HACKING
RSS

Develop your own application without installing any softwares





CodeRun Cloud Add-in information page.


This help you to develop the applications without installing the softwares on your computer and you can easily deploy it in the cloud...


1. click the following link and navigate to the


START THE IDE BUTTON which is present inside the web page.


Click here

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Hacking Myspace Email Account Passwords by win-spy Keylogger

Download Winspy Keylogger

2. After downloading, run the application. On running, a dialog box will be prompted. Now,creat an user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.

3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.

Winspy keylogger

4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.

How to use Winspy keylogger

5. Now, Winspy’s main screen will be displayed as shown in image below:

Hack Myspace password Winspy keylogger

6. Select Remote at top, then Remote install.

7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.

Winspy keylogger

.user - type in the victim’s name
.file name - Name the file to be sent. Use the name such that victim will love to accept it.
.file icon - keep it the same
.Picture - select the picture you want to apply to the keylogger.

In the textfield of “Email keylog to”, enter your email address. Hotmail accounts do not accept keylog files, so use another email account id.

Thats it. This much is enough. If you want, can change other settings also.

8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Myspace account password.

So guys, i hope you have got the trick on how to hack Myspace and other email account passwords from this Myspace hacking article. If you have any comment or views about article, feel free to mention it in comments section.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to get your own Rapidshare Premium Account







Hello Friends,
Everybody wants a personal Rapidshare Premium account but not all can afford it. If you are one of those people who can’t afford it or don’t want to ask your parent to buy you one then there are only 2 ways of getting a Rapidshare premium account. First one is to hack a Rapidshare premium account of some other user. Hacking a Rapidshare premium account isn’t that difficult. But Rapidshare guys are very smart. They provide users with a feature of security lock due to which you will need access to the unlock code for that account to change the password of that Rapidshare account. Thus you can only use that hacked account till the owner of that account changes the password. This one seems to be a temporary solution. Second way is to earn some easy bucks online and buy your own Rapidshare account. The second way may seem difficult at first but to tell you the truth its very easy.

Today I will show how you can earn money online and that too without much difficulty. Just follow the steps given below:
1. Create a Paypal Premium Account( Don’t Worry its free) . When asked for credit card details simply say cancel. You do not need to fill it.
2. Then Go to the following link:
http://www.AWSurveys.com
3. On joining this website, you will get 27 USD just for writing 7 simple surveys which will take not more than 30 minutes.
4. Now the only problem is that the minimum payout limit for this website is 75 USD. But you can earn 1.25 USD on referring this website to your friend.
5. So you just take the referral link from this website and paste it on your facebook status. Don’t forget to mention about it benefits so that your friends register through that link.
6. Suppose you have 500 friends on facebook and out of them only 10% register through your link then also you earn 62.5 USD which gets added to 27 USD that you had earned from surveys. Thus the total 89.5 USD crosses the Payout limit.
7. Now you can get that money into your Paypal Account use it not only to buy your own Rapidshare premium account but also for buying other stuff online.
8. That’s it. So Simple and I swear it works.
Update: Some people have a compliant that Awsurveys doesn’t pay them what they have earned and that it is a SPAM. I would like to tell you that I have already used this website earlier and I had received the payment every time. I am not saying that these guys are lying about their experience with Awsurveys but there are few reasons why they may not have received the payment. The only problem with this website is that it doesn’t communicate with the user if he is violating any terms and conditions instead of that it just cancels their payments. When you request some payout from this website, they have a policy to verify if the accounts that were referred by the user are not fraudulent and they remove the amount gained from these fraudulent accounts from the total amount in your account. Sometimes the reduced amount is less than the amount redeemed by the user and their harsh policy is to cancel the whole payment without even reimbursing the remaining amount. Now you might be thinking how to avoid this? One advice i would give you is to keep atleast 20-25 USD in excess when you are redeeming the amount. In this way you are making sure that even if there were 15 accounts which the website found to be fraudulent still the total wont get below the amount requested by you. Another condition is of the maximum amount that one can redeem in a year. A user can redeem at max 550 USD in one year if you request for payout more than that then hey will just cancel that payment without reimbursing the money in your account. I already faced the latter one which indicates that I have atleast earned upto 550 USD.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Password Hacking Tools

AAh!!

The following tools m gonna list now are some of the dangerous tools available on www, which may be used on u by an unethical hacker. I want you to be well aware of all the possibilities.

They are Free to download and it takes seconds to crush up personal computer if wired online, m not disclosing the links to these tools .

Lord PS
Lord PS is an editor that will create a password stealer/virus that emails you the passwords with tons of options, options may include taking over ur entire pc and disallowing u to access any of the files

Hosein PS v1.6
Does the same job with above with less options/features, another yahoo pass stealer

Fucker PS
This is a strong multi-password stealer that will grab passwords from all the most commonly used programs/services, msn, yahoo etc

JPS v1.8
Another password grabber/stealer - e mailer that is more focuced on Yahoo messenger

Demon PS v2.3
Yahoo messenger password stealer/mailer with anti virus kill options
and other system features

Tro messenger

The big Boss , used with Yahoo messenger lets u take over victims Pc


Many more exists,will be disclosing all of them
Even u can contribute

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Cracking Unix passwords

Contrary to popular belief, UNIX passwords cannot be decrypted. UNIX
passwords are encrypted with a one way function. The login program encrypts
the text you enter at the "Password:" prompt and compares that encrypted
string against the encrypted form of your password.
Password cracking software uses wordlists. Each word in the wordlist is
encrypted and the results are compared to the encrypted form of the target
password.
The best cracking program for UNIX passwords is currently Crack by Alec
Muffett. For PC-DOS, the best package to use is currently CrackerJack.
Password Shadowing:
Password shadowing is a security system where the encrypted password field
of /etc/passwd is replaced with a special token and the encrypted password
is stored in a separate file which is not readable by normal system users.
To defeat password shadowing on many (but not all) systems, write a program
that uses successive calls to getpwent() to obtain the password file.
Finding the shadowed password:
UNIX Path Token
-----------------------------------------------------------------
AIX 3 /etc/security/passwd !
/tcb/auth/files/[first letter #
of username]/[username]
A/UX 3.0s /tcb/files/auth/?/*
BSD4.3-Reno /etc/master.passwd *
ConvexOS 10 /etc/shadpw *
ConvexOS 11 /etc/shadow *
DG/UX /etc/tcb/aa/user/ *
EP/IX /etc/shadow x
HP-UX /.secure/etc/passwd *
IRIX 5 /etc/shadow x
Linux 1.1 /etc/shadow *
OSF/1 /etc/passwd[.dir|.pag] *
SCO UNIX #.2.x /tcb/auth/files/[first letter *
of username]/[username]
SunOS4.1+c2 /etc/security/passwd.adjunct ##username
SunOS 5.0 /etc/shadow
[optional NIS+ private secure maps/tables/whatever]
System V Release 4.0 /etc/shadow x
System V Release 4.2 /etc/security/* database
Ultrix 4 /etc/auth[.dir|.pag] *
UNICOS /etc/udb *

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Password cracking techniques

&
We get daily tons of requests regarding password cracking,
hereby we present a well researched comprehensive article adressing the same
It may bounce many of ur heads but we are sure a must mug up for Geeks nour regular visitors!!
so Gear Up! Dont give up before having a look on the entire article!




Many hacking attempts start with attempting to crack passwords. Passwords are the key piece
of information needed to access a system. Users, when creating passwords, often select passwords
that are prone to being cracked. Many reuse passwords or choose one that’s simple—such
as a pet’s name—to help them remember it. Because of this human factor, most password cracking
is successful; it can be the launching point for escalating privileges, executing applications,
hiding files, and covering tracks. Passwords may be cracked manually or with automated tools
such as a dictionary or brute-force method, each of which are covered later in this chapter.
Manual password cracking involves attempting to log on with different passwords. The
hacker follows these steps:
1.
Find a valid user account (such as Administrator or Guest).
2.
Create a list of possible passwords.
3.
Rank the passwords from high to low probability.
4.
Key in each password.
5.
Try again until a successful password is found.
A hacker can also create a script file that tries each password in a list. This is still considered
manual cracking, but it’s time consuming and not usually effective.

Boring!! isnt it!! A more efficient way of cracking a password is to gain access to the password file on a system.
Most systems



hash
(one-way encrypt) a password for storage on a system. During the
logon process, the password entered by the user is hashed using the same algorithm and then
compared to the hashed passwords stored in the file. A hacker can attempt to gain access to
the hashing algorithm stored on the server instead of trying to guess or otherwise identify the
password. If the hacker is successful, they can decrypt the passwords stored on the server.
Passwords are stored in the Security Accounts Manager (SAM) file on a
Windows system and in a password shadow file on a Linux system.



Understanding the LanManager Hash
Windows 2000 uses NT Lan Manager (NTLM) hashing to secure passwords in transit on the
network. Depending on the password, NTLM hashing can be weak and easy to break. For
example, let’s say that the password is
123456abcdef
. When this password is encrypted with
the NTLM algorithm, it’s first converted to all uppercase:
123456ABCDEF
. The password is
padded with null (blank) characters to make it 14 characters long:
123456ABCDEF__
. Before
the password is encrypted, the 14-character string is split in half:
123456A and BCDEF__.
Each string is individually encrypted, and the results are concatenated:
123456A = 6BF11E04AFAB197F
BCDEF__ = F1E9FFDCC75575B15
The hash is
6BF11E04AFAB197FF1E9FFDCC75575B15


Hacking Tools
Legion automates the password guessing in NetBIOS sessions. Legion scans multiple
IP address ranges for Windows shares and also offers a manual dictionary attack tool.
NTInfoScan is a security scanner for NT 4.0. This vulnerability scanner produces an HTMLbased
report of security issues found on the target system and other information.
L0phtCrack is a password auditing and recovery package distributed by @stake software,
which is now owned by Symantec. It performs Server Message Block (SMB) packet captures
on the local network segment and captures individual login sessions. L0phtCrack contains
dictionary, brute-force, and hybrid attack capabilities.
John the Ripper is a command-line tool designed to crack both Unix and NT passwords. The
cracked passwords are case insensitive and may not represent the real mixed-case password.
KerbCrack consists of two programs: kerbsniff and kerbcrack. The sniffer listens on the network
and captures Windows 2000/XP Kerberos logins. The cracker can be used to find the
passwords from the capture file using a brute force attack or a dictionary attack.

Cracking Windows 2000 Passwords
The SAM file in Windows contains the usernames and hashed passwords. It’s located in the
Windows\system32\config
directory. The file is locked when the operating system is running
so a hacker can’t attempt to copy the file while the machine is booted to Windows.
One option for copying the SAM file is to boot to an alternate operating system such as
DOS or Linux with a boot CD. Alternately, the file can be copied from the
repair
directory.
If a systems administrator uses the RDISK feature of Windows to back up the system, then a
compressed copy of the SAM file called
SAM._
is created in
C:\windows\repair
. To expand
this file, use the following command at the command prompt:
C:\>expand sam._ sam
After the file is uncompressed, a dictionary, hybrid, or brute-force attack can be run against
the SAM file using a tool like L0phtCrack.


Redirecting the SMB Logon to the Attacker
Another way to discover passwords on a network is to redirect the Server Message Block
(SMB) logon to an attacker’s computer so that the passwords are sent to the hacker. In order
to do this, the hacker must sniff the NTLM responses from the authentication server and trick
the victim into attempting Windows authentication with the attacker’s computer. A common
technique is to send the victim an e-mail message with an embedded hyperlink to a fraudulent
Hacking Tools
Win32CreateLocalAdminUser is a program that creates a new user with the username and
password
X
and adds the user to the local administrator’s group. This action is part of the
Metasploit Project and can be launched with the Metasploit framework on Windows.
Offline NT Password Resetter is a method of resetting the password to the administrator’s
account when the system isn’t booted to Windows. The most common method is to boot to
a Linux boot CD and then access the NTFS partition, which is no longer protected, and change
the password.
SMB server. When the hyperlink is clicked, the user unwittingly sends their credentials over
the network.


SMB Redirection
Several automated hacking tools can implement SMB redirection:


SMB Relay MITM Attacks and Countermeasures
An SMB relay MITM attack is when the attacker sets up a fraudulent server with a relay
address. When a victim client connects to the fraudulent server, the MITM server intercepts
the call, hashes the password, and passes the connection to the victim server.
Figure 4.1 illustrates an example of such an attack.


Hacking Tools
SMBRelay is an SMB server that captures usernames and password hashes from incoming
SMB traffic. SMBRelay can also perform man-in-the-middle attacks.
SMBRelay2 is similar to SMBRelay but uses NetBIOS names instead of IP addresses to
capture usernames and passwords.
pwdump2 is a program that extracts the password hashes from a SAM file on a Windows system.
The extracted password hashes can then be run through L0phtCrack to break the passwords.
Samdump is another program to extract NTLM hashed passwords from a SAM file.
C2MYAZZ is a spyware program that makes Windows clients send their passwords as clear
text. It displays usernames and their passwords as users attach to server resources.

SMB relay countermeasures include configuring Windows 2000 to use SMB signing, which
causes it to cryptographically sign each block of SMB communications. These settings are
found under Security Policies/Security Options.


NetBIOS DoS Attacks
A NetBIOS Denial of Service (DoS) attack sends a NetBIOS Name Release message to the NetBIOS
Name Service on a target Windows systems and forces the system to place its name in conflict
so that the name can no longer be used. This essentially blocks the client from participating in the
NetBIOS network and creates a network DoS for that system.


Password-Cracking Countermeasures
The strongest passwords possible should be implemented to protect against password cracking.
Systems should enforce 8–12 character alphanumeric passwords. The length of time the same
password should be used is discussed in the next section.
To protect against cracking of the hashing algorithm for passwords stored on the server,
you must take care to physically isolate and protect the server. The systems administrator can
use the SYSKEY utility in Windows to further protect hashes stored on the server hard disk.
The server logs should also be monitored for brute-force attacks on user accounts.
A systems administrator can implement the following security precautions to decrease the
effectiveness of a brute-force password-cracking attempt:
1.
Never leave a default password.
2.
Never use a password that can be found in a dictionary.


Hacking Tools
SMBGrind increases the speed of L0phtCrack sessions on sniffer dumps by removing duplication
and providing a way to target specific users without having to edit the dump files manually.
The SMBDie tool crashes computers running Windows 2000/XP/NT by sending specially
crafted SMB requests.
NBTdeputy can register a NetBIOS computer name on a network and respond to NetBIOS
over TCP/IP (NetBT) name-query requests. It simplifies the use of SMBRelay. The relay can be
referred to by computer name instead of IP address.


Hacking Tools

NBName can disable entire LANs and prevent machines from rejoining them. Nodes on a Net-
BIOS network infected by the tool think that their names are already in use by other machines.
3.
Never use a password related to the host name, domain name, or anything else that can
be found with whois.
4.
Never use a password related to your hobbies, pets, relatives, or date of birth.
5.
Use a word that has more than 21 characters from a dictionary as a password.
This subject is discussed further in the section "Monitoring Event Viewer Logs."
In the following sections, we’ll look at two measures you can take to strengthen passwords
and prevent password-cracking.



Password Change Interval
Passwords should expire after a certain amount of time so that users are forced to change
their passwords. If the password interval is set too low, then users will forget their current
passwords; as a result, a systems administrator will have to reset users’ passwords frequently.
On the other hand, if passwords are allowed to be used for too long, then security
may be compromised. The recommended password-change interval is every 30 days. In
addition, it’s recommended that users not be allowed to reuse the last three passwords.
You cannot completely block brute-force password attacks if the hacker
switches the proxy server where the source packet is generated. A systems
administrator can only add security features to decrease the likelihood that
brute-force password attacks will be useful.


Monitoring Event Viewer Logs
Administrators should monitor Event Viewer logs to recognize any intrusion attempts either
before they take place or while they’re occurring. Generally, several failed attempts are logged
in the system logs before a successful intrusion or password attack. The security logs are only
as good as the systems administrators who monitor them.
Tools such as VisualLast aid a network administrator in deciphering and analyzing the
security log files. VisualLast provides greater insight into the NT event logs so the administrator
can assess the activity of the network more accurately and efficiently. The program is
designed to allow network administrators to view and report individual users’ logon and
logoff times; these events may be searched according to time frame, which is invaluable to
security analysts who are looking for intrusion details.
The event log located at
c:\\windows\system32\config\Sec.Event.Evt
contains the
trace of an attacker's brute-force attempts.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Credit Card Fraud





For most of you out there, money is hard to come by. Until now:



With the recent advent of plastic money (credit cards), it is easy to use someone else's credit card to order the items you have always desired in life.The stakes are high, but the payoff is worth it.






Step One: Getting the credit card information


First off, you must obtain the crucial item: someone's credit
card number. The best way to get credit card numbers is to take
the blue carbons used in a credit card transaction at your local
department store. These can usually be found in the garbage can
next to the register, or for the more daring, in the garbage
dumpster behind the store. But, due to the large amount of credit
card fraud, many stores have opted to use a carbonless transaction
sheet, making things much more difficult. This is where your
phone comes in handy.


First, look up someone in the phone book, and obtain as much
information as possible about them. Then, during business hours,
call in a very convincing voice - "Hello, this is John Doe from
the Visa Credit Card Fraud Investigations Department. We have
been informed that your credit card may have been used for
fraudulent purposes, so will you please read off the numbers
appearing on your Visa card for verification." Of course, use
your imagination! Believe it or not, many people will fall for
this ploy and give out their credit information.


Now, assuming that you have your victim's credit card number, you
should be able to decipher the information given.


Step Two: Recognizing information from carbon copies


Card examples:


[American Express]
XXXX XXXXXX XXXXX
MM/Y1 THRU MM/Y2
JOE SHMOE


[American Express]
XXXX XXXXXX XXXXX
MM/Y1 THRU MM/Y2
JOE SHMOE


Explanation:
MM/Y1 is the date the card was issued, and MM/Y2 is the
expiration date. The American Express Gold Card has numbers
XXXXXX XXXXXXXX XXXXXXXX, and is covered for up to $5000.00,
even if the card holder is broke.

[Mastercard]
5XXX XXXX XXXX XXXX
XXXX AAA DD-MM-YY MM/YY
JOE SHMOE


Explanation:
XXXX in the second row may be asked for during the ordering
process. The first date is when the card was new, and the
second is when the card expires. The most frequent number
combination used is 5424 1800 XXXX XXXX. There are many of
these cards in circulation, but many of these are on wanted
lists, so check these first.


[Visa]
4XXX XXX(X) XXX(X) XXX(X)
MM/YY MM/YY*VISA
JOE SHMOE


Explanation:
Visa is the most abundant card, and is accepted almost
everywhere. The "*VISA" is sometimes replaced with "BWG", or
followed with a special code. These codes are as follows:


[1] MM/YY*VISA V - Preferred Card
[2] MM/YY*VISA CV - Classic Card
[3] MM/YY*VISA PV - Premier Card

Preferred Cards are backed with money, and are much safer to
use. Classic Cards are newer, harder to reproduce cards with
decent backing. Premier Cards are Classic Cards with Preferred
coverage. Common numbers are 4448 020 XXX XXX, 4254 5123 6000
XXXX, and 4254 5123 8500 XXXX. Any 4712 1250 XXXX XXXX cards
are IBM Credit Union cards, and are risky to use, although
they are usually covered for large purchases.


Step Three: Testing credit


You should now have a Visa, Mastercard, or American Express
credit card number, with the victim's address, zip code, and phone
number. By the way, if you have problems getting the address,
most phone companies offer the Address Tracking Service, which is
a special number you call that will give you an address from a
phone number, at a nominal charge. Now you need to check the
balance of credit on the credit card (to make sure you don't run
out of money), and you must also make sure that the card isn't
stolen. To do this you must obtain a phone number that
businesses use to check out credit cards during purchases. If you
go to a department store, watch the cashier when someone makes a
credit card purchase. He/she will usually call a phone number,
give the credit information, and then give what is called a
"Merchant Number". These numbers are usually written down on or
around the register. It is easy to either find these numbers and
copy them, or to wait until they call one in. Watch what they
dial and wait for the 8 digit (usually) merchant number. Once you
call the number, in a calm voice, read off the account number,
merchant number, amount, and expiration date. The credit bureau
will tell you if it is ok, and will give you an authorization
number. Pretend you are writing this number down, and repeat it
back to them to check it. Ignore this number completely, for it
serves no real purpose. However, once you do this, the bank
removes dollars equal to what you told them, because the card was
supposedly used to make a purchase. Sometimes you can trick the
operator by telling her the customer changed his mind and decided
not to charge it. Of course, some will not allow this. Remember
at all times that you are supposed to be a store clerk calling to
check out the card for a purchase. Act like you are talking with
a customer when he/she "cancels".


Step Four: The drop


Once the cards are cleared, you must find a place to have the
package sent. NEVER use a drop more than once. The following are
typical drop sites:


[1] An empty house

An empty house makes an excellent place to send things. Send the
package UPS, and leave a note on the door saying, "UPS. I work
days, 8 to 6. Could you please leave the package on the back door
step?" You can find dozens of houses from a real estate agent by
telling them you want to look around for a house. Ask for a list
of twenty houses for sale, and tell them you will check out the
area. Do so, until you find one that suits your needs.


[2] Rent A Spot


U-Haul sometimes rents spaces where you can have packages sent and
signed for. End your space when the package arrives.


[3] People's houses


Find someone you do not know, and have the package sent there.
Call ahead saying that "I called the store and they sent the
package to the wrong address. It was already sent, but can you
keep it there for me?" This is a very reliable way if you keep
calm when talking to the people.


Do NOT try post office boxes. Most of the time, UPS will not
deliver to a post office box, and many people have been caught in
the past attempting to use a post office box. Also, when you have
determined a drop site, keep an eye on it for suspicious
characters and cars that have not been there before.


Step Five: Making the transaction


You should now have a reliable credit card number with all the
necessary billing information, and a good drop site.


The best place to order from is catalogues, and mail order houses.
It is in your best interest to place the phone call from a pay
phone, especially if it is a 1-800 number. Now, when you call,
don't try to disguise your voice, thinking you will trick the
salesperson into believing you are an adult. These folks are
trained to detect this, so your best bet is to order in your own
voice. They will ask for the following: name, name as it appears
on card, phone number, billing address, expiration date, method of
shipping, and product. Ask if they offer UPS Red shipping (next
day arrival), because it gives them less time to research an
order. If you are using American Express, you might have a bit of
a problem shipping to an address other than the billing address.
Also, if the salesperson starts to ask questions, do NOT hang up.
Simply talk your way out of the situation, so you won't encourage
investigation on the order.


If everything goes right, you should have the product, free of
charge. Insurance picks up the tab, and no one is any wiser. Be
careful, and try not to order anything over $500. In some states,
UPS requires a signature for anything over $200, not to mention
that anything over $200 is defined as grand theft, as well as
credit fraud. Get caught doing this, and you will bite it for a
couple of years. Good luck!

Info for knowledge purpose only, don't ever try this or you will find yourself in jail.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to download as a premium user on file sharing sites


I am not quite sure if this is considered a hacking tut, but none the less it is a great tool for people. Basically all you do is take a download link that you have received, go to this website CLICK HERE
and you will be able to download as a premium user (no wait times fastest download speed)

Hope this helps everyone out

The filesharing sites that this works for are
* Rapidshare
* Megaupload
* Megavideo
* Hotfile
* Filefactory
* Depositfiles
* Uploading

* Easyshare
* Fileserve
* Filesonic
* Megashares
* Netload
* Duckload
* Oron

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Download hacker proof valuable guide

                                             Click here to download

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Free cracks n tutorials

This summary is not available. Please click here to view the post.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Tutorial Get the serial number you need

* Go to Google.

* In the search field type: "Product name" 94FBR

* Where, "Product Name" is the name of the item you want to find the serial number for.

* And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Get free serials,keygen,cracks to any software










TO FIND THE REQUIRED SERIALS PRESS CTRL + F AND TYPE YOUR REQD SOFTWARE NAME

Please suscribe to support this free site

LIST OF SERIAL KEYS

Microsoft windows 7 keys

J7PYM-6X6FJ-QRKYT-TW4KF-BY7H9


D67PP-QBKVV-6FWDJ-4K2XB-D4684

HQDKC-F3P6D-C9YYM-HRB89-QDBB7

76DX2-7YMCQ-K2WCP-672K2-BK44W

2RG93-6XVFJ-RKHQ7-D2RTT-3FMQT

TT63R-8JGWP-WWT97-R6WQC-4CVWY

YQJX6-D6TRM-VWBM7-PHDJK-YPXJH

Q7J7F-GQHBT-Q42RQ-2F8XV-2WKKM

KH4X7-JY8G7-RCD7G-BYDJW-YTPXH

WYBJ8-8QVP3-24R82-VV2VP-72Q9W

9DP2R-W78GJ-GJBKW-CKR46-H3WYT

CXB7F-WWCM4-BP9V3-2YH43-RK8Y6

W9BYV-K2TB8-4YDJT-QBQWP-KFDHB

WGDJW-B8DYC-WVKX4-6MKF4-B8PK8

2PHXF-9PBDW-D3WWY-CPDKD-XG87V


Microsoft Windows XP Pro Sp2


G8TVB-PD7YR-GTXX8-X6QWJ-T66R8

VTTW8-M24JG-XTCV2-86CKX-H4H28


FYD38-7G2MV-PH8HT-DJ76R-62Q7B

DBW2Y-Q3TCX-V9K4V-H4Q7P-HVV2M

JYXFX-J72W6-WD46Q-KMJX4-TXBVQ

HY3GY-MBTRD-4FQD8-H46R2-8V836

M7KMT-4C48B-VF8FJ-2H7WJ-P2MRJ

CJ9DD-HDFY8-29J6X-9YKK9-FX3FD

RXVVR-X76JB-K29PK-GW2YC-V3K3M

RHF6D-3H64G-4BFVM-DQRCY-RBJDY

HRT73-TJ8K6-P6PYT-4YJ9T-6XT4Q

PWMP8-6R8CP-DRFH4-42QM8-BWFXB

V9BDD-6TC2K-JTMBC-7XGMQ-B6KPG

GD2QT-VGT98-QF4CD-PW7HB-9YJDJ

GWRR2-XDH2X-D7THG-279P4-MRKBD

W9JX2-G8TFB-RBCGG-2K9HQ-BXBW3

HWGW2-6FQ7Y-T93HT-3K2TR-B3FW6

KG79T-9Q2JV-33YG7-PTWX7-YYTDQ

VRTWG-G4D4J-4X6Y9-GBQRD-4P99D

J4VQG-W727H-29CFX-G3C2X-MJG2D

DXMBX-XGQV8-JC2K6-BWGYH-R23RG

V473B-KJWJW-R27HW-DBQ68-W8XGJ

GXYMW-K6J7X-DFVBP-JDVK3-RBYHW

GKJFB-DT3KF-F9PX3-TMMDH-T7Y33

RQ4GC-YG4H3-BDX4H-M7GKG-R4DRG

QRX7R-RK8H6-HP2RY-H8M7M-66XTT

RM6FT-V69M3-3TDDH-YDMY4-KBBT3

H684R-GRB3R-GJ96D-DPC46-CVV8J

TVRRY-F367Q-9X47C-QM7WY-92VFW

by http://sneaktech.com


Microsoft Windows XP Professional

CHYVW-V63RT-67XVC-XJ4VC-M3YWD

XMDCV-2TJMR-7JD66-YTVMK-V7PBD

RQHFJ-X47QJ-G2XKK-WYQ8P-7W6RG

X6MYY-6BH3T-YRBT8-H8YPH-RG68T

YWVHF-GT3M6-3QYB2-FCYCH-X47PQ

QJ68H-G7T8R-WFR77-D8X8Y-VJ398

6KYDY-JT4MB-6V3JQ-4KKFG-P6C63

6JQPJ-84CFG-JCBQP-PVRJP-9G24Q

MQ8JV-XXKVG-DB8V3-67WJB-RCB6W

J3T66-JTP72-TGT7H-PMMWH-XM4K3

DB4H8-DQJJB-KXMWP-GPJVY-H7P6W

38BXC-F2C4R-PXMXV-DBQXM-3C7V6

H2RP3-8KK4G-RJY27-RRMH7-6J4B6

V3VQV-J76TM-JBQJQ-PPCP2-8RWPM

QDGR2-BM67K-G4F2K-PC3CM-7FY6Q

GYTKC-RVYVK-4BRDW-PY7XF-PXJBG

MTBKG-PMMBH-TFWCR-GDBV9-7MRHJ

by http://sneaktech.com


Microsoft Windows XP


8RCKG - 36TH8 - VWBGK - T3CB6 - RHG48

7G4H4 - T4XXW - BVXTH - 4QP4V - 9CV28

PG274 - 383QX - 6C32H - P8RWC - 48M4Q

CWY3F - JGYHJ - W6KBG - 3VYK7 - DGG7M

X6YWJ - M4TG2 - DPGWJ - QCFR8 - 927M6

QCP6D - 7VGVJ - JBKB4 - DQMB2 - 9GTJ3

F7GV4 - B7JGY - Q2KQW - 6R8BM - FR8D6

HFVK4 - TFWFG - 4JKDH - H3FTT - 8B23W

HRPR7 - WGJFC - VPHRB - XVFRW - 2KPWY

V3V63 - 3QW2G - JMFBY - 8F4CM - PDMQW

WX736 - 8YJCM - 2JW33 - 4KJGY - XCDJ6

CQKYH - GKDJC - MJTWP - FPTJX - PKK23

CHYVW - V63RT - 67XVC - XJ4VC - M3YWD

XMDCV - 2TJMR - 7JD66 - YTVMK - V7PBD

RQHFJ - X47QJ - G2XKK - WYQ8P - 7W6RG

by http://sneaktech.com


Microsoft Windows XP sp1


7HCHR-2Y7MW-7RCRH-WMYDY-Y22CT

if u want more plz let me know in comments

by http://sneaktech.com


Microsoft Windows Server 2003

HWVF7-7CH9K-6MPYY-9BGGW-FT9VM

GKTBM-VM9JJ-C2HTV-PWRHB-D9CMB

JWR69-KGWXF-M4JDW-3GKDY-PQGBB

HCPHG-H6XM8-PVKB2-J3BGV-C4CMB

KJYJ8-3TB32-9JD6V-Q424Y-G9CMB

KXV22-MYBJ8-49DGB-9CBQW-QWKVM

KGRDG-D24M4-3RC2P-VHKRF-73GBB

G9YXJ-C9CH6-8QTBF-986FP-KKG7M

F8BYH-GYMG8-HJGGR-WYDQG-RK4DY

H3VVQ-JMHFX-T8YHT-93XGG-69CMB

FFV2G-B6YD9-WPYDY-YVHHP-KM6BB

J6W9D-687QK-QPR72-94B8V-2BDHM

DTB9H-JB697-PJHHX-4R9JQ-JVQHM

by http://sneaktech.com



Microsoft office 2007 Enterprise

RD4KH-TT6DK-FYQHM-CH8P8-JVFMJ

FVT4G-T7GDW-GHDP8-RWMMK-4MJBJ

GM9G8-9GB8M-M4H27-M3CPP-WM6HW

WDVRC-93DP2-D27PK-BXDVV-VHQQ8

TPGWM-BWF6T-W42BH-23DTR-472VW

VK6C7-273J4-GDDXM-942RB-JCWBJ

JTWJ6-YVJWR-TBGKF-8T6BH-BHWBJ

by http://sneaktech.com


Microsoft office 2007

serials:

HWGJF-GV42Q-HM3HT-H9QGM-683Q8

TTC8Q-XH24K-J2BM4-2KG7K-6R4MJ

FD6JX-JCGVX-4TX63-D3YDQ-HJBYJ

KH4FJ-42QBK-3QQT6-9YM8V-6HFMJ

FBT8B-K6JM6-F6TJF-P2WMJ-6D3Q8

TV4QQ-P8H98-XX72G-PVPCB-944MJ

TK88M-8PKR4-6GPXD-K8FQQ-644MJ

MFXF8-7HF3M-CDFKX-B2B4X-X9THW

DM72R-CVP3X-RC6Y9-28T43-BVQQ8

BGQKV-9BF66-HWBMW-2GCYM-MRCVW

by http://sneaktech.com/


Microsoft Office Home and Student 2007

B4MKP-KP9YP-7TBQ4-7T4XF-MTGWY

TXF6Y-H24H8-H8YHX-46DY2-HCPCD

RBRT6-KV6YX-687MH-34HKG-97HR3

P7FXC-C4XJJ-6224W-6WMX3-J8VVB

by http://sneaktech.com/


Microsoft Office Standard 2007

CTKXX-M97FT-89PW2-DHKD3-74MYJ

KD3RD-TKY7Y-6QDP8-WXKX6-24BF3

B7MTR-PBJVD-47GWX-RJXTG-268PJ

JY46M-9BV6V-JJ2YH-JM6T8-2TR2D

QX8VX-QVF3W-MJ49F-6436K-PJ6WQ

by http://sneaktech.com/


Microsoft Office Small Business 2007

CKMPB-6B4QT-MG4C6-2VH4C-RDD43

HTPWX-FR6J8-2WBCQ-T63JR-3M8PD

by http://sneaktech.com/


Microsoft Office Professional 2007

RQ7XB-WB9TB-DYHMY-XGK9Y-4KWPD

WRWWX-G9MMD-X4B8X-7JQP3-CMD93

M2QKF-KDQ4R-YHQKD-M4YYK-GPWVD

KGFVY-7733B-8WCK9-KTG64-BC7D8

HGJH4-9W9FY-8C7B6-P2H6X-9DQ9T

R8JH9-Q3JDV-H7CFG-FVY8Y-P6R2D

TT3M8-H3469-V89G6-8FWK7-D3Q9Q

by http://sneaktech.com/


Microsoft Office Professional Plus 2007

V9MTG-3GX8P-D3Y4R-68BQ8-4Q8VD

DBXYD-TF477-46YM6-W74MH-6YDO8

CTKXX-M97FT-89PW2-DHKD3-74MYJ

RYC22-PRMXB-8HP8W-384PD-GXHX3

WHV8B-6FB6R-MY36T-2F8P7-VQQ9T

WFDWY-XQXJF-RHRYG-BG7RQ-BBDHM

TT3M8-H3469-V89G6-8FWK7-D3Q9Q

KT7WY-RHPHH-WWPT6-CX2H3-7HJ7W

XBGKY-8VY28-4C4J9-Y4MKC-RK87W

QBX6B-8MDWH-GYYFP-Y8KJQ-CFTHW

MTP6Q-D868F-448FG-B6MG7-3DBKT

KGFVY-7733B-8WCK9-KTG64-BC7D8

WRWWX-G9MMD-X4B8X-7JQP3-CMD93


by http://sneaktech.com/

Microsoft Office Enterprise 2007

KGFVY-7733B-8WCK9-KTG64-BC7D8

DBXYD-TF477-46YM4-W74MH-6YDQ8

by http://sneaktech.com/


Microsoft Office Ultimate 2007

J67F8-BB7GM-8VPH2-8YMXP-K49QQ

WRWWX-G9MMD-X4B8X-7JQP3-CMD93

RYC22-PRMXB-8HP8W-384PD-GXHX3

VM98J-C9X4C-MM7YX-93G64-BJMK3

VK626-MQWCC-FXXWY-W2H6F-KVKQQ

PGHBF-6K7PC-J9989-BGGJD-TKT3Q

by http://sneaktech.com/


REQUEST 2:

Norton 360

serials:

TDC97-R4MHQ-TY83R-6HQ4J-TGRKG

by http://sneaktech.com/


REQUEST 3:

Nero

serials:

Nero 8 Ultra edition

4K22-2636-1191-1KX9-5041-CE53-60E6

1K22-3141-1100-3243-5780-9909-X158

1K22-4461-110E-8XE7-5373-K68C-ACMM

1K22-1003-1197-7343-5718-X469-9152

1K22-2017-118M-5861-5080-13E3-0749

by http://sneaktech.com/


Nero 8 Ultra edition site license

7K21-6060-1196-K978-5789-KC90-09A6

7K21-3272-110E-5903-5925-MC9C-1449

7K22-2633-1107-CX43-5455-0EKE-63EM

7K21-0547-1182-1X8M-5474-175K-AA5E

7K21-5161-118C-4C00-5497-8MEK-7129

by http://sneaktech.com/


Nero 8 Ultra edition demo license

3K22-135K-110E-55EX-5966-869E-CC98

5K22-135K-1104-63A1-5122-6611-313X

6K22-035K-110C-XE0K-5274-5XA6-E855

by http://sneaktech.com/


REQUEST 4:

all EA gmaes here

serials:


Need For Speed Carbon

0MZ9-9Z0F-FIGH-TING-4FUN

9DN6-HFLE-9T7F-M3HN-C88X

5GYQ-E2ZB-KTXB-NC6L-8XMN

MVBB-3F3E-AHTA-75G9-UV32

W5M5-R4FQ-XKQN-879Q-UAYH

G244-FMC4-W8R9-KZHA-PNLN

by http://sneaktech.com/


Need For Speed Hot Pursuit 2

CCN5-Y8N8-LTMA-K3XM

HR7P-BLZG-FYGZ-V9X7

8H65-2H2Y-3HKU-YBZ4

82G4-6J34-NKLR-Y5PW

ESB6-Y5ER-K8DW-ZSP9

by http://sneaktech.com/


Need For Speed Most wanted

LE5D-SKRY-V2JN-5VZW-SZ7Q

ERDV-5UXU-4RT9-VGHW-QMFX

95FF-US9Y-ZX5Y-2UH5-XWBM

K35M-UGJP-UR3M-TYE3-NJJB

3GD5-K3ZG-6826-5JHU-MAUZ

JUJA-FWGX-J86T-PYNJ-NGZ3

by http://sneaktech.com/


Need For Speed Prostreet

JGPF-VCGL-J86T-VYNJ-NGZ3

BWZZ-9CP4-M72G-WPX4-98M5

VR4U-5TCM-F22B-N573-QGLG

GBZH-7J34-ZM5X-AX8U-ZZ7L

X5KB-FNTZ-29KA-ALPN-LQ2H

by http://sneaktech.com/


Need For Speed underground

XNDV-FTM9-9PQ3-69JS-C87Y

HRMM-PLSU-MGAB-U9QZ-R9TH

6ZZ9-ZKJX-88DX-DNX8-F4SA

RED5-N5WW-6MXA-V267-DBD6

SEVD-5YRR-LB3Q-CDY3-HMGS

HHSJ-24QA-TW68-QZA7-RNNW

by http://sneaktech.com/


Need For Speed underground 2

6WPF-M7QA-J3XJ-3KG8-5FWU

PHS2-6M2S-A8QW-MZ6U-SELF

GDZ9-JTQC-53EF-GJ3P-QCQ9

B4A2-QPQ8-78CS-AF3V-V2RK

MGUU-3ZKR-U62F-JMDQ-H9AV

HM22-HGSV-ZKVH-QFPB-SQ8D

by http://sneaktech.com/


Crysis

AFC4-94KS-8BH2-PMWC-KLZS

GPZ9-R9Z7-C6UY-LFUQ-HEEQ

YJHZ-NQEU-FY27-486P-KZ38

BD9Z-26XN-N8YY-SPWF-TE7N

8BNW-KZ2U-M62L-YVRC-CG6J

by http://sneaktech.com/


Fifa 2008

Z7ZH-T6FD-Z7LV-V29Z-ST5L

L5ZZ-3CTJ-5SHP-TK5B-PCJW

LA2S-KCJA-8XX2-F4G6-6KHK

BB5V-REXP-RMME-S63H-7HWB

PB5D-Y25K-N2KH-3GRX-U7FE

by http://sneaktech.com/


Fifa manager 2008

R8DM-W4H9-HBU3-MFPB-PCKQ

C9GY-8DRZ-ZEF5-769R-EKBR

TMLL-HZ44-DLD8-TKAJ-33SU

GNEW-FYPP-9JBH-CX6E-FJ7S

XPH9-HU7T-PQLN-9YYR-E2S5

by http://sneaktech.com/


Madden NFL 2008

R4BT-Q3GU-4GZU-EL6K-GWS3

WPBT-5TP5-UGSS-SE97-BKGF

XWJJ-RFW4-CKSY-RB4W-G7GW

T6Y8-AA8P-WQCQ-Y7KN-BYN9

by http://sneaktech.com/


NBA live 2008

6KAJ-J856-LGEJ-PV4B-M6LT

3PPF-P3ZZ-TVJQ-VBHF-KSXL

UXXP-HUV2-SL2Q-V6RT-LQGE

JFGG-H2VA-3GYW-F8C9-2Q8H

by http://sneaktech.com/


Quake 4

JMDH-HHCP-KKHJ-FPWX-CXMD

77KC-NKPJ-TRTW-TKW7-XKG9

DWNG-WJP7-KD7P-NGWD-FFT7

MMRG-GMTJ-PPFG-HJ7F-9CXN

by http://sneaktech.com/


Sothink SWF quicker 4.0

031HE5-73WZMZ-M7ACTN-0BRXF7-90HHXP-3YHKER-67KPEX-FCJPE7-59D4H9-9DZY23-YP3J1A-C2BB3F

031HE5-73WZMZ-M7ACTN-0BRXF7-90HM85-HR4DZ0-2AM512-QAKD7A-4VD364-ZVHPCA-Y9BYE0-1G0A0T

031HE5-73WZMZ-M7ACTN-0BRXF7-90HH6U-CQRAP8-93U94A-2E3V1F-MHE0FR-HRYEY0-9U5H81-GP2WGN

031HE5-73WZMZ-M7ACTN-0BRXF7-90HXJC-X4MK15-D3M8Z7-NPTF48-CZR0CM-V3JQFZ-QP27KQ-3JVH21

031HE5-73WZMZ-M7ACTN-0BRXF7-90HUNW-DU37K0-PVFA6J-0PH33K-CG9VRY-70ZW5R-AF23QP-NFKEXCby http://sneaktech.com/


Sothink SWF quicker 3.0

000017-BMGBNB-HU805C-0EEZHW-RRX00B-KDGCG5-013YUH-X4P6QY-RFK5YF-0NB2NG

000017-BMGBNB-HU8CWU-JX8VDE-BKF5C5-DJTUX4-U331BC-UAQBT4-KBQFXM-VBCCDM

000017-BMGBNB-HU8F1R-FW2ZF6-XFUD0T-FRJQ2E-TZE5WU-TYECG8-ZVANE9-YKM8N6

000017-BMGBNB-HU80GY-K4EEPH-B363A9-7QA21K-0A1MMR-2GA29A-23WKGK-VEMMFA

000017-BMGBNB-HU835H-G6M7PY-UUDR3P-4PZNBP-WXZNA9-08YYZT-BAQUFD-D08B52


Microsoft expression Web 3

DDWJC-VFGHJ-7GFK6-9QK3D-PFTHW

or You can download it here

http://www.megaupload.com/?d=G16QELO2


Sothink_SWF_Quicker_4.5_Build_457

http://rapidshare.com/files/264544194/Sothink_SWF_Quicker_4.5_Build_457.zip

includes serial key

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Freeup or clean RAM using Notepad

System speed. Sometimes the process which have executed but are not required by the OS are stored on the RAM. So, we can remove or freeup the RAM with unused junk data to Speedup the System or processing speed.
We can clean the RAM just by using a Notepad application. This donot require any advanced software. The process to do so is as follows.

Open Notepad

Type
FreeMem=Space(64000000)
save it as “CleanRAM.vbs” on desktop
Note: Type the name of file along with inverted commas
Run the file and your RAM may be free.
Of course you can edit the code in the file for a greater “cleaning-progress”.
For example:
FreeMem=Space(1280000000)
FreeMem=Space(2560000000)
FreeMem=Space(5120000000)
FreeMem=Space(10240000000)

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Turn your keyboard into disco lights


Actually i have developed this trick in the vb script. so follow the steps below:


Process;
1. Open Notepad.
2. Copy and paste the below text there.

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop




3.Save the file as whatever name u wish but with a .VBS extension.
eg. Disco.vbs


Now If You need To disable This:
Press: ctrl+alt+del, on ur desktop.
Search For " wuscript "
And Click on end process

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Add Copy To And Move To Options Whenever U Right Click On A File


  Once done, you will be able to right click any file or folder 
and use the Browse for Folder dialog to choose the location you want to move or copy your file or folder to, without having to go to the destination path, its cool!

First we will add the copy and move options to the right click menu of all FILES.

CLICK Start>Run, type REGEDIT and click OK to open up the registry editor and make your way to this key:

HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers

Right click the ContextMenuHandlers key and choose New>Key.
Name the new key “Copy To” (without the quotes).
Repeat the above and create another new key named Move To.

You should now have two new subkeys under the ContextMenuHandlers key:



HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Copy To
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Move To

Select the Copy To key and in the right hand pane, double click “Default”
Enter this clsid value as the value data:

{C2FBB630-2971-11d1-A18C-00C04FD75D13}

Next , select the Move To key and in the right hand pane set the default value to:

{C2FBB631-2971-11d1-A18C-00C04FD75D13}

This now takes care of the Copy and Move options for the right click context menu of all your files.
Now all that is left is to add the same options to the right click menu of all your folders.
The procedure will be the same as for files but at a different key:

HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHan dlers

Right click ContextMenuHandlers and create a new key named Copy To.
Right click it again and create another new key named Move To.

left click on the right hand pane, add the same default values as you did for Files:

For Copy To:
{C2FBB630-2971-11d1-A18C-00C04FD75D13}
For the Move To:
{C2FBB631-2971-11d1-A18C-00C04FD75D13}

Exit the registry and you are done.

Now when you right click on a file or folder, you should see two new options: Copy to Folder and Move to Folder

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Make your computer to speak what ever you type

Just copy the code below and save it in the notepad as anyname.vbs.
Then double click on the file you see a textbox like this



Then type what ever you want and click ok button.....
copy the code below:


Dim message, sapi
message=InputBox("What do you want me to say?","Speak to Me")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to hide any file inside a picture[TUT] No Binder Needed!!!

This tutorial can be used for any type of file including mp3,wmv,.rar,etc



Here is how it goes:

1. Open C: Drive and make a folder in it e.g. “hacks”. Put both the files i.e. the file that you want to hide and the image inside which you want to hide the file into this folder



2. Select both the files and make a compressed RAR archive e.g. “secret.rar” out of them



3. Open Run and type in “cmd” to open the Command Prompt. Now type “cd..” and press enter and repeat this once again. Type “cd sizlopedia” to open the folder (where “hacks” is the folder that I am using in this tutorial)




4. Type the command “copy /b maria.jpg + secret.rar safe.jpg” and press enter



5. The new picture safe.jpg is now the nested Picture file which has the hidden file saved inside it. Change its extension from .jpg to .rar anytime to access or extract the hidden file


Definitely cool and amazing trick.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Shutdown All The School Computers




This method only works if you are Sharing connection with other computers . Like in the School , Library etc...
so first of all Open CMD if the Admin Blocked it , then :
1-Open Notepad and write:
Code:
command.com

2-save it as "whatever you want.bat". (without quotes).

3-execute it.

Once CMD Opened :
1-Type "@Echo Off" And press Enter. (without quotes).

2-then CLS.

3-to see if there are others in the same Server or not type :

"netstat" and press Enter. (without quotes).

4-So as you can see, where mine says idex, that is the name of my computer, so if your in a school, you and everyone else should have a similar name (this is not vital).




5-Type one more time "CLS" to clean the screen. (without quotes).

6-type "shutdown -i" and press enter .

this should appear :


7-you can then edit the setting of what you want the computer to do.

8-to add the comps you want to shut down, click add and manually enter the computer names, most comps will have the name printed on them, or if you know the ip this will also work.



9-If you don't know them, then press Browse and find the computer name, and then shutdown it or do whatever you want to it.



Enjoy it. And it's for educational purpose only.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

How to setup your own ftp server






Process-1:


First of all u have to get an static IP-Address.
Need a a static ip-address for ur FTP Server.Necessity for getting this static ip-address is ur not suppose to use ur own IP-Address.The main reason is u dont want to show ur IP-Address to everyone , there are many other reasons too but leave them aside..

1) Goto no-ip & create urself a free account.

2) Now ur account been created & ll receive ur account password via mail to ur email address.

3) After getting ur password login to ur account of no-ip.com
4.After getting logged in, click upon add a HOST its on the left menu.

5) Type any hostname u want (eg:-abc) & select any domain from da given list (eg:-ftpserve.com) Click on Submit.

6) Now u have owned ur own static address (example: abc.serveftp.com)

7) Now click downloads button which is present above on the page & click on which operating system ur using & den download DNS update client or u can download it from here directly, this is for microsoft window users..

8) After getting downloaded, u have to install this software & login here with ur email addresss & p/w wen asked for it.

9) At last tick on da check box present at the static address.

10) U have ur own static web address.


Process-2:
Installation & setting of the FTP-Server

1) You have to install Serv-U 4.1.03 , download this software from here

2) Run Serv-U & use da wizard to setup ur FTP.

3) Click on next until u have been asked for IP-Address, leave it as it is & click upon next.

4) Enter ur domain name u have registered (example: abc.serveftp.com) it above in da domain field & click upon next.

5) U ll be asked for anonymous access, select No & click upon next.

6) Next u ll be asked for creating a named account, select yes & click upon next.

7) Choose any user name u wish (eg:-xyz) & clcik upon next.

8) Enter password for dis account (eg:-adc341) for security purpose choose difficult password.

9) U ll be asked for da home directory for the account which u have created above.Select directory & click upon next.

10) Click on yes for locking dis account to da home directory, doing dis da user cannot further move up into home directory, click upon next.

11) At last ur account has been created click finish.


Process-3:
Configuring the user accounts which u have been created.

1) On the left tree-menu, select da account which u have been created above & den click upon General Tab.

2) Goto Hide 'Hidden' Files.

3) Check Allow only and enter the number one in the box.

4) Set da maximum downloading speed upto wat extent u want.As this is an account so many ll be using so set it low(eg:-10-20) to save ur bandwidth.Don't leave it blank as uers can download with full bandwidth.

5) choose how many users u want to login at on time.It depends on ur connection speed try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)

6) Click upon Dir Access Tab.

7) Now u can c home folder here.Highlight it & make ur permission.

8) If u want only users to download check only these Read,List & Inherit.

9) If u want ur users to upload into ur server & bu tto only 1 particular folder but not to downlaod, click upon dat add button & then select dat folder, Now u have to highlight dat folder & set these permissions on dat folder.Check,Write,Appened,List,Create & Inherit after setting these permissions click on the arrow which is present at the bottom right-hand corner.U want dis upload folder 2 be list first, before da home folder.

10) If der is any folder which u dont want anyone to access it, & it is present in the home folder, den click da add button & den select da folder.Now u have to highlight dat folder & see dat no all da checkboxes are left.After doing this click upon upper arrow which is present at bottom right hand corner.

11) There are many things u can do, These are only the basics....

12) Your server is now ready to be connected..

13) Login with your username & password...




  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS