Download Opera Web Browser from here....
Just Click ::
Thursday, April 15, 2010
Tuesday, April 13, 2010
How to Copy Locked Photos from Orkut
Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album. So this makes it difficult to copy photos from Orkut. It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it. This may be annoying most of you! Then…
How To Copy Locked Photos From Orkut?
Yes it’s still possible to copy the photos from Orkut.Here’s a step-by-step procedure to copy the photo.
1. Login into your Orkut Account.
2. Goto your friend’s album and open the photo that you need to copy.
3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.
4. Press the left click button and drag and drop the photo onto the ADDRESS BAR. I think this trick is no longer working. So I have a new trick….
Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). Alternatively you can also Drag and Drop the photo onto the Desktop. That’s it. This trick is working now!!
4. Now the photo gets displayed seperately on your browser.
5. You can Right-Click and select the Save As option to save the photo onto your PC.
The browser also displays the direct link to the photo. This link can be used to share the Orkut photos with your friends without the need to login to your Orkut account to access photos.
Please express your opinions through comments. Cheer Up..
Happy Orkut Hacking.
How to Make a Trojan Horse
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll”
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan source code HERE. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.
For step-by-step compilation guide, refer the post How to compile C Programs.
Testing:
To test the Trojan, just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll”
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan source code HERE. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.
How to compile, test and remove the damage?
Compilation:For step-by-step compilation guide, refer the post How to compile C Programs.
Testing:
To test the Trojan, just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.
Tuesday, April 6, 2010
How to Hack Gmail Account
Gmail is one of the most widely used email services across the globe and it’s no wonder why many people want to hack gmail. So if you are curious to know how to hack a gamil account then this is the post for you. Here in this post I will show you some of the real and working ways to hack gmail and will also make you aware of the common scams and myths associated with hacking gmail.
Before I discuss how to hack gmail I want to make my readers aware of the common scams and myths associated with hacking gmail or any other email. So here we go
1. There is no ready made software/program that will hack gmail just with a click of a button. So never get fooled by something called gmail hacking software. If there exists such program to hack gmail then it’s no more than a scam.
2. Most of the email hacking services on the internet claim to hack gmail password for just a small fee. I have personally tested many of those services and found that most of them are scams.
At this point you may be wondering what are the other ways to hack gmail then. So here are the working ways to hack gmail.
With my experience in the field of hacking and security I can tell you that there are only two ways to hack gmail account.
1. Keylogging
2. Phishing
Any other method to hack gmail other than these two are simply scam or dont work.
The easiest way to hack gmail is through keylogging. It is done using a small program/software called keylogger. This keylogger when installed on any computer will capture each and every keystroke including passwords. Also it works in complete stealth mode by completely hiding itself. So installing a keylogger on the computer is the easiest way to hack gmail. Once the victim logs into his gmail account from this computer his gmail username & password are captured and stored instantly. The stored logs are sent to you via email. But what if you do not have physical access to the computer? Well, still you need not worry since I am going to suggest one of the best keylogger program that support installation on a local computer as well as a remote computer. The following supports remote installation as well.
So to hack any gmail account all you need to do is install the keylogger on the computer from which the victim is likely to login to his gmail account. If you do not have physical access then you need to use the remote installation feature to remotely deploy the kelogger.
NOTE: For more details on keylogger read my post How to use Keyloggers
The other most commonly used trick to hack Gmail is using a Fake Login Page (also called as Phishing). Today, Fake login pages are the most widely used techniques to hack Gmail. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.
However creating a fake login page and taking it online to successfully hack a Gmail password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Gmail since it’s the easiest way.
Before I discuss how to hack gmail I want to make my readers aware of the common scams and myths associated with hacking gmail or any other email. So here we go
1. There is no ready made software/program that will hack gmail just with a click of a button. So never get fooled by something called gmail hacking software. If there exists such program to hack gmail then it’s no more than a scam.
2. Most of the email hacking services on the internet claim to hack gmail password for just a small fee. I have personally tested many of those services and found that most of them are scams.
At this point you may be wondering what are the other ways to hack gmail then. So here are the working ways to hack gmail.
With my experience in the field of hacking and security I can tell you that there are only two ways to hack gmail account.
1. Keylogging
2. Phishing
Any other method to hack gmail other than these two are simply scam or dont work.
Easiest Way to Hack Gmail
The easiest way to hack gmail is through keylogging. It is done using a small program/software called keylogger. This keylogger when installed on any computer will capture each and every keystroke including passwords. Also it works in complete stealth mode by completely hiding itself. So installing a keylogger on the computer is the easiest way to hack gmail. Once the victim logs into his gmail account from this computer his gmail username & password are captured and stored instantly. The stored logs are sent to you via email. But what if you do not have physical access to the computer? Well, still you need not worry since I am going to suggest one of the best keylogger program that support installation on a local computer as well as a remote computer. The following supports remote installation as well.
SniperSpy
So to hack any gmail account all you need to do is install the keylogger on the computer from which the victim is likely to login to his gmail account. If you do not have physical access then you need to use the remote installation feature to remotely deploy the kelogger.
NOTE: For more details on keylogger read my post How to use Keyloggers
Other ways to Hack Gmail
The other most commonly used trick to hack Gmail is using a Fake Login Page (also called as Phishing). Today, Fake login pages are the most widely used techniques to hack Gmail. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.
However creating a fake login page and taking it online to successfully hack a Gmail password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Gmail since it’s the easiest way.
Sunday, April 4, 2010
How to Hack Windows Administrator Password
This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
- You do not need to know the old password to set a new one
- Will detect and offer to unlock locked or disabled out user accounts!
- There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.
How it works?
Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.The download link for both CD and floppy drives along with the complete instructions is given below
Offline NT Password & Reg Editor Download
It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.
Another simple way to reset non-administrator account passwords
Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows
4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.
Subscribe to:
Posts (Atom)