Minggu, 23 September 2012

How to Sniff Passwords Using USB Drive


As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.

How to Protect an Email Account from SPAM


How to Protect an Email Account from SPAM

How to Protect an Email Account from being Hacked


Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is:”Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
If this is the case, then what is the reason for many people to loose their accounts? The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who loose their email accounts are not the victims of hacking but the victims of Trapping. They loose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…

How to Make a Trojan Horse


Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan

How to Hijack a Domain


In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.

How to Hack Orkut


Google uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack.

How to Disable Windows Logo Key


At times it becomes necessary to disable the Windows Key on the keyboard.For example when playing games this nasty Windows Logo key keeps annoying , as we often accidently press it and this takes our game out to the desktop.So it becomes necessary to disable it when not needed an re-enable it when needed.

How to Create a CON folder in Windows


Can you create a folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?
The answer is NO and YES!

How to Completely Erase a Hard Disk Drive


A new year has begun and perhaps you have decided to perform a system upgrade or get rid of your old computer system and purchase a new one.But before you sell or donate your old computer, it is very much necessary to completely erase your Hard Disk Drive.Yes, every one of us are aware of this fact and so, we delete the contents of the hard disk either by using the DELETE key on our keyboard or by Formatting the hard disk. Deleting and Formatting – Just Not Secure Enough

How to Compile C Programs


In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If youĂ­re new to C programming and find it difficult to compile the C source codes then this post is for you. Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs. How to install Borland C++ compiler

How to Change the ICON of an EXE file


Some times it becomes necessary to change the ICON of an executable(.exe) file so that the exe file get’s a new appearence.Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user.But in reality when the file is carried to a different computer, then it shows it’s original ICON itself.This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself.Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.
For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie:The tool changes the exe ICON permanantly.
I’ll give you a step-by-step instruction on how to use this tool to change the icon.

How To Access Your Folders From Your Taskbar


How To Access Your Folders From Your Taskbar
This is an easy way to get to the folders on your system without having to open a Windows Explorer Window every time you want to access files. I find it very useful to have this feature as it allows me to access my Folders and Drives immediately and saves me a lot of time.

Hide IP Address – Real ways to hide your IP


Hide IP Address – Real ways to hide your IP re in this post I will try to give you every possible information to hide the IP address.If you seriously want to hide your IP address then this post is for you!

Hack Protect your Orkut Account


Tips: How can a hacker hack my Orkut account? But this post is meant for providing some safety measures to prevent your Orkut account from being hacked. There is not much you have to take care of. Just follow the simple steps and never get your orkut account hacked in your life.

Email Tracking


One of most the frequently asked question is how to track an email back to the sender.That is how to determine the sender of the email? The most obvious answer is by looking at the “From:” line! But this way of tracking does not work all the time since most of the spammers forge the email address or most of the spam that we get has a forged email address.This is also known as a spoofed email.Is it possible to send email from other’s address?Yes it is possible to send email from anyone’s name.Why not, you can send an email even from Bill Gate’s Email ID.If you need a proof look refer the post Send Spam Email To Friends

Dual Boot After The Fact


Dual Boot After The Fact: I want to run both Windows 2000 Pro and Windows 98 SE on my computer. When I bought a new hard drive, I installed Windows 2000 on it first. But my subsequent research seems to indicate that I should have installed Windows 98 SE first and then Windows 2000 on a separate partition. How do I remove Windows 2000 from the drive so I can partition it and then install Windows 98 SE first and reinstall Windows 2000?

Bypass Internet Censorship


Bypass Internet Censorship: I remember not so long ago someone was asking about ways to get around and view sites that were blocked by the administrators, or some web filtering device, either at work or at school, hope this helps.

Burning Bin & Cue Using Nero


Burning BIN/CUE Images with Nero Burning Rom
BIN/CUE image format is quite common on the Internet. It might seem that finding an appropriate software for burning these images is quite hard. Luckily, it's not. In addition to Golden Hawk CDRWin, the original software for BIN/CUE format, you can also use Nero Burning Rom to burn the images.
Please make sure that you have the latest version of Nero, which now is 5.5.10.0

A Virus Program to Disable USB Ports


In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports

A Virus Program to Block Websites


Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of C will be able to understand the working of the virus. This virus need’s to be clicked only once by the victim. Once it is clicked, it’ll block a list of websites that has been specified in the source code. The victim will never be able to surf those websites unless he re-install’s the operating system. This blocking is not just confined to IE or Firefox. So once blocked, the site will not appear in any of the browser program.
NOTE: You can also block a website manually. But, here I have created a virus that automates all the steps involved in blocking. The manual blocking process is described in the post How to Block a Website ?
Here is the sourcecode of the virus. download

A Closer Look at a Vulnerability in Gmail


Gmail is one of the major webmail service provider across the globe. But as we all know Gmail still carries that 4 letter word BETA. Sometimes we may wonder, why Gmail is still in the testing stage even after years of it’s emergence. Here is one small reason for that. Gmail follows a strict rule that doesn’t allow it’s users to have their first or the last name contain the term Gmail or Google. That is, while signing up for a new Gmail account the users cannot choose a first or last name that contains the term Gmail or Google. This rule is implemented by Gmail for obvious reasons, because if the users are allowed to keep their first or the last name that contains the term Gmail or Google, then it is possible to easily impersonate the identity of Gmail (or Gmail Team) and engage themselves in phising or social engineering attacks on the innocent users. This can be done by simply choosing the first and last name with the following combinations. First Name Last Name Gmail Team Google Team Gmail Password Assistance
download

12 Tips to Maintain a Virus Free Computer


Is your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer. download

10 Tips to Enhance your PC Security


Today almost everyone of us have a PC with an internet connection but how many of us think about it’s security? In fact most of the people are least bothered about their PC’s security.Especially if you have an internet connection safeguarding your PC against network threats is a must.If your PC is not secured then it might be vulnerable to various threats.The threat may be as simple as a virus which corrupts your data or as complex as an identity theft where there are chances of huge loss of money.Did you know that unsecured PCs can be hijacked in minutes ? If you are really concerned about PC security then here are the top 10 security enhancements for your PC. download

Tools AccessPassView


Tools AccessPassView, This utility reveals the database password of every password-protected mdb file that created with Microsoft Access 95/97/2000/XP or with Jet Database Engine 3.0/4.0 . It can be very useful if you forgot your Access Database password and you want to recover it.

dengan Tools ini anda dapat merubah, membuka file-file Microsoft Access

Tools Advanced Password Generator


Advanced Password Generator provides users with a randomly compiled list of passwords based on specific parameters. With simple controls, this is a great tool for increasing online security; however, trial limitations make it hard to grasp its full potential. The program's interface is slightly confusing upon first glace. Users may be overwhelmed with the number of radio buttons and numbers scattered throughout the small screen. However, with a little experimenting or a visit to the Help file, users will learn the program's functions. While we would like to see a cleaner setup, the program does a fine job by laying all options out on the screen. Choosing the parameters is simple enough, thanks to the aforementioned buttons. While the trial version only allows users to use the smallest options, the program has the capability of generating passwords of any length and lists that run into the thousands. The passwords we did create reflected the choices we made and provided a random swath of possible passwords. The program's most interesting feature was its database. Understanding that users may forget their random passwords, this feature lets you catalog what password you use for various sites, which we found very helpful. While its layout could be a little cleaner, we found Advanced Password Generator to be a helpful tool in creating passwords. This program is a great choice to improve online security.

Tools Address View


This tools fow windows, you can see who is address

Tools Sharing WiFi Windows7


Sharing WiFi Windows7, you can use this manual

dapatkan manualnya disini

RAR Password Recovery Magic Portable


RAR Password Recovery Magic is a powerful tool designed to recover lost or forgotten passwords for a RAR/WinRAR archives. RAR Password Recovery Magic supports the customizable brute-force and dictionary-based attacks.RAR Password Recovery Magic has an easy to use interface. All you need to do to recover your password is just to add your file to the operation window. Key Features: Recover passwords for RAR/WinRAR archives. Custom character set for "brute-force" attack supported. You can select character from a range of character options including: Letters, Numbers, symbol... Large wordlist dictionary. Work in the background. Features a user-friendly interface.

Rar Password Recovery Magic adalah alat yang dirancang untuk memulihkan password yang hilang atau lupa untuk rar / WinRAR archives.

Tools Arabic Pad


Small and Simple Arabic [Unicode] Editor. Just write arabic easily. Arabic Pad is a compact application that is designed to help you write Arabic text in Unicode documents. It is a useful tool for the users that own a regular keyboard and need to type a text in Arabic. The program changes the keyboard mapping in order to assign each key to an Arabic alphabet letter. The changes are only recognized by the application so you are only able to create Arabic texts in Arabic Pad. You can save the output text to a simple text file that can be opened or edited with other programs. The program does not offer the possibility to print the file so you need to open it with another text editor in order to send the output to the printer. However, you can use the text by pasting it in other applications such as email clients or instant messaging applications. This application can help you write a short text without installing fonts or language packs on your computer. You can also use it on multiple computers since it can run directly from a removable storage device. Besides the basic text editing commands the program allows you to change the font face and the size of the text from the main toolbar. Unfortunately, you cannot format the text by changing the style or the color. Overall, Arabic Pad is an easy to use program that provides all the required tools for writing text in Arabic Unicode format.

Tools Advanced JPEG Compressor


Advanced JPEG Compressor for Windows is the world's leading software for compressing digital images in JPEG (JPG), the most popular digital photo format. Advanced JPEG Compressor is a perfect solution for a variety of personal or business purposes: resize, compress, convert, edit and share your digital photos.