This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Common Email Hacking methods


Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.


Hackers can install key logger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details. Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).


Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the webpages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.A detailed Email Hacking tutorial is discussed in the post Hacking an email account.


Before leaving you should definitely consider reading my latest post Hacking Yahoo, Gmail or any other Password which covers the real ways of professional hacking.

How to Download Videos from Youtube


Here is the most easiest way to download videos from Youtube and convert it into other formats.Most of the sites give you some confusing way to download videos from Youtube, but here is an easy way.Here is step-by-step guide to download videos from Youtube.


STEP-1. DOWNLOADING THE VIDEO FROM YOUTUBE


Basically the video that you want to download from Youtube will be in the .flv format.So first, when you download videos from Youtube, it will be saved in .flv format. 


Once you get the video URL,  you can use any one of the following sites/plugins to download Youtube videos .



  • Download Youtube Videos - Download Youtube Videos is one of the most widely site to download videos from Youtube in the .flv format.Here you’ll see a box to enter the download URL.Just enter the URL here and click on download to save the video.

  • KissYouTube - KissYouTube offers an easiest way to download videos from Youtube.Just visit the site and you’ll find a box to enter the video URL.In this box enter the URL of the video you want to download and click on GO.Next you will see a Download Button.Click on the download button and save the Youtube video with the extension as .flv .

  •  Download Helper - Download Helper is an excellent firefox plugin to download videos from Youtube.

  • My Video Downloader - MyVideo Downloader will Download and convert videos from many sites, not just YouTube.


 


STEP-2. CONVERTING THE YOUTUBE VIDEO FROM .FLV TO OTHER FORMATS


Once you download the video ,you can use any of the freely available/commercial video conversion softwares.But here in this tutorial I prefer OJOsoft Total Video Converter to convert the downloaded Youtube video.The speciality of this video converter is that it supports almost all the formats.Once you convert the Youtube downloaded video to MPEG format you’ll be able to play it with Windows Media Player.

Hack/Alter Windows Vista Base Score

If you are a Windows Vista user then you are very likely to be familiar with the Base Score.This score is calculated based on the computer’s hardware and software configuration.This score act’s as a rating to your PC.If you have a too low base score then don’t worry.Hacking Windows Vista’s so called Base Score is very easy.It is possible to hack this score within no time.Here are the snapshots of my own system.Actually my system’s base score is 3.7.But I have brought it up to 9.5 with this small hack.Can you beleive this!!




Here is a step-by-step instruction to hack Vista Base score


1. Navigate to C:\Windows\Performance\WinSAT\DataStore


2. You should see a .xml file with Assessment (Formal).WinSAT as filename


3. Right-click it and select open with ‘Wordpad’ (Not notepad!)


4. On line 12, you should see something like the following:

<SystemScore>9.5</SystemScore>

<MemoryScore>9.5</MemoryScore>

<CpuScore>9.5</CpuScore>

<CPUSubAggScore>9.5</CPUSubAggScore>

<VideoEncodeScore>5.5</VideoEncodeScore>

<GraphicsScore>9.5</GraphicsScore>

<GamingScore>9.5</GamingScore>

<DiskScore>9.5</DiskScore>


5. You can enter any number in the place where I have written 9.5.But the number should be less than 10.


6. Once you have entered the number of your choice save the file and close it.


7. That’s it.You have successfully altered your Windows Vista base score.No restart is required.

Free Tools for Spyware Removal


There are lot of PC users who know only little about “Spyware”, “Malware”, “hijackers”, “Dialers” & many more. This article will help you avoid pop-ups, spammers and all those baddies.


What is spy-ware?

Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent.The term spyware suggests software that secretly monitors the user’s behavior.Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited etc.


How to check if a program has spyware?

It is this little site that keeps a database of programs that are known to install spyware.


Check Out: SpywareGuide



How To Block Pop-Ups?

If you would like to block pop-ups (IE Pop-ups) there are tons of different tools out there, but these are the two best, I think.


Try: Google Toolbar - This tool is a Freeware.

Try: AdMuncher - This tool is a Shareware.


How To Remove Spywares?

If you want to remove spwares then you may try the following tools/programs


Try: Lavasoft Ad-Aware - This tool is a freeware.

Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.


Try: Spybot-S&D - This tool is a freeware.

Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.


Try: Spy Sweeper - This tool is a shareware.

Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.The best scanner out there, and updated all the time.


Try: BPS Spyware and Adware Remover - This tool is a shareware.

Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you’d like to remove.


How To Prevent Spyware?

To prevent spyware attack you can try the following tools.


Try: SpywareBlaster - This tool is a freeware.

Info: SpywareBlaster doesn’t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.


Try: XP-AntiSpy - This tool is a freeware.

Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Hack Protect your Orkut Account


Most of the people ask me “How to hack an Orkut account” which I have already discussed in my previous post Hacking Orkut .But here I am giving you a detailed information about how to protect your Orkut accounts.As we all know most of the Google services are still in BETA.So,websites like Orkut, powered by Google is not totally secure!Several people feel proud in hacking other user’s account. You do a foolish thing, and next day your account is hacked. This is very sad indeed, but hackers are adding names to their victims list till now.


How can a hacker hack my Orkut account?

The answer to this question is already discussed in my previous post Hacking Orkut.



But this post is meant for providing some safety measures to prevent your Orkut account from being hacked.There is not much you have to take care of. Just follow the simple steps and never get your orkut account hacked in your life.


1. Never try to login/access your Orkut account from sites other than Orkut.com.


2. Never click on any links from the sources you don’t trust while accessing your Orkut account.(or while accessing any other Google services like Gmail,Blogger etc.)


3. Delete any links on your scrapbook, no matter if a known or unknown person have sent it.


4. Never disclose your orkut login details with anyone.


5. Never ever use Javascripts on Orkut, no matter whatever it claims to do.Get satisfied with the services provided by default! Avoid using third party Scripts which might be malicious.


6. Never get excited to see a site claiming to have 1000 cool orkut tricks for which you have to just log in to your orkut account. Don’t trust that site. That’s a phishing site.


7. Never tick the box “REMEMBER ME” on the orkut homepage if you are surfing from a cafe or a public area.


8. Always remember to hit Sign out button, when you are done.

How to Protect an Email Account from being hacked ?


Today in this post I’ll teach you how to protect your email account from being hacked.Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”.Now one question which arises in our mind is:”Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”.The single answer to these two questions is “Absolutely NOT!”.It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.


If this is the case, then what is the reason for many people to loose their accounts?

The answer is very simple.They don’t know how to protect themselves from being hacked! In fact most of the people who loose their email accounts are not the victims of hacking but the victims of Trapping.They loose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.


Are you confused? If so continue reading and you’ll come to know…


Now I’ll mention some of the most commonly used online scams which fool people and make them loose their passwords.I’ll also mention how to protect your email account from these scams.


1. WEBSITE SPOOFING


Website spoofing is the act of creating a website, with the intention of misleading the readers.The website will be created by a different person or organisation (Other than the original)especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.


For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website.So most of the people believe that it is the original site and loose their passwords.The main intention of spoofed websites is to fool users and take away their passwords.For this,the spoofed sites offer fake login pages.These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc.Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.


Solution:



  • Never try to login/access your email account from the sites other than the original site.

  • Always type the URL of the site in the address bar to get into the site.Never click on the hyperlink to enter the site.


2. BY USING KEYLOGGERS


The other commonly used method to steal password is by using a Keylogger.Keylogger is nothing but a spyware.The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account.If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program.If you just access your email account from a computer installed with keylogger, you definitely loose your password. This is because the keylogger records each and every keystroke that you type.


Solution:


Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly.This keeps your PC secure from a keylogger.Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers.You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.

3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES


Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes.For the owner of the cyber cafe it’s just a cakewalk to steal your password.For this he just need’s to install a keylogger on his computers.So when you login to your email account from this PC, you give away your password to the cafe owner.Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.


This doesn’t mean that you should never use cyber cafes for browsing the internet.I know,all the cyber cafe owners will not be so wicked but it is recommended not to use cafes for accessing confidential information.If it comes to the matter of security never trust anyone,not even your friend.I always use my own PC to login to my accounts to ensure safety.


So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked.Please pass your comments…

How to Change the ICON of an EXE file ?


Some times it becomes necessary to change the ICON of an executable(.exe) file so that the exe file get’s a new appearence.Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user.But in reality when the file is carried to a different computer, then it shows it’s original ICON itself.This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself.Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.


For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie:The tool changes the exe ICON permanantly.


I’ll give you a step-by-step instruction on how to use this tool to change the icon.


1. Goto www.shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).


2. Right-click on the exe file whose ICON is to be changed.


3. Now you will see the option Change Icon…Click on that option.


4. Now the Icon Changer program will open up.


5. Icon changer will search for all the ICONS on your system so that you can select any one of those.


6. Now select the ICON of your choice and click on SET.


7. Now a popup window will appear and ask you to select from either of these two options.



  • Change embeded icon.

  • Adjust Windows to display custom icon.


Select the first option (Change embeded icon).


8. You are done.The ICON get’s changed.