This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Hide IP Address - Real ways to hide your IP


Here in this post I will try to give you every possible information to hide the IP address.If you seriously want to hide your IP address then this post is for you!


One of the most frequently asked questions by the internet users is How To Hide IP Address ?. Many times it becomes necessary to hide the real IP address for the sake of privacy.For this, I have tried many softwares, proxy servers and many such tools that guaranteed to hide my IP address.But still none of them worked for me. I think most of you have the same experience.Are you fed up with these dummy softwares that fails to hide the real IP address? Then is there any working way to hide the IP address?



YES, you can definitely hide your IP .


Now I’ll come to the heart of the post, which contains the answer to your curious question How to Hide the IP address ? The only solution to hide your IP address is by using a Proxy Server.But Wait! The story doesn’t end here.Even though proxy servers are the only way to hide your IP address, there are several ways of connecting your PC to the proxy server.Before setting up the connection with the proxy servers you must know some information about different types of proxy servers and their uses.


1. Transparent Proxy Server

This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speedup the web browsing since thay have a very good ability to cache websites.But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the web.This type of proxy server does not hide your IP address.


2. Anonymous Proxy Server

This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.


3. Distorting Proxy Server

This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.


4. High Anonymity Proxy Server ( Elite Proxy)

This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.So this is the best way to mask your IP.


Which Proxy Server is the best to Hide My IP ?


I know, you can answer this question better than me.Obviously High Anonymity Proxy or Elite Proxy is the best to hide your IP.But it’s not easy to get a list of working elite proxies.If you search the Google, you will definitely get tons of proxy list.You’ll get a list of proxies in the following format


IP:Port Number

Eg: 221.90.45.67:8080 (221.90.45.67 is the IP of the proxy server and 8080 is the port number)

But most of them don’t work.Here are some of the problems/risks associated with using free proxies that are available on the internet.



  • Most of them do not work since the proxy servers frequently changes it’s IP/Port number.

  • Even if you find a working proxy server it may be too slow.

  • Your privacy is not guaranteed since all your traffic is routed through the proxy server.

  • The administrators of the proxy servers may steal your valuable information such as passwords,SSN (Social security number),Credit Card details etc.


So with all these being the risks then how to find a Working,fast,Highly Anonymous and secured Proxy servers?


Now I will give a list of softwares that will really hide your IP address.I have tried many such softwares and have found only few of them working perfectly.Here is a list of working IP Hiding softwares that you can try.I have listed them in the order of their popularity


1. Hide The IP


Let’s you choose the country,Type and speed of the proxy.Not so popular but personally I recommend this to the users.


2. Hide My IP


3. Hide IP NG


You can get more informations about these products on their respective homepages.


How to ensure that the IP is hidden ?


Before you hide your IP you can check your real IP by visiting the following site.


WhatIsMyIPAddress.Com


Once you get your real IP, switch on your IP hiding software.Now once again visit the above site and check your IP address.If you see a new IP then this means that your software is doing the right job.Also the above site(Whatismyipaddress.com) is capable of detecting many proxies.If you see the words such as “Suspected proxy server or network sharing device” or similar words then it means that the proxy you are using is not an Elite Proxy.


One Final Word before you leave! Even though Elite proxies are almost undetectable this doesn’t mean that you can escape from online crimes by hiding your IP.There are many proxy detecting services available which detect almost any proxy.So if you involve in any cyber crimes then you will definitely be behind the bars.Using proxy will not help you in this case.


One More thing, It is unsafe to use proxy during e-commerce transactions such as Online banking,Online Credit Card payment etc.So please avoid proxies during these circumstances.

How to Hack an Email using Hardware Keylogger ?

Top Reasons why you shouldn’t buy an iphone

Are you planning to buy an iphone ? If so then this post is a must read for you.The much hyped iPhone 3G was launched in India a few weeks back and we have seen many issues and open security flaws in the new iPhone.Here I have some of the top reasons for which you shouldn’t buy an iphone.



 



  • The worst thing is that you cannot forward a SMS message!! Don’t think that I am foolish, but really your iPhone 3G can’t forward a simple SMS. You’ll have to retype the SMS and forward it.

  • There is NO copy / paste functionality. So you need to remember the texts and type again as you go.

  • Bluetooth functionality is only limited to headset use. You can’t do any file transfer over Bluetooth.So if you are planning to share your songs or photos with your friends then forget about it!

  • Absolutely no camera settings - it’s just like some ancient digital camera which does only point and shoot functionality.No Flash,No Zoom functionality.

  • Photos taken in a VGA camera is better than that of iphone!

  • The iPhone 3G is simply overpriced in India (Costs almost twice the price as in US)

  • It’s in built Safari web browser does not support Flash as well as Java.

  • There is No office document editor. Most Nokia’s come with inbuilt editor’s for Word / Excel.

  • The iPhone doesn’t has AD2P on the Bluetooth - which means you can’t get stereo sound via Blue Tooth headphones, that’s a big disappointment for the music fans.

  • The iPhone doesn’t has a Removable battery. Yes - you cannot change the battery yourself. Apple expects you to send the phone to an Apple Outlet to replace the battery. Now if you travel too much - what are you gonna do? Look for an Apple Store to interchange the travel battery?

  • iPhone doesn’t has an option to send MMS. Forget about MMS.

  • Though you can’t sent MMS - You can’t receive MMS messages too!

  • You can’t set your personal songs as ring tones!

  • The iPhone’s screen is not Finger Print Resistant. Since the iPhone is a touch screen phone so it is bound to get your finger print’s each time you touch so it gets dirty very easily.

  • THE BIGGEST ONE - ONCE YOU ARE ON 3G NETWORK(Which I suppose will happen in a year in India), YOU CANNOT MAKE CALLS TO A PHONE ON 2G NETWORK. SO IF YOU WANT TO CALL A PERSON WHO IS NOT HAVING A 3G PHONE. SORRY, YOU’LL HAVE TO FIND A PCO and a 1RUPEE!!!


These are some of the top reasons that shows iphone’s incapability.But there are many more such reasons for you to stop buying an iphone.If you still want to buy the iphone then definitely you must be crazy?!

Is your Nokia Cell Phone Original ?


Nokia is one of the largest selling phones across the globe.Most of us own a Nokia phone but are unaware of it’s originality.Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.


Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).


Then check the 7th and 8th numbers


Phone serial no. x x x x x x ? ? x x x x x x x



IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality


IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality


IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good


IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality


IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

Unlocking the iphone


As we all know, iPhone is Subscriber Identity Module (SIM) locked. This means iphone was designed for and can be used by one carrier—AT&T in the United States—and offers a limited set of iPhone-compatible voice and data plans. Within weeks of its release, a hacker named iZsh created a tool named iASign, which allowed iPhone owners to unlock and use their phones with AT&T/Cingular plans that were not designed for the iPhone, including pay-as-you-go plans.


 



A month or two later, the iPhone Dev Team hackers released the iUnlock and anySIM tools (see Figure above), which allowed the iPhone to be unlocked and used with any Global System for Mobile communications (GSM) SIM from around the world.Within days of its release, the iPhone had been unlocked and used in dozens of countries,from Malaysia to Jamaica and from Norway to Pakistan.


Reacting to the iPhone Unlock tool, Steve Jobs said, “It’s a cat-and-mouse game. We try to stay ahead. People will try to break in, and it’s our job to stop them breaking in.” In late September 2007, Apple issued the following statement in a press release:


Apple has discovered that many of the unauthorized iPhone unlocking programs available on the Internet cause irreparable damage to the iPhone’s software,which will likely result in the modified iPhone becoming permanently inoperable when a future Apple-supplied iPhone software update is installed.Apple plans to release the next iPhone software update,containing many new features including the iTunes Wi-Fi Music Store(http://www.itunes.com/), later this week.Apple strongly discourages users from installing unauthorized unlocking programs on their iPhones.Users whomake unauthorized modifications to the software on their iPhone violate their iPhone software license agreement and void their warranty.The permanent inability to use an iPhone due to installing unlocking software is not covered under the iPhone’s warranty.


After releasing firmware update 1.1.1 for iPhone, Apple refused warranty service to bothunlocked phones and phoneswith third-party applications. Caveat emptorand hacker beware.

10 Tips to Enhance your PC Security


Today almost everyone of us have a PC with an internet connection but how many of us think about it’s security? In fact most of the people are least bothered about their PC’s security.Especially if you have an internet connection safeguarding your PC against network threats is a must.If your PC is not secured then it might be vulnerable to various threats.The threat may be as simple as a virus which corrupts your data or as complex as an identity theft where there are chances of huge loss of money.Did you know that unsecured PCs can be hijacked in minutes ? If you are really concerned about PC security then here are the top 10 security enhancements for your PC.


1. Check Windows Update.Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.


2. Install a good Antivirus software and update it regularly.An Antivirus without updates is of no use.


3. Install a personal firewall. Both SyGate (http://www.sygate.com/) and ZoneAlarm (http://www.zonelabs.com/) offer free versions.


4. Install a good Antispyware.(Antivirus with built-in antispyware is a go0d choice)


5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro#l. This will make it much harder for anyone to gain access to your accounts.


6. If you’re using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.


7. Be skeptical of things on the Internet. Don’t blindly assume that an email “From:” a particular person is actually from that person since it is possible to send a fake email.


8. Check for Versign SSL (Secure Sockets Layer) Certificate (Or logo) before you make any ecommerce transaction (Credit card transaction) with a website.


9. Never disable the Auto-Protect feature of your Antivirus.If your Antivirus doesn’t have Auto-Protect feature then manually scan the files before you execute them.


10. Never give out your passwords to anyone at any time even if the person claims to be from “support.”

Essential Hacking Tools for every Hacker


Here is a list of all the essential hacking tools that every hacker should possess.Here in this post I will give details of different Hacking/Security tools and utilities along with the download links.I have also divided these tools into their respective categories for ease of understanding.


NETWORK SCANNERS AND TCP/IP UTILITIES

 

 

1. IP TOOLS


 

IP-Tools offers many TCP/IP utilities in one program. This award-winning program can work under Windows 98/ME, Windows NT 4.0, Windows 2000/XP/2003, Windows Vista and is indispensable for anyone who uses the Internet or Intranet.

It includes the following utilities



  • Local Info - examines the local host and shows info about processor, memory, Winsock data, etc.

  • Name Scanner - scans all hostnames within a range of IP addresses

  • Port Scanner - scans network(s) for active TCP based services

  • Ping Scanner - pings a remote hosts over the network

  • Telnet - telnet client

  • HTTP - HTTP client

  • IP-Monitor - shows network traffic in real time & many more


IP TOOLS has almost all the utilities built into it.So there is no need to use seperate tools for every indivisual process of hacking such as Port scanning,Whois scanning,IP monitor etc.It’s like a hacking tool kit which has all the necessary tools for hacking.


Download IP Tools Here






2. NMAP


Nmap is a similar hacking/security tool as IP Tools which offer slightly different set of features.Unlike IP Tools Nmap is a freeware.It is designed to rapidly scan large networks, although it works fine against single hosts.Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available


Download Nmap Here


 


 PASSWORD CRACKERS

1. LC4 (For Windows Password Recovery)


LC4 is the award-winning password auditing and recovery application, L0phtCrack. It provides two critical capabilities to Windows network administrators:



  • LC4 helps administrators secure Windows-authenticated networks through comprehensive auditing of Windows NT and Windows 2000 user account passwords.


 



  • LC4 recovers Windows user account passwords to streamline migration of users to another authentication system or to access accounts whose passwords are lost.


Donload LC4 Here





2. SAMINSIDE (For Windows Password Recovery)


SAMInside is designated for the recovery of Windows NT/2000/XP/2003/Vista user passwords.


The following are some of the highlighting features of Saminside.



  • The program doesn’t require installation.It can be directly run from CD,Disk or Pendrive.

  • Includes over 10 types of data import and 6 types of password attack



  1. Brute-force attack

  2. Distributed attack

  3. Mask attack

  4. Dictionary attack

  5. Hybrid attack

  6. Pre-calculated tables attack



  • Run’s very fast since the program is completely written in assembler.


As far as my opinion is concerned both LC4 and SAMINSIDE are powerful password crackers for cracking Windows Passwords.However LC4 has slightly upper hand over Saminside.I recommend LC4 for advanced users but Saminside is more suitable for novice users.


You Can Get Saminside From Here





3. MESSENPASS (For Instant Messenger Password Recovery)


Messenpass is a password recovery tool for instant messengers.It can be used to recover the lost passwords of yahoo messenger or windows messenger.It is too easy to use this tool.Just double-click this tool and it reveals the username and passwords that are stored in the system.


Download MessenPass Here



REMOTE ADMINISTRATION TOOLS (RAT)


RADMIN


Radmin (Remote Administrator) is the world famous, award winning secure remote control software and remote access software which enables you to work on a remote computer in real time as if you were using its own keyboard and mouse.


Radmin has the following features.



  • Access and control your home and office computer remotely from anywhere

  • Perform systems administration remotely

  • Provide Help Desk (remote support) functions for remote users

  • Work from home remotely

  • Manage small, medium, and large networks remotely

  • Organize online presentations and conferences

  • Share your desktop

  • Teach and monitor students’ activities remotely


I have used Radmin personally and recommend this software to everyone.It works great!


Download Radmin Here


 Most of the above tools are shareware which means that you have to pay for them.But they are really worth for their money.Most of the time freewares offer limited functionality/features than the sharewares and hence I recommend them to my visitors.But still you can get 99% of all the softwares for free (cracked versions) on the internet.I will not discuss about how/where to download the cracked versions of the softwares for obvious reasons.It’s all up to you how you get these softwares.