This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.


Think about your financial information, and personal emails that your account holds. Don’t risk being hacked. read the post  information and follow then  u will never get hacked even if ur account  got hacked u can get it back


now a days  most off  the email services like gmail and yahoo introduced the captcha system so old brute forcing method wont work   .


check the email hacking methods so that  you can defend from those attacks


the main steps  to  hack proof your email comes while registering the email accout


you must set up the secondary mail id and also the security question


Where did you meet your spouse?

What was the name of your first school?

Who was your childhood hero?

What is your favorite pastime?

What is your favorite sports team?

What is your father’s middle name?

What was your high school mascot?

What was your first car of bike?

What is your pet’s name?


For example, a pet’s name. Don’t write your real pet’s name. Invent one! so that no one can guess that  add some special characters to your password like @#$*^ ” these cant be recorded by most of the keyloggers


make the note of the security question  and the secondary id some where in your dairy.


keyloggers are  mostly responsible for steeling of the date both account passwords


Here are the best tools to  protect your information from being stolen.


Web Based On Screen Keyboards

Some website such as Citibank has an on-screen javascript keyboard which you can use your mouse to click the character. This way, you can avoid using your keyboard. There is no need to install anything because everything is loaded from the website. If you’d like to implement an on-screen keyboard on your website, please visit the links below.

1. JavaScript Virtual Keyboard by Dmitry Khudorozhkov.

2. Javascript VirtualKeyboard by WingedFox.

- In my opinion, WingedFox’s Javascript VirtualKeyboard is much better than Dmitry’s JVK.


Program On Screen Keyboards

If you want to use an on-screen keyboard on a website but the on-screen keyboard is not available, you can download and use program type of on-screen keyboard. Usually the on screen keyboard program is very small in size and free to use.


1. Neo’s SafeKeys


2. MiloSoft Virtual On Screen Keyboard


3. Click-N-Type virtual keyboard


4. Mouse Only Keyboard v1.4 (MOK)


Softwares:


1. QFX KeyScrambler


2. I Hate Keyloggers


3. SnoopFree Privacy Shield 1.0.5


4. MyPlanetSoft Anti-Keylogger v1.5


5. KL-Detector v1.3


6. PSMAntiKeyLogger


This is the first post on hacking and this is also the ultimate post that will teach you how to hack any email. After reading this post u can hack gmail, yahoomail, hotmail, aol mail

The following article is not only teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.

You all are very lucky for reading this post in learnhacking.org, because i worked very hard about more than 3 months to learn this.

Getting started :

There are so many ways to hack emails depending on the victim
Hacking with Keyloggers
Hacking with Trojans
Usage of Fake pages

Keyloggers :

Installing the keylogger in the victim’s system records each and every keystroke (every keyborad button including symbols), its very easy if u have the physical acsess to his/her system and its a bit complicated when it comes in remote installation.

A keylogger records the every keystrokes (as said above) the victim presses and mail you the info. By installing the keylogger u can not only hack his email password u can get the list of the sites he visits and their passwords you can also hack bank and paypal accounts with this.

Keyloggers are widely available on the internet, you can google it (google search) for more info or you can just check our upcoming posts on hacking emails using keyloggers.

Soon we will upload some videos too.

Trojans
These are the hackers best friends, also called as Remote Administration Tools, you can play with the victim’s system with the help of these tools, you will have total control over his system, some of the features of these programs are as follows

- Pro – connective ( Reverse Connection)

- Run any Program in the victim’s pc.

- Run MS-Dos Command.

- Run Batch Script

- Run Vb Script

- Run Registry Entry

- Receive MSN , Steam , IExplorer, Firefox, Anti virus , Dial-Up , Crypted Passwords

- Keylogger ( Live keylogger, you can see in Live ! ) *New*

- ScreenShot + WebCam ( Live ! ) *New*

- Files Manager with PRO Options

- Search Files

- Registry

- Admin FTP

- Windows

- Application ( Max Process , Directory Of File, Memory RAM, Refresh and Kill Button )

- Online Editor *New*

- Printer

- Downloader

- Give Damage

- Clip board

- Shut Down PC

- Control Panel

- MSN Stuff ( You can add a contact , delete a contact, change his status and chat with his contacts in Live ! ) *New*

- Funny Stuff ( Hide Desktop Windows, Hide Start Button , Hide task bar, Open CD-ROM, Swap Mouse Buttons, Minimize All Windows, Start Mouse Control, Modify/Upload Wallpapers, Play Sound, Control keyboard, Lock Ctrl+Alt+Del, HTML Script) *New*

- Chat ( With Custom Skin , Nickname) *New*

- Alert Message ( Custom Error messages, Questions with answers)

and also a lot of things can be done with these trojans.

If you want to know how to hack with trojans and where to get them, just check our upcoming posts on email hacking with trojans.

Fake pages

Hacking by fake pages is the best easy and effective way its mostly used and 33% of the total passwords hacked are by using this method .

In this method we will send him a fake page of the site which we want to hack, fake page looks exactly the same like the real one the only difference is the address or url of the page , the victim thinks that fake page as original one and enters the password then we will get his password to our mail

1.HACK GMAIL

2.HACK YAHOOMAIL

3.HACK HOTMAIL

4.HACK AOL

4.SNIFFING

This method is used when the victim and you are in the same lan then we can sniff all his passwords and also record all his traffic.

For more info check our upcoming post on hacking email by sniffing.

How to get back a hacked orkut or gmail account


Now a days most of the hackers are targeting gmail accounts dude to the no of services offered by the google

if hacker change the secret question and secondary email to new ones. Once these two things are changed, you cannot get back your account through the forgot password tool.

then follow these steps

Gmail has a special page to report such incidents when someone hacks into your account.

check it here :https://services.google.com/inquiry/gmail_security1.




The Gmail Team considers numerous data points when determining original account ownership in a hijacking case. In addition to the information requested on the form, you can also include the following information to help them process your claim.
The email addresses of up to 3 Frequently Mailed Contacts
The names of up to 3 Labels
Any other Google services you used with this account and the date you started using each one
Your ip-address

You can also resubmit the form later if you find any additional information that would help them investigate. This process is said to take about 4-10 days.

BackTrack 4 Pre Release Available For Download

You may remember back in February the BETA of BackTrack 4 was released for download, the team have made many changes and have now released BackTrack 4 Pre Release.

For those that don’t know BackTrack is the top rated linux live distribution focused on penetration testing. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes.

It’s evolved from the merge of the two wide spread distributions – Whax and Auditor Security Collection. By joining forces and replacing these distributions, BackTrack has gained massive popularity and was voted in 2006 as the #1 Security Live Distribution by insecure.org. Security professionals as well as new-comers are using BackTrack as their favorite toolset all over the globe.


The new version has busted the 700mb file size though so it’d DVD or USB, it’s recommended to use a USB drive to run it or install it on your HDD as running from a CD isn’t exactly speedy.

Full details available in the PDF guide:

BackTrack 4 Guide [PDF]

You can download BackTrack 4 Pre Release ISO here:

bt4-pre-final.iso

Or read more here.