This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

What to do when your Orkut Account is Hacked ?


It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.


Here are some options suggested by Google Support when your forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:


1. Reset Your Google Account Password:

Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotPasswd - you will receive an email at your secondary email address with a link to reset your Google Account Password. This will not work if the other person has changed your secondary email address or if you no longer have access to that address.


2. For Google Accounts Associated with Gmail:

If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.


3. For Hijacked Google Accounts Not Linked to Gmail:

If your Google Account doesn’t use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original “Google Email Verification” message.It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.

How to Create a CON folder in Windows?

Can you create a folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?


The answer is NO and YES!


NO because create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try any number of times.Where as in Windows Vista when you try to rename the file you get an error message “The specified device name is invalid”.


What is the reason for this? Simple, these names represent the internal devices and hence we cannot create folders with the above names.


YES because it is still possible to create these folders using the command prompt.Heres the instructions to create it.


1. Go to command prompt


2. Type in prompt (FOR EG. TO CREATE CON FOLDER IN E: DRIVE)


C:\>md \\.\e:\con


NOTE:”con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.


3. To delete the folder use the following command


C:\>rd \\.\e:\con


NOTE:The folder can only be deleted from the command prompt.You cannot remove it by right-click delete

Send Fake Email - Fake Email Pranks


THIS TUTORIAL WILL TELL YOU HOW TO SEND FAKE EMAIL TO ANY EMAIL BOX SUCH AS YAHOO, GMAIL, HOTMAIL AND SO ON… THE ART OF SENDING FAKE EMAIL IS CALLED EMAIL FORGING OR EMAIL SPOOFING.FOR EXAMPLE YOU CAN SEND FAKE EMAIL TO YOUR FRIEND AS BILL GATES <billg@microsoft.com>.IT’S 100% WORKING.

 


Most of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain.But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorised access.Also many of the websites offer you to send fake email from their sites where none of them work.So we have to run our own SMTP server on our computer to successfully send a fake email.SMTP server is a simple software program which can be installed on your computer in few seconds.SMTP server allows you to send fake email right from your desktop easily and effectively.Download QK SMTP server HERE.This is the SMTP server i am using in my tutorial.Once you download and install the server on your comp then you are all set to send fake email successfully.This works 100%,so trust me & continue.


PART A: CONFIGURING SMTP SERVER


Once you have installed the QK SMTP server on your comp you must perform the following configuration.


1. Click on “Settings” button on the main screen,the Settings window pops up


2. On Settings window click on “Basic Parameter” tab


3. Set binding IP to “127.0.0.1″


4. Set port to “25″


PART B: SENDING FAKE EMAIL (EMAIL FORGING)


1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running).If it is already running then this step can be ignored


2. Goto command prompt(Start-Accessories-Command prompt)


3. Type exactly as follows


C:\>telnet 127.0.0.1 25


Here 127.0.0.1 is the default IP of every computer.25 is the port number.SO you are connecting to the SMTP server running on your own computer.This step is very importand to send fake email.


NOTE: The IP 127.0.0.1 should not be substituted by any other IP.


Heres the snapshot of what you see after step 3.Click on it to enlarge



 


4. After typing the telnet command in the command prompt you get entry to the server which displays the following message.The response of a OK SMTP server is given below.Message within Green color is only explanation.



220 Welcome to QK SMTP Server 3

helo hacker (Type helo & any name followed by space)

250 Hello hacker (Server Welcomes You)

mail from:billg@microsoft.com (email ID can be anything of your choice.This is the ID from which fake email appears to have come from)

250 billg@microsoft.com Address Okay (Server gives a positive response)

rcpt to:admin@gmail.com (Type any valid recipient email address)

250 admin@gmail.com Address Okay (Server gives a positive response)

data (type this command to start input data)

354 Please start mail input

From:Gates <billg@microsoft.com>

To:admin@gmail.com

Date:Sat Jan 5,2008 9:45 PM

Subject:Test to send fake email

You can create as many headers followed by the “:” symbol.

NOTE:HEADERS SHOULD NOT CONTAIN A LINE GAP.IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header & body data


<HERE IS YOUR DATA>End the body of email by pressing [ENTER] .(dot) [ENTER]


250 Mail queued for delivery (Sever indicates that the email is ready for sending)

quit (Type this command to quit from server)

221 Closing connection. Good bye.

Connection to host lost

(You will get the above 2 lines of message after typing “quit” command)

(Your fake email is sent to the recipient)


*****END OF EMAIL FORGING*****

Here’s the screenshot for your convenience

 


 


NOTE: The fake email that you have sent may also reach the spam/bulk box.So if you are trying a fake email test on your own inbox then please do check the spam/bulk box also.

How to Block a Website ?

Some times it becomes necessary to block a website on our Computers for one or other reason.You can easily and effectivily block access to a website by adding it to your Windows HOSTS file.Once the website is blocked in the HOSTS file,it will not appear in any of the browsers.That is,the website becomes completely unavailable.

 


 


1.Go to your HOSTS file which is located at:


C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP

C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000

C:\WINDOWS for Windows 98 and ME


2. Open HOSTS with Notepad.


The default Windows HOSTS looks like this:

______________________


# Copyright © 1993-1999 Microsoft Corp.

#

# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.

#

# This file contains the mappings of IP addresses to host names. Each

# entry should be kept on an individual line. The IP address should

# be placed in the first column followed by the corresponding host name.

# The IP address and the host name should be separated by at least one

# space.

#

# Additionally, comments (such as these) may be inserted on individual

# lines or following the machine name denoted by a “#” symbol.

#

# For example:

#

# 102.54.94.97 rhino.acme.com # source server

# 38.25.63.10 x.acme.com # x client host

#

127.0.0.1 localhost

_____________________________


3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:


127.0.0.1 name of the URL you want to block


For example to block the website MySpace.com, simply type:


127.0.0.1 myspace.com

127.0.0.1 www.myspace.com


Other parts of MySpace could be blocked in a similar way:


127.0.0.1 search.myspace.com

127.0.0.1 profile.myspace.com

etc etc etc…


It is necessary to add a website with and without the “www.”. You can add any number of websites to this list.


4. Close Notepad and answer “Yes” when prompted.


5. After blocking the website, test it in any of the browser.If every thing is done as said above,the website must not appear in any of the web browsers. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”.I have also created a virus to block a website which automatically blocks a list of websites as specified in the source program.


Some people suggest that your add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookies.

Hack Zune 80GB Media Player- Add a 40/60/80 GB Hard Drive

Add A 40/60/80 GB Hard Drive




Start by removing the bottom dock port spacer with a razer or flathead screwdriver. Insert on one of the long ends and not in the middle of the dock. It should pop off easily. After the dock port spacer is removed you will now have access to both screws. Remove them. You should now be able to open the case.

When you are removing the case slowly work down the “crack” until it pops up. Do not pry the whole thing from one end. You should now be able to remove the battery and hard drive casing.


Remove the 4 screws holding the drive case on the board as well as the clip for the battery. Remove the battery. Now remove both clips for the clickwheel. Simply lift up on the brown parts with a flathead screwdiver or your fingernails if you have them. Now lift up on the hard drive and put the drive and casing above the top part of the Zune (by the headphone jack).


Remove the drive cable clip and remove the sticky tape off the label side of the drive. You should now be able to remove the hard drive to replace it. Now get your new 40/60/80GB drive and remove the metal plate label. You should be able to use your fingernail to pop the label side off of the drive. There are two sticker spots holding this on so it will not come off easily.




 


After the label plate is removed we can connect the new drive to the Zune. You do not need to re-use the hard drive cage when installing a 60/80GB drive because the drive is too large. If you are using a 40GB drive then you can use the exact set up as the 30GB drive.


You should cut the old drive pads to fit two of them on the new drive. Be careful not to use too much or your new drive will not fit. When putting everything back together be sure and use your old battery enclosure so the battery gets seated properly.

Alienware Curved Monitors-The Next Technology?


 


A resolution of 2880×900. Dimensions equivalent to two 24″ widescreen monitors standing end-to-end. DLP rear projection on a curved screen, with OLED illumination. An insignificant .02ms response time.


Alienware’s new curved monitor caused quite a stir when it was revealed here at CES. It seemed like the natural evolution of monitor technology had finally arrived. After all, the human eye is curved, so why shouldn’t our monitors curve too? What a great idea.


So is it that great? Well, it’s as quick as curved. Not that any of that means much right now, because this monitor has major problems.


One of the more intriguing technologies at the Consumer Electronics Show (CES) being held this week is a 42-inch-long, curved monitor. Made by Alienware, the monitor is supposed to simulate peripheral vision. The sci-fi-like screen is aimed at gamers for a more immersive experience, although it might not be as suitable for design or text work.


If 42 inches is still not big enough for you, it’s possible to put two of these monitors side-by-side for a dual monitor configuration.


Another issue is the image quality. While the picture seemed sharp, it lacked color depth, appearing altogether faded. And ultimately, I care far more about image quality than the shape of the box.


CES was dominated by another display technology–3D glasses. Yes, the technology that has moved from gimmick to money-maker in the movie industry is still being pushed on the PC. And though it has progressed since the 90s, 3D gaming monitors and glasses still haven’t gotten to the point of usefulness. Every pair I tried left me disappointed and cross-eyed.


In the same way, I’m not sure this monitor is ready. It will surely be too expensive to even contemplate, requiring an even costlier PC to run a game at such a massive resolution. Beyond the obvious flaws that need to be addressed, it’s just plain bulky–and while I wouldn’t place the curving monitor into the realm of pure gimmick, in person, it only really qualifies as “neat.”


If you want one anyway, I can’t blame you. My shelves are full of neat, expensive, and obsolete technology too. Keep your eyes open late into this year.

Hacking Orkut

How To Hack Orkut ???



Google uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack.

 


First Level- Security-SSL or 128 bit secured connection

Second Level- Google account checks for cookie in the sytem of user

 

Third Level- Google provides a redirection to the entered User information

 

Fourth Level- Google doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut using input validation attack!!!

It is not an easy task to hack Orkut by breaking this security! But still some people manages to get access to other’s Orkut accounts. The question concerned is How they do it? Many of them just use simple tricks that fool users and then they themself leak out their password. Here are some points you need to take care of, to prevent your Orkut account being hacked!


Phishing Attack is the most popular way of hacking/stealing other’s password.By using fake login pages it is possible to hack Orkut. Here the users land on a page where they are asked for their login information and they enter their Orkut username and password thinking it to be a real page but actually it is other way round. It submits all the entered details to the creator of the fake login page.


Orkut New Features: I have come across a page(fake page) that looks like they are giving the user a choice of selecting new features for orkut with your ID and password, of course!! When the user submit’s his/her Orkut login information through this page, there goes his ID and password mailed to the coder.


Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not ORKUT. This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page and there you loose up your password.


Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it.So be careful, javascripts can even be used to hack Orkut!


Primary mail address: If by some means a hacker came to know the password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’.This way Google will send link to the already hacked primary email ID to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your, Orkut account is hacked too.


So a better thing would be to keep a very unknown or useless email id of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker.Hence your Orkut account saved.


So, I hope that this post not only teaches you to hack Orkut but also to hack protect your Orkut account.


If you would like to share something, comment here and I will add up here with a credit to your name.