tag:blogger.com,1999:blog-25329683975760914782024-03-13T12:44:25.781-07:00SRTKhackA hacking tip site for all.Unknownnoreply@blogger.comBlogger53125tag:blogger.com,1999:blog-2532968397576091478.post-44503890330664177722012-05-19T07:08:00.002-07:002012-05-19T07:08:26.463-07:00Delete An "undeletable" File<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
Open a Command Prompt window and leave it open.<br />
Close all open programs.<br />
Click Start, Run and enter TASKMGR.EXE<br />
Go to the Processes tab and End Process on Explorer.exe.<br />
Leave Task Manager open.<br />
Go back to the Command Prompt window and change to the directory the AVI (or other undeletable file) is located in.<br />
At the command prompt type DEL <filename> where <filename> is the file you wish to delete.<br />
Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.<br />
Close Task Manager.<br />
<br />
<br />
Or you can try this<br />
<br />
Open Notepad.exe<br />
<br />
Click File>Save As..><br />
<br />
locate the folder where ur undeletable file is<br />
<br />
Choose 'All files' from the file type box<br />
<br />
click once on the file u wanna delete so its name appears in the 'filename' box<br />
<br />
put a " at the start and end of the filename<br />
(the filename should have the extension of the undeletable file so it will overwrite it)<br />
<br />
click save,<br />
<br />
It should ask u to overwrite the existing file, choose yes and u can delete it as normal<br />
<br />
<br />
Here's a manual way of doing it. I'll take this off once you put into your first post zain.<br />
<br />
1. Start<br />
2. Run<br />
3. Type: command<br />
4. To move into a directory type: cd c:\*** (The stars stand for your folder)<br />
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1<br />
6. Once your in the folder the non-deletable file it in type in dir - a list will come up with everything inside.<br />
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.<br />
</div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-2532968397576091478.post-37062057900114787912012-05-19T07:07:00.000-07:002012-05-19T07:07:59.973-07:00Cracking Zip Password Files<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
Tut On Cracking Zip Password Files..<br />
<br />
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.<br />
FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).<br />
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.<br />
The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.<br />
FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.<br />
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.<br />
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".<br />
<br />
We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.<br />
If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.<br />
<br />
Now that we've gone through all the theoretical stuff, let's get to the actual commands.<br />
<br />
<br />
--------------------------------------------------------------------------------<br />
Bruteforce<br />
--------------------------------------------------------------------------------<br />
<br />
<br />
The command line you'll need to use for using brute force is:<br />
<br />
fzc -mb -nzFile.zip -lChr Lenght -cType of chars<br />
<br />
Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)<br />
<br />
For Chr Lenght you can use 4 kind of switches...<br />
<br />
-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords<br />
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars<br />
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...<br />
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...<br />
<br />
For the Type of chars we have 5 switches they are:<br />
<br />
-> a for using lowercase letters<br />
-> A for using uppercase letters<br />
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)<br />
-> s for using space<br />
-> 1 for using numbers<br />
<br />
<br />
Example:<br />
If you want to find a password with lowercase and numbers by brute force you would just do something like:<br />
<br />
fzc -mb -nzTest.zip -l4-7 -ca1<br />
<br />
This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.<br />
<br />
*****<br />
hint<br />
*****<br />
<br />
You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.<br />
<br />
<br />
--------------------------------------------------------------------------------<br />
Wordlis<br />
--------------------------------------------------------------------------------<br />
<br />
Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.<br />
To start a wordlist attak you'll do something like.<br />
<br />
fzc -mwMode number -nzFile.zip -nwWordlist<br />
<br />
Where:<br />
<br />
Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.<br />
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.<br />
<br />
You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.<br />
So if you something like<br />
<br />
fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+<br />
<br />
FZC would just start reading at line 50 and would just read with length >= to 9.<br />
<br />
Example:<br />
<br />
If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:<br />
<br />
fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50<br />
<br />
<br />
<span style="font-size: large;">--------------------------------------------------------------------------------</span><br />
Resuming<br />
<span style="font-size: large;">--------------------------------------------------------------------------------</span><br />
<br />
Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).<br />
To resume the bruteforce attack you just need to do:<br />
<br />
fzc -mr<br />
<br />
And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.<br />
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type<br />
<br />
fzc -mw3 -nzfile.zip -nwwordlist.txt -f100<br />
<br />
Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.<br />
<br />
<br />
Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program<br />
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-25545322320734148962012-05-19T06:59:00.002-07:002012-05-19T06:59:21.277-07:00How To: Change Your Ip In Less Then 1 Minute<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
Change Your Ip In Less Then 1 Minute<br />
<br />
1. Click on "Start" in the bottom left hand corner of screen<br />
2. Click on "Run"<br />
3. Type in "command" and hit ok<br />
<br />
You should now be at an MSDOS prompt screen.<br />
<br />
4. Type "ipconfig /release" just like that, and hit "enter"<br />
5. Type "exit" and leave the prompt<br />
6. Right-click on "Network Places" or "My Network Places" on your desktop.<br />
7. Click on "properties"<br />
<br />
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.<br />
<br />
8. Right click on "Local Area Connection" and click "properties"<br />
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab<br />
10. Click on "Use the following IP address" under the "General" tab<br />
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).<br />
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.<br />
13. Hit the "Ok" button here<br />
14. Hit the "Ok" button again<br />
<br />
You should now be back to the "Local Area Connection" screen.<br />
<br />
15. Right-click back on "Local Area Connection" and go to properties again.<br />
16. Go back to the "TCP/IP" settings<br />
17. This time, select "Obtain an IP address automatically"<br />
tongue.gif 18. Hit "Ok"<br />
19. Hit "Ok" again<br />
20. You now have a new IP address<br />
<br />
With a little practice, you can easily get this process down to 15 seconds.<br />
<br />
P.S:<br />
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back<br />
<div>
<br /></div>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-36368040822699904062012-05-19T06:58:00.003-07:002012-05-19T06:58:47.594-07:00Change Text on XP Start Button<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, sans-serif;"><span style="font-size: large;">A very simple trick that changer yours XP start button to your customized test.</span></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: Arial, sans-serif; font-size: x-small;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-size: 10pt;"><span style="font-family: 'Courier New', Courier, monospace;">Step 1 - Modify
Explorer.exe File</span><span style="font-family: Arial, sans-serif;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">In order to make the
changes, the file explorer.exe located at C:\Windows needs to be edited. Since
explorer.exe is a binary file it requires a special editor. For purposes of
this article I have used Resource Hacker. Resource HackerTM is a freeware
utility to view, modify, rename, add, delete and extract resources in 32bit
Windows executables and resource files (*.res). It incorporates an internal
resource script compiler and decompiler and works on Microsoft Windows
95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">get this from
h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">The first step is to
make a backup copy of the file explorer.exe located at C:\Windows\explorer.
Place it in a folder somewhere on your hard drive where it will be safe. Start
Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">The category we are
going to be using is "String Table". Expand it by clicking the plus
sign then navigate down to and expand string 37 followed by highlighting 1033.
If you are using the Classic Layout rather than the XP Layout, use number 38.
The right hand pane will display the stringtable. We’re going to modify item
578, currently showing the word “start” just as it displays on the current
Start button.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">There is no magic
here. Just double click on the word “start” so that it’s highlighted, making
sure the quotation marks are not part of the highlight. They need to remain in
place, surrounding the new text that you’ll type. Go ahead and type your new
entry. In my case I used Click Me!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">You’ll notice that
after the new text string has been entered the Compile Script button that was
grayed out is now active. I won’t get into what’s involved in compiling a
script, but suffice it to say it’s going to make this exercise worthwhile.
Click Compile Script and then save the altered file using the Save As command
on the File Menu. Do not use the Save command – Make sure to use the Save As
command and choose a name for the file. Save the newly named file to
C:\Windows.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-size: 10pt;"><span style="font-family: 'Courier New', Courier, monospace;">Step 2 – Modify the
Registry</span><span style="font-family: Arial, sans-serif;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">!!!make a backup of
your registry before making changes!!!<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">Now that the modified
explorer.exe has been created it’s necessary to modify the registry so the file
will be recognized when the user logs on to the system. If you don’t know how
to access the registry I’m not sure this article is for you, but just in case
it’s a temporary memory lapse, go to Start (soon to be something else) Run and
type regedit in the Open field. Navigate to:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">HKEY_LOCAL_MACHINE\
SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">In the right pane,
double click the "Shell" entry to open the Edit String dialog box. In
Value data: line, enter the name that was used to save the modified
explorer.exe file. Click OK.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 0.0001pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 10.0pt;">Close Registry Editor
and either log off the system and log back in, or reboot the entire system if
that’s your preference. If all went as planned you should see your new Start
button with the revised text.[/b] <o:p></o:p></span></div>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-2147707676842981712012-05-19T06:57:00.001-07:002012-05-19T06:57:06.286-07:00Boot Winxp Fast<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<span style="font-size: large;">Boot your Winxp Fast</span><br />
<br />
<span style="font-family: 'Courier New', Courier, monospace;">Follow the following steps</span><br />
<br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\</span><br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">2. From the Start menu, select "Run..." & type "gpedit.msc".</span><br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.</span><br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".</span><br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">5. Click "OK", "Apply" & "OK" once again to exit.</span><br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">6. From the Start menu, select "Run..." & type "devmgmt.msc".</span><br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">7. Double click on "IDE ATA/ATAPI controllers"</span><br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">8. Right click on "Primary IDE Channel" and select "Properties".</span><br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".</span><br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.</span><br />
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">11. Reboot your computer.</span><br />
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-11615166200861742112012-05-17T05:30:00.002-07:002012-05-17T05:30:18.624-07:00Compress 1GB File to 10MB with KGB Archiver<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">KGB Archiver is an opensource software which can compress 1 GB file to 10 MB file. This software is based on PAQ6 algorithm which has AES-256 powerful encryption. KGB archiver is available for Linux and Windows both. </span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">This software case too much time to compress a file as we can see that the compression ratio is very hign. But the time depends on the size of file being compressed. File compressed with KGB Arciver can only be decompressed with this tool only. If you are compressing any file with KGB archiver and sending the comprssed file to your friends then he must have KBG archiver installed on his computer to decompress the file.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>Note: Some of you may not feel happy after reading this not. Because this tool can not compress video files. This tool can only compress </b></span><br />
<div class="separator" style="background-color: white; clear: both; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEyRDzDwORae-dU1uUdPEiUlJdRJ35nk8FrzTohV93gTZtkYfNj0NaH3P0Brq8tWmwR2WrmLMixabBmPbnQ1oNcDcpMp5fM58E-YHhuBudy2zmp5tLzUpJe2nPB-3P05t63-W33vBG5hk/s1600/19.png" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="228" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEyRDzDwORae-dU1uUdPEiUlJdRJ35nk8FrzTohV93gTZtkYfNj0NaH3P0Brq8tWmwR2WrmLMixabBmPbnQ1oNcDcpMp5fM58E-YHhuBudy2zmp5tLzUpJe2nPB-3P05t63-W33vBG5hk/s320/19.png" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b><br /></b></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>Features of KGB Archiver:</b> These are some features of this cool compression software.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><ul style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<li><span style="font-family: Arial, Helvetica, sans-serif;">Supports native .kgb files and .zip files</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">AES-256 Encryption</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Able to create self-extracting archives.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Multilanguage supports like Arabic, German, Greek, Japanese, Spanish many more.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Unicode is supported in both User Interface and File Systems.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">An Explorer shell extension is available for the windows version.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Make Password protected compressed file.</span></li>
</ul>
<div style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<a href="http://sourceforge.net/projects/kgbarchiver/" rel="nofollow" style="color: #222222;" target="_blank"><span style="font-family: Arial, Helvetica, sans-serif;">Download</span></a></div>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-56755720661773684182012-05-17T05:12:00.000-07:002012-05-17T05:12:03.406-07:00Download your Facebook albums with Photograbber<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Facebook the largest social network is a virtual world where people spend more time than real world. We all use it to share our daily experience, photos, videos and everything we think. We can easily create albums and create photos with friends. </span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Sometimes we need to download all the photos in our system. Although, Facebook has given an option to download all Facebook data including status and comments. But what if we only want to download photos. There are some nice tools which can help. PhotoGrabber is also a nice tool to download photos from Facebook.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEht7UySi9IZo_iffMeeozz6Qw3dF-vxhEoptkRqABE33_Xjz1X_fbvo1uWrFiKPc2Zjb0M5wNqc6eZTGS0YlVzNW2QHB2fzBEBm5py_7gxQKF385zxZhyphenhyphenpidyaC11zbT53Fv5UZMrBKD5M/s1600/pg-r74.png" imageanchor="1" style="background-color: white; clear: right; color: #222222; float: right; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEht7UySi9IZo_iffMeeozz6Qw3dF-vxhEoptkRqABE33_Xjz1X_fbvo1uWrFiKPc2Zjb0M5wNqc6eZTGS0YlVzNW2QHB2fzBEBm5py_7gxQKF385zxZhyphenhyphenpidyaC11zbT53Fv5UZMrBKD5M/s200/pg-r74.png" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="121" /></a><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>Follow these steps:</b></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><br />
<ul style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<li><span style="font-family: Arial, Helvetica, sans-serif;">Download <a href="http://code.google.com/p/photograbber/" rel="nofollow" style="color: #222222;" target="_blank">PhotoGrabber Desktop client</a>. It is available for windows or MAC.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Signin with your Facebook account and allow this application to access account.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Now you will see your album listed on the application.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">select the album you want to download and hit the download begin button.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Downloading will start within few seconds.</span></li>
</ul>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-37515506940097440902012-05-17T04:33:00.002-07:002012-05-17T04:33:51.248-07:00iCrypt Err0r Version | make trojan FUD<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqyUqbU9uviuXBZ9P8b50LewcfGGGsmskEZ67vVzuHV1CepVaa75JMcQyvR3CEzdiih1cPBPKsDvLUHvNF_fVgBaxquZCh6UjaEwIcMA8daULvjHCQtsti6-r5IiiWR3IHvCT4v8kaH0XZ/s1600/icrypt.jpg" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqyUqbU9uviuXBZ9P8b50LewcfGGGsmskEZ67vVzuHV1CepVaa75JMcQyvR3CEzdiih1cPBPKsDvLUHvNF_fVgBaxquZCh6UjaEwIcMA8daULvjHCQtsti6-r5IiiWR3IHvCT4v8kaH0XZ/s320/icrypt.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="288" /></span></a></div>
<span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">This is a simple encryptor which makes your trojan undetectable from antiviruses. Encrypt your trojan and check it with NoVirusThanks.org</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>Download Here</b></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><a href="http://www.ziddu.com/download/15913691/iCrypt_Err0r_Version.rar.html" style="color: #222222;"><b>http://www.ziddu.com/download/15913691/iCrypt_Err0r_Version.rar.html</b></a></span>
</div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-2532968397576091478.post-88250326285123849442012-05-17T04:26:00.002-07:002012-05-17T04:26:46.953-07:00free download Spyware Terminator 2.8.2.192<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div align="center" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<div class="separator" style="clear: both;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOEXImcNtoDUKgC0JfjZzeKzLSnAr5c5sXKyusju9koO0Js-x5sKQ8srpf-jfGwWlZ5hJEES0OpbFTx2LXdqL_6_Y6tqsEyfPrcjUeSFHOyf-2bgsNJhmb5yHHjWPNJs-xx1wN-uBM3bXu/s1600/spywar10.jpg" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="143" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOEXImcNtoDUKgC0JfjZzeKzLSnAr5c5sXKyusju9koO0Js-x5sKQ8srpf-jfGwWlZ5hJEES0OpbFTx2LXdqL_6_Y6tqsEyfPrcjUeSFHOyf-2bgsNJhmb5yHHjWPNJs-xx1wN-uBM3bXu/s200/spywar10.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="200" /></a></div>
<span id="goog_532080454"></span><span id="goog_532080455"></span><span class="Apple-style-span" style="font-family: Arial; font-weight: bold;"><br /></span></div>
<div align="center" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Spyware Terminator 2.8.2.192 | 11.09MB</span></b></div>
<br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Millions of users worldwide rely on Spyware Terminator, winner of many awards and high ratings from industry experts and users. Its free comprehensive protection is comparable to competitors paid versions!</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><a href="" name="more" style="background-color: white; color: #777777; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"></a><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><span id="more-577347"></span></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Spyware Terminator includes: </span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">. Fast spyware scanning<br />. 100% real time protection<br />. HIPS protection<br />. Antivirus protection<br />. Multilanguage Support<br />. Free automatic updates<br />. Free scheduled scans<br />. Free support </span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Spyware Terminator will scan your computer for known threats and report findings in a manner that is easy to read and interpret. Every entry is given a rating and a classification, which makes it very easy to decide if a detected item should be removed. Unlike some free software titles, Spyware Terminator will remove all threats for free. </span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Spyware Terminator is licensed for free for both home and business use.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><div style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
</div>
<div style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span class="Apple-style-span" style="font-family: Arial; font-weight: bold;"><br /></span></div>
<div style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span class="Apple-style-span" style="font-weight: bold;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Download Here </span></span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<b style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><a href="http://hotfile.com/dl/85281755/3353b7d/28-SpywareTerminator.rar.html" style="color: #222222;" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">http://hotfile.com/dl/85281755/3353b7d/28-SpywareTerminator.rar.html</span></a> <span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"> </span></b><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><b style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><a href="http://www.fileserve.com/file/C8gW4rx/28-SpywareTerminator.rar" style="color: #222222;" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">http://www.fileserve.com/file/C8gW4rx/28-SpywareTerminator.rar</span></a> </b></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-3283352013274890092012-05-17T04:25:00.001-07:002012-05-17T04:25:55.764-07:00How to make trojan, kelogger undetectable from antivirus<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: left;">
<span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><span class="Apple-style-span" style="font-size: x-small;">In my previous post i wrote about trojan and how to crate a trojan server to hack but all famous trojan servers are detected by antivirus and thus useless. Here i am going to write the method to make your</span></span><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; font-weight: bold; line-height: 19px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: x-small;"> trojan, keylogger and RAT</span></span></span><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><span class="Apple-style-span" style="font-size: x-small;"> FUD (fully undetectable) by antivirus softwares.</span></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial; font-size: 14px; line-height: 19px;">1- download <span class="Apple-style-span" style="font-weight: bold;">PC Guard For Windows</span></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial; font-size: 14px; line-height: 19px;"><b>http://www.mediafire.com/?dgt9y9d12dn0jom</b></span><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial; font-size: 14px; line-height: 19px;"><span class="Apple-style-span" style="font-weight: bold;"> </span></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; font-weight: bold; line-height: 19px;"><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">2. Open PC Guard , and in the "Application filename" browse your server's location.</span></span></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZH5TcGtq5iUGyLQSmJtxbXCeoBkt2q0CnAbDPvJLCGzp-CzVPwqTfAfbAZK-_qf0I531G5LqS-izTRfPg89rwa3ZZeIzuegZt7EvnXZCWa4NQAhf7KeKvhqMPA0RZECjlKKLfHUJlMfey/s1600/fud1.jpg" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="253" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZH5TcGtq5iUGyLQSmJtxbXCeoBkt2q0CnAbDPvJLCGzp-CzVPwqTfAfbAZK-_qf0I531G5LqS-izTRfPg89rwa3ZZeIzuegZt7EvnXZCWa4NQAhf7KeKvhqMPA0RZECjlKKLfHUJlMfey/s320/fud1.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></span></span></a></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">3. Click on the "General" tab, and check the options like on the image below.</span></span><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNlYJxHpAPFrnXYVmROEbV96YuOzyssRQMDk5kUcQDkYeqQymXxJPfnlRVe-Snd9mDIymzUdxAwpt3FuODHAIjLGtZJzvrzxvn6O2pxjci7rKqMfRpeWrtcgas1Y6lpvWOEcVyZaTvfB4O/s1600/fud2.jpg" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNlYJxHpAPFrnXYVmROEbV96YuOzyssRQMDk5kUcQDkYeqQymXxJPfnlRVe-Snd9mDIymzUdxAwpt3FuODHAIjLGtZJzvrzxvn6O2pxjci7rKqMfRpeWrtcgas1Y6lpvWOEcVyZaTvfB4O/s320/fud2.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></span></span></a></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">3. Now do the same with the "Security & Encryption" tab. Look at the image below to see what options to check</span></span><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSxHoduFrZS9DTsDB2TlX53GAQ8wXsYSGocwfpxCW6f_nVQYvF08tWC_e00rQiW70bHuh_4EpBi15VMpj76ofL3oVx8FXhH8eTmyWTWGSUtijAUf3Yi29245qVYBHOWQXp6zZbgQAsyuxr/s1600/fud3.jpg" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="255" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSxHoduFrZS9DTsDB2TlX53GAQ8wXsYSGocwfpxCW6f_nVQYvF08tWC_e00rQiW70bHuh_4EpBi15VMpj76ofL3oVx8FXhH8eTmyWTWGSUtijAUf3Yi29245qVYBHOWQXp6zZbgQAsyuxr/s320/fud3.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></span></span></a></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">4. At the end choose "Protection Methods", and select the following options:</span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span class="Apple-style-span" style="font-size: x-small;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3kt1ln-_8JPbE1g3p5u8sQGpn-whq1hsjbytscIB9MFhhVLTQwQLAaV73_r6oya0j9i1GWxnMFSsGJ-HXaaGPlANgqKgLxElUUSqJVL0jMIbkVkXGI68a_WVxtkYmXXfB4i-V07hy7OyJ/s1600/fud4.jpg" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="257" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3kt1ln-_8JPbE1g3p5u8sQGpn-whq1hsjbytscIB9MFhhVLTQwQLAaV73_r6oya0j9i1GWxnMFSsGJ-HXaaGPlANgqKgLxElUUSqJVL0jMIbkVkXGI68a_WVxtkYmXXfB4i-V07hy7OyJ/s320/fud4.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span class="Apple-style-span" style="font-family: Arial;"><br /></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span class="Apple-style-span" style="font-family: Arial;">You have done it....</span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span class="Apple-style-span" style="font-family: Arial;"><br /></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span class="Apple-style-span" style="font-family: Arial;">Now your server, keylogger is FUD(Fully undetectable) from antivirus and other security tools.</span></div>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-82978963996393513232012-05-17T04:10:00.001-07:002012-05-17T05:21:41.654-07:00How to hack with Trojan | Prorat tutorial<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Prorat a famous trojan for hacking system, facebook, gmail, yahoo, twitter and other accounts. Today i wil show you step by step guide to hack with Prorat.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">First of download Prorat from the given link</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><a href="http://adf.ly/54iqa" rel="nofollow" style="color: #222222;" target="_blank">ProRat</a></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Then disable your antivirus. It is necessary other wise your downloaded trojan will be detected and deleted. Don't worry, it will not harm your system at this stage.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Now run Prorat.exe</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">You will see the prorat window. There are so many options but you have to create a server first. </span><br />
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6eL5Yj8S3fSN-JujfawDHQnweY2_M_SFIdg5N_R8_4srct_qArvC2hudEl_5mct964TD2BJ26Wtqmi7Ha9Yxa5GYTIIdSSZC7k_n5MMhawS74-RxeZQUB4VqeLHJA2fx_tC9st1m8-q4F/s1600/pro.JPG" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6eL5Yj8S3fSN-JujfawDHQnweY2_M_SFIdg5N_R8_4srct_qArvC2hudEl_5mct964TD2BJ26Wtqmi7Ha9Yxa5GYTIIdSSZC7k_n5MMhawS74-RxeZQUB4VqeLHJA2fx_tC9st1m8-q4F/s320/pro.JPG" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">So click on create server.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">There will be 3 options</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><ol style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Create Prorat server</span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Create Downloader Server</span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Create Cgi Victim List & usage</span></li>
</ol>
<br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">now click on create prorat server</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">A new window will popup. which will have a lots of options in side bar.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><ul style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Notifications</span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">General settings</span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Bind with Files</span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Server extnsions</span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Server Icons</span></li>
</ul>
<br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">You have to use all options one by one to create a server.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Now in Notofication. Mark on Use Mail Notification and enter your email id. there will be a default id. Erase it and enter your. Then Test. It will send a testing mail to your email. Check your spam too.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Then Go to general settings and select all the options which you want to have in your trojan.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Then go to Bind with file and select file to bind your trojan with.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">At last select your server extension and icon. Then click on Create server.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Now you have created a server.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Send this server file to the victim you want to hack, but before sending this file to victim make it FUD (Fully UnDetectable) with FUD cryptors. Search for this website for FUD articles. </span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">after creating server FUD, it is ready to send to the victim.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Send this file to the victim. If the victim will run the server in the system, Trojan server will send you the notification email with the IP address of the victim. Use this ip and run your prorat.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">At the top there is an option for IP and port. Enter thr IP and port and click on connect.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">wait to connect.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">After getting connected to the victim's system.. you can use any of the options available on the prorat to hack the user's system</span>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-41695695629180889592012-05-17T04:09:00.002-07:002012-05-17T04:09:31.320-07:00Download DarkComet-RAT v4.2 fwb (Firewall bypass)<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<b><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br class="Apple-interchange-newline" /></span></b></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnqNmJx3EnxZyUIJlpMlqiYWVOpDV0Io-Z_Zx9z6NOI11OKKftr-jFa2DkSGQ12-ID4-5BoI7I-98W5x7WLKjjvxAcg1t7yPtKkNVuyq90wSdOiOAOH1LOAHCgiZA2EzlCof3Qh5i2SAUO/s1600/dark.png" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnqNmJx3EnxZyUIJlpMlqiYWVOpDV0Io-Z_Zx9z6NOI11OKKftr-jFa2DkSGQ12-ID4-5BoI7I-98W5x7WLKjjvxAcg1t7yPtKkNVuyq90wSdOiOAOH1LOAHCgiZA2EzlCof3Qh5i2SAUO/s320/dark.png" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></span></a></div>
<span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">This version of DarkComet is firewall bypass. It will inject to web browsers and bypass firewall rules.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Targets are in this order : Firefox, Opera, Chrome, Safari, Internet Explorer and Explorer if all fails (normally never) then it runs normally. Notice now you can use remote computers as SOCKS5 proxies</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Download Here:</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><a href="http://www.darkcomet-rat.com/process_download.php?id=6" rel="nofollow" style="background-color: white; color: #222222; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">http://www.darkcomet-rat.com/process_download.php?id=6</span></a>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-52311590979605130322012-05-17T04:07:00.002-07:002012-05-17T04:07:52.556-07:00Introduction to ping sweep<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Before writing about Ping sweep, i would like to introduce Ping. Ping is a network based utility which is used to know if a host is alive or dead on the network. Suppose i want to check for hackingtricks.in</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8z1wNW0MSue09dhn2DtsQYQh3OTL9B_hIN2VPoT4tMgXzMTddAIccpsDCJ2wBKHR93sP79Me8ZkDpc8YLsIcJajYFR3Mwtds0RsXWmTU99YAn-tnL6NlcnlRTPbR-O44ao2v4nlBC-Mji/s1600/ping.JPG" imageanchor="1" style="background-color: white; clear: left; color: #222222; float: left; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="99" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8z1wNW0MSue09dhn2DtsQYQh3OTL9B_hIN2VPoT4tMgXzMTddAIccpsDCJ2wBKHR93sP79Me8ZkDpc8YLsIcJajYFR3Mwtds0RsXWmTU99YAn-tnL6NlcnlRTPbR-O44ao2v4nlBC-Mji/s320/ping.JPG" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"> if we get the response it means website is live. You can check for a system by its IP address or a website by its domain name. We can use this program to detect host like website, computer system, printer, network or any device.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Ping Sweep:Ping Sweep also known as ICMP sweep is a network scanning technique which is used to determine which of a range of IP addresses map to live hosts. As we have seen in Ping, which is used for single computer. This is used for a renge of IP address for various computers. ping sweep consists of ICMP (Internet Control Message Protocol) ECHO requests sent to multiple hosts. If a system (HOST) is live, it will reply with ICMP ECHO reply.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">There are a various tools available that can be used to do a ping sweep, such as fping, gping, and nmap.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>Download Fping here: <a href="http://fping.sourceforge.net/" style="color: #222222;">http://fping.sourceforge.net/</a></b></span>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-28040083735176461122012-05-17T04:06:00.001-07:002012-05-17T04:06:44.485-07:00FBI and SOCA Seize 36 Websites For Card Fraud<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;">Federal Bureau of Investigations (FBI) and Serious Organized Crime Agency (SOCA) has worked together and seized 36 domains. All these 36 websites were involved in the credit card frauds. These websites were all found to be trading illegally-obtained payment card details.</span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZyDDPrOfaQG308QeZKtWa3rZPNZ43V16ZVyOuPH8kGpOQD3KN_MHo2_ZbrB92fOc-CcRc8oz6tFeg-uZE4Vl5PHXnRlktSVZ7u2T1RcN0w5u300p0B4Ifj2mmkJ_iA0XWptlOFW2HGVy/s1600/SOCA-and-the-FBI-Seize-36-Sites-Involved-in-Card-Fraud-2.png" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="140" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZyDDPrOfaQG308QeZKtWa3rZPNZ43V16ZVyOuPH8kGpOQD3KN_MHo2_ZbrB92fOc-CcRc8oz6tFeg-uZE4Vl5PHXnRlktSVZ7u2T1RcN0w5u300p0B4Ifj2mmkJ_iA0XWptlOFW2HGVy/s320/SOCA-and-the-FBI-Seize-36-Sites-Involved-in-Card-Fraud-2.png" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;">Organization has also informed the financial institutions and banks whose customers have been affected by these cybercriminal websites. They also claimed to prevented fraud that might have cost individuals and companies more than £500 million. So we can say that this is one of biggest a</span><span style="font-family: Arial, Helvetica, sans-serif;">nti-fraud operation of recent days.</span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;">“This operation is an excellent example of the level of international cooperation being focused on tackling online fraud,” said Lee Miles, Head of Cyber Operations for SOCA.</span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<br /></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;">“Our activities have saved business, online retailers and financial institutions potential fraud losses estimated at more than half a billion pounds, and at the same time protected thousands of individuals from the distress caused by being a victim of fraud or identity crime.”</span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;">In past two years, law enforcement agencies from many countries have worked together to prevent online fraud and cyber crimes. Although, cyber crimes are increasing day by day but this kind of strong steps against cyber criminals will surely make some positive impact.</span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;">Law enforcement agencies claim to save many personal accounts which can be misused by these fraudster websites. And these websites can help in identifying more websites which are involved in these kinds of crimes.</span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<br /></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;">At last, it’s my personal advice to all internet users to be safe as much as they can. If they want to purchase something online, then take care while choosing the merchant. Try to purchase only from the trusted vendors and ensure that your personal and card information don’t end up in the wrong hands.</span></div>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-71844694477911366272012-05-17T04:05:00.004-07:002012-05-17T04:05:51.448-07:005 things a Beginner Hacker Should Know<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Here are few points for beginners which they should know.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white;"><br /></span><br />
<ol style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoww2hb4Vv62WfgHASpA9FzqhBsQc1JTR6hTjysvEpWfE836kOD2urQ824hNUY8tNAirNlgY7Bec0LmXptZqqHMUt40EW7XfW7UzCYXTXnj6aBuKZcaljd6ZRa-XPOYT1L7M_AHMqClf83/s1600/How-to-be-a-hacker.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoww2hb4Vv62WfgHASpA9FzqhBsQc1JTR6hTjysvEpWfE836kOD2urQ824hNUY8tNAirNlgY7Bec0LmXptZqqHMUt40EW7XfW7UzCYXTXnj6aBuKZcaljd6ZRa-XPOYT1L7M_AHMqClf83/s200/How-to-be-a-hacker.jpg" width="200" /></a>
<li><span style="font-family: Arial, Helvetica, sans-serif;">At this stage, most of the students search for hacking tools and software. But Here i want to make this clear that no tool and software exists which can hack Gmail, Facebook, Yahoo, twitter or any aother website or email account in just few clicks. These types of posts on internet are just for attracting visits and spread spams. Most of this type of hacking tools are binded with trojans which leads your system at risk. The recent example it Anonymous LOIC tool which is used to hack members to use their system in criminal activities.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Never use any premium keylogger which is available free on filehosting websites. Hackers always host this type of tool with Trojans. After installing this type of keyloggers you will be hacked. </span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Never pay for hacking on the websites which are asking money in return of hacking. If you want to pay for any hacking book, tool or other kit, pay only on the trusted websites. </span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Join any good hacking forum and learn new things from the experts. Never follow a person just for his claims. Always follow a person who has real knowledge. Adding hacker word is not going to make anyone hacker. There are many Javascript pranks and online websites are available which are used to create fake screenshot and defacing pages. These are used by many noobs to create some fake hacking screenshot to share on Facebook. And beginners follow them thinking as a hacker.</span></li>
<li><span style="font-family: Arial, Helvetica, sans-serif;">Learn Programming languages and networking. These are must to be a hacker. Most of the hacking attacks such as SQL injection, PHP injection, XSS, Phising and many other needs the knowledge of programming.</span></li>
</ol>
<br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Hacker is not the person who use keyloggers for hacking email ids and deface low secure innocent websites. Hacker is the person with indepth knowledge of computer who can create his own exploits to hack in the secure systems and servers. hacker is the person who is ready to take challenges. You may heard the name of many hacking groups who deface innocent websites just for fame. I think they are nothing just a noob. Hacking a school website or a shop website is not going to make you a hacker. </span> </div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-56752111093078860092012-05-17T04:04:00.001-07:002012-05-17T04:04:23.229-07:00what is Ethical hacking and penetration testing<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 18px;">Cyber world, the virtual world on the internet is now a part of our daily life. Every person, who use internet either by computer or by any other gadgets, is a part of the cyber world. But Cyber world is also full of thieves as real world. So security is must. If you do proper security for all your physical things in real world, you must be aware of the security of the things you have in cyber world. If you think, you are not a computer person and why should you need to know about cyber crimes and its protections, and then just think about your bank account which you use and your credit cards and your online purchase. All these things are the main target of hacker which you use daily in your life.</span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif; font-size: 12pt; line-height: 18px;"><br /></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<b><span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Cyber crimes<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">All the organizations and companies have a network of systems for storing and accessing their private information which are confidential. These data is the top secret part of the company. But hackers always try to break the security of these systems to get that secret information of the company. According to the latest cyber crime report by Symantec, cyber crime costs more that $114 billion annually. This is a huge loss by cyber crimes. The report also says that 14 adults become the victim of cyber crimes in a minute. You can imagine the dangers. Most of the hackers work individual and hack only for their profit. But there are many companies who hire hackers to know the hidden secrets of the competitors company. So the world is full of hackers and threats. Do you know how to be safe and what to do in this bad cyber world.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Hackers or cyber criminals are the persons who use their computer knowledge for accessing or stealing without authorization. Now most of the security organizations have proposed to declare cyber criminal as terrorists. Hacking is the biggest problem now a day. We can see the past 6 months. Some hacker groups have costs a lot to Sony and some other organizations. They had also accessed and published secret data of some security organizations. They had also hacked some networks and website. Lulzsec and Anonymous are the main 2 hackers groups and cyber police of many countries are in search of the members of these groups. Hackers use all the latest bugs and vulnerabilities to hack and the most dangerous thing is that they know how to hide their real identity in the cyber world. If you look at the recent high profile cyber crime cases, you will see that the hackers have cost a lot to the most reputed companies by stealing their network data and secret information. But they are still unknown. No one knows who are they? where they live?, how they do?<br />Sometimes I think they are most advanced than the security experts working on those companies but they do not have that much educational qualification. They are talented but use their knowledge in bad works.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Working process of hackers is similar. The complete hacking can be defined as a set of steps performed by hackers. These are Information gathering, scanning, gaining access, maintaining access and clearing tracks. Information gathering and scanning involves getting knowledge about the target system or victim whom they want to hack. After having enough knowledge about the target system, hackers try to exploit vulnerabilities of the target and gain access to unauthorized data. Then they maintain access to get some secret data of the company and steal important information. Finally they clear all the tracks so that no one will able to find them. This is what they are invisible on the internet.<o:p></o:p></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgna4B7mir08eILCMdZeWzpe_i1kk9f6NshTae-HFiAE6D32PbWp6v-DZQIXUlmSzRBsKo5eRAUkhAUMbxjhd-eT_17Fw2JqGzvqxyzp68HNSpIGO6sVwzSF6pC5cIWk-gg8uWUgkS5IaGd/s1600/fig1.JPG" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="317" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgna4B7mir08eILCMdZeWzpe_i1kk9f6NshTae-HFiAE6D32PbWp6v-DZQIXUlmSzRBsKo5eRAUkhAUMbxjhd-eT_17Fw2JqGzvqxyzp68HNSpIGO6sVwzSF6pC5cIWk-gg8uWUgkS5IaGd/s320/fig1.JPG" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<div align="center" class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><br /></span></span></div>
<div align="center" class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<b><span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Figure1: Steps performed by hacker<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Catching a hacker is not so easy. But securing your network is much easy and recommended.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<b><span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Need of Ethical hackers<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">So most of the organization now hire hackers who try to secure the company system security by finding vulnerabilities and security holes. These hackers are called Ethical hackers. An Ethical Hacker will follow the same Techniques and Methodologies as a Malicious Hacker, however, in the end, The found vulnerabilities of Security Flaws are either Reported (Responsible Disclosure/Open Disclosure) or Fixed. This is also called Penetration Testing which is also called as pentest in short. Working of ethical hackers can also be shown as a graphical image which is given below.<o:p></o:p></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBs7mCDwPcUMLlxLdj_PdksW9Ls2oaYGIfgVmUrdFl-vAnxHkc5Ez36rc1vLXFC-falKBUtmW8F2E0AKvqUrOCGHfg7TJ6BN2iU6GpyQMVVqI4l7r8OAPCJd_ZrZgdJ_8UNHrzXwVvKkuT/s1600/fig2.JPG" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBs7mCDwPcUMLlxLdj_PdksW9Ls2oaYGIfgVmUrdFl-vAnxHkc5Ez36rc1vLXFC-falKBUtmW8F2E0AKvqUrOCGHfg7TJ6BN2iU6GpyQMVVqI4l7r8OAPCJd_ZrZgdJ_8UNHrzXwVvKkuT/s320/fig2.JPG" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<br /></div>
<div align="center" class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><br /></span></span></div>
<div align="center" class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<b><span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Figure2: Steps performed by Ethical hacker<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">If you take a look on the steps performed by hackers and ethical hackers, you will see that the starting 3 steps are similar in both hackers. But the last steps are different. Ethical hacker reports the vulnerabilities to the organization while hackers maintain the access to access secret data of the company and then clear all the tracks. Reporting vulnerability is the main work of Ethical hacker. Now company will have to work on patching those found vulnerabilities. This is what we called best step of protection against hackers.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">“<i>One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems.”</i><o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<b><span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Skills Required Becoming an Ethical Hacker<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Ethical hackers are those persons who stay 1 step ahead from the malicious hackers so they must be computer system experts having knowledge about computer programming, networking, operating systems, web programming and various security aspects. Ethical hackers do not need to have strong command of the countermeasure that can prevent attacks. Their work is only to report the vulnerability to the organization’s security team.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Ethical hacking has following steps:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">1. Talk to the client, and discuss the needs to be addressed during the testing of system, network or application.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">2. Prepare and sign nondisclosure agreement (NDA) documents with the client.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">3. Organize an ethical hacking team, and prepare a schedule for testing.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">4. Conduct the test.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">5. Analyze the results of the testing, and prepare a report.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">6. Present the report to the client about the vulnerabilities.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">But the most important things which an Ethical hacker should know that No ethical hacking activities or testing associated with a network security test or system security audit should be start until a signed legal document has been given to ethical hacker express the permission to perform the hacking and testing activities on network or system is received from the target organization. This type of legal document is necessary because it can cause a trouble to the ethical hacker if he does not have proof to show that he has been allowed from the company.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">The other important thing which he should know is that the details of the ethical hacking report must be kept confidential, because they highlight the organization’s security risks and vulnerabilities. If this document falls into the wrong hands, the results can be harmful for the organization.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">In security field one more term is used vulnerability assessment which is simply identifies and reports noted vulnerabilities. But it is not the same thing as Penetration testing. Penetration testing tries to exploit those vulnerabilities for unauthorized access. It’s not a onetime action. It should be done regularly.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<b><span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Penetration testing<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Penetration testing is very important for anyone who stores important and sensitive information in systems. The only way anyone can be sure there are no security risks are if they have had their entire security system assessed and then made adjustments as necessary. This can only be done by penetration testing. You can see the steps in process of penetration testing in the figure below.<o:p></o:p></span></span></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivR0xuerLqkggDmmY9dYAw8ye2H1vp_hSg8XyImHdTrcf4RjoCivoONnMJVLnzEqeYWOka2PbSwlhRuW5qMUBREIz1q8eK5l4FX3DsIcMKj_7XrBnWU-ZKp9bmj5j2DzD3Ka1zmxFT_BAB/s1600/fig3.JPG" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivR0xuerLqkggDmmY9dYAw8ye2H1vp_hSg8XyImHdTrcf4RjoCivoONnMJVLnzEqeYWOka2PbSwlhRuW5qMUBREIz1q8eK5l4FX3DsIcMKj_7XrBnWU-ZKp9bmj5j2DzD3Ka1zmxFT_BAB/s320/fig3.JPG" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="266" /></a></div>
<div align="center" class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="line-height: 18px;"><br /></span></span></div>
<div align="center" class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<b><span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Figure 3: steps in penetration testing<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">You can see that the last step is re test. Now you can understand why I wrote that penetration testing should be done regularly.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">With the advancement in technology, hackers try to create new type of attacks, so all the older countermeasures will not work against these attacks. This is the reason why ethical hackers need to update their information on these types of new attacks so that they can create a good protection against these attacks. They should learn how these attacks are performed and then try to attack it on the network or systems, to check if systems are really secure. If not, then they try to secure systems and networks to prevent these attacks. So the new attacks are the reason why penetration testing is a regular process.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<i><span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">“The Information Assurance Certification Review Board (IACRB) manages a penetration testing certification known as the Certified Penetration Tester (CPT). The CPT requires that the exam candidate pass a traditional multiple choice exams, as well as pass a practical exam that requires the candidate to perform a penetration test against live servers.”<o:p></o:p></span></span></i></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Penetration testing can be carried out by several ways but in general we define as following 2 types<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b><span style="font-size: 12pt; line-height: 18px;">Black box penetration testing: </span></b><span style="font-size: 12pt; line-height: 18px;">In this type of penetration testing tester have no prior knowledge of the infrastructure to be tested. He should get all the information about the infrastructure of the network by some testing, guessing and skills. This testing is like the real attack on the system or network by the hackers. Because tester also has no given information about the infrastructure. Many companies use this type of penetration testing because this is the real time testing which feels like real hackers are doing on the network. But it slows down the system and network performance during testing time because there are so many testing tools used by the testers which use bandwidth and resources.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b><span style="font-size: 12pt; line-height: 18px;">White box penetration testing:</span></b><span style="font-size: 12pt; line-height: 18px;"> In white box penetration testing tester has complete knowledge of the infrastructure to be tested such as network diagram, source code of application, server settings. This information helps tester in his work. But this type of testing is not so effective.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-family: Arial, Helvetica, sans-serif;"><b><span style="font-size: 12pt; line-height: 18px;">Gray box penetration testing: </span></b><span style="font-size: 12pt; line-height: 18px;">This is the combination of black box and white box testing. In this some information are given to the tester not all. This type of testing is used in most of the organizations. It takes less time with more vulnerability exposure. It is easy to work for testers in this type of testing.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<b><span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Risks involved in penetration testing<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">But penetration testing must be done carefully. It also has some risk. In white box testing, tester has access to the code and during testing it can harm the code by mistakes. And in black box testing tester use so many tools to scan and attack on the network or systems which slow down the system performance of the network or system. The possibility exists that systems may be damaged in the course of penetration testing. Every attack has some negative impact on the network and the system and it may cause some times loss to the company. But it can be minimized by hiring experienced professionals and monitoring all the steps. Backup of all the things is also necessary. But the most dangerous risk is information leakage of the company. The person hired for the penetration testing of the company should work under proper guidance of the company. As part of company’s penetration testing team, he will be able to know all the hidden secrets of the company. The hidden infrastructures and network loop holes. If he is not monitored properly, he can misuse those information are leak the information to other companies which are your competitors in the market<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<b><span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Conclusion<o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">So we can say that ethical hacking and penetration testing are related to each other. Penetration testing is done with Ethical hacking with protection against attacks. In general the testers in the process of penetration testing are Ethical hackers. They can be the part of the company or some individual persons hired by the company for the network and system testing. Most of the company hire some certified ethical hackers to be a part of the company’s security team but most of the famous ethical hackers work on hourly basis and do not want to join any company. So companies hire them for their work. But company should track all the work done by Hired Ethical hacker because he is not the company person but he will have all the secret details such as security infrastructure of the company. He may leak the company secret information to other company. So it’s really important to take care while hiring any Ethical hacker for the company.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<span style="font-size: 12pt; line-height: 18px;"><span style="font-family: Arial, Helvetica, sans-serif;">Cyber crimes are increasing day by day so need of ethical hackers and penetration testers are also increasing. Having a permanent Ethical hacker is secure than hiring some out members. SO many companies are now hiring permanent Ethical hackers for the company. This can be a better career option for a person having interest in computers and network security. There are many reputed organizations which conduct exams and running courses for penetration testing and ethical hacking. One can join those institutes for being a certified ethical hacker and penetration tester.</span></span></div>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-68687931708956599172012-05-17T04:01:00.000-07:002012-05-17T04:02:42.263-07:00<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<span style="font-family: 'Trebuchet MS', sans-serif;">In this post i will explain about Caching Proxy servers and Web Proxy Server</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif; font-size: large;">This is the first type of proxy servers. </span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<b><span style="font-family: 'Trebuchet MS', sans-serif;">Caching Proxy servers</span></b><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"> These are the proxy servers which keeps a copy of the previously accessed pages, images and other type of media in the server cache for some period of time. If the same user or any other user requset for the same file, the file is served from the cache of the server. After the cache time period expired, the file is removed from the cache. Most ISPs and large businesses have a caching proxy. Caching proxies were the first kind of proxy server.</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;">Advantages of the Cache Proxy servers: As we can see that the web page, images and other media accessed by a user is stored in the cache. Next time these previously accessed pages are served directly from the cache not from the original server. So it reduces bandwidth consumption and faster access. The time of response is faster now. This is really good when you want to access some blogs which you have accessed before. Proxy server will serve the page from the serve cache even if the website is currently offline.</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;">Disadvantages of Cache Proxy servers: Although Cache Proxy servers provide faster access to some frequent resources. But it has a big advantage. It is not good for those website which changes the content and media frequently.</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;">Some poorly configured proxy servers also have some big advantages which creates problem in logging into a website. So use this proxy server with a good server administrator only.</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;">This post is published on hackingtricks.in and may be reproduced on some content theft websites which copy my posts daily. Try to avoid those websites</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;">But this advantage is not big now as most of th web masters are also optimize their website for caching and use some server side caching mechanisms by using CDNs. CDN cache static data of the website for the long period of time on the distributed servers.</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif; font-size: large;">This is the second type of proxy servers. </span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><b>Web Proxy Servers</b></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"> Web Proxy Servers are those Proxy servers which only serves the HTTP traffic. These are mostly used in Schools, organizations and corporate world to block websites on the base of URLs. All the proxy websites which we used to access some other websites in order to hide out IP address are called web proxy servers.</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;">But Web Proxies are some thing wider than we think. It can be the combination of some other type of proxy servers. A web proxy can also do the job of a cache proxy server to cache the recently requested pages to serve those pages next time from the cache.</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;">Types of Web Proxy:</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;">Transparent Proxy: These are the simpler type of proxy servers which keeps every thing transparent identifies itself as a proxy server . It reveals the IP address of the Proxy server and the IP address of the client who is using the proxy. These proxies are used to get around the simple IP ban but it do not provide the anonymity.</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;">Anonymous Proxy: These type of Proxy servers identifies itself as a proxy server and reveals the ip only of the the server. This hides the IP of the client who is using the server. This type of proxy server is detectable, but provides reasonable anonymity for most users.</span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="font-family: 'Trebuchet MS', sans-serif;">Elite Proxy: These are the most advanced proxy servers which do not identifies iself as a proxy server. So it is hard to detece whether the request is coming from the proxy server of coming from the original users. It provides an advance level of anonymity. These servers are usually paid and available only after paying. Hackers used this type of proxy servers for high profile hacking. These are also called High Anonymity Proxy servers</span><br />
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-79281770582255166562012-05-17T03:54:00.001-07:002012-05-17T03:54:26.126-07:00How to access any deleted and unavailable photo on facebook<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Facebook is the largest social network with more than 800 millions users. Users always want to see the pics of other persons and search for the scripts which could allow them to see the unavailable pic of other users. Sometimes we miss some pics which are now deleted by the users. But Facebook photos can be seen even after the deletion. And you can see the private pics of other users.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>How to see deleted pics on Facebook</b></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Like other big websites, Facebook also uses CDN service to distribute static content on various servers. This makes website fast. This CDN is the way by which we can access those pics on facebook which were deleted by the users month ago. If you want to know <a href="http://www.hackingtricks.in/2011/01/how-to-hack-facebook-account.html" style="color: #222222;" target="_blank">how to hack facebook account</a> read my older post.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>Follow these steps:</b></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">First of all select a photo to start your experiment.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Now right click on the photo and click on "copy image URL". Paste this address on notepad and save.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Now delete the photo. After the deletion, try to access the photo. You will see something link this.</span><br />
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPHb0FUTRLEbIDJHK1NWhETlqVt5GHndD6kupqOKoxbE-WCXJXtZJxyxfl-YdRrLNeohuMZi8cI_l4MK3D2K0p1svRzC03JNalKbS4P7F1xY0rSpa-XAI52eIv7R8XTL_Ce75-7UnB9rM2/s1600/fb1.JPG" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="68" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPHb0FUTRLEbIDJHK1NWhETlqVt5GHndD6kupqOKoxbE-WCXJXtZJxyxfl-YdRrLNeohuMZi8cI_l4MK3D2K0p1svRzC03JNalKbS4P7F1xY0rSpa-XAI52eIv7R8XTL_Ce75-7UnB9rM2/s320/fb1.JPG" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Now copy the link address from the notepad which we have saved and then open the link in browser. You will see the photo which you have deleted few moments back and was unavalable to see.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>How it works??</b> This is possible because <a href="http://www.hackingtrick.in/search/label/Facebook%20Hacking" style="color: #222222;" target="_blank">facebook</a> use CDN. When we delete a photo from the facebook, it is deleted by the facebook database and server. But various copies of the photo are distributed on the CDN servers which are still there. As facebook uses a long tome caching so these photos are available on those servers for months.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>How to see unauthorized pic: </b>One day one of my friend paste a link of a photo which was available to him but not to me. I want to see that photo but has no way. Here was my solution to see the that photo. I asked him to "copy image URL" and paste on the chat. By this URL i was able to see the photo on my browser while i was not authorize to see the photo.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>How it works?? </b>When we open a photo on facebook, its URL looks like this:</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>https://www.facebook.com/photo.php?fbid=somenumber&set=o.</b><b>somenumber</b> <b>&type=1&ref=nf</b></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Here facebook restricts us by the the fbid. <a href="http://www.hackingtrick.in/search/label/Facebook%20Hacking" style="color: #222222;" target="_blank">Facebook</a> checks whether we are authorize to see the photo or not. When we see the photo by image URL, it looks something like this.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><b style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><span style="font-family: Arial, Helvetica, sans-serif;">https://fbcdn-sphotos-a.akamaihd.net/hphotos-ak-ash4/s320x320/431527_316797435048428_100001545211364_864180_547497944_n.jpg</span></b><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">With this link, we see the photo direct from the server with its original location. So there is no restriction on the photo now.</span>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-7541118783792174302012-05-17T03:52:00.000-07:002012-05-17T03:52:33.963-07:00Tips to protect Facebook account from hackers<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Facebook, the social networking website or we can say our virtual world. Most of the people live more in this virtual world than their real world. We share our photos, moods and thoughts with our friends. But with the increase in use of Facebook, Hackers are also very active and they always try to hack innocent people's facebook account.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Many people do not care about their Facebook account security. According to them, "There is no loss to me if my facebook account is hacked." But they easily forget that they also have some of their private information. And if there is no private information, the account represents you. These are the people who never care about their account security and then request me to help in getting back their facebook account because some one is using it and doing abusive things. </span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Why should you always try to protect your account: Facebook is your online identity. If you account is hacked, you will have to face following problems:</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">1. Now someone else is living your life in Facebook. All the abusive and criminals activities done by hacker will represent you.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">2. He will ruin your reputation.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">3. Your private photos can be misused in porn industry.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">4. Your personal data wil be sold to the internet marketing firms</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">5. If you are a girl, then i do not think i have to explain the problem.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>Myths about facebook hacking:</b> Some people think that hackers have some nice hacking tools which easily gra their passwords. So they can not do any thing to protect their account. There is not a single percent truth in this. No tool exists which can grab your password. Yeah some hackers use facebook security services as a security bug to take over your facebook account. But facebook has given so many ways to recover facebook account. You are never going to lose your facebook account if you will follow all the security points which i am goinf to describe in this post.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Most of the time hackers use phishing and keyloggers to hack facebook account. Protection against these attacks are easy.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Read: <a href="http://www.hackingtricks.in/2012/03/how-to-access-any-deleted-and.html" style="background-color: white; border-bottom-style: none; border-color: initial; border-image: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; color: #222222; line-height: 25px;">How to access any deleted and unavailable photo on facebook</a></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>Security settings for facebook:</b></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">1. Hide your primary Email account and phone number from your profile. This should only be visible to you. It should not be available to your friends too.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">To do this click on your name on the top navigation bar and go to your time line. Now click on About to open your profile info. Here scroll down to contact info and click on Edit. Here you will see some icons with a down arrow key in front of each info. click on drop down in front of emails to change it to "only me." </span><br />
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFbDmfbFgVQv438pwmkDY6KjJfzvgaVPXq83h0CG0HwKXartX4aTlOgGCzP6hcJP9NrB0ASuOvNPdr5duoRjAUa1uzffeik5tOKONxJ5RgU4Za4xd6NbdaUu9isNdAS-EHiH3vjY5T8Fs8/s1600/fbsecure.JPG" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="70" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFbDmfbFgVQv438pwmkDY6KjJfzvgaVPXq83h0CG0HwKXartX4aTlOgGCzP6hcJP9NrB0ASuOvNPdr5duoRjAUa1uzffeik5tOKONxJ5RgU4Za4xd6NbdaUu9isNdAS-EHiH3vjY5T8Fs8/s320/fbsecure.JPG" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">You must hide your email id and phone number and change the visibility to "only me" option.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Hackers can use your email id and phone number to perform phising attack.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">2. Go to "Account settings" and then Security tab. Turn on "Secure Browsing". Click on Edit to enable the setting.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Enable "login notifications." This wil help you to know the unauthorize activity each time your account has been tried to access by you or someone else.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">3. Add your phone number as a recovery option. This is the best way to recover the password.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">4. Use a good Antivirus and internet security to protect system from keyloggers and trojans. Most of the internet security tools also warns against phishing page.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">5. Regular update your browser and windows for latest patches. Updated browsers has inbuilt security tools which protects against malicious downloads and phishing links.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">6. Avoid clicking on suspicious links and spams on Facebook. There are various type of scams running on the Facebook which attracts users by many offers. </span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">7. For girls, avoid adding strange smart boys.. profile pics can be fake. And if added any, never reveal your personal information such as address, phone number, about family and some other which can cause a trouble for you. Because many fake boys started blackmailing girls by saying that they will mail chats to her father or post pics on public websites.</span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; color: #333333; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">These are some facebook security tips which must follow in order to protect your facebooka account.</span>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-71164238791808452742012-05-16T06:32:00.002-07:002012-05-17T05:21:41.645-07:00Cool wondow tricks - it starts notepad with automatic typing<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"> You can send it to your friend to make a fun. This one is also w funny script which will open the notepad and start typing in it automatically. You can set the message it will type. Send it to your friendas a ghost of computer which will do anything on computer.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Type the script given below in notepad and save as Ghost.vbs and send to friend.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b></b></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>Set wshShell = wscript.CreateObject("WScript.Shell")</b></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>do</b></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>wscript.sleep 100</b></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>wshshell.sendkeys "This is a Virus. You have been infected."</b></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>loop</b></span>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-21369576902388340792012-05-16T06:30:00.002-07:002012-05-16T06:30:49.965-07:00How to speed up copy speed in windows<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="background-color: white; clear: both; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBDlASgAZB6ml4GQuZX_ykHue5B4xtSfTSAWSS2fngntXIglFc7qdsrwtOOYgzwk-MjUQFgN4cOfXIwxmsRuAvu0h2HysnXUaW3v2QtH5QRDr75H-9XNWzh60mdEmB4iFZSF7xh3Ez0lU/s1600/winmeld.jpg" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><br class="Apple-interchange-newline" /><img border="0" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBDlASgAZB6ml4GQuZX_ykHue5B4xtSfTSAWSS2fngntXIglFc7qdsrwtOOYgzwk-MjUQFgN4cOfXIwxmsRuAvu0h2HysnXUaW3v2QtH5QRDr75H-9XNWzh60mdEmB4iFZSF7xh3Ez0lU/s320/winmeld.jpg" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">This post is about a nice software which gives you a better experience in copy paste in windows. This tool has a lot of features and improves the speed of copy. The name of the tool is WinMend.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">WinMend File Copy is a free and excellent batch file copy tool. Based on extensive testing, and by constantly maximizing the potential of the operating system, WinMend File Copy developed a unique key technique that makes up for the inadequacy of the system’s default copy functionality and increases the speed of file copy to be 3 times of the system default. It can resume the interrupted replication and display a list of failed files, such as files occupied by other applications. It is the best help you can ever get to speed up system backup. Supports Language: English, Hungarian, Russian, Vietnames.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><b style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Features:</span></b><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><a href="" name="more" style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-decoration: underline;"></a><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">1. High-Speed Copy</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">2. Copying Resume</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">3. Error List</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">4. Three Copy Modes</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">5. Suspend COpy</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><b style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Download Here:</span></b><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><b style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><a href="http://www.winmend.com/file-copy/" style="color: #222222;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">http://www.winmend.com/file-copy/</span></a></b>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-85614393110556417182012-05-16T06:22:00.002-07:002012-05-16T06:22:39.579-07:00create a shortcut for locking the Computer Screen in Windows 7<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">There are many tricks to lock the computer screen but the most popular and fastest way is to use shortcuts. win+L is the shortcut to lock the screen. You can also use mouse to lock the screen</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">This is an alternate way to lock the computer screen in windows 7.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>Steps:</b></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>1: </b>Right-click on the desktop. </span><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">point to new, then shortcuts.</span><br />
<div class="separator" style="background-color: white; clear: both; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj6e6qxEw8krN0XbWEpw36p0N6_zjaX4oZQ_YuvATIjySaVt5BVC2UPCSi2tKZ8NeephKZgLrZImc19jx0E0mE85N8vsWcQub0Zt_vCrB6kf5wp5zmBtmXDe89DrCSqwwlJoKDTS8WZzo/s1600/lock.JPG" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="271" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj6e6qxEw8krN0XbWEpw36p0N6_zjaX4oZQ_YuvATIjySaVt5BVC2UPCSi2tKZ8NeephKZgLrZImc19jx0E0mE85N8vsWcQub0Zt_vCrB6kf5wp5zmBtmXDe89DrCSqwwlJoKDTS8WZzo/s320/lock.JPG" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>2: </b>Now type <b>rundll32.exe user32.dll, LockWorkStation</b> in the location box and click next</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><div class="separator" style="background-color: white; clear: both; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2rqJGImXV8ncHUyIh9l0KWAnY0lOQMH-IzpsykBwX8AR-eRDGoUVMKyj1OxmwMDhaeupln3dY5T-XH1vlppUQzhnuBR32i6Ca8D65LIIGRr9N3PRAsxrLHlQNj6MD6EkEL_12s9fwwoU/s1600/lock2.JPG" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="239" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2rqJGImXV8ncHUyIh9l0KWAnY0lOQMH-IzpsykBwX8AR-eRDGoUVMKyj1OxmwMDhaeupln3dY5T-XH1vlppUQzhnuBR32i6Ca8D65LIIGRr9N3PRAsxrLHlQNj6MD6EkEL_12s9fwwoU/s320/lock2.JPG" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><b>3: </b>then give the name to this shortcut. </span><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Click on the Finish button. </span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Now you can use this shortcut to lock the computer screen</span>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-39694970679979911112012-05-16T06:21:00.002-07:002012-05-16T06:21:32.855-07:00how to display text message during windows startup<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">You can add a text message during windows startup as a messag to users who use your computer in absense of you. i haev tested this trick on windows xp, vista and 7. It works fine on all these versions of operating systems.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Follow these message.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><br />
<ol style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;">
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">GO to run, type "regedit" and press enter</span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Navigate to<b>HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\System</b> and double-click on legalnoticecaption</span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">In the Value data field enter header what you want.</span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Then double-click on legalnoticetext And in the Value data field enter in the message you want to display and click OK.</span></li>
<li><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Now reboot your system to see the effet. </span></li>
</ol>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-13976604464285288482012-05-16T06:07:00.002-07:002012-05-16T06:15:19.897-07:00How to show lyrics in windows media player<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Windows media player is the default media player for windows system. And it is available in all flavors of windows. You can almost all popular audio and video formats in this player.</span><br />
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Think if you can see the lyrics of a song too in the player. Now you do not need to search for the lyrics and then download on the system to read it. You can add a small plugin to your system to show the lyrics in windows media player.</span><br />
<div class="separator" style="background-color: white; clear: both; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLZQqulHac_a29UAEnGUib89qlxGyN3W18Tz5d0CKKuJ8O-s6sd2IYpcUPWJSMcV19PMs6uIbawg2XbHGeytcAE2b1ME5gltmRvsYrZYG6EdGlalzxFDSdjK8NvAj_YQUJqf9gIy1oZnE/s1600/Lyrics-Plugin-for-Windows-Media-Player.png" imageanchor="1" style="color: #222222; margin-left: 1em; margin-right: 1em;"><img border="0" height="226" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLZQqulHac_a29UAEnGUib89qlxGyN3W18Tz5d0CKKuJ8O-s6sd2IYpcUPWJSMcV19PMs6uIbawg2XbHGeytcAE2b1ME5gltmRvsYrZYG6EdGlalzxFDSdjK8NvAj_YQUJqf9gIy1oZnE/s320/Lyrics-Plugin-for-Windows-Media-Player.png" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="320" /></a></div>
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br />
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Download this plugin from the link</span><br />
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><a href="http://www.lyricsplugin.com/download/lyricsplugin-wmplayer.php" style="color: #222222;">http://www.lyricsplugin.com/download/lyricsplugin-wmplayer.php</a></span><br />
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">After the installation of the plugin, open windows media player. Now, start playing any song and change the view mode to Now Playing, press Ctrl+3 to enable so. Now, you will see the lyrics of the song you are playing on the screen</span>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2532968397576091478.post-36446490892302075042012-05-16T06:06:00.002-07:002012-05-16T06:06:30.124-07:00How to extract data from a Web Page into an Excel Spreadsheet<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Do you know? you can extract the data of a website into a excel spreadsheet. This feature is very useful when you found some useful data on a webpage and you want to save it into your system. You can save Google search results, your bank ministatments and other records with just a mouse clicks.</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaN5KkDYPIBMk8le7Wi2As1w75UOPYmeAqZC1kRK94NzlNrT6As-3qRsi59qBk0untcTw91dV2zruQm7grQmBzoZwX81OltWeEZW1gx7xG1RnYi04C0P13HA-m7IEf2-TCzvKYN36riQQ/s1600/importwebpages.png" imageanchor="1" style="background-color: white; clear: left; color: #222222; float: left; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px; margin-bottom: 1em; margin-right: 1em;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><img border="0" height="115" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaN5KkDYPIBMk8le7Wi2As1w75UOPYmeAqZC1kRK94NzlNrT6As-3qRsi59qBk0untcTw91dV2zruQm7grQmBzoZwX81OltWeEZW1gx7xG1RnYi04C0P13HA-m7IEf2-TCzvKYN36riQQ/s200/importwebpages.png" style="border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-bottom-style: solid; border-bottom-width: 1px; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(204, 204, 204); border-top-left-radius: 4px; border-top-right-radius: 4px; border-top-style: solid; border-top-width: 1px; box-shadow: rgba(0, 0, 0, 0.148438) 0px 1px 1px; padding-bottom: 4px; padding-left: 4px; padding-right: 4px; padding-top: 4px;" width="200" /></span></a><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">To import a webpage into excel sheet click on Data and then go it Get External Data group. In this you will find an option "From Web". Click on this and then "From Web".</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">There is another way of doing this in which you do not need to open Microsoft excel each time to import a webpage. </span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Open Internet Explorer and then navigate to the website you want to import. Then right click on the page where you will find an option to "Export to Excel"</span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><br /></span><br style="background-color: white; font-family: 'Segoe UI', Calibri, 'Myriad Pro', Myriad, 'Trebuchet MS', Helvetica, sans-serif; font-size: 14px; line-height: 19px;" /><span class="Apple-style-span" style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 19px;">Once the data is inside Excel, you can do all sort of complex things like conditional formatting, sorting, create charts, etc. If you set the data auto-refresh, Excel will update the worksheet whenever the source web page changes.</span>
</div>Unknownnoreply@blogger.com0