Friday, June 14, 2013

KEYLOGGERS.

                       KEYLOGGERS INFORMATION



The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. This definition is not altogether correct, since a keylogger doesn’t have to be software – it can also be a device. Keylogging devices are much rarer than keylogging software, but it is important to keep their existence in mind when thinking about information security. Legitimate programs may have a keylogging function which can be used to call certain program functions using “hotkeys,” or to toggle between keyboard layouts (e.g. Keyboard Ninja). There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords. Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including: Parental control: parents can track what their children do on the Internet, and can opt to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content; Jealous spouses or partners can use a keylogger to track the actions of their better half on the Internet if they suspect them of “virtual cheating”; Company security: tracking the use of computers for non-work-related purposes, or the use of workstations after hours; Company security: using keyloggers to track the input of key words and phrases associated with commercial information which could damage the company (materially or otherwise) if disclosed; Other security (e.g. law enforcement): using keylogger records to analyze and track incidents linked to the use of personal computers; Other reasons. However, the justifications listed above are more subjective than objective; the situations can all be resolved using other methods. Additionally, any legitimate keylogging program can still be used with malicious or criminal intent. Today, keyloggers are mainly used to steal user data relating to various online payment systems, and virus writers are constantly writing new keylogger Trojans for this very purpose. Furthermore, many keyloggers hide themselves in the system (i.e. they have rootkit functionality), which makes them fully-fledged Trojan programs. As such programs are extensively used by cyber criminals, detecting them is a priority for antivirus companies. Kaspersky Lab’s malware classification system has a dedicated category for malicious programs with keylogging functionality: Trojan-Spy. Trojan-Spy programs, as the name suggests, track user activity, save the information to the user’s hard disk and then forward it to the author or ‘master’ of the Trojan. The information collected includes keystrokes and screen-shots, used in the theft of banking data to support online fraud.


ENJOY................

Make ur Windows Xp Genuine

       Make ur Windows Xp Genuine : All Hacks here



This activates ur "Windows Xp Home" if not activated and completely validates it..[ITS ILLEGAL[

When you Install Windows Xp Home Edition it asks "60 days lest for the activation" please Activate it Now .. This Hack will take your Way out like a piece of Cake.


**This is ment for educational purpose only.


To Download this Crack right click on the link below and Open it in a new Window.




2) Converts Ur Xp a Valid one By Exploiting A small Loophole !!


Download No. 2 Crack here


3) Most awaited Vista Cracks Combined with Xp one !!

4) Most Favourite Xp Crack!!




5) Xp Crack with Keygen !!

6) Some Miscellaneous Crack !!







or u may try dis


these are instructions on how to crack the latest version of Windows XP with Service Pack 2 that uses the registration key: JD3T2-QH36R-X7W2W-7R3XT-DVRPQ.
**** IT WILL WORK WITH OTHER VERSIONS OF WINDOWS XP but not all! ****

This will allow you to bypass the Microsoft Genuine Validation thingy


this method works better than many others i've tried before. forget the cracks and injectors etc... this is the BEST WAY:

1) start > run > "regedit" (without the quotes of course)

2) go to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer

...and doubleclick on it. Then change some of the value data to ANYTHING ELSE...delete some, add some letters, I don't care...just change it!

now close out regedit.

3) go to start > run > "%systemroot%\system32\oobe\msoobe.exe /a" (again, dont type the quotes)

4) the activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.




Now you can dl all the updates without activating, and the Genuine Microsoft Validation thingy won't bug you no more!!



***Notes, this works best after a reformmat***




this method works better than many others i've tried before. forget the cracks and injectors etc... this is the BEST WAY:

1) start > run > "regedit" (without the quotes of course)

2) go to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer

...and doubleclick on it. Then change some of the value data to ANYTHING ELSE...delete some, add some letters, I don't care...just change it!

now close out regedit.

3) go to start > run > "%systemroot%\system32\oobe\msoobe.exe /a" (again, dont type the quotes)

4) the activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.

Please Put More Links If u Know Them.

Hack Admin Password From User Mode

Hack Admin Password From User Mode

Disclaimer: Use this article for eductational purpose ONLY.



Follow these steps:

1. Open command prompt (Start->Run->cmd),
2. Enter the following command, then press ENTER
3. Enter the followin command, then press ENTER:
compmgmt.msc
This should open the computer management console.
4. Go to local users & groups->users. Right click on any user and select "set password".
If you get a "access denied" do the following:

start>run>cmd
then use following commands
1) net user test /add (this command will make test named user)
2) net localgroup administrators test /add (this command will make test user as administrators rights)

and use net user command to reset your admin. password



Alternative
What if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..
Start >> Run >> [type]cmd // this will open your command prompt
[type] net(space)user(press enter)
[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)

// for e.g. : net user HOME *(press enter)

[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types.. the blinking pointer will b there at the same place.. but it still works..
// for e.g. : password changed successfully

ENJOY.....

DON't FORGET TO LIKE ...

Wednesday, June 12, 2013

HOW TO TRACE ANY EMAIL

                                HOW TO TRACE ANY EMAIL




So here is the method of tracing the exact location from the email sent.I am showing the email tracing on yahoo here but gmail and other mail providing services have same concept.

Step 1:-First open up your email account and click on your inbox.

Step 2:-Now Select any email that you want to trace

Step 3:-After Opening scrool the mail at the end and in right corner you will see a option FULL HEADER click on it



Step 4:- Now Closely Look at the the header you will find the whole detail that from which IP address it is sent.


ENJOY........

5 Ways To Avoid Being Hacked

5 Ways To Avoid Being Hacked

Hacking. We often think of it happening to companies or governments. But it also happens to ordinary people. But we can take steps to stop it.


Step 1: Tough passwords



You need to have a separate password for each account, so that if one account gets hacked, all of your vital information is not vulnerable. The problem is that it's tough to remember dozens of passwords. The answer: a password manager. There are a variety of third-party software programs that will create and store passwords for you.


Step 2: Two-Part Authentication

When you log on to many different computers — especially shared computers — to access your email account, you are especially vulnerable to hackers.
Many websites are moving toward two-step verification. Google is one. Essentially, it means that you need more than a password to log into a new account. If you use the service, you have to remember a password but also remember a special key that gets sent to you as a text.


Step 3: Change Your Behavior



"I hate to say it, but the reality is they need to share a little bit less," says Ulanoff.
Ulanoff says we probably don't want to go back to the pre-social media days, but oversharing may not be just embarrassing, it may cause harm. Things like birth dates and graduation years can be used to access your information. That doesn't mean you need to shut down your online presence, but be careful what details you put out there.


Step 4: Consolidation



Remember Friendster? Or MySpace? Whitson Gordon, senior editor of Lifehacker.com, says that back in the early days of the Internet, it would have been hard to imagine "10, 20 years down the road when we would have so many services we're grappling with."
So sit down and think about the last 10 years of your online life. And then delete the accounts for the services you signed up for and no longer use.


Step 5: Back It Up



"If there's one thing I have to hammer home with everybody, it's back up your data," Gordon says. You can either use an external hard drive or an online service. As more of the things we care about get stored electronically, the more vulnerable they are to get lost. If your smartphone gets stolen with wedding photos on it, there won't be as much heartbreak.

ENJOY................

Top 10 ways to track your stolen phone

 Top 10 ways to track your stolen phone through its IMEI number and apps


The mobile theft in India has been on a rise and given the fact that more and more swanky phones are arriving in the market, these numbers are only bound to increase. Over the past few days we have had several of our readers ask us about ways in which they can track their stolen or lost phones.

First of the bat always remember to write your IMEI number ( more details below) and download apps that help you track your phone via either sending you pictures of the pick-pocketer or tracking your phone's GPS. It is also important to have a remote wiping facility so that your personal details don't fall into the wrong hands.

Know Your Mobile India bring you the best apps that increase your chances at finding your lost or stolen phone or tablet.

1. IMEI


Every smartphone has a unique IMEI number assigned to it and you can access it by dialing *#06#. Once your phone's 15-digit IMEI number is displayed, write it down and keep it safe for future reference. You can also retrieve the IMEI number by removing the battery. It is usually listed on a white sticker along with the phone's serial number.

When you lose your handset, you will need to launch a FIR with the police, attaching a copy of the IMEI number with it. Then give a copy of this to your service provider who can track the phone based on its unique ID number and meanwhile block the handset so that it cannot be used by anyone else. IMEI number helps to tracks the handset, even when the SIM is changed or the SIM card is not activated. Once the phone is traced, the police should be able to retrieve it.

2. Avast! mobile security


This free invisible security app brings twin security measures for your handset by providing - a mobile antivirus and mobile tracking/controls solution. What is great about the app is that its anti-theft component is invisible to thieves, and provides remote options (via web portal or SMS commands) for locating and recovering your phone. Time to say goodbye to 'lost' phones.

Download Avast! Free Mobile Security

3. Mobile chase-location tracker


This is another handy app to track your stolen or lost phone. This app checks when the pick-pocketer changes the SIM card and sends a a SMS in 5 minutes from the new SIM number to your number, which has been stored in the application. The SIM contains GPS location data or current location code to aid in trace.

Download Mobile Chase-Location Tracker

4. Thief tracker


This one is our favorite. With Thief tracker app, you get to catch the 'thief' red handed. Any unsuccessful attempt to unlock your mobile will trigger this app to snap a picture from front camera and send you an email without the user even knowing it. However the app has some limitations - like it does not wipe data and an unsuccessful attempt is considered only when 4 dots in the pattern are selected.

Download Thief Tracker

5. Smart look


This software also clicks the pictures of the 'thief' - in fact three of them and, immediately e-mails it to you. It also comes equipped with a GPS continuous tracking system which is linked to the google map and also assists in tracing your lost or stolen phone.

6. Anti- theft alaram


You will love this app. Simply activate the alarm and leave your phone on the table or wherever and if someone moves your phone an alarm will sound. The alarm will only stop after entering a PIN. Those with sticky fingers, beware!

Download Anti-theft Alarm

7. Kaspersky mobile security


Another popular app that provides anti-theft defense, allowing you to block, wipe or find your missing phone. You can also easily filter unwanted SMS texts and calls. Plus, Anti-Virus Lite with cloud-based security scanner alerts you to potentially malicious apps before they can harm your phone.

Download Kaspersky mobile security

8. Lookout security and antivirus


This free app houses a slew of features to protect and trace your phone. After downloading the app, you will be able to find your phone on a Google Map instantly from Lookout.com, sound a loud alarm or make your phone SCREAM to find it even if it’s on silent and automatically see your phone's last known location. That's not all, in addition this app provides remotely lock and date wipe out facility. It also offers a lookout premium coverage for a small monthly fee for more stringent security.

Download Lookout security and antivirus

9. Trend Micro mobile security & antivirus


Ranked as one of the top selling security app, Trend Micro mobile provides free antivirus with a premium version which includes privacy scanning, web and contact filtering, parental controls and anti-theft features. You can avail a 30 day free trial to test various features like:
--Privacy scanner warns you of apps that potentially steal your information
--Surf, Call, Text Security keeps you and your kids safe by avoiding unwanted contact and content
--Lost Device Protection includes anti-theft features that let you find, lock and wipe a missing device.

Download Trend Micro mobile security & antivirus

10. Plan B, Lookout mobile security


Well if plan A doesn't work, you don't need to fear, there is always Plan B. This 'find my phone' app is the only app that you can download even after you have lost your phone. Using 'Plan B' requires access to the Android Market website and your Google account. After you install it, Plan B will start locating your phone using cell towers and GPS. On some phones, Plan B can switch GPS on automatically. Your location will keep updating for 10 minutes, and you will get an email each time it is located, whether the phone is moving or standing still. Information is also sent via SMS.

ENJOY.........

TURN ON UR PC IN JUST 10 SECONDS


                          TURN ON UR PC IN JUST 10 SECONDS

 
Alright so u wanna know how to turn the pc on in 10 seconds .Here's what u have to do to turn ur pc on in 10 seconds

Click on the start button then press R it will take u to Run well go to run
& type Regedit




press enter
this will open Registery Editor
now look for the key

HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\
ContentIndex

now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000(75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer

You'll See The Result

ENJOY............

List of some good proxy sites

                 LIST OF SOME GOOD PROXY SITES...



This is the list of some good proxy site which you can use to surf anoymously on the internet . Even you can use this proxy sites to open block website in school or offices. For example you can use facebook if it is block at your school or office.




                                  Surf with Shivam..



Blocking Facebook On Your Computer

                        BLOCK FACEBOOK ON YOUR COMPUTER .     



   In this tutorial i will teach you to specifically block facebook on your computer.----------------


How To Block Facebook ?

1. Go to Start > Programmes > Accesories
2. Then Right click on Notepad and Run it as administrator.
3. Now open host file by clicking on File > Open and locate to followiing adress..

                                       C:\WINDOWS\system32\drivers\etc

4. Then just below # 127.0.0.1 localhost paste folowing code
                 # Blocking Facebook
                                           127.0.0.1 login.facebook.com
                                           127.0.0.1 www.facebook.com
                                           127.0.0.1 apps.facebook.com
                                           127.0.0.1 blog.facebook.com
 5 . Now save the host file and done.
6. Open any browser and try to open facebook. It won't open. If facebook opens then you might have done somthing went wrong. 


ENJOY.................

Tuesday, June 11, 2013

Learn To Hide Files Behind The Images

HIDE FILE BEHIND THE IMAGES...

1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories Command Prompt and type CD DESKTOP commands in it.

   

5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.

                            Copy /b imagename.jpg + filename.rar finalimage.jpg



  • Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
  • Replace filename with name of your file you want to hide. It must be in .rar format.
  • Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

How To Access Hidden File ?

To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.

    1. Open winrar
    2. Now locate your image and open it or simply drag your image in winrar.
    3. Extract the file and done.
   

          ENJOY................

Thursday, May 30, 2013

How to find the IP address of the sender in Gmail


When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.


Finding IP address in Gmail

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is

65.119.112.245.
That is be the IP address of the sender!
5. Track the IP address of the sender

ENJOY..........

Wednesday, May 29, 2013

ATM Hacking.... Beware and Secure

ATM Hacking.... Beware and Secure


ATM hacking concept is new in India but its wildly used elsewhere. I will show you how its done. Before you enter,analyze your surroundings for sure. If you find any thing suspicious contact your nearest bank branch or dial toll free no. so that others may be saved from being robbed.Look he following method is used by the thrives.The equipment used to capture your ATM card number and PIN are cleverly disguised to look like normal ATM equipment. A "skimmer" is mounted to the front of the normal ATM card slot that reads the ATM card number and transmits it to the criminals sitting in a nearby car. At the same time, a wireless camera is disguised to look like a leaflet holder and is mounted in a position to view ATM PIN entries.The thieves copy the cards and use the PIN numbers to withdraw thousands from many accounts in a very short time directly from the bank ATM."This activity has been around for a few years. In the past, it was primarily done in small retailers, where the skimming device was behind the counter and the camera was over the keypad. It was also done by setting up ATM machines that were completely fake. It's always a GOOD IDEA to conceal your actions when entering your PIN. When you do this, the camera doesn't record your PIN number and they can't clone your card.Here is a picture of a ATM Machine after being compromised.






They attach a device over the card slot on the legitimate ATM, which reads the magnetic information. Using the latest wireless technology, it is normally transmitted to fraudsters in a nearby vehicle





Your ATM is protected by a PIN, but these criminals have a solution for this too. They install a hidden camera, again using the latest technology (wireless) and the PIN is digitally recorded.






Here is a picture of the compromised ATM with the camera installed.


"This tutorial is Education Purpose only don’t misuse it Our team will Not Hold any responsibility"



Tweet Longer Than 140 Characters Limit From Twitter


Tweet Longer Than 140 Characters Limit From Twitter


Twitter is a popular micro-blogging website on which users are allowed to post tweetsof up to 140 characters only. But there are some services which offers users to tweet beyond this limit. But it is hard to find an app for this. But Android has a cool app which offers users to tweet more than 140 characters.

TwitLonger is a free app in the Android market that offers users to tweet more tha 140 characters limit. After installation, you need to authorize the app to access yourTwitter account. After that compose the tweet from the textbox. You will see a character counter just above the textbox to know the lenght of the tweet you are going to post. After composing the mail, click on Tweet button. Now go to your Twitter account from the web browser and see the tweet posted. You will see a tweet posted by the TwitLonger. Characters in the Tweet that extend beyond the 140 character limit, you will see a link saying tweets posted via Tweet Longer.  In order to read the full message, you need to hit the short URL provided alongside the



Way To Select All Friends In Facebook While Inviting To A Event Or Page

Way To Select All Friends In Facebook While Inviting To A Event Or Page--


Yes many old javascripts of selecting all friends has been blockedby facebook 


So I am giving you  a new javascript to select all friends


Go to Facebook.com


Select a Page/Event to like


Click on invite friends


Wait till the Invite Window Loads






Copy the bellow Javascrip t to ur Address Bar of browser

javascript:function check_all_in_ document(doc){var c=new Array() ;c=doc.getElementsByTagName('input');for (var i=0;i<c.length;i++){if(c[i] .type=='checkbox'){c[i].click();}}}check_all_in_ document(window.document);for(var j=0;j<window.frames.length;j++){check_all_ in_document(window.frames[j].document);}


Hit Enter Key

Wait sometime if u have lot’s of friends

Now all ur friends will be Selected

Click Submit And U Are Done!!

Note: Your Browser Must Support Javascript

DOWNLOAD MICROSOFT ESSENTIALS..

Protect your PC



DOWNLOAD HERE :-

AVG Antivirus 2013 with valid keys till 2018.

AVG Antivirus 2013 with valid keys till 2018.



Hey guys,Today i will provide you the best antivirus according to me, yes AVG internet security 2013 is released by AVG.
Avg 2013 comes with faster, smarter scan and smooth and fast interface. 

Protect your pc with Avg antivirus and feel safe with your browsing.

Iit is a trial version from the official site but dont worry i will give you the keys which will help you to use it till 2018. oh yes 2018.


Here are the keys,

1) 8MEH-RF3MY-BZ7CJ-9LUAR-ST99N-CEMBR-ACED
2) 8MEH-RGM33-K474L-6FGRR-8RR7K-UEMBR-ACED
3) 8MEH-RJXR4-2CKYP-2GB3A-DBMAD-PEMBR-ACED
4) 8MEH-RMXLW-HN44A-BABPA-S9NQF-PEMBR-ACED
5) 8MEH-RNZLL-2Y4QX-79PPA-MMOKE-AEMBR-ACED
6) 8MEH-RREY3-L2LQA-LUMOR-UDTZ4-6EMBR-ACED
7) 8MEH-RREY3-L2LQA-LUMOR-UJXN3-6EMBR-ACED
8) 8MEH-RW2ZU-29S4F-26QCR-WT482-BEMBR-ACED

Tuesday, May 28, 2013

How to make free International calls from Private Number

make free International calls from Private Number_--






Goto www.evaphone.com and create a account and they will offer you free call with Private Number

ROADRASH

Download  Roadrash PC game full setup now.. 





DOWNLOAD HERE  :-