This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Mobile CricketCast



Mobile CricketCast is Java cellphone application that lets you watch Cricket games anywhere, anytime!

With this application you can catch the latest score! Get live text commentary pushed to your phone with every ball.

You can download the application by visiting http://plusmo.com/c from your mobile browser or download this jar file and transfer to your cellphone.



AddThis Social Bookmark Button


Windows 7


Windows 7 is a future version of Microsoft Windows expected to be released in 2010 or later. Recently LongZ from istartedsomething.com released unofficial windows 7 wallpaper pack on Devianart.

windows7-wall

The wallpaper that contains the unofficial Windows Seven logo centred on a wavy yellow and pink background looks pretty impressive. The wallpaper is available in various resolutions. You can download Windows Se7en Wallpaper pack from here.



AddThis Social Bookmark Button


Torrent Downloads…


#For Torrent Downloads…

Torrent is a nice way to download any sort of stuff - softwares, movies, games, etc (anything you can imagine in digital format) but the only problem comes when the seeders are less in numbers than the leachers, then the speed is really slow!

  1. www.torrentz.com - This is a free site. It does not require any account or anything. Here you can get almost anything you want to search for. After searching the item please make sure that the host you decide to download from has more seeders than leachers. Rest enjoy!
  2. www.desitorrents.com - This is not a free site. You have to have a account with it to download. This site provides you with all the Hindi stuff like movies music videos, mp3’s and also of other Indian language! Here also please make sure you have enough seeders!

#For FREE Software Downloads, Cracks & Keys

Apart from torrent site listed above there are other options too as torrent sometime does not work in LAN environment!

  1. www.ddl2.com - This website provides every software in the world (it has never disappointed me). It gives u rapidshare links or other links from where you can download the software. The softwares are always in their full versions or with cracks, keys!
  2. www.LimeWire.com - You can download the pro-version of LimeWire from the above options(torrents/ddl2) as its not free! Once you are in the programs option search for the required software, games, etc and its done!



AddThis Social Bookmark Button


A noob proof tutorial on remote hacking which is 90% undetectable


A noob proof tutorial on remote hacking which is 90% undetectable

In this tutorial you will learn how to hack a computer any where in the world. Ok well not anywhere obviously things like the military and the goverment will have very high security so you definately wont be able 2 hack them using this method. I hope not aniways =\.

A Major Notice If you are behind a router you will need to port forward your router. To do this you can use a DMS. Its hard to explain as every router has a different interface ( homepage that has a different layout ) so i suggest you go to google and search portforward.com. It will teach you how to port forward your router there.

Ok to begin with you will need these three tools
Daemon Crypt -
Pc Guard -
Yuri Rat -

Ok now that you have these three tools your 1st step will be to open up Yuri Rat and then click on server build

IPB Image

You should now have the following the screen

IPB Image

In this screen I want you to put your IP address into the DNS/IP section.

To get IP Address go to Start > Run > Type CMD and hit enter. When the black box appears type in IPCONFIG. You will then have your IP Address

Port: You Can Leave As Default (-7898-)

Assigned Name: Doesn’t effect how the server will work its just to keep you more organized so if you wanted to hack your friend “JOE” and specifically make this server for him then you may want to type something like “JOES TROJAN”.

Server Install Name: You should leave this as default as I myself don’t know what the difference is as every server you make is named server when it is 1st created anyway. Do not change it as it may make problems but I am not sure.

Ok as you can see there are more settings on the right hand side. I am going to recommend you settings for different purposes

To Hack A Friend For Fun: Uncheck Everything Unless You Want To Do Optional
(OPTIONAL) Melt Server - Your server will disappear into another folder
(OPTIONAL) Custom Icon if you want to make it more believable or something then get an icon of super Mario or something you get my drift

To Find Out Valuable Information: Check Everything

Ok Now You Are Finished Click Build

Your server will then be saved to your C:\ or Hard Drive which ever you know it as. Now we are going to make the server about 90% Undetectable. Only once has one of my servers been detected by an anti virus and I think it was a Norton not sure which version. Ive scanned more then once with Kasper Sky & Symantec Anti Virus and every time they said its clean so lets begin

Open Up Daemon Crypt

Select Your File by clicking browse and going to the folder your server is in. If you have not moved it, it will most likely be in C:\

So Now You Have This

IPB Image

Click On Crypt and then you can close Daemon Tools

Now Install Your Pc Guard for Win32

When you open it you should get this

IPB Image

Ok you have to do basically the same thing as what you did with daemon tools. Click Browse and then find your server so that you have this

IPB Image

You then want to click on the General Settings and put these settings

IPB Image

Ok now you want to go to customization and make sure nothing is ticked

IPB Image

For the last step you want to click the protection methods tab and set it to plain. And then click on protect

IPB Image

Your server is now undetectable =)

Ok so now we have our server and everything is ready to go. Only thing now is to do some social engineering. Basically just lie to your friend/victim and tell them that it is a harmless file. If you do not know anything about your victim talk 2 him for like 3 days find out what he likes. Then lets say he likes football and naked women XD. say to him its a funny game where you play a 5minute 2D football match and if you win a sexc girl comes up on the screen and strips or something along them lines. Im not to good at social engineering. You could even say to your friend/victim that it is a patch for a game that you know that they have and it adds on extra things. The Server is now on there computer and they have double clicked it. If you checked the melt server option then the server will basically evaporate into their computer. They say hey its not working you say hey thats strange it works on my comp. Ahh fuck it i cant b bothered 2 send it again..

Ok so now you have the server running on there comp and it has opened up the default port for you to connect to.

Once again open Yuri Rat and click on listen. Yuri rat will then listen for your online servers that you have gave to people running on the default port 7898. If the person who you sent the rat to is not online you cant connect. When the server you sent out to your friend/victim a balloon notification will pop up. Note that yuri rat should still be listening for the servers. The server will show up in yuri rat. You right click and press connect. And there you go. you are now successfully connected to your victim

IPB Image

Ok now without uploading plug ins from yuri rat to your friends/victims computer you will only be able to do limited things with the program which are Download files from there comp & put files from your comp onto their comp.

When you are connected click on plug ins and them upload all of them.

You will then have access to keyloggers, screen capture and muc more. If you get stuck click on the help button and it wil tel you more aout plug ins



AddThis Social Bookmark Button


Add Yourself, Testimonial Yourself and Be Your Own Fan

Add Yourself ,Testimonial Yourself amp; Be Fan Of Yourself

---------------------------

ADD YOURSELF

Go To
http://www.orkut.com/invite.aspx

Run the following script:

javascript:document.body.innerHTML='
ADD!
';void(0)

replace xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxs with ur id

click ADD

P.S: repeat the procedure twice(once to send and another time to accept)
---------------------------

RITE TESTIMONIAL YOURSELF

to write a testimonial

go to

http://www.orkut.com/TestimonialWrite.aspx?uid= (ur UID)

then come to your home page and accept it

enjoy
---------------------------

BE YOUR OWN FAN

Now click on friends there you can see that your own id is there now be your own fan and don’t forget to give all KARMAs
Note: You have to add yourself first to be your own fan and to write testimonial to yourself

How to change mac ip in windows xp linux

First let me explain a few things about MAC addresses. MAC stands for Media Access Control and in a sense the MAC address is a computer?s true name on a LAN. An Ethernet MAC address is a six byte number, usually expressed as a twelve digit hexadecimal number (Example: 1AB4C234AB1F).



IPs are translated to MAC address by a protocol called ARP (Address Resolution Protocol). Let?s say a computer with and IP of 192.168.1.1 wants to send information to another computer on the LAN that has an IP of 192.168.1.2 . First 192.168.1.1 will send out a broadcast to all stations on the LAN asking who has the IP 192.168.1.2. Then the box that has 192.168.1.2 will respond to 192.168.1.1 with it?s MAC address which is cached in 192.168.1.1?s ARP table for later use. To put this in Socratic Dialog form (with just a touch of Stallone):



Host 1 (199.160.1.1): Yo everyone on the LAN (FF:FF:FF:FF:FF:FF), who has the IP 199.160.1.2? My MAC is DE:AD:BE:EF:CA:FE so you can respond back to me.

Host 2 (199.16o.1.2): Hello DE:AD:BE:EF:CA:FE, I have IP 199.160.1.2 and my MAC address is 12:34:56:78:90:12 so you can send your IP packets to me.



You can see the ARP table of a box by dropping out to a command prompt and typing ?arp ?a? in Windows or just ?arp? in Linux. ARP can also work the other way by a host on the LAN sending its MAC address to another machine on the LAN for preemptive caching unless the host is configured to not accept un-requested ARP replies.



A person might want to change the MAC address of a NIC for many reasons:



1. To get past MAC address filtering on a router. Valid MAC addresses can be found by sniffing them and then the deviant user could assume the MAC of a valid host. Having two hosts on the same network can cause some network stability problems, but much of the time it's workable. This is one of the reasons why MIC Address filtering on a wireless router is pointless. An attacker can just sniff the MAC address out of the air while in monitor mode and set his WiFi NIC to use it. Interestingly, a lot of hotels use MAC filtering in their "pay to surf" schemes, so this method can be an instant in for cheap skate road warriors.
2. Sniffing other connections on the network. By assuming another host's MAC as their own they may receive packets not meant for them. However, ARP poisoning is generally a better method than MAC spoofing to accomplish this task.
3. So as to keep their burned in MAC address out of IDS and security logs, thus keeping deviant behavior from being connected to their hardware. For example, two of the main things a DHCP server logs when it leases an IP to a client is the MAC address and host name. If you have a wireless router look around on it's web interface for where it logs this info. Luckily there are tools to randomize this information (MadMACs).
4. To pull off a denial of service attack, for instance assuming the MAC of the gateway to a sub net might cause traffic problems. Also, a lot of WiFi routers will lock up if a client tries to connect with the same MAC as the router's BSSID.

Linux

To change your MAC address in Linux (and most *nix system) is easy as pie. All it takes is two easy to script commands:



ifconfig eth0 down hw ether 00:00:00:00:00:01

ifconfig eth0 up



These two little commands would set your eth0 interface to use the MAC 00:00:00:00:00:01. Just plug in the NIC you want to set and the MAC address you want to use into the commands above and your done. Changing your MAC address is one of those things that is much easier to do in Linux then under Windows.



Mac OS X



For versions of OS X before Tiger (OS X 10.4) you will need this patch:



http://slagheap.net/etherspoof/



Then you use a command like:



sudo ifconfig en0 lladdr 00:00:00:00:00:01



I'm not much of a Macintosh guy, so I pulled most of this info from:

http://www.macgeekery.com/gspot/2006-04/mac_address_spoofing



My understanding is that there are complications with some AirPort cards so you may also want to read:

http://rgov.org/airport-spoof/



Windows 2000/XP/Vista: The Hard Way









In XP you can use the regedit to edit the registry from a GUI or the reg command to edit it from the console, I?ll be using regedit. Information on all your NICs can be found the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\ . Under this key you will find a bunch of sub keys labeled as 0000, 00001, 0002 and so forth. We can assume any MAC address we want by finding the key that controls the NIC we want to change, putting in a string value called ?NetworkAddress? and setting it to the MAC address we want to use formatted as a twelve digit hex number (example: 000000000001). To find out which key is which we can search through them for the value ?DriverDesc? until we find the one that matches the NIC we wish to alter. After you set ?NetworkAddress? to the address you want just restart the NIC by disabling it then enabling it (or in the case of PCMCIA cards, just eject and reinsert). You can confirm the MAC address change by using the ?getmac? or ?ipconfig /all? commands.



Windows 2000/XP/Vista: The Easy Way



Use Mac Makeup ( http://www.gorlani.com/publicprj/macmakeup/macmakeup.asp ), MadMACs (http://www.irongeek.com/i.php?page=security/madmacs-mac-spoofer), Smac ( http://www.klcconsulting.net/smac/ ) or Etherchange (http://ntsecurity.nu/toolbox/etherchange/ ). Mac Makeup is a cool little GUI and Command line tool that's freeware, the creator also offers a Plugin for Bart's PE builder. MadMACs is a tool to randomize your MAC address and host name on every reboot. Smac has a nice GUI and was free but has since gone commercial, there's no reason to bother with it as there are free tools that are just as good. I use MadMACs since I wrote it and it lets me keep my host information randomized.



Have fun with your MAC addresses switching, but be careful not to cause network problems. My favorite MAC address is DEADBEEFCAFE, for other interesting MACs see:



http://www.binrev.com/forums/index.php?showtopic=15942



Enjoy.





After Notes:

After I posted my article Benjamin E. Pratt emailed me some other notes on changing your MAC address on different platforms and in different ways:
BSD

1) Bring down the interface: "ifconfig xl0 down"

2) Enter new MAC address: "ifconfig xl0 link 00:00:00:AA:AA:AA"

3) Bring up the interface: "ifconfig xl0 up"

Linux

1) Bring down the interface: "ifconfig eth0 down"

2) Enter new MAC address: "ifconfig eth0 hw ether 00:00:00:AA:AA:AA"

3) Bring up the interface: "ifconfig eth0 up"

Windows 2000/XP
Method 1:

This is depending on the type of Network Interface Card (NIC) you have. If you have a card that doesn?t support Clone MAC address, then you have to go to second method.

a) Go to Start->Settings->Control Panel and double click on Network and Dial-up Connections.

b) Right click on the NIC you want to change the MAC address and click on properties.

c) Under "General" tab, click on the "Configure" button

d) Click on "Advanced" tab

e) Under "Property section", you should see an item called "Network Address" or "Locally Administered Address", click on it.

f) On the right side, under "Value", type in the New MAC address you want to assign to your NIC. Usually this value is entered without the "-" between the MAC address numbers.

g) Goto command prompt and type in "ipconfig /all" or "net config rdr" to verify the changes. If the changes are not materialized, then use the second method.

h) If successful, reboot your system.

Method 2:

This should work on all Windows 2000/XP systems

a) Go to Start -> Run, type "regedt32" to start registry editor. Do not use "Regedit".

b) Go to "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}". Double click on it to expand the tree. The subkeys are 4-digit numbers, which represent particular network adapters. You should see it starts with 0000, then 0001, 0002, 0003 and so on.

c) Find the interface you want by searching for the proper "DriverDesc" key.

d) Edit, or add, the string key "NetworkAddress" (has the data type "REG_SZ") to contain the new MAC address.

e) Disable then re-enable the network interface that you changed (or reboot the system).

Method 3:

Use the program Etherchange from http://ntsecurity.nu/toolbox/etherchange/

Windows 9x

Use the same method as Windows 2000/XP except for the registry key location is "HKEY_LOCAL_MACHINE\System\ CurrentControlSet\Services\Class\Net" and you must reboot your system.

Making A file of the size you want


How to make a file of the size you want ?
Let us assume you want to make a file of size 10000kb
Convert it to bytes -> 10000*1024 which comes out to be 10240000 bytes

Open calculator (win key+r -> type in calc )
Choose view mode to be Scientific one
Type in 10240000 and convert it to hex it comes out to be 9C4000
Convert this value to 8 digits by padding zeroes to its left -> so finally it comes out be 009C4000

Open Command Prompt (win key + r -> type in cmd )
Type DEBUG filename.dat
it'll show file not found error ,ignore it
Type RCX -> Enter -> then last four hexadecimal numbers i.e. 4000 ->Enter
Type RBX -> Enter -> then first four hexadecimal numbers i.e. 009C->Enter
Type W ->Enter
Type Q ->Enter

W stands for write and Q for quit

Now check the file you just made by dir command ->dir filename.dat

Using the same technique you can make files as big as you want

Here is an image to show how exactly everything can be done




Another simpler method by Prash2488

try this command on cmd
fsutil file createnew [path]{e.g.:-F:new foldervirus.txt} [SizeInBytes]then press enter:



AddThis Social Bookmark Button