Wednesday, 31 October 2012
Monday, 29 October 2012
Find keylogger or any spyware in PC
Its great method to find or detect a keylogger or any other spyware in your PC or system. As we all know nowadays keyloggers and spywares are big concern as hackers are trying their best to infect the victims to hack their accounts. Today i will teach you how to find a keylogger or Trojan or spyware in your PC or Laptop. There are several ways to find them but using this method you will know the exact path of the keylogger and where its saving the log file. Also once you have the keylogger server now you can reverse engineer the server and hack the hackers account password which he used in keylogger server. Lets first start with keyloggers introduction.
Sunday, 28 October 2012
How to shutdown your friend's Pc
How to shutdown your friend's Pc through chating using cmd Hello friends. You can shutdown your friend's computer through chating. This is very simple and cool trick. Kindly follow these
steps :-
Saturday, 27 October 2012
What Is Brute Force and some Softwares for brute force attack
Hi , The topic of this article is "Brute Force".In this article i will explain the meaning of bruteforce and will provide some top Brute force softwares to download.Lets Strat....
Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies. Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence. Brute force is considered to be an infallible, although time-consuming, approach.
Flame (malware) what you need to know
Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system.The program is being used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT),Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics. The last of these stated in its report that "sKyWIper is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found."
Friday, 26 October 2012
Ubuntu: The Complete Introduction for Beginners
Ubuntu is linux based operating system with the origin in south africa. Its name means "humanity towards others". Back in 2004, Linux was already established as a server operating system, but free software was not yet a part of everyday life. Further, Linux was thought of as a complicated operating system which non-technical people could not use. It was at this time in 2004 that Ubuntu began as a Linux distribution aimed at ease of use. Mark Shuttleworth, the creator of the project, gathered a few developers and went on to create the most popular Linux distribution till date.
Thursday, 25 October 2012
Advanced Port Scanning techniques
Advanced Port Scanning techniques
-----------------------------------------------------------------------------Today i will teach you different types of port scanning and their analysis, drawbacks etc. Lets start with a brief overview of yesterday's tutorial.
In simple words, Port Scanning is a series of attempts by a hacker or network administrator to examine which ports on a network are open/closed/filtered by attempting to connect to a range of ports and then gathering information from responding open ports to detect what applications or which service is associated or running on those ports. Port Scanning is accomplished by running port scanner against the host to scan 0 to 65536 potentially available ports on computer.
Tuesday, 16 October 2012
How To: Delete ghost messages from MS Outlook
Most people who use Microsoft Outlook as an email client for Gmail or their personal POP
mail would sometimes notice that it is trying to send out emails but there aren’t any in the
outbox. These are usually ghost messages that have been sent earlier or are too large
and stuck in your outbox. Deleting these stuck emails removes them, but there are some traces
that are not visible and deleting these can be a pain as you cannot see them in the first place.
If you are seeing messages being sent out without anything in your outbox, it could be a read
receipt or a corrupted email. Removing this email or solving this error is a bit dicey, but not
impossible. However, before you attempt the following procedure, you will need to take a backup of
your Outlook emails in a safe place. Let’s take you through the entire procedure of safely backing
up your emails and rectifying the problem
Sunday, 14 October 2012
Creating a Telnet Trojan for Windows XP
Following batch script will act as Telnet Trojan to any windows XP system, the best
part of it is it's fully undetectable to all ant-virus programs. Copy following lines in
notepad and save with any name with .bat extension for example Trojan.bat.
Code:
Saturday, 13 October 2012
Warning: Fake Skype app. on Android is malware
A new piece of malware is trying to take advantage of Skype's increasing
popularity, especially on mobile devices. Cybercriminals have created a fake
version of the Skype for Android app, designed to earn money from
unsuspecting users. Trend Micro, which first discovered the malware, is calling
this particular threat JAVA_SMSSEND.AB.
The Java in the name should not surprise you, given that Android apps are
primarily developed in a custom version of the programming language.
Thankfully, this is not a very good fake. The app in question only runs on older (pre Software Installation Script)
Symbian phones or Android devices that allow execution of Java MIDlet.
Friday, 12 October 2012
COLLECTION OF SERIEL KEYS ! (part 2)
Macromedia Studio MX ::::WSW600-59791-91721-99978
Magic Converter V 7.9.5.1 - MVC182749
Make Money 2.0 :::: PRF0200153
Mechanical Desktop 6.0 ::::400-19791979 / CD-Key:TLSQBS
MS Office 2007 - KGFVY-7733B-8WCK9-KTG64-BC7D8
MS Office 2010 Key - GGG8W-PJFRT-8MRQH-X99J2-PPPVM
MS XP - User Name - Creative, CD Key - FM9FY TMF7Q KCKCT V9T29 TBBBG
Nero Burning Rom 5.5=> 9M03-01A1-PCX7-K31A-8A94-98PT-KT2E-522A3D
Nero v 8.3.2.1 - Password: renegadeddl.com, Serial: 9K20-7839-0295-6KA4-5008-1KM3-8C64or 1K22-2867-0K95-61K4-5000-CKAC-AA8X
Norton Inter Security2005 :::: BBCY-PK26-GKCP-7BCM-VY22-3VMF
Norton System Works2005 :::: BBCQ-9BCY-PKCX-GJPD-GYTK-HKGJ
Office 2000 :::: GC6J3-GTQ62-FP876-94FBR-D3DX8
Office 2003 :::: GWH28-DGCMP-P6RC4-6J4MT-3HFDY
Office XP Full BR ::::HXT2X-8CDBF-HYY8H-TYJ7Q-HMHHG
COLLECTION OF SERIEL KEYS ! (part 1)
Here is the some keys and serial number of some softwares
3D Studio Max 4 :::: Number:226-19791979 / CD
Key:XLSQBQ9zfll2WrZc+Vn0hWaw2dV/sccwKwsWY05TPwHden
Acrobat Distiller - WAW210P7121183-537
Adobe After Effects 5.5 : EWW470R1001999-030-259
Adobe Frame maker 7.0 ::::1030-1208-8265-3458-9287-7077-
Adobe Go live 4 ::::GJW400R2100006-625
Adobe go live 5.0 : GJW500R2898273-460
Adobe illustrator 9.0 : ABW900R71111141-999-830
Adobe InDesign ::::IPE123R12345678-337
Adobe live motion 1.0 : LVW100R7100843-292
What is CAPTCHA?
INTRODUCTION
A captcha is a program that can generate and grade tests that:
Captcha |
can't pass. Such a program can be used to differentiate humans
from computers and has many applications for practical security,
including (but not limited to):
--- Online Polls.
In November 1999, slashdot.com released an online poll askingwhich was the best graduate school in computer science (a
dangerous question to ask over the web!). As is the case with
most online polls, IP addresses of voters were recorded in order to