This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Hacking Yahoo Password


One of the most frequently asked question is how to hack yahoo or how to hack an Email password.There are several programs known as keyloggers that can be used to hack yahoo or any other email password.Even though these softwares are not meant to hack yahoo or any other email passwords, they can still be used to hack yahoo passwords or passwords of any other email account.


 


If you are new to this site, then you should definitely consider reading my previous post Hacking an Email Account which exposes all the details of hacking email.


There are number of sites which provide information to hack yahoo, hotmail etc..So what’s special about this site? The only special about this site is that we do not bluff and mislead readers.We actually teach you how to track someone’s email password rather than telling some nosense tricks to crack or hack someone’s yahoo email password for money.


One thing I’ll make clear.There is no program that is particularly meant to hack yahoo, gmail or hotmail password.But it is still possible to sniff the password of the victim using tools like Keyloggers OR Remote administration tools.For more information on Keyloggers refer this post: Hacking An Email Account



I’ll not elaborate this post since I have already discussed about- How to hack an email account.So this post is an addon to my previous post.Here I am giving information on two new programs that can be used to hack yahoo or any other email password or any other information “REMOTELY”.You need not have physical access to the victim’s PC.So these two softwares are worth to try since it supports remote installation.The following are the two new programs…


1.Remote Logger

Remote Logger Features:

Remote Installation - lets you to create a customized Remote Logger engine file. You can send this file to your target for remote monitoring. Once installed successfully it’s possible to hack the password of the victim since whatever he/she types on the keyboard gets recorded.


2.SuperKeylogger

Superkeylogger features :


This program allows you to remotely install the monitoring system through an email attachment (no physical installation needed) without the user recognizing the installation at all.


These two softwares are none other than keyloggers but supports remote installation.Use these tools to hack password of victim without the need to have physical access to his/her computer.


Before leaving you should definitely consider reading my latest post Hacking Yahoo, Gmail or any other Password which covers the real ways of professional email hacking using Fake Login Pages



Also refer my new post on How To Hack An Email Using Hardware Keylogger? which is an addon to the current post that you are reading.

How to Change User Information ?


On a regular basis, people ask me questions about changing user information, the information you provided when you installed Windows. You can change it. Both of the following values are in the key




HKLM\SOFTWARE\Microsoft\Windows NT\ CurrentVersion


>>RegisteredOrganization.

The name of the organization (Change this to your desired organization)


>>RegisteredOwner. The name of the user (Change this to your desired name)


These changes are reflected in the system instantaneously and requies no reboot.You can confirm this by seeing the system properties(Right-Click on “My Computer” icon and select properties).


Both are REG_SZ values. Changing the registered organization and owner names doesn’t affect installed applications. However, applications that you install after changing these values are likely to pick up the new names.

Run Programs at Startup without using Startup folder


 This tweak allows a program to be launched when the user logs onto the computer. It can be set to run minimized and there is no trace of the executable in the Startup folder on the Start Menu nor in the Documents and Settings folder accessible via Windows Explorer.


 


 


Click Start, click Run, and type regedit to run Regedit.Navigate to


HKEY_CURRENT_USER\Software\

Microsoft \Windows\CurrentVersion\Run



Modify/Create the Value Data Type(s) and Value Name(s) as given below:


Data Type: REG_SZ [String Value]

Value Name: [Enter the Name of Program Executable]

Value Data: [Enter the Path to the Program Executable]Exit Registry and Reboot

Inside GoOgLe - A Collection of Strange Links on Google


Although Google is a search engine,it’s also a website.It has millions of it’s own pages indexed in it.When i was digging deep inside Google i found some strange links inside it.So I decided to compile a list of strange Google links. Enjoy!


1.If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out. http://www.google.com/jobs/britney.html


2.These two links are to fun Google games

http://www.google.com/Easter/feature_easter.html

http://www.google.com/heart/heart01.html


3.Quench your thirst for knowledge with Google Gulp

www.google.com/googlegulp/


4.Check out Google’s latest ideas

http://www.google.com/experimental/


5.If you are fond of puzzles

http://www.google.com/puzzles/


6.Tribute to Moms

http://www.google.com/moms01/


7.Google Mobile maps

http://www.google.com/mobile/gmm/index.html


8.http://www.google.com/tofc/


9.Are you scary smart?

http://www.google.com/scarysmart/


10.Google press center

http://www.google.com/press/


11.Google apps

http://www.google.com/a/help/intl/en/var_0.html


12Mind-racing problems.

http://www.google.com/indiacodejam/


13.Doodle 4 Google

http://www.google.com/doodle4google/


14.The virgle

http://www.google.com/virgle/


15.Google Alerts

http://www.google.com/alerts


16.Urchin Software from Google

http://www.google.com/urchin/


17.Google dictionary

http://www.google.com/translate_dict


18.Inside google

http://www.google.com/plex/


19.Movie reviews

http://www.google.com/reviews


20.GOOGLE MARS

http://www.google.com/mars/


21.GOOGLE SKY

http://www.google.com/sky/


22.Google’s next Coding Competition site

http://www.google.com/codejam/


23.http://www.google.com/pda

24.http://www.google.com/m

25.http://www.google.com/imode/

26.http://www.google.com/jsky


27.Blog search

http://www.google.com/blogsearch


28.Microsoft on google

http://www.google.com/microsoft


29.GOOGLE MOON

http://www.google.com/moon/


30.Google Linux

http://www.google.com/linux


30.http://www.google.com/ie


31.Google tour

http://www.google.com/tour/services/


32.Google TOS

http://www.google.com/accounts/TOS


33.Google trends

http://www.google.com/trends/hottrends


34.Google arts

http://www.google.com/Top/Arts/


35.Google 3d warehouse

http://www.google.com/sketchup/3dwh/


36.Google Adult content

http://www.google.com/Top/Adult/


37.Google & Dilbert Doodle

http://www.google.com/dilbert.html


38.Google in Kannada

www.google.com/intl/kn/


29.Google strange logos

http://www.google.com/doodle8.html

http://www.google.com/doodle9.html


30.Win Registry files in google

www.google.com/google_rsearch.reg


31.Google Universities Search

http://www.google.com/options/universities.html


Oops there’s still lot more.But only this much for now….

How to Remove Newfolder.EXE/Sohanad Virus


You can remove this worm by manual method, or using a removal tool.


1.Manual Method

Here are simple steps following which you can get the worm removed from your system:


1.Download this file:Registry_Repair.


2.Double click on that downloaded registry file, you will be asked weather you’re sure to add this to registry, click yes.


3.Restart your system.


4.Search for the file svhost32.exe and delete it if its found.


5.Search for the file svhost.exe and delete it if its found.

Password Hacking FAQ


1. What are some password basics?


Most accounts on a computer system usually have some method of restricting access to that account, usually in the form of a password. When accessing the system, the user has to present a valid ID to use the system, followed by a password to use the account. Most systems either do not echo the password back on the screen as it is typed, or they print an asterisk in place of the real character.

On most systems,the password is typically ran through some type of algorithm to generate a hash. The hash is usually more than just a scrambled version of the original text that made up the password, it is usually a one-way hash. The one-way hash is a string of characters that cannot be reversed into its original text. You see, most systems do not “decrypt” the stored password during authentication, they store the one-way hash. During the login process, you supply an account and password. The password is ran through an algorithm that generates a one-way hash. This hash is compared to the hash stored on the system. If they are the same, it is assumed the proper password was supplied.

Cryptographically speaking, some algorithms are better than others at generating a one-way hash. The main operating systems we are covering here — NT, Netware, and Unix — all use an algorithm that has been made publically available and has been scrutinized to some degree.

To crack a password requires getting a copy of the one-way hash stored on the server, and then using the algorithm generate your own hash until you get a match. When you get a match, whatever word you used to generate your hash will allow you to log into that system. Since this can be rather time-consuming, automation is typically used. There are freeware password crackers available for NT, Netware, and Unix.


2. Why protect the hashes?



If the one-way hashes are not the password itself but a mathematical derivative, why should they be protected? Well, since the algorithm is already known, a password cracker could be used to simply encrypt the possible passwords and compare the one-way hashes until you get a match. There are two types of approaches to this — dictionary and brute force.

Usually the hashes are stored in a part of the system that has extra security to limit access from potential crackers.


3. What is a dictionary password cracker?



A dictionary password cracker simply takes a list of dictionary words, and one at a time encrypts them to see if they encrypt to the one way hash from the system. If the hashes are equal, the password is considered cracked, and the word tried from the dictionary list is the password.

Some of these dictionary crackers can “manipulate” each word in the wordlist by using filters. These rules/filters allow you to change “idiot” to “1d10t” and other advanced variations to get the most from a word list. The best known of these mutation filters are the rules that come with Crack (for Unix). These filtering rules are so popular they have been ported over to cracking software for NT.

If your dictionary cracker does not have manipulation rules, you can “pre-treat” the wordlist. There are plenty of wordlist manipulation tools that allow all kinds of ways to filter, expand, and alter wordlists. With a little careful planning, you can turn a small collection of wordlists into a very large and thorough list for dictionary crackers without those fancy word manipulations built in.


4. What is a brute force password cracker?



A brute force cracker simply tries all possible passwords until it gets the password. From a cracker perspective, this is usually very time consuming. However, given enough time and CPU power, the password eventually gets cracked.

Most modern brute force crackers allow a number of options to be specified, such as maximum password length or characters to brute force with.


5. Which method is best for cracking?



It really depends on your goal, the cracking software you have, and the operating system you are trying to crack. Let’s go through several scenarios.

If you remotely retrieved the password file through some system bug, your goal may be to simply get logged into that system. With the password file, you now have the user accounts and the hashes. A dictionary attack seems like the quickest method, as you may simply want access to the box. This is typical if you have a method of leveraging basic access to gain god status.

If you already have basic access and used this access to get the password file, maybe you have a particular account you wish to crack. While a couple of swipes with a dictionary cracker might help, brute force may be the way to go.

If your cracking software does both dictionary and brute force, and both are quite slow, you may just wish to kick off a brute force attack and then go about your day. By all means, we recommend a dictionary attack with a pre-treated wordlist first, followed up by brute force only on the accounts you really want the password to.

You should pre-treat your wordlists if the machine you are going to be cracking from bottlenecks more at the CPU than at the disk controller. For example, some slower computers with extremely fast drives make good candidates for large pre-treated wordlists, but if you have the CPU cycles to spare you might want to let the cracking program’s manipulation filters do their thing.

A lot of serious hackers have a large wordlist in both regular and pre-treated form to accommodate either need.


6. What is a salt?



To increase the overhead in cracking passwords, some algorithms employ salts to add further complexity and difficulty to the cracking of passwords. These salts are typically 2 to 8 bytes in length, and algorithmically introduced to further obfuscate the one-way hash. Of the major operating systems covered here, only NT does not use a salt. The specifics for salts for both Unix and Netware systems are covered in their individual password sections.

Historically, the way cracking has been done is to take a potential password, encrypt it and produce the hash, and then compare the result to each account in the password file. By adding a salt, you force the cracker to have to read the salt in and encrypt the potential password with each salt present in the password file. This increases the amount of time to break all of the passwords, although it is certainly no guarantee that the passwords can’t be cracked. Because of this most modern password crackers when dealing with salts do give the option of checking a specific account.


7. What are the dangers of cracking passwords?



The dangers are quite simple, and quite real. If you are caught with a password file you do not have legitimate access to, you are technically in possession of stolen property in the eyes of the law. For this reason, some hackers like to run the cracking on someone else’s systems, thereby limiting their liability. I would only recommend doing this on a system you have a legitimate or well-established account on if you wish to keep a good eye on things, but perhaps have a way of running the cracking software under a different account than your own. This way, if the cracking is discovered (as it often is — cracking is fairly CPU-intensive), it looks to belong to someone else. Obviously, you would want to run this under system adminstrator priviledges as you may have a bit more control, such as assigning lower priority to the cracking software, and hiding the results (making it less obvious to the real administrator).

Being on a system you have legit access to also allows you better access to check on the progress. Of course, if it is known you are a hacker, you’ll still be the first to be blamed whether the cracking software is yours or not!

Running the cracking software in the privacy of your own home has the advantage of allowing you to throw any and all computing power you have at your disposal at a password, but if caught (say you get raided) then there is little doubt whose cracking job is running. However, there are a couple of things you can do to protect yourself: encrypt your files. Only decrypt them when you are viewing them, and wipe and/or encrypt them back after you are done viewing them.


8. Is there any way I can open a password-protected Microsoft Office document?



Certainly! There are plenty of commercial programs that will do this, but we give props to Elcomsoft for fighting the DMCA. 30-day trial versions are available here

A Self Destructing Program in C

This program will destroy itself upon execution.The program will cause the .exe file to be deleted upon execution.That is this program is capable of destroying itself upon execution.Heres the code


#include
#include
#include
void main()
{
printf(”This program will destroy itself if u press any key!!!\n”);
getch();
remove(_argv[0]);/*array of pointers to command line arguments*/
}

HOW TO COMPILE ?
Load the source code to the compiler and compile(press Alt-F9) and then press F9.This will generate the .exe file in the current directory(Bin directory).Execute this .exe file it will destroy itself upon execution.