HACER ZONE

ZTE MF631 Unlock USB 3g Modem

ZTE MF631 is a high speed mobile broadband device which provides high speed up-to &.2mbps to the users in Indian market it is available along with TATA DOCOMO barrier so we can use only TATA DOCOMO SIM on it.This Device may cost around 2100Rs-To 2400 RS

TATA Docomo 3G Data Card ZTE MF631 Unlock USB 3g Modem
Before starting unlocking process there few things which you should take into account, first is to make sure that your data card is detected in your desktop/laptop

How to Unlock ZTE MF631 Modem

  1.  First Of All get ZTE MF631 Unlocker From Here
  2. Install DC Unlocker/ZTE MF631 Unlocker As shows Here
  3. Now Open DC unlocker and in Manufacture drop down menu select ZTE DATA CARDS and in Model Number Select AUTO DETECT  and Click On Search refer below screen shotzte dc scrap 3 ZTE MF631 Unlock USB 3g Modem
  4.  Now it will search you modem and after it you can see following window showing ypur modem unlocking statuszte dc scrap 4 ZTE MF631 Unlock USB 3g Modem
  5. Now Check Unlocking  tab on DC unlocker click on it and then Select Unlock and it will unlock your modem and you are Done Enjoy :p
  6. Create new profile for you network provider (Using APN and User name and password), try to connect to the internet now.

Hope you will be able to unlock your Modem            

You can comment below if you are facing any issue, or simply say thanks for the above article

TATA DOCOMO -3G MODEM DC

UNLOCKER

Sponsored links

Dear here is the tata docomo 3g modem , huawei and zte manufacturer and unlocking is available with alot of range of models and versions by 2 easy steps in10 seconds

1. First step to install your modem which will automatically install its modem drivers and then after it will make particular comport, and then open the software and select first the modem manufacturer  (12 companies are there) and then press the button shortcut icon of search,  it will automaticaly detect the model .

2. Second step is when modem is found, just press button of unlocking on right side and then after press the button unlock, your modem gets unlocked successfully……….  100 % tested

How to Unlock Huawei  Modem

For Free-

It’s not difficult to look for unlocking service for Huawei USB 3G modem online. Most of the time however, these unlocking service comes with a small fee. Some forums do offer such service for free—but you would have to wait for the kind soul to respond to your request, and God knows how long they will take.

Huawei E1762
If you rather go for something that can unlock your Huawei modem within seconds for freeinstead, check out the following three unlock code generators.

Online Unlock Key Generator

On this site, getting your modem’s unlock code is as simple as entering your modem’s IMEI, enter the CAPTCHA code and click on the “Calculator” button.

Within seconds, it will return you with your modem’s unlock code and flash code.

Huawei modem unlock service

Supported Huawei modem models:

E1550, E155, E156, E156G, E160, E160G, E161, E166, E169, E169G, E170, E172, E176, E180, E182E, E196, E226, E270, E271, E272, E510, E612, E618, E620, E630, E630+, E660, E660A, E800, E870, E880, EG162, EG162G, EG602, EG602G

Universal MasterCode

As its name suggest, Universal MasterCode is capable of generating unlock codes for a wide range of device, which of course includes most of Huawei’s modem.

E156 E155, E1550 E1552, E156G E160, E160G E161 E166, E169 E169G, E170, E172, E176 E1762 E180 E182E E196 E226 E270, E800,E870 E880 EG162 E880 EG162 EG162G EG602 EG602G, E271, E272, E510 E612 E618 E630 ,E620 E630+ E660 E660a

Universal MasterCode

As you can see, the unlock code generated is the same as the one generated by the online unlock key generator above. There is no limit how many unlock codes you can generate, meaning as long as you have this generator on your computer, you can unlock as many modems as you wish.

No installation is required. Just download and start the application.

Download Universal MasterCode: MediaFire | RapidShare (243 KB)

Huawei Unlocker

Huawei Unlocker is another simple and straight forward free unlock code generator. Enter your modem’s IMEI, hit the “Unlock” button and consider yourself done. Again, no installation required.

Huawei Unlocker

Download Huawei Unlocker: MediaFire | RapidShare (196 KB)

Unlocking The Modem with The Unlock Code

To make use of the unlock code, insert an unauthorized sim card to your Huawei modem. Unauthorized sim card meaning sim card from any operators other than the one the modem is currently locked to.

When you do so, you would be prompt for the modem’s unlock code. Just enter the unlock code you have received earlier and voila, you can now use your Huawei USB modem with sim cards from any other operator.

I have tested it on my E1762 and it worked perfectly.

Huawei Modem Code Writer Tool
If your modem doesn’t prompt for the unlock code even after you have inserted an unauthorized sim, you can use any of these two code writer tools:

Download Huawei Modem Code Writer: MediaFire | RapidShare

OR

Download Huawei Code Tool: MediaFire | RapidShare

P.s: SheepTech shall not be liable for any loss or damage caused by the following the guide above. Unlock at your own risk.

BROADBAND HACK-

Idea 3G

|IDEA BROADBAND PLANS|HACK IT

ALONE

Yeah the ‘what an idea may have worked for call rate’ but will it work idea 3g with a network where call drops congustion lack of bandwidth on normal gprs plans is common issue,can the same hopeless infrastructure support 3g technology without breaking that you have decide i am not going for that nightmare idea anyway. Any way the launch 3g plans. There are as always four type of plans a new time based included see which suits you the most.
The activation first, all normal 2g plans can be used with it except 2g gprs(i had manged to hack hi hi email me to know). You need to send sms the word ‘ACT 3G’ TO 12345 confirmed by sms and all 2g gprs pack deactivated you would get automatic setting if havent any already on your set. There no special setting or apn required for 3g videocalling. A flat 5p/sec or Rs3/min video call rate charged on roaming and home circle.
The plans
sachet packs of Rs8 and 51 for 10 and 50mb for 1 and 3 day respectively,
Usage based packs Rs 103,200,450,650,750,1750 for 100,250,600,1280,2040,5120mb respectively post useage 10p/10kb(some time more)
Time based packs Rs45,80,150 for 30,60,120 unlimited usage minutes, validity 1,3,7 days respectively
data Rate cutter plans gives you low rate of usages Rs 55 1p/10kb (bsnl has same normal rate,airtel gives that after use of Rs675 plan on data limit cross of 1.02gb. Finally the Usb packs normal usb(netsetter) available Rs 750 onward with and without one month free usage. The data card bandwith from 3.2 to 7.6mbps changes with price mostly one year warrenty. Any way plans are Rs 599,750,1750,for 1gb,2gb,5gb respectively post use at 5p/10kb
final words. Just dont blame me if you are not satisfied i have seen the result on my friend laptop and i am not happy with it.

HIstory of TATA DOCOMO GPRS HACK:

It is true that we were able to successfully browse and download free Internet (2G and 3G both) using proxy hacks that are not working now:
The famous one you can found if you google, is 10.124.94.7 proxy, that is useless for now as TATA Docomo back-end team detected this proxy
and restricted it to be used.
Again in february to may 2011, these proxies were leaked 202.87.41.187, 203.101.45.215, 10.124.72.121, 203.122.58.164, 10.124.94.9 etc. They worked for
a specific time, but are not working now.

How you can hack?

If you are researching and decided to ultimately hack TATA DOCOMO 3G GPRS in June 2011, then i want to inform you that
the hack is still available, i can not tell you the full hack here on this website, because if docomo back-end team detects it, they will block it!
So, I am giving you some hints you can consider while searching on Internet.
1. You can browse TATA DOCOMO 3G internet for free only using TATA.DOCOMO.INTERNET that is an APN, it is not possible using TATA.DOCOM.DIVE.IN currently,
according to my exploration.
2. You can browse free Internet in June 2011 only using authentication (username and password) for free DOCOMO GPRS on PC
3. For example, keep your balance Rs. 1/- and then go to Mozilla Firefox > Options > Advanced > Network > Seetings then select Manual Proxy
and enter 203.122.58.164 and port 8080, then open google.com, you will be redirected to Apcache’s page . Here clicking on any other link
will require Username and password to free internet access. That is what you have to put here and you are done..
4. I hope, the password and username should be leaked very soon on internet…, but i am really sorry cant provide you full hack because of my website rules.
5. If you unluckily cant find the hack or dont have time to explore, you can buy 149 rs. GPRS Pack to use 8GB of internet with 30 days validity..

Why and How the hacks are leaked?
TATA DOCOMO itself, publish Free GPRS hacks and publish articles on websites such as gsmhosting.com etc, do you know why they do it? to promote their company. People
will buy more sim cards as they see that their friends are running free internet. However when sufficient people buy the sim, they block the trick.

Another, Some hackers use Brutte method to find out what proxies , username and password exist on tata docomo server, They research more and more and finds
a loop hole that provides free internet access, and they publish it on internet. Then a lot of website copies the same article, that is fucking annoying.

Image

Note-try at low balance only. Hello frendz! Today I tried to subscribe reli@nce 99 rs. Postpaid net pack on my 0 bal prepaid card.
For subscribing try *123*099# To check your Usage – dial #367 and listen. If you are getting Msg as ” Unable to Process request ” then keep on trying. This Msg is due to network problem. The plan offers 2.5 gb for 1 month + additional 99 rs of net usage. You can use both rcommms nd rcomnet.

Note-try at low balance only.
UPDATE

Here is settings for Different APN working with Reliance.
1. rcomnet – Just write APN as rcomnet and leave everything as default. No proxy and port needed.
2. rcommms / rcomwap – APN – rcommms (No disconnection) or rcomwap
(disconnects after every 9 MB)
Proxy no – 10.239.221.22 or 10.239.221.5
Port no- 8080

When your 2.5 GB is over then u can resubscribe the plan -
First u need to unsubscribe by sending sms Unsub 8024 to 155223 or Unsub 8022 to 155223. If u get no Default
configured then call 155223 and then select language by pressing 1 for eng and 2 for hindi.

Then type code as 2084 and press 1 to confirm. After that u will also get msg as you have successfully unsubscribed.
Now subscribe again by dialling *123*099#

Working GPRS Trick For Vodafone

Netbios Hacking

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.

STEP-BY-STEP NETBIOS HACKING PROCEDURE

1.Open command prompt

2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).

Example: C:\>net view \\219.64.55.112

The above is an example for operation using command prompt. “net view” is one of the netbios command to view the shared resources of the remote computer. Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios. You have to substitute a vlaid IP address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If not an error message is displayed. So repeat the procedure 2 with a different IP address.

3. After succeeding, use the “net use” command in the command prompt. The “net use” is another netbios command which makes it possible to hack remote drives or printers.

Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint
NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT

F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer. These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.

4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.

Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name. You can open it and access remote computer’s Hard-Drive. You can copy files, music, folders etc. from victim’s hard-drive. You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system. You can access files/folders quickly through “Command Prompt”.

NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios. That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed). So Repeat The Procedure 2,3 With Different IP Address.

HAPPY NETBOS HACKING!!

Common Email Hacking Methods

Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.

Hackers can install keylogger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details.

A keylogger program is widely available on the internet.some of them are listed below

Win-Spy Monitor

Realtime Spy

SpyAgent Stealth

Spy Anywhere

For more information on keyloggers and it’s usage refer my post Hacking an email account.

Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).

Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the web pages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.A detailed Email Hacking tutorial is discussed in the post Hacking an email account.

Hack Facebook Password – Facebook Hacking

Hack Facebook PasswordWondering to know how to hack Facebook password? Well, before you can do that, it is very much necessary to understand the real ways of hacking that actually work and also those that are simply scam and do not work. So in this post, we’ll look at some of the possible ways to hack Facebook password!

Every day I get a lot of emails from people requesting me to hack Facebook passwords of their spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are even willing to pay for the service. However, I strongly deny any such requests since I do not provide any paid hacking service. But anyhow, I have decided to write down this post so that you can learn the tricks for yourself and implement everything at your own risk.

With my experience of over 7 years in the field of ethical hacking and security, all I can tell you is that there are only two ways to successfully hack Facebook password.

Possible Ways to Hack Facebook Password

1. Keylogging – The Easiest Way!

Keylogging refers to simply recording each and every keystroke that is  typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will automatically load from the start-up, runs in the invisible mode and start capturing each and every keystroke that was typed on the computer.

Some keyloggers with advanced features can also capture screenshots and monitor every activity of the computer. One doesn’t need to have any special knowledge in order to install and use a keylogger. That means, anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack Facebook password. I recommend the following keylogger as the best for gaining access to Facebook account.

Easily Access any Email
SniperSpy (TESTED) is a revolutionary product that will allow you to easily access *ANY* online account or password protected material such as MySpace, Facebook, Yahoo, Gmail or Hotmail. There are absolutely *NO* limitations to what accounts or websites this software can access!

Why SniperSpy is the best?

Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However, there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this, you can install it on a remote computer without the need for having physical access to it. It operates in a complete stealth mode so that it remains undetected.

Here is a summary of benefits that you will receive with Sniperspy software:

1. Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online account.

2. Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.

3. Never Get Caught!
SniperSpy operates in a total stealth mode and thus remains undetectable. Therefore you need not have the fear of being traced or getting caught.

4. Remote Installation Feature
With the Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However, it can also be installed on a local computer.

5. Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.

6. Completely Safe to Use
This software is 100% safe to use since it does not collect any personal information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.

7. Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.

So what are you waiting for? If you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!

2. Phishing – The Difficult Way

The other common way to hack passwords or online accounts is via Phishing. This is the most widely used technique by many hackers to gain access to Facebook and other social networking websites. This method will make use of a fake login page (often called as spoofeed webpage) which will exactly resemble the original one. Say for example, a spoofed webpage of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her password in such a fake login page, the login details are stolen away by the hacker.

Most Internet users would easily fall prey to such online phishing scams. Thus phishing scams trick users in such a way that, they themselves give away their passwords. But phishing requires specialized knowledge and high level skills to implement. Hence it would not be possible for a noob user (perhaps like you) to attempt this trick. It is a punishable offense too. So, I would recommend that you stay away from phishing and make use of the keyloggers to hack Facebook password since it is the easiest and the safest way.

Facebook Hacking Methods that Do Not Work!

Today, there are hundreds of scam websites out there that are waiting to rip off your pockets by making false promises. These websites claim to be the experts in the field of hacking and boast to instantly obtain any password for you. Most people fall victim to these websites and lose their hard earned money. Thus the idea behind this post is to expose the truth behind hacking the Facebook (or any email password) so that you can learn how to do it for yourself and stay away from all those scam websites. The following are some of the hacking methods that actually do not work:

1. Many scam websites claim to exploit a certain vulnerability of Facebook website as a means to crack the password. Unfortunately, there is no such vulnerability in Facebook (or any other online account) that can be exploited to crack the password. I advise you to stay away from such scam websites.

2. There is no ready-made software program that is available to hack Facebook password except the keylogger (spy software). In fact, keyloggers are pretty generic and meant to record the keystrokes of a computer which obviously includes the password also. Keep in mind that apart from the keylogger, there is no such program that is specifically designed to gain access to Facebook accounts. Stay away from any website that claim to sell such program.

3. Beware! On many websites and Internet forums you will often see fake articles about Facebook hacking. Most of them will tell you something like this: “you need to send an email to passwordretrieve@facebook.com along with your username and password” (or something similar). Never give away your password to anyone nor send it to any email address. If you do so, you will lose your password itself in attempt to hack somebody else’s password.

12 Tips to Maintain a Virus Free Computer

Computer VirusIs your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.

1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted sources.

2. USB thumb/pen drives is another common way by which viruses spread rapidly. So it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is a safe way to open a pen drive.

3. Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).

4. As we all know, Internet is the main source of all the malicious programs including viruses, worms, trojans etc. In fact Internet contributes to virus infection by up to 80%. So here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum extent.

  • Don’t click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
  • You can also use a pop-up blocker to automatically block those pop-ups.

5. Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from malicious websites.

6. Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from virues. If PC security is your first option then it is recommended that you go for a shareware antivirus software over the free ones. Most of the antivirus supports the Auto-Protect feature that provides realtime security for your PC. Make sure that this feature is turned on.

7. Install a good Antispyware program, that operates against Internet malware and spyware.

8. Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still do a scan before opening.

9. Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.

10. Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.

11. While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.

12. And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious program

How to Protect an Email Account from being Hacked

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.

If this is the case, then what is the reason for many people to lose their accounts?

The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.

Are you confused? If so continue reading and you’ll come to know…

Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.

1. WEBSITE SPOOFING

Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.

For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.

Solution:

  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.

2. BY USING KEYLOGGERS

The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.

Solution:

Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.

3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES

Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.

This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.

How to use Google for Hacking

Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.

1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter

inurl:”viewerframe?mode=motion”

Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows

As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.

intitle:”Live View / – AXIS”

Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

2. Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.

intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.

filetype:xls inurl:”email.xls”

Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query

intitle:index.of finances.xls

3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.

“?intitle:index.of?mp3 eminem“

Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.

How to Trace Any IP Address

ipmapIn my earlier post I had discussed about how to capture the IP address of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. There exists many websites through which you can trace any IP address back to it’s source. One of my favorite site is ip2location.com.

Just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.

1. Country in which the IP is located

2. Region

3. City

4. Latitude/Longitude

5. Zip Code

6. Time Zone

7. Name of the ISP

8. Internet Speed

9. Weather Station

10. Area Code and

11. Domain name associated with the IP address.

A sample snapshot of the results from ip2location.com is given below

ip2location_results

You can also visually trace route any IP address back to it’s location. For this just visit http://www.yougetsignal.com/tools/visual-tracert/ and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination. Hope this helps.

Hack Software and Run the Trial Program Forever

In this post I’ll show you how to hack a Software and run the trial program forever. Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?

Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.

When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.

So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.

RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003 and Vista.

NOTE: FOLLOW THESE TIPS CAREFULLY

You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.

1. Note down the date and time, when you install the software for the first time.

2. Once the trial period expires, you must always run the software using RunAsDate.

3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.

4. It is better and safe to inject the date of the last day in the trial period.

For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate. I hope this helps! Please express your experience and opinions through comments.

How to Hide Your IP Address

Submitted by on Tuesday, 16 September 200820 Comments

Hide IP AddressEvery time your computer is connected to the Internet, it is assigned a public IP address which is used to uniquely identify your computer. Wherever you visit websites or use Internet services, your public IP is also transmetted and recorded in the logs kept on those servers. Thus, your IP address makes it possible to trace all your web activities back to you.

So, How do I Hide my IP Address?

The best and the easiest way to hide your IP address is by using a proxy server (anonymous proxy server) in one form or the other. A proxy server is a special type of server which acts as an intermediary between your home computer (or network) and rest of the Internet. This proxy server makes requests for Internet services/information on behalf of your computer using it’s own IP address instead of yours. The obtained information is then passed on to your computer. Thus, your computer is indirectly connected to the Internet via a proxy server where the IP address of the proxy server is exposed and your actual IP address remains concealed. Web proxies are identified by a combination of URL and TCP port number which is similar to something as below:

In the above example, http://207.133.133.205 is the URL of the proxy server and 35 is the port number. There are a variety of these proxy servers available:

Transparent Proxy Server
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speed-up the web browsing since thay have a very good ability to cache websites. But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the outside world. This type of proxy server will not hide your IP address.

Anonymous Proxy Server
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. Anonymous proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.

Distorting Proxy Server
A Distorting proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.

High Anonymity Proxy Server (Elite Proxy)
An Elite proxy server does not identify itself as a proxy server and will not make the original IP address available to the outside world. This type of proxy server will hide your IP address.

Which Proxy is the Best?

Clearly High Anonymity Proxy (Elite Proxy) is the best to hide your IP address. Because of it’s nature, the elite proxy neither identifies itself as a proxy server nor will expose your real IP address to the Internet. Hence, it provides maximum privacy for your Internet activities.

You can obtain a long list of proxy server URLs on Google and configure your browser settings so as to make them working for you. However, most of the free proxy servers you get on the Internet will not be effective in concealing your IP address. Even if some of them work they will be too slow and may take several minutes for a single webpage to load.

So, in order to connect to a blazing fast elite proxy server, I recommend you to use the following IP Hiding software:

Hide the IP (Tested)

Hide the IP will put you behind a blazing fast Elite Proxy Server(High Anonymous Proxy) with just a click of a button. With this program, you need not worry about configuring your browser settings.

All you have to do is just install the program and select the proxy server you want to be behind. It offers a list of countries from which you can decide which country to be indicated as your origin.

How to ensure that the IP is hidden?

Before you hide your IP address, you can check your real IP by visiting the following website:

WhatIsMyIPAddress.Com

Once you get your real IP, switch on your IP hiding software. Now once again visit the above site and check your IP address. If you see a new IP then this means that your software is doing the right job.

Also, the above site (Whatismyipaddress.com) is capable of detecting many proxies. If you see the words such as “suspected proxy server or network sharing device” or similar words then, it means that the proxy you are using is not an Elite Proxy.

Download Hide the IP now and see the difference for yourself. For more information on this product, visit Hide the IP homepage from the following link:

Hide the IP (Download Link)

Chat without Yahoo Messenger or Gtalk

Can we chat without Yahoo messenger? Most of us are familiar with the most widely used applications such as Yahoo messenger and Gtalk to carry out chatting with our friends. But here I’ll show how to chat without Yahoo messenger or Gtalk. As we all know the information we exchange with their servers(Yahoo or Gtalk) are recorded and stored along with the corresponding IP addresses. This may hurt our privacy since all the information we exchange while chatting has to pass through a third party server.

Moreover if the matter is highly confidential, then it is necessary to have a totally private chat where the messages are exchanged only between the people involved in the chat and not with any other third party servers. At these situations, it is better to chat without Yahoo messenger.

So, how to carry out a private chat without Yahoo messenger or Gtalk?

For this purpose there exists many softwares that support’s you to host a web-based chat system without any additional software or services. So with these softwares the exchange of messages takes place directly between the two persons engaging in the chat and will not pass through any other third party server. This ensures 100% privacy and eliminates the desperate need to chat with Yahoo messenger.

One of my favorite program for private chat is Easy Chat Server

Easy Chat Server is a Windows program that allows you to host a web-based chat system without any additional software or services. Unlike other chat server, you do not need to install Java. It allows you to build one or more web-based chat rooms on your machine, and provides advanced chat functionalities aiming to offer discussion space for your users, customers and partners.

Here are some of the screenshots of Easy Chat Server.



Key Features of Easy Chat Server:

  • Easy to use, Simple installation that will have you up and running in minutes.
  • 128-Bit Security Socket Layer(SSL) support. Support for server level certificate creation.
  • Instantly runs a complete chat server on your PCs – does not need to install any Web Server.
  • Supports full private messaging and One to One private chat.
  • Support of images, smileys, avatar icons.
  • Full chat and access logs are available within the chat server.
  • Have a built-in IP Filter, supports banning/unbanning IP address, securely.
  • Multiple styles available for the user to customize rooms.
  • Unlimited rooms and users, no any annual, per-user, or maintenance fees.
  • No spyware, adware or other unwanted extra

How to Copy Locked Photos from Orkut

Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album. So this makes it difficult to copy photos from Orkut. It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it. This may be annoying most of you! Then…

How To Copy Locked Photos From Orkut?

Yes it’s still possible to copy the photos from Orkut. Here’s a step-by-step procedure to copy the photo.

1. Login into your Orkut Account.

2. Goto your friend’s album and open the photo that you need to copy.

3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.

4. Press the left click button and drag and drop the photo onto the ADDRESS BAR. I think this trick is no longer working. So I have a new trick….

Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). Alternatively you can also Drag and Drop the photo onto the Desktop. That’s it. This trick is working now!!

4. Now the photo gets displayed seperately on your browser.

5. You can Right-Click and select the Save As option to save the photo onto your PC.

The browser also displays the direct link to the photo. This link can be used to share the Orkut photos with your friends without the need to login to your Orkut account to access photos.

Please express your opinions through comments. Cheer Up..

Happy Orkut Hacking.

How to Become a Hacker

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a samilar situation, then this article will most likely guide you to reach your goal.

On a regular basis, I get a lot of emails where people ask me ”How to Become a Hacker”. In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.

What Skills do I Need to Become a Hacker?

In simple words, there is no magic to become a  Hacker. But like anything else that is worthwhile, it takes dedication and willingness to learn. It is most important to have a basic knowledge of topics such as operating system basics and it’s working, computer networks, computer security and of course programming. However, you need not be the expert in each or any of those topics mentioned. As you gain the basic knowledge of various branches of computer, you can choose any one as your favorite and advance in it.

What is the Best Way to Become a Hacker?

As said earlier, the best way to become a hacker is to start from the basics. You will have to master the basics to build a strong foundation. And once this is done, you’ll be in a position to explore new ideas and start thinking like a Hacker.

There exists tons of books on the market that will teach you hacking, but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in the book. Also, most of them are not suitable for the beginners who doesn’t know anything about hacking.

Anyhow, I have found an excellent Book for the Beginners that will teach you hacking from the basics. This book is the first step to fulfil your dream of becoming a hacker. When I first read this book, I myself was surprised at how simple and easy it was laid out. I decided to introduce this book for all those enthusiasts as it can be the right source for the beginners who are interested to learn hacking from the basics. The good thing about this book is that, any one can understand the concepts presented here, without the need for any prior knowledge. This book is called

Become a Hacker

Learn Hacking

This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything in this book is presented in a simple and effective manner. It is a great source for the beginner who would like to become a hacker. This will install a Hacker’s Mindset on you.

The following skills are uncovered in this book

1. You will learn all the hacker underground tricks and learn to apply them in real world situations.

2. You will be put into a hacker mindset so that you will learn to think like a Hacker.

3. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.

4. You will acquire knowledge nonexistent to 99.9% of the people in the world!

5. This underground handbook may get you interested in pursuing a career as an Ethical Hacker.

This book is of great value for all those who have a dream to become a Hacker.

So what are you waiting for? Go grab your copy now from the following link

How to Block a Website ?

Some times it becomes necessary to block a website on our Computers for one or other reason. You can easily and effectivily block access to a website by adding it to your Windows HOSTS file. Once the website is blocked in the HOSTS file, it will not appear in any of the browsers. That is, the website becomes completely unavailable.

1. Go to your HOSTS file which is located at:

C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP
C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000
C:\WINDOWS for Windows 98 and ME

2. Open HOSTS with Notepad.

The default Windows HOSTS looks like this:
______________________

# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a “#” symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost
_____________________________

3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:

127.0.0.1 name of the URL you want to block

For example to block the website MySpace.com, simply type:

127.0.0.1 myspace.com
127.0.0.1 http://www.myspace.com

Other parts of MySpace could be blocked in a similar way:

127.0.0.1 search.myspace.com
127.0.0.1 profile.myspace.com
etc etc etc…

It is necessary to add a website with and without the “www.”. You can add any number of websites to this list.

4. Close Notepad and answer “Yes” when prompted.

5. After blocking the website, test it in any of the browser. If every thing is done as said above,the website must not appear in any of the web browsers. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”. I have also created a virus to block a website which automatically blocks a list of websites as specified in the source program.

Some people suggest that your add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookies.

5 Ways to Speed Up Your Windows PC

Speed Up your PCIf you have a Windows PC that is not maintained properly on a regular basis, it’s performance will most likely tend to degrade with the passage of time.

To counter this decreased performance, visiting a computer shop isn’t the only solution. Rather, it is possible to improve your computer’s performance yourself. Here is a way to save your money and squeeze more speed out of your Windows PC.

Steps to Speed Up your PC

1. Free Up Disk Space by eliminating junk files and unused programs from your computer

  • Remove temporary Internet files.
  • Empty the Recycle Bin.
  • Remove Windows temporary files.
  • Uninstall Programs that you no longer use.

2. Periodically perform Hard Disk Defragmentation.

  • Goto Start -> All Programs -> Accessories -> System tools
  • Open the Disk Defragmentor program
  • Click on Analyze Disk

3. Clean Up your Registry (Highly Recommended)

Cleaning up your Windows registry plays a major role in increasing the speed of your computer. Unfortunately, Windows doesn’t provide any in built tool for cleaning the registry. So, you have to use a commercial registry Cleaner like PC Health Advisor to do this.

Every time you install/uninstall a program or make changes to your computer, a new entry is added to the registry. So, with the passage of time, a large amount of unwanted or invalid entries will get accumulated which begins to clog your registry. This will result in decreased performance of your PC causing error messages and system crashes.

So, clean up your registry on a regular basis to keep your computer performance at it’s best. You can download PC Health Advisor from the following link:

4. Remove Unwanted Programs from the Start-Up

  • Type msconfig in Run dialog box and hit Enter.
  • Now in the System Configuration window, goto Startup tab
  • Uncheck unwanted programs that you wish to remove from the start-up programs

5. Scan for Malware programs like viruses and spyware

Free Tools for Spyware Removal

There are lot of PC users who know only little about “Spyware”, “Malware”, “hijackers”, “Dialers” & many more. This article will help you avoid pop-ups, spammers and all those baddies.

What is Spyware?

Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent. The term spyware suggests software that secretly monitors the user’s behavior. Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited etc.

How to check if a program has spyware?

It is this little site that keeps a database of programs that are known to install spyware.

Check Out: SpywareGuide

How To Block Pop-Ups?

If you would like to block pop-ups (IE Pop-ups) there are tons of different tools out there, but these are the two best, I think.

Try: Google Toolbar - This tool is a Freeware.

Try: AdMuncher – This tool is a Shareware.

How To Remove Spywares?

If you want to remove spwares then you may try the following tools/programs

Try: Lavasoft Ad-Aware – This tool is a freeware.

Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D – This tool is a freeware.

Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: Spy Sweeper – This tool is a shareware.

Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. The best scanner out there, and updated all the time.

Try: BPS Spyware and Adware Remover – This tool is a shareware.

Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you’d like to remove.

How To Prevent Spyware?

To prevent spyware attack you can try the following tools.

Try: SpywareBlaster – This tool is a freeware.

Info: SpywareBlaster doesn’t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: XP-AntiSpy – This tool is a freeware.

Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Porn Blocker – How to Block Internet Porn

Porn Blocker – Block Porn Completely

Block Internet PornDue to a rapid increase in the number of porn websites across the Internet, finding porn is as simple as Googling the word ‘sex’. Exposure to pornography can have a serious impact on children since it has the ability to easily distort the tender minds. If you are a parent, then you are most likely reading this because you are in search of a Porn Blocker to block Internet Porn. In fact, it is the responsibility of every parent to take every necessary step to prevent your child from being exposed to porn. In this post, I will introduce you to an excellent porn blocker/porn filtering software using which you can block Internet porn and keep your computer Porn-Free. Here is the best Porn Blocker tool that I have ever used

My Porn Blocker – No1. Porn Filtering Software

My Porn Blocker main features

1. Block Porn Before it Appears – My Porn Blocker silently works in the background and stops harmful sites before they appear.

2. Integrates with all Search Engines – My Porn Blocker blocks links to porn sites from even appearing on search engines.

3. Works in Complete Stealth Mode – My Porn Blocker runs silently by hiding itself from the taskbar, process list, start menu and add/remove programs.

4. Blocks all Chat Softwares – Using My Porn Blocker it is possible to restrict your child from getting exposed to porn world via chatting.

5. Block/Limit Access to Social Networking sites - My Porn Blocker offers a feature by which you can block or limit access to inappropriate services like MySpace and Facebook.

6. Automatic Screenshot Capture - My Porn Blocker has the ability to take high quality screenshots which shows what your children do on the PC when you are away.

7. URL Logging- My Porn Blocker keeps neat and simple logs of every URL visited.

This is only a small list of it’s features. Visit My Porn Blocker Official Website for more information on this product.

Why My Porn Blocker is the Best?

The patented design of My Porn Blocker has a prominent advantage over the usual way most similar porn blocker software applications function. Most Porn Blockers fail to provide a complete solution to the problem caused by pornographic content. Hundreds to thousands of new porn websites are added to the Internet every minute and hence most porn blockers fail to filter the porn effectively.  However, after testing a number of porn filter programs, I found out this excellent porn filter software called My Porn Blocker. It proves an easy but still a very effective tool to combat porn and keep your child away from pornographic content on the Web. It also contains many additional handy features which no other program on the Internet will offer. So we recommend this as the best porn filtering software on the Internet.

The Verdict – If you are really serious to keep your PC out of porn and are in search of the best porn filtering software, then My Porn Blocker is the tool you should go for. So go grab My Porn Blocker now…

Download My Porn Blocker Now!

How to Install Windows 7 From a USB Drive

Windows-7-USBInstalling Windows from a USB flash drive has several advantages – First of all, the overall speed of the installation process will increase significantly, carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install the OS even on those systems that do not have a DVD drive, such as a netbook.

In this post, I will show you how to load the Windows installation on to your USB flash drive and make it bootable just like the DVD.

Tools Required:

1. USB flash drive with a minimum capacity of 4 GB.

2. Windows 7 set-up DVD.

Step-1: Plug-in your USB flash drive and backup all the existing data in it.

Step-2: Open the command prompt. If you are using Windows 7/Vista then open it with administrator rights*.

* Goto Start -> All Programs -> Accessories -> Right-click on “Command Prompt” and select “Run as Administrator”.

Step 3: In the command prompt, type in the following command:

DISKPART

This will start the Microsoft DiskPart utility as shown below:
Microsoft DiskPartNow issue the following command:

LIST DISK

This will show you a list of  available disks on your system. Disk 0 is usually the hard disk. In my case, Disk 5 is the USB drive (this can be a different one in your case). Now issue the command as shown below:

SELECT DISK 5

Install Windows 7 from USB

NOTE: In the above command, 5 is the USB drive number on my system. If you have a different number on your system, then you need to replace 5 with that number.

Step-4: Now issue the following list of commands one by one as shown below:

CLEAN

CREATE PARTITION PRIMARY

SELECT PARTITION 1

ACTIVE

FORMAT FS=NTFS QUICK

ASSIGN

EXIT

Install Windows 7 from USBMinimize the command prompt and proceed to the next step.

Step 5: Insert the Windows 7/Vista installation disc and note down the “drive letter” of your DVD drive. In my case, it is “H:”. Now type the following list of commands as shown below:

H: CD BOOT

CD BOOT

BOOTSECT.EXE /NT60 M:(NOTE: M: is your USB drive letter)

EXIT

Win 7 from USB flash drive

Step-6: Copy the contents of your Windows 7/Vista installation disk into the USB flash drive.

That’s it! Your USB stick is now ready to boot and install the OS for you. Don’t forget to enable the “USB Boot” option and change the “boot priority to USB device from hard disk” in your BIOS settings.

Domain Hijacking – How to Hijack a Domain

Domain hijackingIn this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.

Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).

The operation of domain name is as follows

Any website say for example gohacking.com consists of two parts. The domain name (gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.

1. After registering a new domain name, we get a control panel where in we can have a full control of the domain.

2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.

For a clear understanding let me take up a small example.

John registers a new domain “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.

What happens when a domain is hijacked

Now let’s see what happens when a domain name is hijacked. To hijack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.

For example, a hacker gets access to the domain control panel of  “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).

In this case the John’s domain name (abc.com) is said to be hijacked.

How the domain names are hijacked

To hijack a domain name, it’s necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients

1. The domain registrar name for the target domain.

2. The administrative email address associated with the target domain.

These information can be obtained by accessing the WHOIS data of the target domain. To get access the WHOIS data, goto whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this you’ll get the “Administrative contact email address”.

To get the domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.

The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So to take full control of the domain, the hacker will hack the administrative email associated with it. Email hacking has been discussed in my previous post how to hack an email account.

Once the hacker take full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.

How to protect the domain name from being hijacked

The best way to protect the domain name is to protect the administrative email account associated with the domain. If you loose this email account, you loose your domain. So refer my previous post on how to protect your email account from being hacked. Another best way to protect your domain is to go for private domain registration. When you register a domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public. So when a hacker performs a WHOIS lookup for you domain name, he will not be able to find your name, phone and administrative email address. So the private registration provides an extra security and protects your privacy. Private domain registration costs a bit extra amount but is really worth for it’s advantages. Every domain registrar provides an option to go for private registration, so when you purchase a new domain make sure that you select the private registration option

Hacking Yahoo Messenger

This tutorial will tell you how to hack yahoo messenger while you are engaged in chatting with some person. While you are chatting through yahoo messenger, Yahoo will hide the IP addresses of all the computers that are connected through the yahoo messenger application to the chat room. So it is not possible to directly find out the IP of the person you want to hack. Then how to get the IP address? Yes it is still possible to hack the IP address during the Yahoo messenger chat. The procedure to Hack Yahoo messenger is discussed in detail below.

While you are chatting via yahoo messenger the communication between you and the person you want to hack, takes place indirectly via Yahoo server and not directly. It is not possible to hack Yahoo messenger directly to get the IP address. So to hack his IP, you must establish a direct communication with him. So ,how to do this? It’s easy. Just start chatting with some one via Yahoo messenger. During the process of chatting send him a big file. Now the file transfer takes place directly between your computer and the victim’s computer(via yahoo messenger application). So now, you are ready to go. Here’s the step-by-step process to hack Yahoo messenger and get the IP address of the person .

  • Goto the COMMAND PROMPT (START>>>RUN>>>Type CMD).
  • Here Type “netstat -n” (without quotes).
NOTE: If you are new to “netstat” and other IP related commands refer this tutorial: Windows XP IP Utilities
  • The pic given below shows netstat results of my computer. I was not chatting when i took this pic and hence it looks modified.

  • Here local address is your own IP and the foreign address is the IP address of the recipient with whom you are connected via yahoo messenger (There may be multiple recipients and hence multiple foreign addresses).
  • Now send him the file.
  • Check the output by typing the command “netstat -n” (without quotes).
  • Assume the output is something like this.
TCP 127.0.0.10:5101 124.55.23.11:1246 ESTABLISHED

Here 124.55.23.11 is the IP address of the person with whom you are chatting and 1246 is the port number where connection is established. That’s It! You have now hacked Yahoo messenger to get his IP address.

Once you hack Yahoo messenger and get his IP address you can use any of the Remote Administration tools or perform NETBIOS HACKING.

NOTE: Some times there are chances where in the file transfer gets encrypted (takes place via yahoo server itself). So in this case the above hack may fail to work.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

%d bloggers like this: