Friday, July 24, 2009

How to Make a Trojan Horse

How to Make a Trojan

Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…

Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.

Now lets move to the working of our Trojan

The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.

The algorithm of the Trojan is as follows

1. Search for the root drive

2. Navigate to WindowsSystem32 on the root drive

3. Create the file named “spceshot.dll

4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full

5. Once the drive is full, stop the process.

You can download the Trojan source code HERE. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.

Hacking Yahoo Messenger

This tutorial will tell you how to hack yahoo messenger while you are engaged in chatting with some person.While you are chatting through yahoo messenger, Yahoo will hide the IP addresses of all the computers that are connected through the yahoo messenger application to the chat room.So it is not possible to directly find out the IP of the person you want to hack.Then how to get the IP address? Yes it is still possible to hack the IP address during the Yahoo messenger chat.The procedure to Hack Yahoo messenger is discussed in detail below.

While you are chatting via yahoo messenger the communication between you and the person you want to hack, takes place indirectly via Yahoo server and not directly.It is not possible to hack Yahoo messenger directly to get the IP address.So to hack his IP, you must establish a direct communication with him.So,how to do this? It’s easy.Just start chatting with some one via Yahoo messenger.During the process of chatting send him a big file.Now the file transfer takes place directly between your computer and the victim’s computer(via yahoo messenger application).So now, you are ready to go. Here’s the step-by-step process to hack Yahoo messenger and get the IP address of the person .

  • Goto the COMMAND PROMPT (START>>>RUN>>>Type CMD).
  • Here Type “netstat -n” (without quotes).

NOTE: If you are new to “netstat” and other IP related commands refer this tutorial:Windows XP IP Utilities

  • The pic given below shows netstat results of my computer.I was not chatting when i took this pic and hence it looks modified.

  • Here local address is your own IP and the foreign address is the IP address of the recipient with whom you are connected via yahoo messenger (There may be multiple recipients and hence multiple foreign addresses).
  • Now send him the file.
  • Check the output by typing the command “netstat -n” (without quotes).
  • Assume the output is something like this.

TCP 127.0.0.10:5101 124.55.23.11:1246 ESTABLISHED

Here 124.55.23.11 is the IP address of the person with whom you are chatting and 1246 is the port number where connection is established.That’s It! You have now hacked Yahoo messenger to get his IP address.

Once you hack Yahoo messenger and get his IP address you can use any of the Remote Administration tools or perform NETBIOS HACKING.Refer this tutorial on Netbios Hacking.

NOTE: Some times there are chances where in the file transfer gets encrypted (takes place via yahoo server itself).So in this case the above hack may fail to work.

Change the Title of Yahoo Messenger

Here’s how you change the title text that appears at the top of the Messenger window. By default, this is “Yahoo! Messenger”, followed by your status. Simply edit the ymsgr.ini file, which you will find in the same folder as the Messenger program, in your Program Files folder. Locate the file and open it in Notepad. Then, at the end, add the following:

[APP TITLE]
caption=YOUR TEXT

Here, “YOUR TEXT” is whatever you want in the title bar. Save the file and close Messenger. When you restart it you will see your text in the title bar.

Netbios Hacking

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.

STEP-BY-STEP NETBIOS HACKING PROCEDURE

1.Open command prompt

2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).

Example: C:\>net view \\219.64.55.112

The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP address in it’s place.If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address.

3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios command which makes it possible to hack remote drives or printers.

Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint

NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.

NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT

F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer.These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.

4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.

Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system.You can access files\folders quickly through “Command Prompt”.

NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address.

HAPPY NETBOS HACKING!!

Chat without Yahoo Messenger or Gtalk

Can we chat without Yahoo messenger? Most of us are familiar with the most widely used applications such as Yahoo messenger and Gtalk to carry out chatting with our friends.But here I’ll show how to chat without Yahoo messenger or Gtalk.As we all know the information we exchange with their servers(Yahoo or Gtalk) are recorded and stored along with the corresponding IP addresses.This may hurt our privacy since all the information we exchange while chatting has to pass through a third party server.

Moreover if the matter is highly confidential, then it is necessary to have a totally private chat where the messages are exchanged only between the people involved in the chat and not with any other third party servers.At these situations, it is better to chat without Yahoo messenger.
So, how to carry out a private chat without Yahoo messenger or Gtalk?
For this purpose there exists many softwares that support’s you to host a web-based chat system without any additional software or services.So with these softwares the exchange of messages takes place directly between the two persons engaging in the chat and will not pass through any other third party server.This ensures 100% privacy and eliminates the desperate need to chat with Yahoo messenger.
One of my favorite program for private chat is Easy Chat Server

Easy Chat Server is a Windows program that allows you to host a web-based chat system without any additional software or services. Unlike other chat server, you do not need to install Java. It allows you to build one or more web-based chat rooms on your machine, and provides advanced chat functionalities aiming to offer discussion space for your users, customers and partners.
Here are some of the screenshots of Easy Chat Server.

Key Features of Easy Chat Server:
  • Easy to use, Simple installation that will have you up and running in minutes.
  • 128-Bit Security Socket Layer(SSL) support. support for server level certificate creation.
  • Instantly runs a complete chat server on your PCs – does not need to install any Web Server.
  • Supports full private messaging and One to One private chat.
  • Support of images, smileys, avatar icons.
  • Full chat and access logs are available within the chat server.
  • Have a built-in IP Filter, supports banning/unbanning IP address, securely.
  • Multiple styles available for the user to customize rooms.
  • Unlimited rooms and users, no any annual, per-user, or maintenance fees.
  • No spyware, adware or other unwanted extra programs.

Speed Up PC – Top 5 Ways to Speed Up Your Computer

5 Best Ways to Speed Up your PC

Speed Up PC

Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up your PC. For your convenience, I ’ll split this post into 2 parts.

1. Automatic Ways to Speed Up PC (Using PC Speed Up Softwares)

2. Manual Ways to Speed Up PC

Automatic Ways to Speed Up PC

You can use a PC Optimizer Tool to automatically boost the Speed of your PC without the need to worry about the manual ways of doing it. These tools will automatically find and fix upto 99% of your PC errors by optimizing the Windows registry, cleaning up junk files, removing unwanted items from the start up etc. This can speed up your PC and Internet speed by upto 3 times. Here are some of the best PC Optimizer Programs that I recommend.

1. Perfect Optimizer

2. Registry Easy

Using a PC Optimizer is the easiest way to speed up your PC. This is because, most of the performance tweaks such as Registry Cleanup cannot be done manually.

Manual Ways to Speed Up Your PC

1. Free Up Disk Space to increase the speed of your PC

  • Remove temporary Internet files.
  • Empty the Recycle Bin.
  • Remove Windows temporary files.
  • Uninstall Programs that you no longer use.

2. Periodically Perform Hard Disk Defragment. This can Speed Up your PC significantly.

3. Clean Up your Registry (Highly Recommended)

Cleaning Up your Windows Registry is very much necessary to speed up your PC. Unfortunately you cannot do this manually. You have to use a Registry Cleaner to do this. Here is the best registry cleaner on the web.

Registry Easy

A complete review of registry cleaners can be found at Registry Cleaner Reviews

4. Clean Up the browser cache to Speed Up your Internet.

5. Install a good Antispyware software

Spywares can really hurt the performance of your PC. So, install a good anti-spyware to protect your PC from spywares and improve the speed of your PC. I recommend the following Antispywares to protect your PC.

1. Spyware Cease

2. Nodware Anti-Spyware

Which is the Best Way to Speed Up my PC? (Auto or Manual)

The best way to speed Up your PC is by using a PC Optimizer such as Perfect Optimizer or Registry Easy. This is because, manual ways can only perform 30-40% of the tweaks to improve the speed of your PC, but the most important aspect of the Speed Up process such as Registry clean Up and other advanced performance tweaks can only be done using a PC Optimizer software. So if you are serious about improving the speed of your PC, then you need to use a PC Optimizer.

How to Change User Information ?

On a regular basis, people ask me questions about changing user information, the information you provided when you installed Windows. You can change it. Both of the following values are in the key

HKLM\SOFTWARE\Microsoft\Windows NT\ CurrentVersion

>>RegisteredOrganization.
The name of the organization (Change this to your desired organization)

>>RegisteredOwner. The name of the user (Change this to your desired name)

These changes are reflected in the system instantaneously and requies no reboot.You can confirm this by seeing the system properties(Right-Click on “My Computer” icon and select properties).

Both are REG_SZ values. Changing the registered organization and owner names doesn’t affect installed applications. However, applications that you install after changing these values are likely to pick up the new names.

How to Copy Locked Photos from Orkut

Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album. So this makes it difficult to copy photos from Orkut. It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it. This may be annoying most of you! Then…

How To Copy Locked Photos From Orkut?

Yes it’s still possible to copy the photos from Orkut.Here’s a step-by-step procedure to copy the photo.

1. Login into your Orkut Account.

2. Goto your friend’s album and open the photo that you need to copy.

3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.

4. Press the left click button and drag and drop the photo onto the ADDRESS BAR. I think this trick is no longer working. So I have a new trick….

Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). Alternatively you can also Drag and Drop the photo onto the Desktop. That’s it. This trick is working now!!

4. Now the photo gets displayed seperately on your browser.

5. You can Right-Click and select the Save As option to save the photo onto your PC.

The browser also displays the direct link to the photo. This link can be used to share the Orkut photos with your friends without the need to login to your Orkut account to access photos.

Please express your opinions through comments. Cheer Up..

Happy Orkut Hacking.

How to Hack Orkut

Most of the people ask me “How to hack an Orkut account” which I have already discussed in my previous post Hacking Orkut. But here I am giving you a detailed information about how to protect your Orkut accounts. As we all know most of the Google services are still in BETA. So,websites like Orkut, powered by Google is not totally secure!Several people feel proud in hacking other user’s account. You do a foolish thing, and next day your account is hacked. This is very sad indeed, but hackers are adding names to their victims list till now.

How can a hacker hack my Orkut account?
The answer to this question is already discussed in my previous post How to Hack Orkut.

But this post is meant for providing some safety measures to prevent your Orkut account from being hacked. There is not much you have to take care of. Just follow the simple steps and never get your orkut account hacked in your life.

1. Never try to login/access your Orkut account from sites other than Orkut.com.

2. Never click on any links from the sources you don’t trust while accessing your Orkut account. (or while accessing any other Google services like Gmail,Blogger etc.)

3. Delete any links on your scrapbook, no matter if a known or unknown person have sent it.

4. Never disclose your orkut login details with anyone.

5. Never ever use Javascripts on Orkut, no matter whatever it claims to do. Get satisfied with the services provided by default! Avoid using third party Scripts which might be malicious.

6. Never get excited to see a site claiming to have 1000 cool orkut tricks for which you have to just log in to your orkut account. Don’t trust that site. That’s a Phishing site.

7. Never tick the box “REMEMBER ME” on the orkut homepage if you are surfing from a cafe or a public area.

8. Always remember to hit Sign out button, when you are done.

How To Hack Orkut ???

How To Hack Orkut ???
Google uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack.

Second Level – Google account checks for cookie in the sytem of user
Third Level – Google provides a redirection to the entered User information
Fourth Level – Google doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut using input validation attack!!!

It is not an easy task to hack Orkut by breaking this security! But still some people manages to get access to other’s Orkut accounts. The question concerned is How they do it? Many of them just use simple tricks that fool users and then they themself leak out their password. Here are some points you need to take care of, to protect your Orkut account being hacked.

Common Ways to Hack Orkut

1. Using Keyloggers is one of the Easiest Way to Hack an Orkut (or any other email) password. Keylogger programs can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden.

A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an Orkut account.

A keylogger program is widely available on the internet. Some of the best ones are listed below

Win-Spy Monitor

Realtime Spy

A detailed information on Keylogger Hack can be found in my post Hacking an Email Account.

2. Phishing Attack is the most popular way of hacking/stealing other’s password. By using fake login pages it is possible to hack Orkut. Here the users land on a page where they are asked for their login information and they enter their Orkut username and password thinking it to be a real page but actually it is other way round. It submits all the entered details to the creator of the fake login page.

3. Orkut New Features: I have come across a page(fake page) that looks like they are giving the user a choice of selecting new features for orkut with your ID and password, of course!! When the user submit’s his/her Orkut login information through this page, there goes his ID and password mailed to the coder.

4. Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not ORKUT. This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page and there you loose up your password.

5. Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it. So be careful, javascripts can even be used to hack Orkut!

6. Primary mail address: If by some means a hacker came to know the password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’. This way Google will send link to the already hacked primary email ID to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your, Orkut account is hacked too.

So a better thing would be to keep a very unknown or useless email ID of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker. Hence your Orkut account saved.

So, I hope that this post not only teaches you to hack Orkut but also to hack protect your Orkut account.

If you would like to share something, comment here and I will add up here with a credit to your name.

Change IP Address

How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address.

1. Click on “Start” in the bottom left hand corner of screen.

2. Click on “Run”.

3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.

4. Type “ipconfig /release” just like that, and hit “enter”.

5. Type “exit” and leave the prompt.

6. Right-click on “Network Places” or “My Network Places” on your desktop.

7. Click on “properties”.

You should now be on a screen with something titled “Local Area Connection”, or something close to that.

8. Right click on “Local Area Connection” and click “properties”.

9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.

10. Click on “Use the following IP address” under the “General” tab.

11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).

12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.

13. Hit the “Ok” button here.

14. Hit the “Ok” button again.You should now be back to the “Local Area Connection” screen.

15. Right-click back on “Local Area Connection” and go to properties again.

16. Go back to the “TCP/IP” settings.

17. This time, select “Obtain an IP address automatically”.

18. Hit “Ok”.

19. Hit “Ok” again.

20. You now have a new IP address.

Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack.In this case you need to switch off the modem and then switch it on to get the new IP address.

NOTE: All these tricks works only if you have a dynamic IP address.But if you have a static IP address you have no option to change your IP.

Use Gmail Account to Send Emails from Multiple Addresses

In this post I am going to show you how to use your Gmail account to send and receive emails from multiple addresses. Most of us own more than one email account say for example, one from Gmail, one from Yahoo and one from Hotmail. If you are tired of logging into multiple accounts to check your inbox or to send emails, I have a solution here.

Gmail has an option to integrate multiple email accounts (email addresses) into a single Gmail account. Once you integrate multiple email addresses into your Gmail account, you can use the same account to send emails from different addresses and receive emails for different addresses. Let’s take a simple example

Suppose you have three email addressess (email accounts)

1. gohacking@gmail.com

2. gohacking@yahoo.com

3. hacker@hotmail.com

You can integrate the emails gohacking@yahoo.com and hacker@hotmail.com to gohacking@gmail.com and operate all the three accounts from your single gmail account. Here is a step-by-step procedure to do this.

1. Login to your gmail account.

2. Click on Settings at the top right corner.

3. Under Settings, click on Accounts tab.

4. Now you’ll see the first option “Send mail as:

5. Under this option, click on Add another email address you own

6. Now a small new window will pop-up asking you to enter the details of your new email address.

7. Here you can enter any name and any email address. The email address need not belong to gmail only. You can enter your yahoo, hotmail or any other valid email address.

8. A Verification email will be sent to the address that you specify. Once you verify that you own the email address, it will be integrated to your Gmail account.

Now when you compose a new email, you’ll see an option to select from multiple address to send the mail. Also you’ll receive the incoming mails for multiple addresses to a single mailbox. I hope this will benefit you.

Before you leave, I should also tell you one good advantage of this. According to Gmail privacy policy, they will not send the user’s IP address in the outgoing emails. That means when you send an email from your Gmail account , the receiver will not be able to find out your IP address. But you don’t have this advantage in Yahoo or other email providers.

Please share your opinions through comments. I hope this helps….

A Virus Program to Disable USB Ports

Virus to disable USB portsIn this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.

Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.

1. Download the USB_Block.rar file on to your computer.

2. It contains the following 4 files.

  • block_usb.c (source code)
  • unblock_usb.c (source code)

3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.

3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).

4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.

5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).

I hope you like this post. Please pass your comments.

How to Find the IP Address of a Remote Computer

Find IP AddressMost of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.

I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.

1. Download the IP Finder script (IP_Finder.ZIP) that I have created.

2. Open a new account in X10Hosting (or any free host that supports PHP).

3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.

4. You can rename the ip.php to any name of your choice.

5. Set the permission to 777 on ip_log.txt.

Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.

For your better understanding let’s take up the following example.

Suppose you open a new account in X10hosting.com with the subdomain as abc, then your IP Finder link would be

http://abc.x10hosting.com/ip.php

You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.

To find the recorded IP address check the logs using the following link.

http://abc.x10hosting.com/ip_log.php

The sample log will be in the following format

79.92.144.237 Thursday 07th of May 2009 05:31:27 PM
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM

NOTE: You have to replace abc with your subdomain name.

I hope this helps. Express your opinion and suggestions through comments.

Get a Call from your own Cell Phone number

Here is a trick to get a call to your cell phone from your own number.Do you think I am crazy? No, I am not…….

Just try the following steps and you’ll get a call to your cell phone from your own number.

1. Just give a missed call to this number.You’ll not be charged!

+41445804650

2. Wait for a few seconds and you’ll get a call to your cell phone from your own number

3. Receive the call.You’ll hear a lady voice asking for a PIN number.Just enter some rubbish number.

4. She say’s- Your PIN cannot be processed and the call disconnects..

ANOTHER TRICK

Instead of giving a missed call, just continue calling.The call will not be received and will get disconnected just after a while.But now do you know what happen’s?

You will get a call from the number

+501

Reason behind this trick

God Knows!!

Just try and pass your comments. Tell me whether the second trick worked or not!!

Popularity: 29%

How to Hack an Email Account by software

How to Hack an Email Account


The most frequent question asked by many people especially in a chat room is How to Hack an Email Account? So you as the reader are most likely reading this because you want to hack into some one’s email account. Most of the sites on the internet teach you some nonsense and outdated tricks to hack an email. But here are some of the real and working ways that can be used to hack an email account.

THINGS YOU SHOULD KNOW BEFORE PROCEEDING

Before you learn the real ways to hack an email, the following are the things you should be aware of.

1. There is no ready made software that can hack emails just with a click of a button. Please don’t waste your money on such scam softwares.

2. Never trust any hacking services that claims to hack email passwords just for $100 or $200. Often people get fooled by these services and eventually loose their money with no gain.

3. With my experience of over 6 years in the field of Hacking and Security, I can tell you that there exists only 2 foolproof methods to hack an email. All the other methods are simply scam or don’t work. The following are the only 2 foolproof methods that work.

1. EASIEST WAY TO HACK AN EMAIL ACCOUNT

Today, with the advent of a program called Keylogger it’s just a cakewalk to hack an email account. It doesn’t matter whether or not you have physical access to the victim’s computer. Using a keylogger is the easiest way to hack an email account. Any one with a basic knowledge of computer can use the keylogger and within few hours you can hack any email account.

1. What is a keylogger?

A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a small program that monitors each keystroke a user types on a specific computer’s keyboard. Using a keylogger is the easiest way to hack an email account. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.

2. Where is the keylogger program available?

A keylogger program is widely available on the internet. Some of the best ones are listed below

SniperSpy

Win-Spy

3. How to install it?

You can install these keyloggers just as any other program but these things you must keep in mind. While installing, it asks you to set a secret password and a hot key combination. This is because, after installation the keylogger program is completely hidden and the victim can no way identify it. So, you need the Hot Key combination and secret password to later unhide the keylogger.

4. Once installed how to get password from it?

The hacker can open the keylogger program by just pressing the hot keys (which is set during installation) and enter the password. Now it shows the logs containing every keystroke of the user,where it was pressed, at what time, including screenshots of the activities. These logs contain the password of the victim’s email account.

5. I don’t have physical access to the victim’s target computer, what can I do?

It doesn’t matter whether or not you have physical access to the victim’s computer. Because keyloggers like SniperSpy and Win-Spy offers Remote Installation Feature. With this feature it is possible to remotely install the keylogger on the victim’s PC.

You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the file, it will automatically get installed without his knowledge and start recording every activity on his computer. These activities are sent to you by the keylogger software via email or FTP.

6. What is the best way to deploy the keylogger onto remote PC?

Instead of sending the keylogger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to www.hotlinkfiles.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.

7. How can a keylogger hack the Email password?

Hacking an email password using keylogger is as simple as this: You install the keylogger on a Remote PC (or on your local PC). The victim is unaware of the presence of the keylogger on his computer. As usual, he logs into his Email account by typing the username and password. This username and password is recorded and sent to you via Email. Now you have the password of your target email account.

In case if you install the keylogger on your local PC, you can obtain the recorded email password just by unhiding the keylogger program (use your hot key and password to unhide).

8. Which Keylogger is the best?

I recommend SniperSpy as the best for the following reasons.

1. SniperSpy is fully compatible with Windows 98/ME/2000/XP/Vista. But Winspy has known compatible issues with Vista. So if your PC or the remote PC runs Vista then Winspy is not recommended.

2. SniperSpy is more reliable than Win-Spy since the logs sent will be received and hosted by SniperSpy servers. You need not rely on your email account to receive the logs.

2. Unlike Winspy, Sniperspy doesn’t require anything to be installed on your computer. To monitor the remote PC all you have to do is just login to your SniperSpy account from your browser.

3. SniperSpy is more easy to use and faster than Winspy.

4. SniperSpy offers better support than WinSpy.

To get a complete review of SniperSpy please see my new post Which Spy Software to Choose

Apart from the above mentioned reasons, both SniperSpy and WinSpy stands head-to-head. However in my opinion it’s better to go for SniperSpy since it is the best one. I have tested tons of keyloggers and the only two that stood up were SniperSpy and Winspy.

So what are you waiting for? If you’re serious to hack an email account then go grab either of the two keyloggers now!

For more information on these two softwares visit the following links

1. SniperSpy 2. WinSpy

2. OTHER WAYS TO HACK AN EMAIL ACCOUNT

The other most commonly used trick to sniff password is using Fake Login Pages. Today, Fake login pages are the most widely used techniques to hack an email account. A Fake Login page is a page that appears exactly as a Login page but once we enter our password there, we end up loosing it.

Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get redirected to some other page. Many times we ignore this but finally we loose our valuable data.

However creating a fake login page and taking it online to successfully hack an email account is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc.

I hope this info has helped you. Happy Email Hacking!

Popularity: 100% [?]

10 ways hacks how to speed up slow computer/pc perfomance

I see a lot of Windows users always complain "My computer/pc is too slow. How to speed up my pc speed performance?" and they need a new PC. Upgrading the PC is always a viable option for better performance, but here are things that you can do to keep your PC healthy and i am sure this will help you to make your PC faster. But changing pc everytime is a costly affair and hence i have listed below 10 perfect ways to help you improve your computer speed performance. Thus, you will be able to speed up your computer/pc for free.

The last time u installed Windows it worked very smoothly on your first boot right? The boot process was faster, applications were running quickly and smoothly, no errors. Now why does it takes such a long time to boot and takes lot of memory? What can i possibly do to restore my PC that earlier state?

Speed up windows computerThe answer is pretty simple. You have to take care of your pc and tweak a bit. Overclocking your PC is an option to try at your own risk which i don’t recommend hence not discussing in this post. You only have to understand why your pc is slowing down and do things to prevent from slowing down.

Here are 10 simple ways to speed your PC:

1. Using an Anti-Virus, Spyware and Adware removal program:

If you use internet frequently, chances are that you pc is infected by any adware or spyware if you not using a good anti virus/anti-malware program. Most adware’s and spywares open multiple connections to access internet spreading infection all over the web. This may slow down your pc, other harmful viruses might crunch your memory and system resources mostly slowing down startup process. Therefore,

  • Use a good antivirus, adware, spyware removal Software.
  • Make sure you UPDATE it regularly.
  • Enable the auto update mode for better security.
  • Run regular scans (weekly scheduled scanning recommended).

2. Defragmenting Hard drives:

The files when moved or created on your PC are stored into small fragments randomly on your disk drive. When you open those files it takes time to gather all those chunks and put them back together to form that single file. When you defragment your drive all those scattered fragments are arranged properly on the drive thus loading application bit faster. There is a Disk Defragmenter utility in windows,

Open My Computer > Right click on the disk drive you want to defragment > Select Properties > Under Tools tab click Defragment Now. But i recommend Power Defragmenter a small free utility by sysinternals which is faster and with various options.

3. Clean Registry:

Windows registry is a database of information of all the files, folders and the windows configuration. This database grows as you use windows, can also become erroneous. Thus, it becomes necessary to clean and repair registry errors regularly. Use CCleaner, a tiny Freeware to scan and fix registry issues.

4. Delete Temporary, Junk and Obsolete files/Clear cache:

Clean all your drives for free space, i personally recommend keep atleast 20% of your drive space free. Also, you have to clear the windows TEMP files, the web browsers temporary files, caches files, etc. All web browsers has that option.CCleaner will be a good choice for the same, it will analyze and clean all unwanted internet files, Windows Explorer files and system files.

5. Check Disk for errors:

Scan your disk for errors regularly. There may be some lost fragments or links which may lead to error in application. Run Scandisk once a week to keep things running smoothly. the error checking utility in windows will scan and attempt to recover bad sectors. Open My Computer > Right click the drive > Properties > Tools > click Check Now Button. Else simply type chkdsk /r at the command prompt.

6. Remove Startup items:

Removing unwanted startup programs will speedup the windows boot process and your desktop will be ready quickly. some programs like Limewire or MSN messenger take time to load at startup, you can remove those and run them when needed.to remove Startup items: start > Run > type msconfig > press OK. Now in the System Configuration Utility uncheck the unwanted programs (better Disable All).

7. Remove unnecessary Programs:

Remove those programs which you don’t use anymore. This will free disk space and even help windows perform better. Also, remove the windows unwanted components like Indexing services & Outlook Express from the Add/Remove windows programs.

8. Keep PC updated:

Look for regular updates, Enable Windows Updates, Updates includes major bugfixes which can be helpful. Look for new Service packs for better hardware compatibility. Update all device drivers, anti-virus programs and other applications. Hardware Manufactures keep updating their device drivers for better and smooth functioning. I have written earlier on a Free Software To Update Windows Device Drivers do read that.

9. Remove unwanted visual effects:

The animated windows and fading menus can slow down your pc unknowingly. You can remove those fading effects, Use windows classic style theme, remove the heavy graphic wallpaper(none), You can even lower the color quality( to medium 16-Bit) and lower the screen resolution. Lower the screen resolution, better the performance.

10.Use Lightweight programs:

Replace all those resource consuming programs and look for better alternatives, especially for those who have RAM less then 512 and an old PIII machine.

use Lightweight antivirus programs like Avira...the best i found, NOD32, AVG instead of Norton Antivirus.

This will really help you improve performance and helped me speed up my pc/computer.Try these out to improve your computer speed and performance.

Hey guys...if you have any additional tips to improve slow pc performance, then just mention it below in comments section.

Enjoy HaCkInG.....

Internet IP Subnetting

Internet IP Subnetting

IP Subnetting is a method of segmenting hosts within a network and providing additional structure. Without subnets, an organization operates as a flat network. These flat topologies result in short routing tables, but as the network grows, the use of bandwidth becomes inefficient.

Routers use a subnet mask to determine which parts of the IP address correspond to the network, the subnet, and the host. The mask is a 32-bit number in the same format as the IP address. The mask is a string of consecutive is starting from the most significant bits representing the network ID, followed by a string of consecutive Os representing the host ID.










IP
Address
Network Host
128
10000000
10
00001010
173
10110010
46
00101110

Subnet
Mask
Network Subnet Host
255
11111111
255
11111111
255
11111111
0
00000000

This subnet mask can also be written as "/24", where 24 represents the number of 1s in the subnet mask.

Each address class has a default subnet mask (A=/8, B=/16, C=124). The default subnet masks only the network portion of the address; the effect is no subnetting. With each bit of subnetting beyond the default, you can create 2-2 subnets. The preceding example has 254 subnets, each with 254 hosts.

Identifying Subnet Addresses
Given an IP address and subnet mask, you can identify the subnet address, broadcast address, and the first and the last usable addresses within a sub- net as follows:

  • Write the 32-bit address and subnet mask below that (the following figure shows 174.24.4.176/26).
  • Draw a vertical line just after the last 1 bit in the subnet mask.
  • Copy the portion of the IP address to the left of the line. Place all Os for the remaining free spaces to the right. This is the subnet number.
  • Copy the portion of the IP address to the left of the line. Place all is for the remaining free spaces to the right. This is the broadcast address for the subnet.
  • You can also find the first and last address by placing ...000i and ...iliO respectively in the remaining free spaces.

174.24.4.176 1010111000110000000100 10|110000 Host
255.255.255.192 1111111111111111111111 11|000000 Mask
174.24.4.128 1010111000110000000100 10|000000 Subnet
174.24.4.191 1010111000110000000100 10|111111 Broadcast

Hacking Explained

Hacking Explained

Anyone who accesses a public network should know about hackers and their methods. Failure to understand what they do can leave you and your network exposed.

Although thieves and opportunists always go after an easy target versus a difficult (or well-prepared) one, some hackers specifically choose difficult targets, such as government offices or networking companies, solely for bragging rights.

Hacking really boils down to a few activities:

  • Breaking in�'Breaking into a private network is usually the first part of any hacking scheme. (A denial-of-service [DoS] attack is one notable exception.) Most break-ins require a password (which are guessed or stolen), but hackers find other ways to get in as well.
  • Breaking stuff�'Once in a network, many hackers (anarchists in particular) try to break or disable the entire network, or specific parts of it, such as web servers. If they destroy data or disrupt business, recovery can be expensive for the attacked company.
  • Stealing stuff�'Like most thieves, many hackers are motivated by greed. They might sell plans, schematics, or intellectual property to unscrupulous individuals, companies, or government agencies.

Hacks and Attacks
An attack in network speak refers to any attempt to break into a compute network, or packet, as well as any attempt to launch a malicious or self-replicating program. Attacks fit into multiple categories, many of which are described here.

All network attacks are either active or passive.

Active attacks include injecting malicious files, altering data, or clogging the network. In theory, you can detect active attacks but not passive attacks.

Passive attacks such as eavesdropping do not actually cause harm to the network, but hackers can use them to obtain information that enables active attacks. People looking for passwords can tirelessly try every combination until they find a working password (a brute-force attack). Man-in-the-middle attacks occur when a hacker interposes between two valid users and eavesdrops for passwords. Passive attacks are difficult to detect.

Remote attacks are conducted by people outside the network (those without a network ID), whereas local attacks use an existing account to exploit the system.

Hit-and-run attacks quickly crash systems, whereas persistent attacks affect the victims only as long as the attack lasts.

Friday, May 1, 2009

Google Hack Tips and Tricks 77

How to find MP3 with Google

Hello all. I hope all of you have a nice and safe surfing there. Did you know you can find a lot of mp3 only by using Google and you don't need to sign up with rapidshare or megaupload or what or any torrent site. Google have everything HAHAHA

This is a little tricks you should do:

1) Go to http://www.google.com (yeah you know that)

2) at search bar type intitle:"index of" songname/artist name . E.g intitle:"index of" metallica

3)You will see a result and majority the subtitle refers more to "index of" search results that's why you can download everything cuz the "index of" contain the ingredients of the web HAHAHAHA

4)Well try experiment yourself with this. you can change from intitle:"index of" metallica to intitle:"index of" (mp3|mp4|avi) metallica. Maybe your search results get more expanded and more related to your search. YEAH!

How To Find Proxy using Google

1) Well go to http://google.com

2)type inurl:"nph-proxy.cgi" "start using cgiproxy"

3)You will get results such as http://www.mindnexus.com/cgi-bin/nph-proxy.cgi and others.Have fun!

How to find Live Webcam

Wow thats so cool you can view live webcam anywhere everywhere just using Google! Dont blame Google for a newborn of thousand hackers around the world HAHAHAHA

1)go to http://google.com

2)type inurl/view/index.shtml . HAHA guess what you'll get the available webcam on the net (I think)

3) OK this is important. To view selected webcam you need to replace inurl with specific IP address. E.g such as 207.111.167.30/view/index.shtml

4)ok try to experiment with your search method.You can change from inurl/view/index.shtml to inurl/view.shtml or inurl.view/index.shtml

5) For more expanded and specific, try intitle:":Live View /-Axis" | inurl:view/view.shtml^ or maybe intitle:"netcam live image" .Have fun

How to Search Rapidshare link download

HAHA This is supercool so how you can do this one? Well many people out there keep asking in social networking sites and keep asking for help in forum but trust me you'll frustrated if it is a dead link (or dead man walking) . So C'mon follow this hell yeah step by step:

1) go to google search engine

2)type site:rapidshare.com "text here" .Replace "text here" with your search such as "Hancock"

3) You too can use this search parameter for Savefile or Megaupload. E.g site:megaupload.com "Rock You Like a Hurricane"

4) Experiment it. You too can change the parameter to site:. rapidshare.com "Mr Bean" or site:. rapidshare.com filetype:pdf ebook

5) Well actually for more easy you can search for rapidshare links or anytype of that at their search engine too. You can go to http://searchhacker.com/ or http://newzfind.com/ to find your favourite links for download. Well have fun with it!!

6) Dont forget to try with this too!!!

Rapidshare Search Engine

Filez

TVPHP

FileCrop

Well I hope to sharing with all of you guys out there. Hope You can teach me better if you know more than me. Have a nice hacking days!

Google Hack Tips and Tricks

77
rate or flag this page

By ahmadnaim


How to find MP3 with Google

Hello all. I hope all of you have a nice and safe surfing there. Did you know you can find a lot of mp3 only by using Google and you don't need to sign up with rapidshare or megaupload or what or any torrent site. Google have everything HAHAHA

This is a little tricks you should do:

1) Go to http://www.google.com (yeah you know that)

2) at search bar type intitle:"index of" songname/artist name . E.g intitle:"index of" metallica

3)You will see a result and majority the subtitle refers more to "index of" search results that's why you can download everything cuz the "index of" contain the ingredients of the web HAHAHAHA

4)Well try experiment yourself with this. you can change from intitle:"index of" metallica to intitle:"index of" (mp3|mp4|avi) metallica. Maybe your search results get more expanded and more related to your search. YEAH!

How To Find Proxy using Google

1) Well go to http://google.com

2)type inurl:"nph-proxy.cgi" "start using cgiproxy"

3)You will get results such as http://www.mindnexus.com/cgi-bin/nph-proxy.cgi and others.Have fun!

How to find Live Webcam

Wow thats so cool you can view live webcam anywhere everywhere just using Google! Dont blame Google for a newborn of thousand hackers around the world HAHAHAHA

1)go to http://google.com

2)type inurl/view/index.shtml . HAHA guess what you'll get the available webcam on the net (I think)

3) OK this is important. To view selected webcam you need to replace inurl with specific IP address. E.g such as 207.111.167.30/view/index.shtml

4)ok try to experiment with your search method.You can change from inurl/view/index.shtml to inurl/view.shtml or inurl.view/index.shtml

5) For more expanded and specific, try intitle:":Live View /-Axis" | inurl:view/view.shtml^ or maybe intitle:"netcam live image" .Have fun

How to Search Rapidshare link download

HAHA This is supercool so how you can do this one? Well many people out there keep asking in social networking sites and keep asking for help in forum but trust me you'll frustrated if it is a dead link (or dead man walking) . So C'mon follow this hell yeah step by step:

1) go to google search engine

2)type site:rapidshare.com "text here" .Replace "text here" with your search such as "Hancock"

3) You too can use this search parameter for Savefile or Megaupload. E.g site:megaupload.com "Rock You Like a Hurricane"

4) Experiment it. You too can change the parameter to site:. rapidshare.com "Mr Bean" or site:. rapidshare.com filetype:pdf ebook

5) Well actually for more easy you can search for rapidshare links or anytype of that at their search engine too. You can go to http://searchhacker.com/ or http://newzfind.com/ to find your favourite links for download. Well have fun with it!!

6) Dont forget to try with this too!!!

Rapidshare Search Engine

Filez

TVPHP

FileCrop

Well I hope to sharing with all of you guys out there. Hope You can teach me better if you know more than me. Have a nice hacking days!