This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Reveal hidden passwords under asterisks for free

shot-asterisk


College labs, Cyber cafes are a good source of saved passwords. People either save their passwords unknowingly sometimes as the “Remember my password” is checked by default or when the settings of the browser are set to saving the password automatically.



Accessing their email accounts, social networking profiles etc becomes easier but most of the times its difficult to change or know those passwords as they are under asterisks and changing the password required you to enter the old password.


This is where Asterisk Key comes in handy. Its a free software which shows you the password behind asterisks in the ACTIVE INTERNET EXPLORER window. It however, doesn’t work in firefox or chrome but only Internet Explorer.


Download Asterisk Key (454KB)


Stay tuned as I’ll post on how to use Asterisk Key and retrieve MTNL broadband internet password of any user.

Phishing Tutorial: Explained stepwise

3507171113 bebef09270 Phishing Tutorial: Explained stepwise


In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake.


Read more for the Phishing Tutorial



Now i am going to explain you “How to do phishing?”


Steps are indicated as follows:-


Step 1- Firstly you must signup for a free web hosting service like:

www.freehostia.com

www.ripway.com etc….. and register a domain or subdomain.

After getting your signup done, you have your own subdomain like for instance you registered with freehostia, then your domain is like “www.yourname.freehostia.com”


Step 2- Now Login to your freehostia account and go to “File Manager” in the freehostia control panel.


Step 3- Now what you have to do is, go to your domain folder like “yourname.freehostia.com” and create a separate folder in that directory with the name of the site, for eg. yahoo , if you want to phish a yahoomail account!


Step 4- Click here to Download the compressed file and extract it to your desktop:


and then open your “yahoomail” folder. You’ll find two files there viz. “bhanu.php” & “index.htm” [ Each phisher folder contains same files]

Step 5- Now upload “bhanu.php” & “index.htm” to the “yahoo” folder you created inside “yourname.freehostia.com”

So when you’re done with the uploading part, the link to your yahoo phisher is “www.yourname.freehostia.com/yahoo/index.htm”.


Step 6- Congrats!! That is your Yahoomail phisher!! Now all you have to do is copy the link to the phisher file i.e.”www.yourname.freehostia.com/yahoo/index.htm” and send it to the victim you want to hack! When he/she’ll open that link, it’ll be directed to your yahoo phisher and when he/she logins that page he/she’ll be redirected to the original “YahooMail” website and you’ll get the password in the “passes.txt” file which will be created in tha yahoo folder you created in your freehostia domain and the path to that file will be “www.yourname.freehostia.com/yahoo/passes.txt” !


IMPORTANT NOTE: CHANGE YOUR FREEHOSTIA DIRECTORY PERMISSION TO “755” SO THAT NO ONE CAN ACCESS YOUR PERSONAL FILES EXCEPT THE PHISHER LOGIN PAGE!!


**FOR EDUCATIONAL PURPOSES ONLY!**

How do The Crackers Crack IM, E-Mail and other accounts?

3507952878 3c8c7e214c How do The Crackers Crack IM, E Mail and other accounts?


The most frequent questions asked by many people especially in a chat room is How To Hack Yahoo Password or any other email account.So you as the reader are most likely reading this because you want to break into somebody’s email account.Here are some of the tricks that can be used to track an email password.

THINGS YOU SHOULD KNOW BEFORE PROCEEDING



There is no program that will crack the password of victim’s account.There exist many password hacking programs which claims to do this,but unfortunately people using these kind of programs will only end up in frustration.



None of these programs work since services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts.Another thing you must know if you ask this question in any “hacker” chat room/channel, you hear that you have to email some address and in any way you give up your password in the process, in attempt to crack others password.So DO NOT BELEIVE THIS.


TWO WAYS OF HACKING METHODS THAT YOU CAN TRY



IF YOU HAVE ACCESS TO VICTIM’S COMPUTER



If you have physical access to victim’s computer then it’s definitely possible to crack his password.This can easily be done by just installing a keylogger.

What is a keylogger? A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard.

A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.OK we can crack passwords using a keylogger but these are the questions that arise in our mind now!

1.Where is the keylogger program available?

A keylogger program is widely available on the internet.some of them are listed below

Powered Keylogger

Advanced keylogger

Elite Keylogger

Handy Keylogger

Quick Keylogger

Oops i think the above list is enough.There exists hundreds of such keyloggers available on the net.These are software keyloggers.There are also hardware Keyloggers available which can be directly attached to computer and can be used to sniff valuable data.These programs are none other than spyware! So use it @ your own risk.

2.How to install it?



You can install these keyloggers just as any other program but these things you must keep in mind.While installing,it asks you for a secret password and a hot key to enable it.This is because after installing the keylogger program is completely hidden and the victim can no way identify it.Keylogger is hidden from control panel,Program files,Start menu,Task manager so that it becomes completely invisible but runs in background monitoring the user activities.

3.Once installed how to get password from it?



The hacker can open the keylogger program by just pressing the hot keys(which is set during installation) and enter the password.Now it shows the logs containing every keystroke of the user,where it was pressed,at what time,including screenshots of the activities.

Some keyloggers also has a built in SMTP server.So once you install the keylogger on victim’s computer you can just sit back in our place and receive the logs via email

4.Which keylogger program is the best?

According to me Elite Keylogger and Powered keylogger are the best.You can also read the features and side by side comparisions of them and select the best that suites your needs.

IF YOU DO NOT HAVE ACCESS TO VICTIM’S COMPUTER



Ofcourse the above method can only be employed if you can access victims computer.But what to do if we do not have access.In this case there exists many Remote Administration Tools commonly known as RATs available on net.Just try googling and you can get one.

OTHER WAYS OF HACKING PASSWORD

The other most commonly used trick to sniff password is using Fake Login Pages or Phishers.

This is where many people get cheated.A Fake Login page or a Phisher is a page that appears exactly as a Login page but once we enter our password there ,we end up loosing it.

Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & password) are redirected to remote server and we get an error “Page cannot be displayed”.Many times we ignore this but finally we loose our valuable data.

KeyLoggers: (Keystroke Loggers)

3507677202 ac0ebeaf00 KeyLoggers: (Keystroke Loggers)

Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.
There are two types of keystroke loggers:
1. Software based and
2. Hardware based.


Read more about keyloggers….



Spy ware: Spector (http://www.spector.com/)



  • Spector is a spy ware and it will record everything anyone does on the internet.

  • Spector automatically takes hundreds of snapshots every hour, very much like a surveillance camera. With spector, you will be able to see exactly what your surveillance targets have been doing online and offline.

  • Spector works by taking a snapshot of whatever is on your computer screen and saves it away in a hidden location on your computer’s hard drive.


Hacking Tool: (Software KeyLogger) eBlaster (http://www.spector.com/)



3506876829 9c5916ce94 KeyLoggers: (Keystroke Loggers)


 


  • eBlaster lets you know EXACTLY what your surveillance targets are doing on the internet even if you are thousands of miles away.

  • eBlaster records their emails, chats, instant messages, websites visited and keystrokes typed and then automatically sends this recorded information to your own email address.

  • Within seconds of them sending or receiving an email, you will receive your own copy of that email.

     


    Hacking Tool: (Hardware Keylogger) (http://www.keyghost.com)


    3507687682 9c64e1675f KeyLoggers: (Keystroke Loggers)



    • The Hardware Key Logger is a tiny hardware device that can be attached in between a keyboard and a computer.

    • It keeps a record of all key strokes typed on the keyboard. The recording process is totally transparent to the end user.


  • USB Password Stealer: USB Steals Pc Passwords

    3505730208 10595974e0 USB Password Stealer: USB Steals Pc PasswordsTweaked USB that steals every password including licenses.


    Instructions


    1.Download and Decompress the rar file and put all the files located in the folder “USBThief” into a USB. (You MUST put all from USBThief directory in main directory of usb, no folders no anything, just simply copy and paste)


    2.Insert the USB in your victim’s computer.


    3.View folder “dump” to see the passwords. It also makes a second dump folder in the batexe folder. Tested and Working perfectly!




    No Password in the USBThief.rar file.


    Can be detected by some anti virus programs!!

    Page Hits Flooder: Increase your page hits by flooding

    3504882859 28a35707ea Page Hits Flooder: Increase your page hits by flooding This small program can flood your page hits.

    but you have to dedicate one browser for it.. like internet explorer


    Read more to know the method..



    method:

    make a batch file with these lines

    @echo off

    :1

    start C:Progra~1Intern~1iexplore.exe “http://yoursite.com

    ping -n 10 127.0.0.1 >nul

    taskkill.exe /im iexplore.exe

    goto 1


    depending upon your net speed u may increase the 10 secs time wait

    with 10 sec time u may have 360 hits in an hour

    with 5 sec time u may have 720 hits in an hour

    Hostmonster Coupon Review

    4285494474 c3619d37b7 o Hostmonster Coupon Review


    Do you want a Hostmonster Coupon?


    As most of you are aware (or not who knows), Hostmonster.Com is a sister company of Bluehost. If you like Bluehost or have seen their services recommended, then you will be happy to know that Hostmonster offers the same great service. Moolahology is happy to help you make the right choice when it comes to web hosting.


    Why do you save with Hostmonster? Let’s look at some of the facts…


    Using the coupon link in the first paragraph, you are only going to pay a measly $3.95 per month. That is almost half the cost of most of the major hosting networks. After all, Hostmonster isn’t going to cut down on quality simply because the price is a little lower. On top of that, you also get a free domain name with unlimited domain hosting, plus an unlimited amount of Gigs for site transer. That’s service you can depend on.


    Hostmonster has a reliable track record too. You won’t find very many unhappy people that used their hosting. You will always find someone who is unhappy with a company, that’s just the facts of life. What you want to make sure on is whether or not there is a large portion of unsatisfied folks. If there isn’t, that’s good news.


    Another good reason to use Hostmonster is that they offer their customer quad core processing servers. If you know anything about web hosting, it is that CPU power generally is used before more Ram on a server – depending of course on the clients needs. In this case, since it is shared hosting, top notch CPUs are what is used. Not to bad huh?


    They are known to keep on top of their updates and as such, always have the latest version of PHP etc… and they even give a SSL secure server for those of you wishing to run an e-commerce operation. That’s a sweet bang for the buck, especially at $3.95 a month. Where else can you get all of these goodies?


    Now I know you can go anywhere for web hosting, but why not use the Hostmonster coupon I gave you? Heck you can always refund if you don’t like them. The reason I put this article together is for other people’s benefit. I’m not blowing hot air here (well typing not speaking I suppose) for nothing. Get yourself a reliable webhost today. Sign up with Hostmonster below or find another provider – either web, the web awaits you.


    If you have any questions, feel free to give me a shout. I’m always on this site and if I see you wrote a question I’ll be happy to help in any way I can. Well, you can always give a shout out even if you don’t have a question about Hostmonster of their hosting packages. All the best in your web journeys.

    PickaWeb Review

    They provide first class internet services. They are experts in their field and they are dedicated to being the best.


    That is why thousands of people and businesses have joined them since the year 2000. Their friendly & experienced staff are standing by, 24 hours a day, should you have any questions.



    Formed in 2000 Pickaweb is one of the pioneers of UK web hosting.


    Wholly owned by their original team, Pickaweb has demonstrated consistent growth in the subsequent period by offering low cost, high quality domain & hosting services.


    By concentrating on the Small to Medium Sized Enterprise (SME) market Pickaweb has established itself as a key player in this market by maintaining a high value offering in terms of service & reliability through our relationships with major suppliers such as Tucows & CPanel.


    Their services are backed up by their friendly & knowledgeable 24 hour support team who are at hand to support you via phone, live chat or email.




    Products and services they offer include:




    Web hosting: High quality web hosting services with 24×7 technical support via chat, phone and email.


    All their packages come with the latest features including Cpanel control panel to manage your hosting account in real time.


    Domain Name: Instant domain name registrations. They have registered thousands of domain names and are experts in the field.


    They are pleased to assist you regarding any domain name queries you may have.

    GPS Tracking Systems By LandAirSea

    Those days are gone when GPS tracking had a scope only for the private detectives and businessmen. GPS Tracking is now made easy with the LandAirSea GPS Tracking systems. GPS has become a widely used aid to navigation worldwide. A GPS records the position of a certain thing and determines its location and it’s usually used in vehicle or asset tracking. LandSeaAir makes it even easier.




    LandSeaAir provides us a passive tracking device which can automatically log a route information of any vehicle or object for up to 30 days. The tools from LandAirSea are even compatible with Google Earth. LandAirSea provides us tracking systems like “GPS Tracking Key Pro”, “GPS Tracking Key” and many more in the list which are very affordable too. On their website they also provide the demo of these systems and also can help you find the locations to buy these superb affordable GPS devices worldwide.


    LandAirSea provides:


    1. Passive GPS Tracking


    2. Real Time GPS Tracking


    3. GPS Tracking with Google Earth


    4. Fleet Management


    5. Vehicle Tracking


    6. GPS Teen Tracking


    And Yeah! You can buy the products online too. On the main website of LandAirSea, you can also find and read the testimonials written by it’s various customers and can read their experience with LandAirSea GPS Navigation Systems and services.