Wednesday, July 28, 2010

Can Hackers still Hack facebook?



Facebook Security team are constantly taking steps to avoid hackers from gaining unauthorized access to Facebook accounts.Recently Facebook has introduced 2 new security features.
The first feature allows Facebook users to identify and name the devices from which they access the site, and then receive notifications whenever someone attempts to log in under their names from other devices.
The second feature will automatically block suspicious logins.Facebook will record your IP address of the computer through which you log in to your Facebook account and if you try to gain access to your facebook acount from another IP they can ask you to answer your secret question , identify your pictures etc

Here is the official statement by Facebook:

When we see that someone is trying to access your account from an unusual device, we’ll ask the person to answer an additional verification question to prove his or her identity as the real account owner

Can Hackers still Hack Facebook account?

So the question arrives here will it stop hackers from Hacking your Facebook account.The answer is no, you see that vulnerabilities are discovered so there is no way you can prevent it from happening.There are still alot of methods which hackers can use to gain access to your Facebook account.If you are not a victim you could be so you should take steps to secure your Facebook account.If your Facebook account has been hacked then you should see the following post to get it back.

Facebook account hacked what to do Now!

Some posts from Past on Facebook Hacking:

How to hack Facebook Password
Hack Facebook Password using winspy
4 ways on how to hack Facebook password
Hack Facebook account using Facebook freezer

How to Create Facebook Fake login page(Video)

Facebook Hacking
In my previous post How to hack facebook password I told you about the two ways which most hackers use to Hack Facebook Password i.e Phishing and keylogging.However I posted a video tutorial to Hack a facebook password using winspy keylogger so i was requested by alot of users for a video tutorial to create a facebook fake login page to Hack a Facebook password, so therefore i have created a video which explains the steps to create a Facebook fake login page






Download Already created Fake Facebook login page

Monday, July 26, 2010

Allspy keylogger - The Full review

Is your wife or spouse cheating you? Do you want to see what your kids do on the computer when you are not at home?,Do you want to monitor the persons who use your computer?, then Allspykeylogger is the best solution.






Why Allspy?
All-Spy Keylogger is an invisible easy-to-use surveillance tool and a spyware keylogger that records every activity on a computer and sends reports to a specified email address. The application helps you find out who has used a computer and what was done. All-Spy Keylogger spy software does not consume computer resources and it runs completely invisible, meaning that it is invisible in Program Files and Task Manager, so that nobody using your computer will suspect that his/her activity is closely monitored.

Antivirus Detection rate:
The keylogger is so build that it Module is detected by some virus scanners, but not the big names Norton and McAfee used by 90% of users. I also had no problem emailing it via Hotmail, Yahoo, and Gmail as an attachment.
Here is a Antivirus detection report which shows that the file is 100% clean.

Extra security:
For extra security, All-Spy Keylogger has a password protected interface and hot-key combination for accessing the application, all the recorded information being stored in a secret, encrypted file.


Both sides of chat conversations and instant messages are recorded and saved. You can get detailed visual recordings of all this by accessing the screenshot option that acts like a surveillance camera. All-Spy Keylogger has also a spy web site recording feature that continually monitors every web page that is accessed from the computer.

All-Spy Keylogger monitors all printing activities, all files and folder activity and the clipboard operations as well, recording all copy, cut, paste operations.

Click here to place an order of  Allspykeylogger

Saturday, July 24, 2010

How to identify phishing scams

What is Phishing?

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.


What does a phishing scam look like?


Phishing e-mail messages take a number of forms. They might appear to come from your bank or financial institution, a company you regularly do business with, such as Microsoft, or from your social networking site.



 The following is an example of what a phishing scam in an e-mail message might look like.
Phishing spam
Example of a phishing e-mail message, which includes a deceptive Web address that links to a scam Web site.


Here are a few phrases to look for if you think an e-mail message is a phishing scam.

1.Verify or update your account:


Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through e-mail.
2.you have won a prize or lottery:
The lottery scam is a common phishing scam known as advanced fee fraud. One of the most common forms of advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part
"3.If you don't respond within 48 hours, your account will be closed."
These messages convey a sense of urgency so that you'll respond immediately without thinking.

Tips to protect yourselves from phishing:

1. Don’t reply to, or click links within, emails that ask for personal, financial, or account information.

2. Check the message headers. The ‘From:’ address and the ‘Return-path’ should reference the same source. If necessary, look at the expanded header as some phishing use vulnerable email servers to rout their messages.

3. Instead of clicking the links in emails, go to the websites directly by typing the web address into your browser, cut and paste, or use bookmarks.

4. If on a secure page, look for “https” at the beginning of the URL and the padlock icon in the browser.

5. Use a browser that has a phishing filter (Firefox, Internet Explorer, or Opera).

6. If you ever need to change your account information, such as your billing details or your password, you should always sign in to your account from the main login page of your trusted network (i.e. your bank’s main website) and make the changes directly within your account.

Friday, July 23, 2010

Hack Gmail account with Gmail Hacking tool


Previously i have posted alot of articles on Gmail hacking.Recently the number of users Gmail users have increased, therefore Gmail have been the major target of lots of hackers.People use Gmail as a primary email and therefore if hackers can gain access to their primary email accounts so therefore they can also hack other accounts associated witth your Gmail account.


A long time back Google introduced the ability to optionally encrypt any transmission to / from GMail and not just the login sequence. Previously Gmail used to encrypt the login sequence only. All other data was transmitted unencrypted over the wire making such hacking possible. Every ething that you are doing on your gmail account is transmitted unencrypted over the web.

This makes Gmail velnurable to Session hijacking, the hacker can force your browser with Gmail Hacking tool to send a cookie file.Once the hacker gets the cookies he can login into your gmail account with out your username and password.Any one with basic knowledge of computers can use this tool to hack your gmail password.


How to protect your gmail account from getting hacked?

So this question might arrive in your minds, well the answer is simple you just need to change your browser connection to https.

To change your browser connection to https kindly perform the following steps:


1.Sign in to Gmail.


2.Click Settings at the top of any Gmail page.


3.Set 'Browser Connection' to 'Always use https.'


4.Click Save Changes.


5.Reload Gmail.

That's all you need to protect your GMail account from getting hacked.

Sunday, July 11, 2010

Which Cell Phone Spying software to Choose?

Cell phone spying software
I had previously written Reviews on Mobile Spy and Spy Phone Gold.I got alot of questions regarding the Best Cell Phone Spying Software.There are lots of Mobile Spying softwares available in Market but none of them has features like Spy Phone Gold.The features and Mobile Spy are Spy Phone Gold are almost same but Mobile spy lacks the feature of Call Interception and Call recording.


Below is a Comparision Chart between Mobile Spy and Spy Phone Gold:

Cell Phone spying software

This comparison Chart might have showed you the exact features of both Cell Phone Spying Softwares.

Which Cell Phone Spy Software to Choose?

Its really depends upon your needs.If you want a High- tech Cellphone monitoring software i suggest you to go with Spy Phone Gold or if Mobile spy meets your needs i suggest you to go with it.If you want to monitor your kids i suggest you to go with Mobile Nanny.Mobile Nanny is next generation Parental control software which has an ability to block and monitor every aspect of how your Child uses your mobile phone.All of these softwares have 100% money back guarantee so you can try them with out any risk.You can Grab either of these softwares from following links:

1.Spy Phone Gold 

2.Mobile Spy

Thursday, July 8, 2010

How to Install flash player on Google Chrome browser

Install flash payer on google chrome browser
Google chrome is one of the fastest browsers with amazing features.But still has some problems which needs authemtication.Flash sites are not perfectly opening for every one.Many are getting the message to download the latest version of Adobe flash player to display some content in it.So in this article i will tell you on How to install flash player on Google chrome browser

Procedure:

1.Download the flash player for windows xpi file.

2.Rename the file to .zip as its a file which directly interacts with your web browser and changes itself with the extension.

3.Then extract it to a new folder through winzip. You will see a couple files flashplayer.xpt and NPSWF32.dll which you have copy.

4.Then go to the plugins folder of your google chrome browser, which might be at -
C/Documents and settings//Local Settings/Application Data/Google/Chrome/Application/Plugins/

Paste both the files in this plugins folder and then close your Chrome browser and restart it.

Try to check whether the installation is done perfectly, by just watching a video in Youtube which requires the latest version of flash player to play the video.

Monday, July 5, 2010

Hack a computer remotely using Realtime spy


Photobucket

I get this question asked daily "How to hack a computer remotely" OR "How to install a keylogger in a remote machine".As we know that in order to install a keylogger we must have physical access to victims computer.There are lots of methods to gain physical access such as Netbios hacking ,Trojans, Rats etc.However these methods require alot of skill and its very difficuly for newbies to do it.Alternatively we use a keylogger(Remote installation supported).All we have to do is to make sure that the remote file gets installed into victims computer and your done.Below we will go through the necessary steps required to hack a computer remotely and install a keylogger.I will be using Realtime spy.


Step 1

First of all download Realtime spy.After downloading your copy of Realtime-Spy navigate to where you downloaded (in this case it is on the Windows desktop). Double click the Realtime-Spy installer file to start the install.
NOTE: After install is complete you can delete this file!




Step 2

Upon finishing the installation you will be able to run Realtime-Spy's configuration file immediately. Do this and continue to the next step.
Step 3

You will now see the Realtime-Spy configuration window. Enter in your username and password that you received after purchasing Realtime-Spy. These must be entered EXACTLY as given. They are case sensitive, and take care not to mix up 0's with O's and I's with l's.
After you enter your username and password, choose whether or not you want Realtime-Spy to display a splash warning whenever it is ran, and how often you want it to clear its logs.

After you enter your username/password and select the options you want - press "next" to go to the next configuration panel.



Step 4
When you click "next" Realtime-Spy will verify your settings. If they are correct you will be able to configure your monitoring options, as shown below. Once you have your options set click "create" to create your logging module.



Step 5

Click "create" to create your logging module Or Remote file. You will be prompted for a name to give the file you are creating. In this example we have named it 'test' - you can name it whatever you want. Click Save and you will receive a message similar to the one below.

Remember the location of the file you have just created!



Step 6

Now it is time to send out the file to the remote PC. In this guide we are using Outlook Express on Windows XP.

Click the Create Mail button to open a new mail window.


Step 7

Click ATTACH and navigate to where you saved your Realtime-Spy file you created previously. Click on the file and then click 'Attach' to attach the file to your email.





Step 8

You will now have to enter a recipient for the file you are sending, as well as an email subject and body. Notice the size of the Realtime-Spy file - it should be approximately 100-120kb at all times!

Once you are ready to go click Send to send the email!


Step 9

Once you send out the file you can then login to your Realtime-Spy webspace. 

Enter in your username/password at the prompt to continue!




Step 10

You will be presented with your Realtime-Spy webspace. Here you can select and view users that were logged with the file you sent out.

Note: Users will only appear after they have downloaded and executed the file you have sent them.



If you have any problem regarding the installation feel free to comment.

Saturday, July 3, 2010

Free Microsoft Office 2010 Product key

If you are looking Microsoft office 2010 Product keys then you are in the right place.Previously i posted on Microsoft office 2007 product key.You may use one of the following product keys to activate your Microsoft office keys, Microsoft Home Edition keys, Microsoft Standard edition keys and much more.



Note:Due to DMCA notice I am forced to remove keys from here, So If you want to get access to the keys kindly download them from the link below:
Download Microsoft 2010 Product Keys

Free microsoft office 2007 Product key

Microsoft office hacked

Recently I wrote on Free Adobe photoshop CS5 serial key, how ever some of readers requested for Free microsoft office 2007 Product key Microsoft Office 2007 (officially called 2007 Microsoft Office System) is a Windows version of the Microsoft Office System, Microsoft's productivity suite.Office Professional 2007, Office Home & Student 2007, Office Standard 2007, Office Small Business 2007 are all available for free download from Microsoft. It also comes with a 60 day trial period.


The office professional 2007 suite includes:

Microsoft Office Access 2007
Accounting Express 2008
Microsoft Office Excel 2007
Microsoft Office Outlook 2007 with Business Contact Manager
Microsoft Office PowerPoint 2007
Microsoft Office Publisher 2007
Microsoft Office Word 2007

Below i am posting a procedure to convert Microsoft office to full version:

Converting Microsoft Office 2007 to Full Version:

This requires that Microsoft Office 2007 has been installed without the product key in the first place.

Once Microsoft Office 2007 has been installed with no product key, proceed as follows:

1. In Windows Explorer, browse to the following folder:


C:Program FilesCommon FilesMicrosoft SharedOFFICE12Office Setup ControllerProof.en


2. Right click on Proof.XML file, select Open With in the right click menu.


3. In the Open With window, select Notepad to be used to open the XML file.
[Note: In Windows Vista, if you can’t see the Notepad option, simply double click the “Other Programs” to unhide it.]

4. Scroll down to the bottom of the Proof.XML to locate the following lines:

<feature Id="SetupXmlFiles" Cost="1248″><optionref Id=”AlwaysInstalled”/></feature>

5. Change the AlwaysInsalled to neverInstalled so that the line looks like following:


<optionref Id="neverInstalled"/>


6. Save the Proof.xml file.

[In Windows Vista, you may need to take ownership and grant full access permission to yourself before able to modify the file. We already have a detailed article on that. Here is the link to How to take Ownership of a File in Windows Vista]

7. You can now launch Microsoft Office 2007 application such as Word, Excel, Powerpoint, Outlook and etc without prompting for activation.

Free Microsoft 2010 Product Keys 


If you are looking for free microsoft 2010 Product keys, Kindly refer our post on Free Microsoft 2010 Product keys

If you have any problem implementing this hack feel free to comment!

Thursday, July 1, 2010

Recover deleted files from hard drive

Have you accidentally deleted an important file?.Then you need not to worry even if you have deleted the file from recycle bin.If you realize that you have accidentally deleted a file from hard drive then you must act immediately to recover it.In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.





If you search for "data recovery service" or "data recovery software" you will come across hundreds of softwares claiming to recover deleted files but they don't.Their purpose is just to take your money.These data recovery software's are either neither effective nor capable of recovering your files in its original condition.I have tested lots of data recovery softwares and found the following software as the best data recovery software.

1. Stellar Phoenix Data Recovery (for Windows)

2. Stellar Phoenix Mac Data Recovery (for Mac)

What is Stellar Phoenix?

Stellar Phoenix Windows Data Recovery Software is a comprehensive windows partition recovery solution for data loss due to partition corruption, partition resizing, file system damage, boot sector corruption, MBR damage, virus infection and human errors.

Will I be able to recover the files back?
Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition.


How to recover lost files with Stellar phoenix data recovery software?

Files & folders are also deleted using Shift+Delete key. By using Shift+Delete key, files are deleted permanently and its contents will not be stored in the recycle bin. An ordinary computer user will assume that using Shift+Delete key will permanently delete a file from the system. If the data which has got deleted is important then it becomes very essential to recover that data as quickly as possible. It needs to be recovered using data recovery software to locate, recover and restore all the important files and folders.

Stellar Phoenix Windows Data Recovery Software is an ideal solution to all your Windows related data loss problems. This software is an advanced recovery software designed for safe and non-destructive data recovery from hard drive or any other removable storage media. It also supports recovery of raw data from badly corrupted storage media. Additionally, it also offers data recovery from formatted drives.

Features:

With Stellar phoenix data recovery software you can:

1.Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
2.Recover deleted emails
3.Recover deleted documents
4.Recover deleted photos
5.Recover deleted music
6.Formatted Hard-Drive recovery
7.Recover files from USB Drives, CDs, DVDs and memory cards
8.Recover almost all the camera format files

and much more.

Visit the following links for more information on Stellar Data Recovery