Monday, April 12, 2010

How to Find the IP Address of a Remote Computer


Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.

I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.

1. Download the IP Finder script (IP_Finder.ZIP) that I have created.
2. Open a new account in X10Hosting (or any free host that supports PHP).
3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.
4. You can rename the ip.php to any name of your choice.
5. Set the permission to 777 on ip_log.txt.
Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.



For your better understanding let’s take up the following example.

Suppose you open a new account in X10hosting.com with the subdomain as abc, then your IP Finder link would be
http://abc.x10hosting.com/ip.php


You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.



To find the recorded IP address check the logs using the following link.

http://abc.x10hosting.com/ip_log.php

The sample log will be in the following format



79.92.144.237 Thursday 07th of May 2009 05:31:27 PM

59.45.144.237 Thursday 07th of May 2009 05:31:28 PM

123.92.144.237 Thursday 07th of May 2009 05:31:31 PM



NOTE: You have to replace abc with your subdomain name.



I hope this helps. Express your opinion and suggestions through comments

How to Hack a MySpace Account

MySpace is one of the most widely used Social Networking website by many teenagers and adults across the globe. I have seen many cheaters create secret MySpace accounts in order to exchange messages with another person and have secret relationships. So, it’s no wonder why many people want to hack Myspace account. If you are wondering to know how to hack MySpace then you have landed at the right place.








Is it possible to hack MySpace?

Yes. As a matter of fact, almost anything can be hacked on the Internet. However you must be aware of the following things before you proceed to hack MySpace.


With my experience of about 7 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack MySpace: They are Keylogging and Phishing. All the other ways are simply scam or don’t work! Here is a list of facts about MySpace hacking.
1. There is no ready made software or program that can instantly hack into MySpace and get you the password within minutes.
2. Never trust any Hacking Service that claims to hack a MySpace account for a fee. I have personally tried and tested many of them. All I can tell you is that they are no more than a scam.

The following are the only 2 foolproof methods that work.




1. MySpace Hacking - The Easiest Way

The easiest way to hack MySpace is by using a keylogger (Also known as Spy software). A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. Keylogging can not only get you the password, but also has the power to monitor each and every activity they perform on their compter. To use a keylogger you don’t need to have any special knowledge. Anyone with a basic knowledge of computers can use the keyloggers. Hence for novice computer users, it is the ideal way to obtain MySpace password. With my experience I recommend the following keylogger as the best.



SniperSpy

SniperSpy is revolutionary software that allows you to access *ANY* online account or password protected material. MySpace, Facebook, Yahoo, Gmail, etc. – There are *NO* limitations to what accounts or websites this software can access!



Why Sniperspy is the best?


1. With my experience of over 7 years in the field of IT security, I have tried almost every product currently available and know the ins and outs of what it is and how it works.


2. Sniperspy is the only software that offers a complete stealth and easy access to any password.



Here is a summary of benifits that you will receive with Sniperspy software:


1. Access ANY Password
Using Sniperspy, you can hack every password typed, allowing you to access any type of password protected account.


2. Monitor all the Activities on the Target Computer and Access Protected MySpace Accounts
With Sniperspy you can do anything from secretly recording their IM conversations to accessing protected MySpace, Facebook or email accounts.


3. Never Get Caught
This software runs in a total stealth mode which makes it possible to record the activities without anyone knowing it.


4. Remote Install Feature
No physical access to your remote PC is needed to install the spy software. You can install the software even if the PC is out of country!


5. Extremely Easy to Use
Sniperspy is designed for novice computer users and requires no special skills.



Click Here to Download Sniperspy Now!



2. MySpace Hacking – The Other Way


Phishing

Phishing is the most commonly used method to hack into MySpace or any other email. The most widely used technique in phishing is the use of Fake Login Page (also known as spoofed page). These fake login pages resemble the original login pages of sites like Yahoo, Gmail, MySpace etc. Here the victim is trickedto make him believe the fake login page to be the real one and enter hispassword. But once the user attempts to login through these pages, his/her login details are stolen away. However phishing requires specialized knowledge and high level skills to implement. So I recommend the use of keyloggers to hack MySpace since it is the easiest way.

How to use Keyloggers – Detailed Tutorial and FAQs

Here is a DETAILED tutorial which contains every possible information that you need to know about keyloggers which includes how to use it, how it works etc.




WARNING: I highly recommend that you read this post completely since every single piece of information is important.



I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”. So to give you a clear picture and make you understand better I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go…


1. What is a Keylogger?

A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.

2. How Keylogger works?

Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://mail.yahoo.com/ and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.


3. How to install the keylogger?


A keylogger can be installed just like any other program. Just follow the screen instructions and you’re done.

4. Do I need any special knowledge to install and use the keylogger?


Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.


5. Once I install the keylogger can the victim come to know about it’s presence?

No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.


6. Can I be traced back if I install the keylogger on some other computer?

No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.


7. Which keylogger is the best?

Today there exists hundreds of keyloggers on the market and most of them are no more than a scam. So I tested some of the top keyloggers and conclude that the following is the best one.


SniperSpy





8. How SniperSpy works?



I will try to explain the working of Sniperspy in simple steps.



1. After you purchase Sniperspy, you’ll be able to create the installation module using easy set-up program. You need to email this module to the remote user as an attachment.



2. When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continously.



3. You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.



9. I don’t have physical access to the traget computer. Can I still use SniperSpy?



Yes you can. SniperSpy supports REMOTE INSTALLATION feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation all you need to do is just place the module (refer FAQ-8) in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).



10. Can I install SniperSpy on a local computer?



If you need to install to your local (current) computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module ( Refer FAQ-8). Double-click the module filename to execute it. Nothing will appear on the screen as the software is installed.



11. What if the antivirus block from sending it as an email attachment?



Instead of sending the keylogger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to http://www.fileden.com/. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.



12. Why SniperSpy is the best?



■SniperSpy supports REMOTE INSTALLATION feature. This feature is not present on most of the keyloggers.

■SniperSpy is fully compatible with Windows 98/ME/2000/XP/Vista and bypasses ANY Firewall.

■SniperSpy is more reliable than any other keylogger program. You need not rely on your email account to receive the logs. Instead you can just login to your online SniperSpy account to receive the logs.

■SniperSpy captures full-size screenshots of the activities on the target PC.

■Records BOTH sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.

■SniperSpy is more easy to install and requires no extra knowledge.

■SniperSpy is recognized by BBC, CNN, CBS and other news networks. Hence it is reputed and trustworthy.

13. How safe is to use SniperSpy?



Sniperspy is completely safe to use since all the customer databases remain confidential and private. SniperSpy do not collect any information from your system other than the information required for the product’s successful operation. They will not contact you in any way unless you request assistance.



14. Is my online order 100% Safe and Secure?



Absolutely Yes! All the e-commerce transactions for SniperSpy is handled by Plimus – they are a trusted online retailer specializing in digitally delivered products. All your information remains private and secure. The safety and protection of your personal information is 100% guaranteed. So you can place your order for SniperSpy with no worries of scam!



SniperSpy is completely reliable, safe and best keylogger out there. It is really worth the price that you pay for it. I promise that you cannot get a better keylogger than this. So what are you waiting for? Go grab SniperSpy now! Visit the following link for more informaion.



SniperSpy Homepage

How to Trace Any IP Address

In my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com. Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.




1. Country in which the IP is located

2. Region

3. City

4. Latitude/Longitude

5. Zip Code

6. Time Zone

7. Name of the ISP

8. Internet Speed

9. Weather Station

10. Area Code and

11. Domain name associated with the IP address.

A sample snapshot of the results from ip2location.com is given below







You can also visually trace route any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps. Please pass you comments.

10 Tips for a Total Online Security


With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online security.




1. Always install a good antivirus software and keep it up-to-date. Also install a good anti-spyware to keep your PC away from spywares.



2. Always visit known and trusted websites. If you are about to visit an unknown website, ensure that you do not click on suspectable links and banners.



3. Perform a virus scan on the files/email attachments that you download before executing them.



4. Regularly Update your operating system and browser software. For a better security it is recommended that you surf the Internet through the latest version of your browser program.



5. Never share your password (email, bank logins etc.) with any one for any reason. Choose a strong password (A blend of alphanumeric+special symbols) and change it regularly, eg. every 3 months. Avoid using easy-to-guess passwords. (ex. pet’s name or kid’s name)



6. Always type the URL of the website in your browser’s address bar to enter the login pages. For ex. To login to your Gmail account type http://mail.google.com/



7. Before you enter your password on any login page, ensure that you see https instead of http. ex. https://mail.google.com instead of http://mail.google.com. HTTPS protocol implements SSL (Secure Sockets Layer) and provide better security than a normal HTTP. For more information on HTTPS and SSL see Know More About Secure Sockets Layer (SSL).



8. Beware of phishing emails! Do not respond to any email that request you to update your login details by clicking on a link in the body of the email. Such links can lead to Fake Login Pages (Spoofed Pages). For more information on phishing refer What is Phishing?. Also refer How to Protect an Email Account from being Hacked.



9. Always hit the logout button to close your login session rather than abruptly terminating the browser window. Also clear your web browser caches after every session to remove the temporary files stored in the memory and hard disk of your PC.



10. Avoid (Stop) using any public computers or computers in the Internet cafes to access any sensitive/confidential information. Also avoid such computers to login to your email/bank accounts. You cannot be sure if any spyware, keystroke-logger, password-sniffer and other malicious programs have not been installed on such a PC.



By following the above 10 tips your online security can be guaranteed upto 90%. I hope this will help my readers for keeping themselves safe from any of the online insecurities. Cheers! Pass your comments.

How to use Google for Hacking

Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.




1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter



inurl:”viewerframe?mode=motion”



Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows

As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.




intitle:”Live View / – AXIS”



Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.



2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.



intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”



You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.



filetype:xls inurl:”email.xls”



Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query



intitle:index.of finances.xls



3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.



“?intitle:index.of?mp3 eminem“



Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.



I hope you enjoy this post. Pass your comments. Cheers!

What is MD5 Hash and How to Use it?

In this post I will explain you about one of my favorite and interesting cryptographic algorithm called MD5 (Message-Digest algorithm 5). This algorithm is mainly used to perform file integrity checks under most circumstances. Here I will not jump into the technical aspects of this algorithm, rather will tell you about how to make use of this algorithm in your daily life. Before I tell you about how to use MD5, I would like to share one of my recent experience which made me start using MD5 algorithm.




Recently I made some significant changes and updates to my website and as obvious I generated a complete backup of the site on my server. I downloaded this backup onto my PC and deleted the original one on the server. But after a few days something went wrong and I wanted to restore the backup that I downloaded. When I tried to restore the backup I was shocked! The backup file that I used to restore was corrupted. That means, the backup file that I downloaded onto my PC wasn’t exactly the one that was on my server. The reason is that there occured some data loss during the download process. Yes, this data loss can happen often when a file is downloaded from the Internet. The file can be corrupted due to any of the following reasons.



■Data loss during the download process, due to instability in the Internet connection/server

■The file can be tampered due to virus infections or

■Due to Hacker attacks

So whenever you download any valuable data from the Internet it is completely necessary that you check the integrity of the downloaded file. That is you need to ensure that the downloaded file is exactly the same as that of the original one. In this scenario the MD5 hash can become handy. All you have to do is generate MD5 hash (or MD5 check-sum) for the intended file on your server. After you download the file onto your PC, again generate MD5 hash for the downloaded file. Compare these two hashes and if it matches then it means that the file is downloaded perfectly without any data loss.



A MD5 hash is nothing but a 32 digit hexadicimal number which can be something as follows



e4d909c290d0fb1ca068ffaddf22cbd0



This hash is unique for every file irrespective of it’s size and type. That means two .exe files with the same size will not have the same MD5 hash even though they are of same type and size. So MD5 hash can be used to uniquely identify a file.



How to use MD5 Hash to check the Integrity of Files?

Suppose you have a file called backup.tar on your server. Before you download, you need to generate MD5 hash for this file on your server. To do so use the following command.



For UNIX:



md5sum backup.tar



When you hit ENTER you’ll see something as follows



e4d909c290d0fb1ca068ffaddf22cbd0



This is the MD5 hash for the file backup.tar. After you download this file onto your PC, you can cross check it’s integrity by again re-generating MD5 hash for the downloaded file. If both the hash matches then it means that the file is perfect. Otherwise it means that the file is corrupt. To generate the MD5 hash for the downloaded file on your Windows PC use the following freeware tool



MD5 Summer (Click on the link to download)



I hope you like this post. For further doubts and clarifications please pass your comments. Cheers!

How to Block Unwanted Emails

Do you want to block emails from your ex wife/husband? Do you want to block those annoying offers and newsletters that reach your inbox? Well here is a way to block all those unwanted and annoying emails that you do not want to see or read! With this trick you can block individual email address or the whole domain from which you do not want the emails to come from. Here are the step-by-step instructions to do this.




For Gmail



1. Login to your account
2. At the top-right corner, click on Settings
3. Under Settings, click on Filters
4. You’ll now see an option “Create a new filter“, click on it
5. Now in the From field enter the email address from which you do not want to receive the emails


For ex. you may enter john@gmail .com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.


6. click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.


For Yahoo

1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. In the left panel select the option Filters and click on create or edit filters
5. Now click on Add
6. in the next screen, give a name to your filter and in the From header field enter the email address that you want to block.


Fox ex. john@gmail.com or if you want to block an entire domain then just enter @xyz.com. Dont enter mailto:mailto:*@xyz.com. Select the option Move the message to: Trash and click on Save Changes.


For Hotmail
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. Click on Safe and blocked senders link under Junk e-mail
5. Now click on Blocked senders
6. Type in the email address that you want to block under blocked e-mail address or domain field.


For ex. Enter mailto:mailto:john@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain.



That’s it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy. I hope this post helps. pass your comments!

How to Send Anonymous Emails

Most of us are very curious to know a method to send anonymous emails to our friends for fun. But the question is, is it possible to send anonymous emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo etc? The answer is YES, it is still possible to bypass their spam filters and send anonymous emails to your friends. For example, you can send an email to your friend with the following sender details.




From: Bill Gates <mailto:mailto:billg@microsoft.com>



The art of sending this kind emails is known as Email Spoofing. In my previous post on How to Send Fake Email I insisted on using your own SMTP server to send anonymous emails. This method used to work successfully in the past, but today it has a very low success rate since Gmail and Yahoo(all major email service providers) blocks the emails that are sent directly from a PC. In this post I have come up with a new way to send anonymous emails (spoofed emails) that has 100% success rate. If you have to successfully send an anonymous email or spoofed email, you should send it using a relay server.



What is a Relay Server?



In simple words, a relay server is an SMTP Server that is trusted by Google or Yahoo as an authorised sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorised, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason for which using our own SMTP server to send emails fail.



So What’s Next?



Now all we have to do is, find a trusted SMTP server to Send Spoofed Emails. Usually all the emails that are sent from web hosting providers are trusted and authorised. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free Web Hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cakewalk to send anonymous emails. All we have to do is just modify the email headers to insert the spoofed From address field into it.



I have created a PHP script that allows you to send emails from any name and email address of your choice. The script can be found here.



Anonymous Email Sender Script



Here is a step-by-step procedure to setup your own Anonymous Email Sender Script



1. Goto X10 Hosting and register a new account.



2. Download my Anonymous Email Sender Script (sendmail.rar).



3. Login to your FreeWebHostingArea Account and click on File Manager.



4. Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.



5. Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777.



6. Now type the following URL



http://yoursite.freevar.com/sendmail.php



NOTE: yoursite must be substituted by the name of the subdomain that you have chosen during the registration process.



7. Use the script to send Anonymous Emails. Enjoy!!!



Tell me whether it worked or not. Please pass your comments…



WARNING: ALL THE INFORMATION PROVIDED IN THIS POST ARE FOR EDUCATIONAL PURPOSE ONLY. I AM NOT RESPONSIBLE FOR ANY MISUSE.

How to Recover Deleted Files from Windows and Mac

Have you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well you need not panic! It is possible to recover the deleted files back from your hard disk (even after you have Shift+Deleted) provided you act as soon as you realize that your files are deleted and use the best deleted files recovery software. In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.




Today there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality most of these softwares are neither effective nor capable of recovering your files back. So it is very much necessary to make the right choice of the file recovery software in order to recover deleted files back in the original condition. We recommend the following softwares to recover the deleted files



1. Stellar Phoenix Data Recovery (for Windows)



2. Stellar Phoenix Mac Data Recovery (for Mac)



Stellar Phoenix is one of the best company specializing in deleted files recovery services and solutions since 1993. Stellar’s Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Hence Stellar provides the best tools to recover deleted files with over 1,000,000 satisfied customers across 137 countries.



How the File Deletion Process Works?



When you delete a file from your computer (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk. Let’s take an example of a book containing 50 pages. Suppose when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition the file becomes invisible and hence appears to have deleted.



What are the Chances of Recovering my Files Back?



Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition. It may take up a very long time for those files to be completely deleted since the modern hard disks have ample capacity. Hence the chances are too less that the space from the deleted files are re-used immediately. So, it is really worth to try out the file recovery softwares like Stellar Data Recovery for Windows or Stellar Data Recover for Mac. Some files are reported to have recovered even after years of it’s deletion. However for the best results, it is recommended that you use the file recovery software as immediately as possible to recover your files.



Recovering the Deleted Files



In order to recover the deleted files all you need to do is perform a scan (search) for the deleted files using a File Recovery Software. Please be informed that there is no manual way to recover the deleted files. The Phoenix Data Recovery software performs a thorough scanning of the hard disk sector by sector and will locate the existence of deleted files to restore them back in the original condition. It is the only software that supports 185 popular file types including Windows NT Registry, JPEG, MP4, GIF, BMP and MS Word files. The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this you can



■Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions

■Recover deleted emails

■Recover deleted documents

■Recover deleted photos

■Recover deleted music

■Formatted Hard-Drive recovery

■Recover files from USB Drives, CDs, DVDs and memory cards

■Recover almost all the camera format file

Windows XP IP Utilities

The following are the IP utilities available in Windows that help in finding out the information about IP Hosts and domains.These are the basic IP Hacking Commands that everyone must know!




NOTE: The term Host used in this article can also be assumed as a Website for simple understanding purpose.



1. PING



PING is a simple application (command) used to determine whether a host is online and available.PING command sends one or more ICMP Echo messages to a specified host requesting a reply.The receiver (Target Host) responds to this ICMP Echo message and returns it back to the sender.This confirms that the Host is online and available.Otherwise the host is said to be unavailable.



Syntax:

C:>ping gohacking.com



2. TELNET

Telnet command is used to connect to a desired host on a specified port number.For example

Syntax:

C:>telnet yahoo.com 25

C:>telnet yahoo.com



NOTE: The default port number is 23.When the port number is not specified the default number is assumed.

Telnet Hacking is explained in detail in the following post.

How To Send Fake Email



3. NSLOOKUP

Many times we think about finding out the IP address of a given site.Say for example google.com,yahoo.com,microsoft.com etc.But how to do this? For this there are some websites that can be used to find out the IP address of a given site.But in Windows we have an inbuilt tool to do this job for us.It is nslookup.Yes this tool can be used for resolving a given domain name into it’s IP address (determine the IP of a given site name).Not only this it can also be used for reverse IP lookup.That is if the IP address is given it determines the corresponding domain name for that IP address.



Syntax:

C:>nslookup google.com



4. NETSTAT



The netstat command can be used to display the current TCP/IP network connections.For example the following netstat command displays all connections and their corresponding listening port numbers.



Eg: C:>netstat -a



This command can be used to determine the IP address/Host names of all the applications connected to your computer.If a hacker is connected to your system even the hacker’s IP is displayed.So the netstat command can be used to get an idea of all the active connections to a given system.

Cell Phone Spy – How to Spy on Cell Phones


Need to spy on a cell phone? Do you want to secretly spy on SMS, calls, GPS locations and other confidential info of your child’s or spouse’s cell phone? Well here is a simple and foolproof solution to spy on cell phones with the World’s Most Powerful Cell Phone Spy software from SpyEra!





Spy Phone GOLD (Click on the link to visit Spy-Era Homepage)



Download Spy Phone GOLD software directly onto your mobile phone and receive copies of SMS, Call Logs, Emails, Locations and also listen to live conversations on the target cell phone within minutes. Spy Phone GOLD is the best Cell Phone Spy software of it’s kind. Beware of counterfeit spy softwares on the market, buy original and genuine cell phone spy software from SpyEra.



Spy Phone GOLD Top Features:



■Call Interception – Listen to the actual calls LIVE on the target cell phone

■Environment Listening – Make a spy call to the target phone running SPY PHONE and listen in to the phone’s surroundings.

■SMS Logging – Records both incoming & outgoing SMS

■SIM Change Notification – Get instant notification via SMS when the target cell phone changes it’s SIM

■Remote Control – Send secret SMS to the target phone to control all functions

■Spy from any location accross the world

■100% Undetectable


Spy Phone GOLD is the only cell phone spy software to offer a wide range of features which is 100% undetectable.




How it Works?



The working of Spy Phone GOLD is very simple and needs no extra knowledge to install and use.



Step 1- After you purchase Spy Phone GOLD, you can directly download the spy software onto the target cell phone and installation takes only a few minutes (Approx. 10 Min). No More physical access to the cell phone is required after installation!



Step 2- After installation, SPY Phone secretly records events that happen on the target phone and delivers this information to a web account, where you can view these reports 24×7 from any Internet enabled computer or mobile phone.




Compatible Cell Phones



Spy Phone is fully compatible with the following mobile phones



1.BlackBerry Phones

2.Android Phones

3.Apple iPhones

4.Windows Mobile Phones

5.Symbian OS 9.x and 8.x phones

Click Here for the Complete List of Compatible Phones.



Why Spy Phone GOLD?



There exists many cell phone spy softwares on the market and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy softwares and based on the results we conclude Spy Phone GOLD as be the best one.



Spy Phone GOLD is one of the best and award winning cell phone spy software on the market with an affordable price. Spy Phone GOLD needs no extra knowledge to install/use and hence it becomes just a cakewalk to spy on your favorite cell phone! Today with an excessive usage of cell phones by many teenagers it becomes necessary for their parents to perform cell phone spying.



Awards for Spy Phone GOLD








So what are you waiting for? If you’re really serious to spy on a cell phone then Spy Phone GOLD is for you. Go grab Spy Phone GOLD now and expose the truth.



Spy Phone GOLD - The No.1 Cell Phone Spy Software

How to Spoof Caller ID – Caller ID Spoofing



Caller ID spoofing is the act of making the telephone network to display any desired (Fake) number on the recipient’s Caller ID display unit instead of the original number. The Caller ID spoofing can make a call appear to have come from any phone number that the caller wishes.




Have you ever wondered how to perform Caller ID spoofing? Read on to know more information on Caller ID spoofing and find out how it is performed.



Unlike what most people think, an incoming call may not be from the number that is displayed on the Caller ID display unit. Because of the high trust that the people have in the Caller ID system, it is possible for the caller to easily fool them and make them believe that the number displayed on the Caller ID display is real. This is all possible through Caller ID spoofing.







How to Spoof Caller ID?





You can easily spoof any Caller ID using services like SpoofCard. In order to use the spoofcard service, you need to pay in advance and obtain a PIN (Personal Identification Number) which grants access to make a call using the Caller ID spoofing service. Once you have purchased the service, you will be given access to login to your SpoofCard account. To begin with, you need to call the number given by SpoofCard and enter the PIN. Now you will be given access to enter the number you wish to call and the number you wish to appear as the Caller ID. Once you select the options and initiate the calling process, the call is bridged and the person on the other end receives your call. The receiver would normally assume that the call was coming from a different phone number ie: the spoofed number chosen by you - thus tricking the receiver into thinking that the call was coming from a different individual or organization than the caller’s. In this way it is just a cakewalk to spoof Caller ID and trick the receiver on the other end. Thus you neither need to be a computer expert nor have any technical knowledge to perform Caller ID spoofing. For more information on SpoofCard service visit the following link.









SpoofCard







How Caller ID Spoofing works?





Caller ID spoofing is done through various methods and using different technologies. The most commonly used technologies to spoof Caller ID is VOIP (Voice Over IP) and PRI (Primary Rate Interface) lines.



Today most VOIP systems provide an option for it’s users to enter whatever number they want in the calling party field and this number is sent out when they make a call. Hence it is easily possible for any user to spoof Caller ID provided they have a VOIP system and know how to properly configure it to spoof the Caller ID. However sites like SpoofCard provide an easy and cheap spoofing services for those who aren’t using VOIP systems that they can configure themselves.



Caller ID spoofing is possible and being performed right from the days Called ID system was introduced. However most people are unaware of the fact that it is possible to spoof Caller ID and make any number to be displayed on the receiver’s end. In the past, Caller ID spoofing service was mostly used by telemarketers, collection agencies, law-enforcement officials, and private investigators but today it is available to any Internet user who wish to perform Caller ID spoofing.

A Virus Program to Disable USB Ports


In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.




Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.



1. Download the USB_Block.rar file on to your computer.



2. It contains the following 4 files.



■block_usb.c (source code)

■unblock_usb.c (source code)

3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.



3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).



4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.



5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).



I hope you like this post. Please pass your comments.

Hack BSNL Broadband for Speed

If you are a BSNL broadband user, chances are that you are facing frequent DNS issues. Their DNS servers are just unresponsive. The look up takes a long duration and many times just time out. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS servers or run your own one like djbdns. The easiest options is to use OpenDNS. Just reconfigure your network to use the following DNS servers:




208.67.222.222

208.67.220.220



Detailed instructions specific to operating system or your BSNL modem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features.After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.





your feedback/question will be processed as soon as possible

contact

NAME:  CHAKSHU00GRG
COUNTRY: INDIA
SCHOOL: INDIRA IDEAL SCHOOL
ABOUT ME: GAMER AND BLOGGER
SITE: hackosys.BLOGSPOT
EMAIL ID: chakshu00grg@gmail.com

JOIN ME ON SOCIAL SITES--------



























do you have suggestions/que just fill this form

Your Name
Your Email Address
attach file
Message
Image Verification
captcha
Please enter the text from the image:
[ Refresh Image ] [ What's This? ]

Powered byEMF PHP Form