social engg is. For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


4.Primary email address hack





Any FaceBook Account can be hacked for $100

This is something similar to popular Hotmail yahoo mail account password hacking that you can find in ebooks websites and blogs. This time they ask 100 US dollars to hack any Facebook account. Is it just a phishing site or for real?

There is a simple way to get $100 which you cannot complain to any authorities as you are trying to hack someone else Facebook account. Overall this type of campaigns are phishing and either it will collect your username, password, other personal information or get money out of you.


Do not give out any information or send money to any of these type of hacking password retrieval services available online. They know you are doing something bad.
For more information read Your Facebook Account Worth $100 by Luis Corrons

Users who found this page were searching for:

  • facebook hack password online 2011
  • hack hotmail online
  • hw to increase orkut scraps trick
  • hack password hotmail online

How to hack facebook – Facebook hacks


The scripts in these hacks to hack facebook require FirefoxFirefox is a free web-browsing program similar to Internet Explorer with additional security features and options.After you install Firefox, you’ll need GreasemonkeyGreasemonkey is a Firefox extension which lets you to add bits of DHTML (“user scripts”) to any web page to change its behavior. In much the same way that user CSS lets you take control of a web page’s style, user scripts let you easily control any aspect of a web page’s design or interaction. Greasemonkey is free. You can download it here: Download Greasemonkey (note: this link will not work in Internet Explorer – you must have Firefox installed to install and use Greasemonkey. If you don’t have Firefox, you can download it here for free.) 
 
After you’ve installed Firefox and Greasemonkey, you can install these scripts:
 
  • AutoLogin: Facebook autologin automatically logs you in to Facebook (it stops asking you to log in every time!)
  • Change the color of Facebook: This script changes the default color of your Facebook. By modifying the code you can make it whatever color scheme you want.
 
How to access Facebook if your school blocks it?
Many schools and businesses use a firewall to block access to websites like Facebook, Friendster, Hi5, MSN Spaces, Hotmail, Yahoo email, and other email sites, making it difficult (but not impossible) to access them.
 
If your school or office firewall blocks access to Facebook, Friendster, Hi5, Gmail, or Yahoo email you may be able to use a few internet privacy tricks get get around the firewalls and access any website you want.
 
The easy way: Try Firefox to get around the firewall
 
“Firefox has built-in proxy connection settings”
 
Try the built-in proxy connection settings with an Anonymizer service to access Facebook from school or work
 
Firefox is not affected by many network restrictions that system administrators may automatically apply to Internet Explorer every time you use it. More importantly, Firefox has built-in proxy-connection settings, which when used with settings that you can get from an anonymous web surfing or anonymizer service, can allow you to get to virtually any website you want even if it is blocked by a firewall. Firefox has several other features such as Google-integration for faster searches, automatic pop-up blockers and more. Firefox is free.
 
To hack Facebook from work or school, even through a firewall by using an Anonymizer or Private web surfing site
 For years internet privacy experts have been using anonymizers, private web-surfing services

Install Linux with in Windows

One problem people seem to have with installing Linux is the fact you have to download an .iso, and then burn it to a CD. While burning an .iso to a CD is not hard, unless you are into it, or have done it before, it can be confusing. That is, assuming you have a CD drive, CD burner, and spare CDs. Not to mention with some Windows CD burning programs, it’s not exactly obvious how to properly burn an .iso.To solve this Debian and Ubuntu are now offering a downloadable Windows .exe file that will install Linux while you are running Windows. The Ubuntu one apparently will do all it’s automatic, non-destructive partition magic (meaning it will make your system dual boot with both Windows and Linux without hurting the Windows OS).
The Debian installer can be found on goodbye-microsoft.com, and the Ubuntu one doesn’t seem like it’s ready, but you can read about it on the wiki page.
I don’t see myself using this as I tend to build my own servers (and use Mac on the desktop). However, I can see this being very useful for systems that come with Windows pre-installed and you want Linux instead.
In my experience, a Debian or Ubuntu CD is only used to boot the system anyway. Once a network is found all the software is loaded live over the net via apt-get so this removes the first step being local (and limits some waste). Very cool.

How to delete a virus without an anti-virus program

  1. Click on “START”. Click on “RUN” and type “REGEDIT”.
  2. Now you will see “registry editor” opened in a new window. In registry editor select -> HKEY_LOCAL_MACHINE.
  3. Now under “HKEY_LOCAL_MACHINE” select—>”SOFTWARE”—>”Mcft”—>”WINDOWS”—>”CurrentVerison”—>”RUN”.
  4. Now on the right side select”RavTimeXP”
    Right click on “RavTimeXP” and delete it.
    Close REGISTRY EDITOR and restart your computer.
  5. Click on START—>SEARCH—>”FOR FILES OR FOLDERS”.
    Search box will open with current setting.
    Now click on search(searching for .exe), after searching is finished you will see the results.
  6. Now here you have to delete the icons like folders and size 60KB or a little more than 60 KB or little less than 60 KB, and the file type will be “APPLICATION”.
    Now delete them all.(Note, Remember to double click, otherwise you will have to restart and start from step 1)
  7. Now Empty Recycle Bin. And you are done.

Email spoofing Hacking class

Hi friends, today i will share with you basic idea about What is email Spoofing? How email spoofing works? What are the different ways to send spoofed emails? Can we detect spoofed emails or not?   In my later hacking class tutorials i will explain you how to send spoofed emails using email spoofing tools or by simply web applications. So Let's start from very basic..



What is Email Spoofing?
Email spoofing refers to the process of sending an email message from one source, but making it appear as though the email was sent from a different source. For example, an email originates from user@domain.com but it appears to be from email@address.com. Another method of spoofing is to make the message appear to come from an unknown user within your domain name. For example, the message appears to be from support@yourdomain.com.
This does not mean that your email account was compromised. It means that the sender has fooled the mail client into believing the email originated from a different address.
This is usually done for malicious reasons, either to distribute unsolicited email or to distribute email viruses. Unfortunately, there is no real way to prevent spoofing from occurring. If you receive an email that has questionable content, it is recommended to delete the email message or use an antivirus program to scan the message before opening it.


How Does Email Spoofing Work?
 Basically, email spoofing alters the email header to make it appear as though it originated from a different source address. This is possible due to the simple mail transfer protocol (SMTP) not supporting any type of sending authentication. Originally, email spoofing was used for legitimate reasons when someone wanted to send mail appearing to be from their email address when logged on to a network that was not their own. Nowadays, it is commonly used for sending spam or malicious mails means for sending viruses or phishing page links or simply spreading the botnets. The email fields can be edited in many email clients and automated spam and hacker tool kits that are currently available in the market or you can also also edit them manually if you know little bit of programming and hacking.
  

Why do People Spoof Email?
Email is primarily spoofed for one of two basic reasons: 
1 – Spam means for Email marketing or spreading a message to several users.
2 – To conduct a phishing or spear phishing attack.  



Spammers will spoof the “from” field many times in order to hide their identity from the email recipients. The message body will have advertisements, or links to offers the spammers are trying to sell to the recipients. They change the “From” field in the email in order to make it harder to determine their identity and avoid complaints from the end-user. 

Those who spoof email for malicious intent are simply called Crackers and they typically do so as part of a phishing attack that is for sending phishing page links. They will spoof the email to be from someone else on the same domain as the receiver. In a spear phishing attack, the email may be changed to be from a legitimate friend or co-worker of the person receiving the email. This results in a greater possibility of the targeted person opening the email and falling victim to malware or spyware attack.


What are the Techniques to Spoof Email?
Although it is straight forward to change the “From” field in an email header, the email can still be traced to the sender. But most of  the major ISP’s maintain “black lists” to ban known senders of spam from sending email traffic to users on their network(s). As a result, spammers have now evolved to using specialized software to create a random sending email address. These email addresses will rarely be active or used for a second time. 

Another technique used by those conducting spear phishing attacks is to hack the account password(s) for one or more people in the organization or some normal victim. Once its hacked, the emails in the address book are used to conduct additional attacks by placing those in the “From” field in email making them to appear to be legitimate. This same technique is also used by email worms(botnets) to self-propagate through unsuspecting users opening infected email sent by the respective worm.


Can Spoofed Emails be Detected?
Now a major question arises that can we trace such activities that is email spoofing. Answer is simply no if user is smart enough that is he has used a proxy server while sending the spoofed email and answer is Yes if a novice hacker has send it without spoofing his IP address.
I would recommend you to read this article to hide your IP and remain anonymous while sending emails and performing such hacking activites:


Get Incomedia Website X5 v8 Free License





 About Website X5 :

WebSite X5 is an all-in-one solution packed with tools to create and publish professional websites, online shops and blogs in just 5 easy steps. WebSite X5 is designed to work like a wizard, visually guiding users through the steps to create and publish a complete, functional and professional website. WebSite X5′s templates design the page – all users need to do is drag and drop objects to create pages. With a selection of website objects to choose from including videos (with support for YouTube), image galleries, integrated e-commerce with partners such as PayPal, podcast and RSS content and Shockwave Flash animations – creating a professional website could not be easier.
WebSite X5 generates all the programming code, connects to the service provider and uploads the website. X5′s advantage is that users do not require any previous experience in Web Development, Programming or Design to user the software and create a website.


Instructions :
1. Download Incomedia Website X5 from here.
2. During Setup select Install registered version. Click on Next

3. Click on the Unlock Button.

4. Now the registration form will open in your default browser.Fill in the form as shown in the browser then click on “REGISTER


5. Now enter the product code E1IA-S9P0-H2C0 and click on Send.

6. The Unlock Code (Product key) will be sent to your email address. Copy the unlock code and enter it during installation. [In step 3]