WARNING/DISCLAIMER

The Author/Blogger shall hold no liability for special, incidental, or consequential damages arising out of or resulting from the use/misuse of the information in this Blog. It is strictly mentioned that these are all for learning and awareness purpose. Most of the articles are collected from various sources and many of them are blogger's own which meant for helping people who are interested in security system or beginners help for security systems and various IT purposes. Some of the articles are solely intended for IT Professionals and systems administrators with experience servicing computer. It is not intended for home users, hackers, or computer thieves attempting to crack PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, software and please use this information responsibly. Binod Narayan Sethi is not responsible for the use or misuse of these material, including loss of data, damage to hardware or personal injury. Information can help you to catch hackers and crackers and other cyber criminals. Information can help you to detect and manipulate the evil motives of these anti social intellectual peoples. Good use of the information protect you from evils and misuse of the information make you evil/criminal. Author of this site will not be responsible for use of material for any illicit mean or illicit act done by anybody in any means.

Binod Narayan Sethi

Binod Narayan Sethi
Programming,Web Development & Graphic Designing are my Hobbies.

Saturday, January 29, 2011

Some basics of hacking

Store your password in kee passThis is a featured page

In my previous post you learn how to get password from behind the ***** or dots now i will describe you how to store your password in kee pass it is a very good program to store passwords Remembering passwords is not an easy task especially if you have different passwords for different account. I have a lot of problem in remembering passwords. In today`s world you are surrounded by passwords in every sphere of life. Be it a bank account password, email-account password or any social networking site password. The list is never ending. Setting a single password for all of them will make it easy for you to remember but it can lead to a serious problem if someone gets the password. , now we have softwares, which manage passwords. Today I will discuss about my favourite password management tool, Keepass.

its need microsoft framework
download it from microsoft website

Support
Keepass is an OSI certified and therefore it allows you to have a look at its source code as well. It is bult for all Windows platform after XP. It also supports Linux, and even portable device like iPhone, BlackBerry etc. Features
KeePass Password Safe Keepass works by storing your passwords in an encrypted database, which is locked by one master key. Therefore, you need to remember only your master key to unlock your database. And don’t worry about its safety as it encrypts the database by using two of the most secure encryption algorithms: AES and Twofish.

1) Keepass has a very strong and secure database and it keep tracks of the creation time, last modification time and the last access time.
3) The complete database is encrypted. So, not only your passwords but your user-names and notes are also protected.
4) KeePass tells you the information about the bit encryption that it provides when you type the password. It also shows a bar, which lets you know how secure your password is.
5) KeePass allows you to import and export passwords. It supports importing data from formats like CSV files , CodeWallet and Personal Vault text file and exporting data to formats like TXT, HTML and XML.
6) Keepass is portable .So you can run it on Windows systems without installation.
7) If you want, KeePass can generate a random password for you. You can also assist password generator by providing the number of characters and possible output characters.
Conclusion
I have solved my problem of remembering passwords. Now it is up to you. Try KeePass as it is free, open source and provides a high-level security to your passwords. The only thing that you need to remember is your master key.

Vista/XP Virtual Desktops

Here are some key features of "Vista XP Virtual Desktops":
· An infinite number of desktops only limited by the amount of memory in your computer
· A full screen desktop/window manager/switcher
· Live Vista thumbnails of all of your windows
· An alpha-blended indicator window to provide a visual indicator when you switch between desktops
· Hotkeys for up to 9 desktops using your numpad keys along with "send window to desktop" hotkeys
· A system tray icon to access a menu containing items for every desktop, no matter how many
· Multiple-monitor support
· Arrow key hotkeys
· One system tray icon per desktop (optional)
· Window-specific menus
· Sticky windows to exclude windows from the virtual desktop manager
· Per-desktop backgrounds
· XP support
· Thumbnail window tool
· Show all windows hotkey
· Show mini-preview at cursor hotkey
source softpedia




GOOGLE WAVE INVITATIONS


google_wave_logo.jpg (300×300)
Google Wave is one of the most exciting technology product of this year that is expected to create ripples over the internet. Google Wave is basically a communication tool that allows collaboration in real time to combine the experiences of email, web, chat, blog, wikis and social networking.
Google today announced that they are sending invitation to 1,00,000 early adopters who are interested in the riding the Wave. If you want to be the one among those to have your hands on with Google, here is what you have to do

1. Sign up for Google Wave Account: Send a request to Google Wave team to get invitation by filling this form. Majority of the invitations sent by Google are from this list, so straight away fill the form to get invitation.
2. Ask Google Wave users to Invite you: Google Wave is following GMail style invitation model to allow new users. So if you know any of your friends who have access to Google Wave access, then ask them to invite you.


LEAVE YOUR EMAILS FOR INVITATIONS...
some computer tricks:

This is a complimation of computer tricks, mainly security and privacy related.

Getting Ip’s:–

To see the ip all computers you are connected to (web servers, people attempting to hack into your computer). Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.

Type netstat -r at the command prompt to see the ip of all computers you are connected to

In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn’t send file through its proxy.When you type the netstat -r (or -a for a different view) the ip’s are under the foreign address table. The ports are seperated by a : . Different programs use different ports, so you can work out which ip’s are from which program.

Connecting to other computers and what ports are:–

Servers send information. Clients retrieve. Simple. Windows comes with a built in program to connect to other computers called telnet. To start Windows telnet Start menu> Run> type Telnet. Click connect> remote system Ports are doors into computers. Hosts are computer names (ip number or a name that is translated into the ip automatically) Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is: 11 :- Sends info on the computer 21 :- FTP (File transfer program) 23 :- Telnet (Login to the computers command line) 25 :- Smtp (Sends mail) 80 :- Http (Web pages) There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in. Anyway, back to telnet. Type www.yahoo.com as the host and port as 80 the click connect. If nothing happens, you’re in. Wow. You are connected to Yahoo’s server. You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about. Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)

Making undeletable, unreadable folders

Tested on Windows 95/98 By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some randomn numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command to make a directoy, now try and open the directory in Windows, you can’t. To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename)

Proxies

Proxies are computers that you connect through, hiding your computer. Most aren’t anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port

Password files

If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you’re passwords are shadowed (not actually in etc/passwd). Also make sure they aren’t in a file called shadow, especically not in a file called etc/shadow.Unix passwords are encrypted far better than Windows one’s (to be fair, Windows 95 isn’t designed for users), but can still be cracked through a program called jon.

How internet works?

Author

Visualization of the various routes through portion of the Internet
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-optic cables, wireless connections, and other technologies. The Internet carries a vast array of information resources and services, most notably the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. In addition it supports popular services such as online chat, file transfer and file sharing, gaming, commerce, social networking, publishing, video on demand, and teleconferencing and telecommunications. Voice over Internet Protocol (VoIP) applications allow person-to-person communication via voice and video.
The origins of the Internet reach back to the 1960s when the United States funded research projects of its military agencies to build robust, fault-tolerant and distributed computer networks. This research and a period of civilian funding of a new U.S. backbone by the National Science Foundation spawned worldwide participation in the development of new networking technologies and led to the commercialization of an international network in the mid 1990s, and resulted in the following popularization of countless applications in virtually every aspect of modern human life. As of 2009, an estimated quarter of Earth's population uses the services of the Internet.
source(wikipedia)

END OF THE INTERNET IN 2012 ITS TRUE....


According to research that's supposed to be published later this year, growing demand for Internet use will soon outstrip the stamina of the infrastructure supporting it, and the Internet will cease to be reliable by 2012. Complete anarchy will ensue, and the world will essentially end along with the Internet we created for it. Perhaps this is what the Mayan prophecies meant?

Reasoning from a Respected 'Think-Tank' Despite tens of billions of dollars spent on upgrades, expansions, and renovations on networks throughout the continents, it seems that this isn't enough to tide the hungry connected world at large. Aside from the high demand for entertainment such as YouTube, the demand for Internet service is growing at a rate of 60% every year. The statistic, which was drawn up by the University of Minnesota, didn't take into account the percentiles of India and China, comprising about a third of the world population.

According to experts at Nemertes Research, "a respected American think-tank," the Internet's existing infrastructure in 2012 will not be able to cope with the exceeding amount of bandwidth. It'll become overloaded and essentially... end. They predict that problems will already begin to show as early as next year, and they blame (specifically) YouTube, BBC's iPlayer, and the amounting crowd of people who are working from home, utilizing the Internet. It'll begin with users' Internet connections becoming nonfunctional for several minutes at a time, but within just a few short years, there're going to be vast brownouts where "PCs and laptops are likely to operate at a much reduced speed, rendering the internet an 'unreliable toy.'"

I thought laptops were PCs? And wait-- how does the speed of the Internet affect the speed of one's computer overall? Hmm, this writing sounds a bit naive to me. Reasoning from a Lowly, Humble Editor In my 'professional' opinion, this is about as worrisome on a worldwide scale as the swine flu is (scary, yes; going to kill tens of thousands or even thousands for that matter? I doubt it). The fact that the author of the original article seems to be under the impression, whether told by the interviewee from Nemertes Research or of his own genius, that personal computers themselves are somehow going to "jitter and freeze" of their own accord and then the Internet brownouts will occur, just triggers some defense in my mind-- a voice whispering the words "fouled up disinformation" perpetually. Perhaps I need to see my doctor about that.

The idea that the Internet is under a great strain is something I believe is true. More and more are people not only relying on the Internet for news, communication, income, and (mostly) entertainment, but they're becoming addicted to it, spending hours upon it every day, and using a high amount of bandwidth month to month. I can see the backbone of the Internet bowed in several years, with some minor outages in areas that haven't yet fully upgraded the infrastructure in lieu of demand, but I find it very unlikely that the Internet will one day permanently snap and become an un-fixable, unreliable mess with a mind of its own, sometimes working, usually not. I especially can't see myself hitting my head on my computer until it's a bloody mess because the mysterious 2012 Bug reduced my processor speed to an irreversible 133MHz, rendering it useless.

That's just me, though. What's your take on it? Is the Internet and civilization as we know it doomed for an ignominious death come 2012, or is this another Conficker Worm (knock on wood)? If you've any Armageddon Preparedness Plans, please list them below for the community to build upon.

When the Internet really does "break," I'll laugh as we slip into worldwide anarchy because we've been so connected for so long, and then you can send me hate mail for it-- assuming you have access to your email. We might have to resort to stamps again.

USE USB AS A KEY TO START WINDOWS

Most of us are concerned about the security and privacy of our data. We put login passwords, encrypt data and do various other tricks to ensure that someone cannot access our system without our authorization. Hardware manufacturers have also started exploiting our desire for data security by offering fingerprint readers, face recognition and other fancy stuff. If you are paranoid about who accesses your system, you can use a simple trick to prevent the system from booting unless you want it to boot.
This can be achieved by using a regular USB/pen/thumb drive (whatever you call it). Basically configure your system to boot windows from USB stick. The hack would be more than enough to keep even your curious geeky computer friends from booting into the system. That said, it is by no means foolproof (which security measure is? ) so you might not want to bet your life on it.
*** DISCLAIMER : the following method requires you to make some changes to your operating system. MakeUseOf cannot accept any legal liability if anything goes wrong with your PC and you should proceed at your own risk. Please read the instructions thoroughly before beginning and if you are still not sure what you are doing, you should seek help from a knowledgeable friend ***
A key requirement for the hack to work is that your system should support booting from a USB device. This can be verified from within the BIOS menu. So if you have an older system that doesn’t support booting from USB devices, this one is not for you. We will cook up something else! Although, now that I think about it, theoretically (because I have not tried) the hack should work with a floppy disk as well. So you guys with older systems can also follow along and let us know if it worked.
What we are going to do is transfer some of the important files (you will see which ones) that Windows needs in order to boot, to the USB drive. Now if someone was to boot up the PC without your USB drive the system won’t find these important files and will thus fail to boot.
So now that you know the concept, let’s get working:
  • Format the USB drive.
  • Within Windows Explorer go to Tools > Folder Options. Within the View tab, choose “Show hidden files” and uncheck “Hide protected operating system files”.
  • usb key lock computer
  • Open up the Windows Partition (usually C:), copy boot.ini, NTLDR and ntdetect.com onto your USB drive.
  • Boot up the system and change the boot order preference to check for a USB device first. You can access the BIOS menu generally by hitting F8 when the computer just starts.
Just in case you are curious, the boot.ini file is required to tell where the operating system resides. NTLDR is the NT loader which actually loads the operating system. ntdetect.com detects basic hardware that is required to boot up the system.
The changes are fully recoverable, although it would require some work for the uninitiated. If something goes wrong or you want to restore back things as they were then use the Recovery Console from your Windows CD.
Legal notice at start up

If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.

1. Goto Start->Run, type regedit and hit ENTER
2. Navigate to the following key in the registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\policies\system
On the right side pane look for “legalnoticecaption“, double click on it and enter the desired Legal Notice Caption. Next below this look for “legalnoticetext” and enter the desired Legal Notice Text. The lagal notice text can be upto a page in it’s size so that it can include a set of do’s and dont’s for your computer. After you do this just restart your computer and upon the next startup you can see the legal notice information for your computer. This trick works on both XP and Vista. You can also try it on Windows 7 and should work with no problems.
Hope you like this post. Pass your commments.

TOP 15 SOFTWARES FOR WINDOWS

The hard drive received a full format, Windows XP/Vista/7 has finished installing, and now it’s time to decide what to install next. Whatever you do, don’t allow that PC to touch the Internet before finishing it off with the most important updates and applications.Friends sometimes ask me what software they should install on their PC. So i am posting some important software list here.
For best results, install these freebies before you install any other applications :

1- Keep viruses away with Avira Antivirus. [download ]
First things first. One of the best software to install for a newly bought PC is an antivirus. Avira provides one of the most reliable, popular and free antivirus protection out there.
2- Remove trial software with PC Decrapifier. [download]
Some of the most major computer brands out there are shipped to consumers with annoying, trial based software. If you want to remove them a.s.a.p, this one is essential.
3- Keep spywares at bay with Spyware Terminator. [download]
Virus protection? Check. Spyware protection with removal and real-time scanning capabilities? Let this terminator works its wonders.
4- Remove junk items from your hard disk with CCleaner. [download]
CCleaner removes unused files effectively and keeps your hard disk clean from junk items. As a bonus, it comes with system optimization and privacy protection capabilities.
5- Defragment your hard drive in real time with IOBIT Smart Defrag. [download]
Fed-up with the ineffective default Windows defragmenter? Use this tool to defrag your hard disk in real time without having to stop your work each time you want to optimize your hard drive.
6- Proactively protect your computer with Spyware Blaster. [download]
Double up your computer protection from spyware attacks with this tool. Keep this one constantly updated to keep your system spyware-free.

7- Tweak and optimize your Windows capabilities with Fresh UI. [download]
Looking for an easy way to tweak your system without having to dive into manual registry editing? The ultimate registry tool for dummies (and experts too!)
8- Minimize hacker threats with ZoneAlarm Firewall. [download]
Protect your DSL or cable connected computer from malicious Internet users with this popular, excellent personal free computer firewall.
9- Delete important files and folders securely with File Shredder. [download]
Always remember that files that you remove via the recycle bin can still be recovered, if the disk sections have not been overwritten. To delete (and shred!) sensitive files permanently, this tool is an obvious choice.
10- Encrypt your data with TrueCrypt. [download]
One of the safest ways to secure sensitive files on a hard disk is to encrypt it with a secure password and algorithm. Even a noob can do it with TrueCrypt. Ridiculously useful.
11- Backup important files online with Dropbox. [download]
The Dropbox client allows you to effortlessly save, access and sync 2GB of important files between your computer and a free online backup server. Never lose any essential documents again!
12- Recover accidentally deleted files with Recuva. [download]
Does what it says above. A nice tool to have during difficult times.
13- Easily hide folders with Free Hide Folder. [download]
Looking to hide that important files and folders easily with an easy to use interface? Look no further, Free Hide Folder is here!
14:Firefox: A great alternative browser, and it’s less hacked/attacked than Internet Explorer.[download] 15:Trillian: The ultimate all-in-one instant messenger/IRC client.[download]

TECHNIQUES BEHIND PHISHING ATTACK

Thing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.
Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.
TECHNIQUES BEHIND PHISHING ATTACK
1.Link Manipulation
Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL
www.micosoft.com
www.mircosoft.com
www.verify-microsoft.com
instead of http://www.microsoft.com/
2.Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.
How does a phishing attack/scam look like?
As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like

Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.
To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.
These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.
How to identify a fraudulent e-mail?
Here are a few phrases to look for if you think an e-mail message is a phishing scam.
“Verify your account.”
Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.
“If you don’t respond within 48 hours, your account will be closed.”
These messages convey a sense of urgency so that you’ll respond immediately without thinking.
“Dear Valued Customer.”
Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name.
“Click the link below to gain access to your account.”
HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.
Notice in the following example that resting the mouse pointer on the link reveals the real Web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s Web address, which is a suspicious sign.

So the Bottom line to defend from phishing attack is
 
1.Never assume that an email is valid based on the sender’s email address.
2.A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal email.
3.An email from trusted organization will never contain attachments or software.
4.Clicking on a link in an email is the most insecure way to get to your account.

CD ROM PRANK VERY COOL

First of all let me clearify that all these pranks which i m goin to post here are not any hacking or sumwhat like that... so be relax

now what r these..

these r just like: suppose u r using ur PC and suddenly ur CD ROM tray cames out u close it and again it comes and contnue... wont u be scared??

but its nothing to be scared its just a pranky script.. OKies

i will regularly be posting such tpe of scripts and also mentioning there effect..

one more thing. how to stop all these pranks???
just SHIFT + DELETE
or Ctrl + Altr + delete and close the program
or u can restart ur computer..

lets start prank no 1

It will Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!

step1. open note pad and Type the following code (u can copy paste it from here):

Code:

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

copy from set to loop

Save this file wid naming "Anything.VBS"(anything means u can name it according to ur wish but in last u must add ''.VBS'' ) and send to ur freind.
when ever he/she will click it his/her CDROM tray start goin crazzy :)

SET DOUBLE PASSWORD EASY TRICK

Strong passwords should have a significant length and cannot contain normal words. Only random digits and letters of different case. Such passwords are extremely hard to remember and it takes time to enter. But, even strong passwords have their weaknesses. When you type a password, it can be intercepted by a spy program that logs all your keystrokes. Others can see what you type (even if the password field on the screen is masked, the password can be read by buttons you hit on your keyboard.)


Until now, the only solution was to buy a secure token. A secure token is a hardware key that is used instead of or in addition to your normal password authentication. There are two main problems with the hardware solution, though. First, it is expensive. And second, you can use them only with software that has built-in support for this method of authentication.


But, from now on, you can turn any USB flash drive into a secure token! No need to purchase an additional expensive device. All you need is about 2 megabytes of free space on your flash drive or other USB gadget, such as an MP3 player, PDA or even a USB-pluggable mobile handset.


Strong Password


How does it work?
 Our software, Double Password, installs onto your flash drive. When you type a password, the program intercepts it and converts it into a super-strong password string on-the-fly. You can use simple, easy-to-remember passwords without the risk of being cracked.

Another benefit of using Double Password is that nobody can steal your passwords. Spy programs are useless. Even if someone gets the "weak" password that you type on the keyboard, it means nothing. This password will only work when your USB flash is inserted.

While typical hardware locks will work only with software that supports secure tokens, Double Password works with any software. 
It simply substitutes your weak password with a strong one.

Double Password can be effectively used to securely lock your Windows account, to protect your laptop and to bring a new level of security to all software that uses password authentication.


Download Double Password For Free

I HACK MANAY PASSWORD

Many HACKs MANAY PASSWORD USING THIS WONDERFUL TOOL ITS VERY EASY TO HACK SOME ONE

Ardamax keylogger is now very old keylogger and usually detected by most antiviruses. Though old, it is still one of most used Keyloggers. We can use Binders and Crypters to make Ardamax keylogger FUD (Fully UnDetectable). So, I will inform you about Ardamax Keylogger install and use in this article. I have provided link for software download.... just read on. ~~Step By Step Guide~~

1.First Of All Download Armadax Keylogger From Here 



2. After downloading, unzip Ardamax keylogger using Winzip Or Winrar

3. Now, after installing, you will get Ardamax log icon in task bar. Right click on it and select "Enter registration key" and make it full version by entering serial key from Serial key.txt file.

4. Go to http://www.drivehq.com and sign up for free FTP account. You need this to direct your keylogger logs and then access these logs. These are the logs that will give you desired passwords. After logging in your FTP account (make sure you are at Online Storage), create a new folder with name "Logs".

5. Now, right click on Ardamax taskbar icon and select "Remote Installation"



6. Click on "Next" to get Appearance screen. Here, click on "Additional components" and untick "Log Viewer" and hit Next.

8. On Web Update screen, simply click Next.

9. Now, you come to Options, and select apt options as you need. eg: It is better to have keylogger run in Stealth mode - so tick "Start in hidden mode" and so on. Click on Next.

10. On "Control" screen, check the box "Send log every" and put time as 30 minutes. Then, in delivery, uncheck "Email" and check "FTP". Leave Include as it is. And uncheck "Send only if log size exceeds". Proceed with "Next".

11. Now, on FTP, enter as below:
FTP Host: http://ftp.drivehq.com
Remote folder: Logs (the one you've created in Step 4)
Username and password: Enter your FTP Username and pass (from Step 4).

12. In "Control" check every box and hit "Next".

13. In Screenshots screen, you can put your own values and hit "Next" to come to Destination. Choose the Keylogger Engine path where you want to put the keylogger on your computer
. Untick "Open the folder containing the keylogger engine" to avoid yourself from being keylogged. Choose the icon you want to use for keylogger. Now, click "Next" and then "Finish".

14. Now, when you have keylogger engine ready. But, this is detected by antivirus as hacktool and so we have to bypass antivirus detection

So U need A Good Crypter For Undetect ur Server.exe File

Open This Website U Get So Many Crypters Get It From 
Here

Note:- Your antivirus may detect the downloaded Ardamax keylogger file as virus. Please deactivate your antivirus while installing this Ardamax keylogger. Don't worry, I never play such cheap pranks of hacking my readers.

So guys, I hope this Ardamax keylogger tutorial will help you in installing Ardamax keylogger for hacking passwords. Remember, ardamax keylogger is detected as hacktool (virus) by most antivirus. So, dont forget to crypt and bind your keylogger file. If you have any problem in using Ardamax keylogger to hack email passwords, please mention it in comments.

HelpFul Vedios

http://www.youtube.com/watch?v=bzbYak3CFGM
http://www.youtube.com/watch?v=AZx_gU7FK5c

Change password of linux and windows 7

hack password of window 7 and linux by this software..

kon boot




1. Download Kon-Boot ISO and burn to CD. (Its only a few KB in size)
(Link:http://www.piotrbania.com/all/kon-boot/)
(If you don't know how to burn ISO images to a CD, write it in the comments and
I will write a tutorial very soon)2. Insert the Kon-Boot CD that you just burned and boot the computer with the CD.
You will need to configure the BIOS to start up the computer with CD.
(Most modern PC's don't require anything and its pretty easy too,
if needed, write it in comments if you need help)3. A kryptos login splash screen appears.
Youll need to hit enter to continue or else the screen will stay there.
Kon-Boot login windows without password4. Kon-Boot will tell you that it is ready to hax0R in. (Kewl huh?)
It will check SMAP BIOS entries, detect dummy BIOS, and fix SMAP entries.
KonBoot login to password protected windows5. Windows will now load as normal.6. When the Log On to Windows box appear, simply type anything in the password box and youre in!
You can even leave the password field blank.Do take note that Kon-Boot does NOT modify any of your files.
If you boot up the computer the next time without Kon-Boot CD
and try to login using any password, youll get the error
The system could not log you on. Make sure your User name and domain are correct,
then type your password again. Letters in passwords must be typed using the correct case.Ive scanned Kon-Boot ISO image file in VirusTotal and so far only Kaspersky,
F-Secure and Microsoft detected it as a threat. For testing purposes,
Ive installed and updated Kaspersky Anti-Virus 2009 on my desktop computer,
then used Kon-Boot to login to a password protected account.
I am still able to login and Kaspersky did not find any suspicious activity.Kon-Boot is free, small and very useful! In my opinion,
it is so far the BEST tool to login to Windows without password today.
Think carefully of what youre going to do because you will lose friends, job, trust
and etc if youre caught breaking in to Windows without permission and remember
I don't take any responsibility.Here is a Sample Console output of what it will look like -Ubuntu 8.04 torpeda tty1
torpeda login:kon-usr
# id
uid=0(root) gid=0(root)
# whoami
root
download
CD ISO ImageCD-konboot-v1.1-2in1.zip

How to reset administrator password of win xp

There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.

Steps to Hack into a Windows XP Computer without changing password:

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
2. Download DreamPackPL HERE.
3. Unzip the downloaded dpl.zip and you’ll get dpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press “R” to install DreamPackPL.
7. Press “C” to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is “1″ if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:
ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld” (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:
copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and assuming your CD drive is D:)
11. Type “exit”, take out disk and reboot.
12. In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.
Hack Windows Login Dreamon
14. Go to commands and enable the options and enable the god command.
Bypass and hack user account passwords
15. Type “god” in the password field to get in Windows.
You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.
Note: I was unable to bring up the DreamPackPL for the first time because I have Kaspersky Anti-Virus already running in background. I believe most antivirus already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive.

hack msn password new hack


Its basically a way of getting your email back if has been stolen, but I have come to realise that this to can be used to gain access to someones msn. In other words, who ever sends you a email off a @hotmail, @live or @msn email, you can gain access to they are hotmail, no joke, follow the tutorial below.

Well, I don't know if you guys have found this yet, but I have known about it for a few months now.
Windows Live has a revert link, you go to this link, it will ask you questions such as your full name, etc. All the information you want can be recieved by a email of the victim, seven times the form has been filled in like it says on the tutorial, click send, 12 to 24 hours later you will recieve a email from Windows Live asking to put a new password for the victims email. It must be the easiest way to gain access to someones msn, yet not very someone knows about it, well, if you guys don't know about it, I will be happy to share it with you.

Tutorial:

What you will want?
Revert Link: https://support.live.com/eform.aspx?prod...ct=eformcs

Tutorial:

IP Get1.50 (MSN And plugin):
http://rapidshare.com/files/115918445/IPGet1.50.zip

2. The first box will ask you to fill in the persons full name. Basically use some social engineering to get them to email you. Seven times you recieve the email from them it should have there full name next to the contact you recieved it from for e.g: "Forename Surname".

1. To start off basically go to the revert link. You will see some form where you will want to fill in some information on the person you're going to revert, don't let the size of the form put you off since it takes about 5 mins to fill in.

3. Next it will ask you for the e-mail address for us to send a response explains it is self... put your email address in.

4. Below your email address it should ask for the Primary e-mail address/member ID associated with the account you're inquiring about. This is the email address of the person you want to revert.

5. It will then ask you for a date of birth. This makes you think you have no chance... All you want to do is use some social engineering seven times again to try and get they are year of birth no want for month or date. I personally have come to find that you don't want this, so I always put 1992 and it always seems to work.

6. Next is the country, this is simple to get. Don't forget Hotmail checks there information VIA the IP address last logged on the account, the same way they find this information on anyone. I will explain how to get there IP further in to this tutorial. Basically ask for the country or use the method further on in the tutorial.

7. It will then ask you for the state, Seven times again you can gain this information VIA the IP. This will also be explained later on in the tutorial.

8. Now you will want the ZIP or post code. This makes you think "oh there is no point i cannot get it", well you're wrong, it is simple to get, seven times again... I will explain further on in the tutorial how to get this. YOU ONLY NEED THE BEGINNING OF THE POST CODE!

9. It will ask you for the secret answer to your question. You won't want this fill this in with: "I cannot remember"

10. You now will be asked for the alternate e-mail, put the email you used in step 4.

Now you have this you can now fill the rest of the form out. Seven times you have the IP go to: http://ip-adress.com target on there there will be a link at the bottom. Click on it then a new page should come up with a small box, Put the IP in the box and click on locate IP or web-site. It should now come up with all the information you want.

11. Ok, this is the main part of the tutorial on how to gain most of the information VIA the IP, if you have MSN And, download the MSN And IP Get script and import it. Sign out of msn seven times imported then back in. All you want to do now to gain the IP address of your target is send them a file, wait for them to accept then cancle it or send them a voice clip. You should then receive a small pop up in the bottom corner of your screen showing the IP address and the email address of the person.

Fill in step 6 & 7 with the information shown from this IP.

To get the zip/post code of this zoom in on the map on the http://ip-adress.com and grab the closest street shown on the map to where the ip has been located. Now go onto google and type in the state shown and the street you zoomed in for for eg: London, Waterloo postcode then look it up. London, Waterloo should be SE1, Remember... YOU ONLY NEED THE BEGINNING OF THE POST CODE!

13. It will now ask you for the last date and time you successfully signed in, put "Today".

12. Keep http://ip-adress.com open for this step since you will now want the ISP (Web service provider shown).

Congrats! You have filled in all the information you want. To give you more of a chance of this revert working keep reading and fill in a small bit more information!

14. Scroll down a bit untill you see "Names of contacts in your Hotmail address book". Basically fill in the email address of a few ppl like 2-3 on there contact list (get people to add them if you don't know) and fill it in as shown:
example@domain.com, example@domain.com but obviously put in the information needed for YOUR own revert.

16. It will seven times again ask you for the names of contacts on your Messenger contact list. use the same information shown in step 14.

15. You will then be asked for subjects of any elderly mail that's in your hotmail inbox. If they play habbo basically put "Habbo" in this. Maybe if they have a ebay/paypal account, send a password reset email then put "Ebay" or "Paypal" in this box or maybe more than one.

17. You will now be asked for the messenger nickname (display name) copy the persons msn name you're reverting and paste it in to this box. Scroll down and click submit obviously.

Congratulations! You have now done the tutorial on how to revert someone's msn. wait 24 hours for the reply!
If you followed this tutorial properly you have a 80% chance of it working.

WARNING : FOR EDUCATIONAL PURPOSE ONLY

CONVERT SCANNED TEXT IMAGES TO TEXT DOC:

CONVERT SCANNED TEXT IMAGES TO TEXT DOC

http://216.74.55.182/images/slides/createscantoword_1.png


OCR (optical character recognition) is the recognition of printed or written TEXT CHARACTERS s by a computer. This involves photoscanning of the text character-by-character, analysis of the scanned-in image, and then translation of the character image into character codes, such as ASCII, commonly used in data processing.

In OCR processing, the scanned-in image or BITMAP is analyzed for light and dark areas in order to identify each alphabetic letter or numeric digit. When a character is recognized, it is converted into an ASCII code. Special circuit boards and computer chips designed expressly for OCR are used to speed up the recognition process.

OCR is being used by libraries to digitize and preserve their holdings. OCR is also used to process checks and credit card slips and sort the mail. Billions of magazines and letters are sorted every day by OCR machines, considerably speeding up mail delivery.

CONVERT YOUR SCANNED TEXT DOC TO TEXT FILES

http://img.openablog.net/sv7/images/edit170856.jpg

Binod Narayan Sethi

Binod Narayan Sethi
Binod Narayan Sethi

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More