Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Sunday, November 28, 2010

How to surf web anonymously with TOR

We all many times use proxies for staying anonymous on internet. Lets quickly check out , what we are actually doing while using proxies. We first connect to a proxy server which brings resources requested by us from the web server.


Thus a proxy server hides our identity by acting as an intermediary between us and the web server that we are accessing. Suppose we break into a server using a proxy server thinking that we are anonymous. But what if owner of web server starts enquiring about the clients connecting to it using the proxy server and it is possible that owners of proxy server might reveal our identity. This means we cant actually rely on proxy servers for being anonymous online. Here comes the concept of THE ONION ROUTING (TOR) into picture. By using this , the client traffic is supposed to be passed from three different servers or nodes before reaching to actual web server. It may randomly take any path through any three nodes.

Lets consider it has taken path shown by green arrows. Now

* Node 1 knows only actual origin(client) but not actual destinantion(web server).
*Node 5 neither knows actual origin nor actual destinantion.
*Node 9 knows actual destination but not actual origin.

Thus no one exactly knows which client is accessing which web server. So it is highly anonymous.

Installing and Using TOR:

Step 1. Download the TOR client from the given link and run the setup .

http://adf.ly/BuiF

Note: You need to install a Mozilla firefox add on which is included in package you have downloaded to use Tor.






Step 2. Open the 'Vidalia Control Panel' from the task bar and Click on 'Start Tor'.


Step3. Now open Mozilla Firefox browser, single click on red highlighted 'Tor Disabled' on right corner of browser and it will turn to green highlighted 'Tor Enabled'.

Now just log on to 'www.whatismyip.com' and you will see your new public IP address that will keep changing after an interval of time according to the path randomly taken by web traffic through three different nodes.





0 comments







Firesheep Makes Facebook Hacking Easy

Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly last 24 hours, With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account

What is Session Hijacking?

In a Http session hijacking attack an attacker steals victims cookies, Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook Google, Yahoo, Orkut, Flickr etc or any other email account

How can a Hacker use Firesheep to Hack a Facebook or any other account?

Now I will tell you how can a hacker use firesheep to hack a facebook or any other account, You will need the following things:


Method

1. First of all download "Firesheep" from the above link and use the "openwith" option in the firefox browser


2. Once you have installed firesheep on firefox web browser, Click on view at the top, then goto sidebar and click on Firesheep



3. Now click on the top left button "Start capturing" and it will start to capture the session cookies of people in your wifi network, This will show you the list of those people whose cookies are captured and have visited unsecured website known to firesheep, Double click on the photo and you will be logged in instantly

Firesheep

Hope you liked the post! Pass the comments.





10 comments







Saturday, November 27, 2010

How To Add A Url Address Bar To The Taskbar

You can add an Internet URL address bar to your Windows XP taskbar. Doing so will let you type in URLs and launch Web pages without first launching a browser. It will also let you launch some native Windows XP applications in much the same way as you would via the Run menu (so you could type in calc to launch the calculator or mspaint to launch Microsoft Paint. Here's how you add the address bar:

1. Right-click on the taskbar, select Toolbars, and then click Address.

2. The word Address will appear on your taskbar.

3. Double click it to access it.

4. If that doesn't work, your taskbar is locked. You can unlock it by right-clicking on the taskbar again and uncheck Lock the Taskbar.

NOTE: You may also need to grab the vertical dotted lines beside the word Address and drag it to the left to make the Address window appear.





10 comments






Hide Keyloggers and Trojans with Binders

You would have probably heard that never run a .exe file if you are not confirmed about the authenticity of the person who send you that particular file, The reason why you might have heard that because Trojans, Keylogger, Spywares and Adwares use .exe format by default


So what do you think are you completely safe that you run untrusted MP3,JPEG files?

The answer is no, Its because you never know that virus has came with which format, It can take any format, It could be in JPEG, It could be in MP3 and it could be in almost any Format, So in this article I will tell you how hackers hide Keyloggers,Trojans and other harmful viruses in other files

 What is a Binder?

 A Binder is a software used to bind or combine to or more files under one name and extension, The files to be binded can have any extension or icon, Its all up to you and you have the choice to select the name, icon and various attributes of binded file, The Binded files can be even worse when they are crypted, because Bintext would not be able to find it and at the same time it could also bypass antivirus detection then you are almost guaranteed to be infected


Popular Binders

Here are some of the popular binders used by hackers to hide keyloggers and Trojans:

Simple Binder



Simple binder is one of my favorite binders of all time, I give thumbs up to the maker "Nathan", Its so easy to use and even a script kiddie can easily use it to bind keylogger or backdoors with other files


Weekend Binder


Weekend Binder can be used to bind two or more files under one extension and icon, If the binded file contains an application, the application also runs along with the actual binded files .


How to detect Crypted Binded files?



As I told you before that if a trojan or keylogger is binded with a file and it's crypted in order to bypass antivirus detection then its very difficult to detect it, However there is a great piece of software called resource hacker which is really effective when it comes to keylogger protection, It detects whether the file is binded or not.






Tuesday, November 23, 2010

Display Selected Friends Only on your Facebook Profile

If you have hundreds of facebook friends.This trick will show you how to display certain friends that you select all the time on your facebook profile.
You can also select how many friends are shown.

1. Go to your facebook profile page.
2. Click “Edit Box” pencil in your Friends box.
3. Type the names of your friends in the box that “Always show these friends”.

 










Protect Your Blog From Plagiarize (Copy Paste)

Protect Your Blog From Plagiarize (Copy Paste).....

follow these steps :P
1. Log in to Blogger.
2. On your Dashboard, Select Design.
3. Then Click Edit HTML.
4. Find the word, in the template source code.
5. Replace above code with the below code.




Note: Now your blog will be disable selecting and RightClick.










Make a photo background in drives

Perform the following steps ..

STEP1 )Open notepad and copy the following code :



[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=D:\Wallpapers\celeb\Genelia.jpg
iconarea_text=0x00FFFFFF

STEP2) Here, the path in the 2nd line of code represents the path of your picture.

STEP3) Now save this file as DESKTOP.INI in the location(any drive or any folder) where you desire to set the background picture.

STEP4) After setting it in your favourite location,close the drive and open the location again.

DONE !! .. your picture has been set as background picture for your desired location.

NOTE : Make sure that the extension in the path should be .jpg only and file should be saved as DESKTOP.INI only.

Frnds ... SHARE your experiences in comments after performing this cool trick.Good luck !!











People Search

Now you can find info abt any person,see what websites he is registered on,etc etc...very easily.

Just visit this site,and type the email id there....
Done!!

http://adf.ly/AATY (click the skip add on top right corner )






Sniperspy keylogger For Mac OS Launched

Remote password hacking software
Previously I wrote a review on Sniperspy and concluded it as the best Keylogger to Hack Facebook Password or any other email account Password, but unfortunately some of my blog readers use Mac OS and the sniperspy  did not work on Mac OS, but yesterday received the news from Sniperspy Team about Sniperspy keylogger for Mac OS has just launched so I  decided to give it a try and share with you

SniperSpy is the only software that allows you to secretly watch your Macintosh like a television! Login from ANYWHERE using another computer, smartphone or iPad.

After you install this program to the Mac you wish to monitor, it begins silently recording everything they do online. The program then uploads user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login.

View the screen LIVE and see everything they do online in real time! Browse the file system, view chats, websites, keystrokes and more, with screenshots. You can also access the LIVE control panel within your secure online account to perform live monitoring functions.

Features:

The Sniperspy for Mac OS has Following Features

Keystroke Recordings
The Sniperspy for Mac OS can record all the keystrokes typed on the victims computer. The victim wont even know if Sniperspy is installed in his/her computer


Chat Recordings
The Sniperspy for Mac OS can also track Yahoo, msn, skype etc chats




Live Screen Viewer
Sniperspy is the only software for Mac OS which has a unique feature of Live Screen Viewing, with this feature you can see victims computer just like a Television Screen



and much more

So what are you waiting for, Get your hands on the best Keylogger for Mac OS and Start Monitoring

For Buy Now and Download links kindly visit the link below






Sunday, November 21, 2010

Mobile phone spy software

You can now easily find out who your partner, business associates, and friends have been in contact with. Whether you are suspicious of an affair, or would just like information that will help progress your career, you can now do all of the following using your mobile phone, and the person you are targeting will not suspect a thing. Guaranteed!
Ultimate Bluetooth Mobile Phone Spy Software Edition 2008 will work on All mobile devices that are bluetooth enabled. Not just phones but also laptops, computers, etc. YOU WILL RECEIVE SEPERATE SOFTWARE FOR OLD MODELS AND NEW MODELS (INCLUDING SYMBIAN PHONES). No need to list compatible phones - this works on ALL phones!


Not just 1 program but an entire suite that will work on old phones, new phones, smart phones, java phones - on absolutely all of them!
  • VIEW CONTACTS LIST
  • READ TEXT MESSAGES (SMS)
  • VIEW CALLS MADE / CALLS RECIEVED
  • SET THE TARGET PHONE TO CALL YOU WHENEVER IT MAKES OR RECEIVES A CALL
  • VIEW PHOTOS

MANY MORE FUNCTIONS

ALL THE ABOVE INFORMATION CAN EASILY BE DOWNLOADED TO YOUR PHONE

MAKE CALLS VIA THE PHONE YOU HAVE TARGETED
NO RANGE LIMITATION - SPY FROM ANYWHERE!
Once the target phone has been remotely set you do not need to be in Bluetooth range to listen to calls.

There is no trace or logging of your phone's details on the target phone
That means: THEY WILL NEVER KNOW



Download:
2008 version:

http://hotfile.com/dl/33832004/8465ad9/Ultimate_Bluetooth_Mobile_Phone_Spy_Software_Edition.rar.html

2010 version:

http://hotfile.com/dl/52746687/8ff4fb2/Ultimate.Bluetooth.2010.rar.html









Find Free Porn Sites Passes

first let me say that this won't work for every site and people have probably already heard of this but just in case not here's how you do it

1. Go to google.com

2. Type this (with the quotes) "@members..com" replace with whatever site you want passwords for
e.g. "@members.bangbros.com"

3. Click on this button http://i45.tinypic.com/9kqzwo.jpg

4. Click on the option that says "latest" http://i50.tinypic.com/t4w7wz.jpg

5. You should see search results with urls like this http://:@members.bangbros.com
where is the username for the account and is the password for the account
e.g.
Code:
http://pornwatcher43:imaperv@bangbros.com

6. Go to the sites login page and enter the user name and password you got in step 5

7. Yay free pay porn








Rapidshare Life Time Free Use Premium Account

UNLIMITED download/upload Its very easy to fool RapidShare server if your IP address is assigned by your ISP.
Just follow these simple steps:

Clean up IE or netscape or Firefox cookie( In this case the one that belong to rapidshare website)

On Command prompt (open MS-DOS)
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter

Or save these commands in a bat file and run it everytime you need to fool Rapidshare server. Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download/upload as many files as you want from their server.

another way, get proxies from the internet and apply to the browser.
some of proxies might not work though...

Note:
If you are on a LAN and behind a router (using NAT, for example)---this will not work.
If you use a fixed proxy--- this will not work.
If you have a fixed IP address from your ISP or college or employer or whatever -- this will not work.
If you happen to get the same IP address from your DHCP server because it's assigned to you -- this will not work
No waiting
THIS "cheat" for RAPIDSHARE DOWNLOADS eliminates the "WAITING" for the file. No more COUNTDOWNS. So heres what you do:

1. First, Find a rapidshare download.
2. Hit the FREE BUTTON, like always.
3. While your waiting for it to countdown, change the URL in the bar to:
Code:
java script:c(countdown = 0);
and hit ENTER or the GO button over and over. Eachtime you do so, it decreases 10-20 seconds. Few times and the link appears.
or you can simply do the code below ONCE
java script: for (i=0; i<30; i++) { c(); }









How to find a vulnerable Website?

Website security is a major problem today and should be a priority in any organization or a webmaster, Now a days Hackers are concentrating alot of their efforts to find holes in a web application, If you are a website owner and having a High Page rank and High Traffic then there is a chance that you might be a victim of these Hackers.
Few years back their existed no proper tools search for vulnerability, but now a days there are tons of tools available through which even a newbie can find a vulnerable site and start Hacking

 Common Methods used for Website Hacking

There are lots of methods that can be used to hack a website but most common ones are as follows:


1.SQL Injection
2.XSS(Cross Site Scripting)
3.Remote File Inclusion(RFI)
4.Directory Traversal attack
5.Local File inclusion(LFI)
6.DDOS attack

I have explained some of these methods in my post "Common methods to hack a website"

Tools commonly used to find a vulnerable website

Acunetix

Acunetix is one of my favorite tool to find a venerability in any web application It automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities.

Download Acunetix Web Security Scanner

Nessus

Nessus is the best unix venerability testing tool and among the best to run on windows. Key features of this software include Remote and local file securitychecks a client/server architecture with a GTK graphical interface etc.

Download Nessus from the link below
http://www.nessus.org/download

Retina-

Retina is another Vulnerability assessment tool,It scans all the hosts on a network and report on any vulnerabilities found.

Download Retina from the link below
http://www.eeye.com/Downloads/Trial-Software/Retina-Network-Security-
Scanner.aspx

Metasploit Framework

The Metasploit Framework is the open source penetration testing framework with the world's largest database of public and tested exploits.

Download Metasploit(For Windows users) from the link below
http://www.metasploit.com/releases/framework-3.2.exe

Download Metaspolit(For Linux users) from the link below
http://www.metasploit.com/releases/framework-3.2.tar.gz






Wednesday, November 17, 2010

How to Hack a Facebook account using Hardware Keylogger

Photobucket
Did you know a keylogger is the simplest way to hack a Facebook account?, I have written lots of articles on software keyloggers such as sniperspy and winspy, but software keylogger is not the only keylogger used for facebook hacking , there is an other type of keyloggers and that are called hardware keyloggers.
A hardware keylogger is also used for keystroke logging, A hardware keylogger is plugged between the keyboard plug and the USB or PS/2 port socket, they work with PS/2 keyboards and also usb keyboards,

 A hardware keylogger is just like a normal USB drive or any other computer peripheral so that the victims can never doubt that it is a keylogger, Hardware keylogger has any inbuilt memory which stores the typed keystrokes, Here is how a hardware keylogger may look like:



KeyCobra - The next generation hardware keylogger 

Keycobra is one of my most favorite hardware keyloggers as it offers more than 2G of storage,This keystroke recorder comes in a standard version - 4MB memory capacity, 2,000,000 keystrokes (over 1,000 pages of text), and a Venom version 2 billion keystrokes (over 1 million pages of text), organized into an advanced flash FAT file system. It is compatible with all three operating systems windows,linux and Mac OS, Here are some features of hardware keylogger due to which keycobra is one of the most popular hardware keyloggers around.

Features 

  • Record ALL Keystrokes - even Facebook passwords!
  • Huge memory capacity, organized as an advanced flash FAT file system
  • Advanced text menu for viewing recorded data, includes Net Detective, Phrase Search, Key Filtering, Unplug Counter and more!
  • Super fast memory contents download with USB Download Accelerator (included)
And much more

Here is an screen shot of logs captured by keycobra as it has captured keystrokes for chat.


So what are you waiting for, Grab your hands on the next generation hardware keylogger, Visit the official website of hardware keylogger for more information:

KEYCOBRA - Next Generation hardware keylogger






Sunday, November 14, 2010

Free Kaspersky Internet Security 2011 License Key (1 Year)

There is no doubt that Kaspersky Internet security is one of the most popular Internet security suites, It is claimed that Kaspersky detects more than 98% of the threats, but due to its high cost it is really difficult for e very one to afford it, Therefore I am posting a method to get Free Kaspersky Internet Security 2011 License Key for one year which is worth almost 60$ per license, So follow the steps to get a Free Kaspersky Internet Security 2011 License key

1. First of all goto the Chinese promotional website here

2. Type your email address in the both boxes

3. Next enter the capacha

4. You will now receive the key on your email address you provided in the second step



5. This key won't work on English version so you need to download a Chinese version of Kaspersky Security 2011, Download  it  from here

6. Once you have downloaded the kaspersky chinese version, open the installer and Click on the button marked with the blue box to proceed with the installation.

7. Enter the license key you receiver earlier in the text box and click on the button marked with blue in the below image.

8. Once the kaspersky Internet Security 2011 Chinese version has been installed, Follow the steps below to change it into the English version
  • Go to Safe Mode in Windows
  • Go to Registry Editor .
  • Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\KasperskyLab\protected\AVP11\environment.
  • Update the value of SkinSwitchDisabled from 1 to 0.
  • Restart the computer.
  • Run Kaspersky again and press”Shift + F12″ to change the language to English.






Friday, November 12, 2010

Learn how to hack with the Hackers academy

How to hack?, I get this question asked daily, Lots of people are curious to learn Ethical hacking but they do not know where to start, Any one can become a fairly good Ethical Hacker if he/she can learn from basics and he/she should have a place to practice what he learned

This is where The Hacker's Academy comes into play, If you are a beginner or intermediate or advanced this is still for you, The Hackers Academy is one of the most professional online Ethical Hacking and penetration testing institute, one of the best parts of hackers academy i like is that they give you labs(A place where you can practice) so you can try the concepts for your self

The course will contain of audio recording and video recordings but the most important part is that once you are a member of hackers academy they will tell you exactly how you can create Labs so you can practice what you have learned.


If you get stuck some where then they have professionals 24/7 there to help you out with any problem you have or any question you have. The Hackers Academy course will also prepare you for different types of certifications, once you become a member of The Hackers Academy and I can say it surely that you will pass any type of Ethical hacking certifications and tests

The membership program also has a 30 day money back guarantee, so you have nothing to loose!, If you are unhappy with them, then they will return your every penny

So what are you waiting for, Don't wait until you loose your chance!Get it now!







Tuesday, November 9, 2010

Bring Down Anysite Quick- Sprut- Dos

This program is able to bring down a Virtual Private Server in maximum 1hour. Me and other Sprut users were able to completly shut down a VPS in 10 min with a downtime of 1hour )after the program was exited.Remember always use a Proxy. But still its risky.

http://img213.imageshack.us/img213/2958/sprutlzexpandqp1vp2.png










Add your name at right click of your computer

Here i'll tell you how to add ur Name to right click on my Computer and also Open Your favoraite application with that .Heres How To do :-
Playing With Windows Registry Can be dangerous Try This at ur own risk

1.Copy/Paste the following code in Notepad And then Save it as .reg


Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Your Name Or Name of the Application"
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"


Now edit it and then Type ur name In

Code:
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Your Name Or Name of the Application"

Now Type the location Of the application Which u want to open In:

Code:
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"For eg.C:\Program Files\Winamp\winamp.exe
Thts It finally save it And then Run it .









Monitor an IPhone or an iPod with Mobile Nanny

Mobile Nanny is an extremely useful which can be used to monitor an iPhone or an iPod, With Mobile Nanny you can block, record user activity and set restrictions on your iPhone or iPod touch using MobileNanny which is a new jailbreak tweak available in cydia, Mobile Nanny s next generation Parental control software which also has an ability to block and monitor every aspect of how your Child uses your mobile phone.All of these softwares have 100% money back guarante

How it works?

The image below illustrated how Mobile Nanny works



So what are you waiting for grab your hands on one of the best iPhone monitoring softwares, Grab mobile Nanny from the link below:
Mobile Nanny Download


You might also like:
Which Cell Phone Spying software to Choose?
How to use sniperspy to hack passwords?






Saturday, November 6, 2010

Hack administrator from Guest account in XP

If u wanted to hack your college pc with guest account/student account so that you can download with full speed there ? or just wanted to hack your friend’s pc to make him gawk when you tell your success story of hacking ? well,there is a great way of hacking an administrator account from a guest account by which you can reset the administrator password and getting all the privilages an administrator enjoys on windows..Interested ? read on…

Concept
======

Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command prompt with administrator privilages because no user has logged on. From there we can hack the administrator password,even from a guest account.

Prerequisites

Guest account with write access to system 32.

Here is how to do that -

Go to C:/windows/system32
Copy cmd.exe and paste it on desktop
rename cmd.exe to sethc.exe
Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.

Now Log out from your guest account and at the user select window,press shift key 5 times.
Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open.


Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password.
Congrats You have hacked admin from guest account.
Further..

Also, you can further create a new user at the command prompt by typing “NET USER XERO /ADD” where “XERO” is the username you would like to add with administrator privileges. Then hide your newly created admin account by -

Go to registry editor and navigate to this key
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList]
Here create a new DWORD value, write its name as the “user name” that u created for your admin account and live with your admin account forever :)










Make your computer faster

Go to notepad
write this in:

mystring=(80000000) without asterisk

save it on your desktop and name it *ram.vbe.Now close notepad and double click on ram.vbe

Nothing will open but your computer will get faster.










Partition Hard Drive Without Losing Data

Before starting note that,

- We can partition any drive, even a system drive

- We can do it only in Windows, Windows 7 and Vista specifically

So let’s divide it.

Go to Start > Right click on My Computer and choose Manage.
Disk Management Window will
Pop-up, it may take time to load it since it fetches for all the
hardware and system information in your PC. After it’s fully loaded, go
to Storage> Disk management at the left sidebar. This is where we’ll
have all the information about storage devices that are in our PC
currently connected and active.

At the right column all the storage media will be listed with their
basic information like File system type, and status. Now choose the Volume that you want to partition. Right Click on it and select Shrink Volume option from menu.

As soon as you click on the Shrink Volume option, system will search for available space in your selected Disk Volume.
This will not take much longer than few seconds. After querying, Shrink window will pop-up. This is where you’ll have to specify the Volume for next partition.

Look at the total size of available shrink space. Below it, you’ll have to Enter the space to shrink.you must make sure that the size is not below the total size of space taken by files in that drive.

You can check the used space by right clicking on the drive you are going to partition and choose Properties.
Click on Shrink button after specifying the size to shrink. The shrink
size is for the value for the partition where your old files will be
contained and remaining size will allocated for your next partition.

But you’ll still not able to access this new drive. You’ll have to
format it and specify the drive letter to access them. To do so,
continue reading.

Right click on unallocated drive and choose New Simple Volume option.

New Simple Volume Wizard Window will popup.

Click on Next button to continue.

In next window, you’ll have to specify the size for your new volume.
Set full size if you are satisfied with two partitions; else divide it
again for new partition.

Next choose any drive letter from the available list and click on Next button.

In next window, leave everything as default but make sure it’s similar to the screen below:

Click on Finish window to complete the wizard.

If you’ve autoplay enabled in your computer, then New Volume will be auto played for the first and last time.
With similar method you can also format your empty drive to create multiple partitions.









New social site like facebook

Indian Hackers have created a new social site to compete with facebook . Many feature are copied from facebook like tagging and notifications etc . It seems more like a combination of facebook and twitter . Lets see how much it work . The link for the site is www.socialkin.com .








Thursday, November 4, 2010

Firesheep Makes Facebook Hacking Easy

Recently a new firefox addon Firesheep have been a cause of thousands of email accounts, As reported by techcurnch, Firesheep has been downloaded more than 104,000 times in roughly last 24 hours, With Firesheep the hacker can control any account without even knowing the username and password of the desired account, As Facebook is worlds most popular Social Networking website, therefore it has been the major victim of it, Firesheep uses Http Session hijacking attack to gain unauthorized access to a Facebook or any other account

What is Session Hijacking?

In a Http session hijacking attack an attacker steals victims cookies, Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook Google, Yahoo, Orkut, Flickr etc or any other email account

How can a Hacker use Firesheep to Hack a Facebook or any other account?

Now I will tell you how can a hacker use firesheep to hack a facebook or any other account, You will need the following things:


Method

1. First of all download "Firesheep" from the above link and use the "openwith" option in the firefox browser


2. Once you have installed firesheep on firefox web browser, Click on view at the top, then goto sidebar and click on Firesheep



3. Now click on the top left button "Start capturing" and it will start to capture the session cookies of people in your wifi network, This will show you the list of those people whose cookies are captured and have visited unsecured website known to firesheep, Double click on the photo and you will be logged in instantly

Firesheep

Hope you liked the post! Pass the comments

Some posts from Past on Facebook Hacking:

How to hack Facebook Password
Hack Facebook Password using winspy
4 ways on how to hack Facebook password
Hack Facebook account using Facebook freezer






Tuesday, November 2, 2010

Change the processor name

Type following lines in notepad

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]
"ProcessorNameString"="Intel Xeon 8.0GHz"

and save as processor.reg and run it.

To see new processor name Click on “My computer” and right click and choose property,
which will show “ Intel Xeon 8.0 GHZ. In the place of Intel Xenon 8.0 Ghz we can write anything.....









Monday, November 1, 2010

How to surf web anonymously with TOR

We all many times use proxies for staying anonymous on internet. Lets quickly check out , what we are actually doing while using proxies. We first connect to a proxy server which brings resources requested by us from the web server.

    
Thus a proxy server hides our identity by acting as an intermediary between us and the web server that we are accessing. Suppose we break into a server using a proxy server thinking that we are anonymous. But what if owner of web server starts enquiring about the clients connecting to it using the proxy server  and it is possible that owners of proxy server might  reveal our identity. This means we cant actually rely on proxy servers for being anonymous online. Here comes the concept of THE ONION ROUTING (TOR) into picture. By using this , the client traffic is supposed to be passed from three different servers or nodes before reaching to actual web server. It may randomly take any path through any three nodes.

Lets consider it has taken path shown by green arrows. Now

* Node 1 knows only actual origin(client) but not actual destinantion(web server).
*Node 5 neither knows actual origin nor actual destinantion.
*Node 9 knows actual destination but not actual origin.

Thus no one exactly knows which client is accessing which web server. So it is highly anonymous.

Installing and Using TOR:

Step 1. Download the TOR client from the given link and run the setup .
   
http://www.ziddu.com/download/12331095/vidalia-bundle-0.2.1.26-0.2.10-1.exe.html

Note: You need to install a Mozilla firefox add on which is included in package you have downloaded to use Tor.





                                          
Step 2. Open the 'Vidalia Control Panel' from the task bar and Click on 'Start Tor'.

                         
Step3. Now open Mozilla Firefox browser, single click on red highlighted 'Tor Disabled' on right corner of browser and it will turn to green highlighted 'Tor Enabled'.

Now just log on to 'www.whatismyip.com' and you will see your new public IP address that will keep changing after an interval of time according to the path randomly taken by web traffic through three different nodes.

About The Author
This is a guest post written by Aneesh M Makker. Aneesh M.Makker is an Ethical hacker from Malout, a town in Punjab.Click here to visit his Facebook Profile






Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

200+ Followers

Followers


meet women in Ukraine contatore visite website counter

Recent Comments

Follow Me On Twitter

1112+ Followers