Sunday 23 October 2011

How To attack Yahoo Password without recover


I get a lot of emails where people ask me “how to hack yahoo password or similar?” so here is step by steptutorial with images that explains how to hack yahoo password for free. We’ll create fake yahoo login pagefor the purpose of stealing other’s passwords.
Fake yahoo login page contains 3 files
  • login.php – php code that writes data to a YahooPasswords.htm
  • Yahoo.htm – fake yahoo login page
  • YahooPasswords.htm – fiile where are stored passwords

Step 1

Download fake yahoo login page from this link and extract it to your computer

Step 2

Upload all downloaded files to web hosting that supports php language, . I recommend 000webhost.com , it’s free and has all what you need.
Upload files to root folder (root folder in 000webhost is /public_html), if you want to upload it to other folder then you’ll need to change Yahoo.htm code , action=”/login.php” , replace withaction=”/yourFolder/login.php”
Below are instructions how to upload files to 000webhost.com , for other web hosting services is similar. Launch Cpanel , go to File Manager and upload.

Step 3

Select login.php and YahooPasswords.htm and click on Chmod

Step 4

Set the permissions to 777

What Is A Proxy Server And How To Use It


Proxy server is some kind of a buffer between your computer and the designated internet destination. When you use a proxy server , your computer will send a request to the proxy server , then the proxy server will send it to the destination (for example a website), the destination will answer the request the proxy has sent and finally the proxy will return the data to you computer.  When you visit www.hackspc.com with a proxy server , itlooks like this:
Reasons for using proxy servers:
  • Proxy server is able to increase or decrease the speed of your connection to the Internet depending on the location of the proxy
  • Proxy server ( but only anonymous) can hide your IP address (the resource you visit will retrieve the IP of the proxy, and not your
  • Proxy servers can help in case some owner of an Internet resource impose restrictions for users from certain countries ( for example hulu.com is only reserved for those from United States, if you are not fromUnited States, you can’t watch videos on hulu.com)
How to use a proxy server?
It is simple, just follow these instructions for Internet Explorer
1. Open Internet Explorer
2. In the Menu bar, select Tools, then Internet Options
3. After this  click the Connection tab
4. In the Connection tab, on the bottom , you will find LAN settings;
5.In LAN tab, check use a proxy server for your LAN, in Address add the IP Addresses of the proxy you would like to use, and add Port, and finally click OK.It looks like this:
In this example we are using an anonymous proxy server from United Kingdom with this IP address: 64.66.192.61 and port 80 .  Here you can find  a free proxy list. These are free proxy servers. For more free proxies, just google “free proxy server list”.
The same for Mozilla Firefox
1. Open Mozilla Firefox
2.In Menu bar, select Tools, then Options…
3. After this will appear Options window, click Advanced tab

4. In Advanced tab, you will find Settings, click it
5.In Settings tab, check Manually proxy configuration, in HTTP Proxy add IP addresses from proxy server, and add Port, you can also set sites where you wont´t use proxy server. For Example if you are from Germany, no sense to use a proxy server for German sites.
In the end click Ok;
We used the same proxy server

Learn How To Hack With The Hacker’s Underground Handbook


I wish this book was around when I began my journey to learn how to hack. It was made specifically for thebeginners who really want to get into hacking and for those of us who began and got lost.

The Hacker’s Underground Handbook

Download


The Hacker’s Underground Handbook starts off with the very basics with topics like programming and Linux. It then moves on to introduce and teach the topics of
* password cracking
* phishing
* network hacking
* wireless hacking
* malware
* Windows hacking
I was really surprised how this book laid out the information, presenting it in an easy to read and understandable fashion. In each chapter the author first introduces you to the topic and then shows you a real-world example with step-by-step instructions with images. It makes hacking look so easy!
Once you complete reading this book, the author explains where to go from there and how to keep learning. You will never again be lost and overwhelmed by all the hacking information out there.
If you think this book is something you would be interested in, you can get it here. Hacker’s Underground Handbook

Free SMS worldwide- its working


Get ready to send free SMS to every corner of the world. I am not talking about the free SMS services like WADJA which limits you less than 150 characters. I am actually talking about that SMS Gateway which is provided by the University of Liverpool.
You can send SMS to any cell phone service from it. It uses Google’s Cloud computing technology.
The website is www.for-ever.us .
They allow the actual limit of SMS, i.e. 160 characters, without any ads and promotional message attached with it.
I won’t need it to define much as you already know what free Web bases SMS is. Just visit and enjoy the site.

How To Hide Any Drive Through Command Prompt


Have you ever thought of hiding any drive from your system so that no one can knew about it. You may haveheard or even used a lot of software’s that might be able to do that, but if you are GEEK like me and want to do things by your own without using any 3rd party software than this tutorial will show you how you can do it.
Well there are 3 ways of doing it, in this tutorial we are covering command prompt way of doing it.

Here is how to do it:

Step 1. Open command Prompt, go to Start Menu > All Programs >Accessories > Command prompt
Step 2. In the Command Prompt, type Diskpart and hit enter key. If UAC (User Account Control), dialog-box prompts than click Yes.
Step 3. Then type List Volume and press enter, this will produce the list of all drives.
Step 4. Now select the drive which you want to hide, you can either do this by typing Select Volume 1 (i.e. Volume Number) or by typing Select Volume C(i.e. Drive letter)
Step 5. To hide a drive, type Remove Letter C. Here, C is the drive letter than you want to hide. You can use any drive letter you want.
Step 6. That’s it. You are done! C drive is now hidden

How to unhide hidden drive

Step 1. Follow the procedure mentioned in step 1, 2, 3 and 4.
Step 2. To show the hidden drive type Assign Letter C and hit enter, now you can view C: drive in explorer.
That’s it. This is one way of hiding and un-hiding drives from explorer, for rest two stay tuned.
Author’s Bio – Mad Geek is a pro-blogger who blogs at beingPC.com and a software developer. You can connect with him @itzritesh .

EARN MONEY ONLINE FOR FREE WITH PAISALIVE


Well its been a long time since I have written a article on how to Earn money Online because I could not found a genuine method that actually works .Today I glady introduce you to a new online money making trick.Well you cannot earn full time income but still you can earn enough to pay your telephone bills,canteen bills etc
This doesn’t require any investment on your part as it is completely free to join.All it requires is at-most 15-20 minutes of your daily time.I have attached a link to the payment proof’s and steps on how to earn money with paisalive.
  • You will get Rs 99 Instantly Once you have joined this website.
  • Earn Rs 5 for verifying your mobile number.
  • You can make Rs. 2 (Rs. 50 for the first 2 referrals) per referral.
  • You can earn upto Rs 5 for each PaisaLive email you check.
  • You can make Rs 1 everyday just by just logging into your account.
  • You can earn upto Rs. 2500, for Special campaigns in a single action.
  • You’ll get the pay once in 15 days and Cheque is the only mode of payment.
  • The minimum Payout criteria is Rs 500.
Here is the Step by Step tutorial on how to earn money online with paisaliveand screenshots of payment proof’s.
Here Is The Payment proof

57705264 Earn Money Online For Free With Paisalive

  1. Click Here to Register For Paisalive
  2. Once registered your account will automatically credited with Rs 99
  3. Now you will have to complete their free and easy offers to earn from them.It will take only a minute or two to complete a offer.You can expect 10 to 20 offers everyday.
  4. You will be paid for each offer you complete.
  5. Check your paisalive account daily to get high paying offers
  6. The minimum payout is only Rs 500.

Saturday 22 October 2011

Facebook account Attacking 2013

Surfing the web no longer a solo activity. FacebookTwitter, and other social networks have quickly become an integral part of the online culture, and with them comes an array of serious threats to your privacy. In this article, I’ll identify some of the key dangers of social networking and offer a few easy steps that you can take to stay safe online. Social networking is built on the idea of sharing information openly and fostering a sense of community. Unfortunately, an online network of individuals who actively share their experiences and seek connections with other like-minded people can be easy prey for hackers engaged in social engineering and phishing attacks. It’s important to be aware of the threats and to use discretion in all of your online interactions.



Take Care Before You Share Online
For starters, even in an open community of sharing, you should observe commonsense boundaries. As President Obama warned students in his September address to schools, “be careful what you post on Facebook. Whatever you do, it will be pulled up again later somewhere in your life.” The core truth of that statement can be applied to any social networking site, and possibly to the Internet as a whole. As a general rule, refrain from posting things online that you will regret later. The odds are good that someone, someday, will stumble across it, and it may come back to haunt you— especially if you are planning to run for public office. If you think that abstaining from posting embarrassing or inflammatory comments online ruins the fun, you’re playing a dangerous game. Remember who your friends are, and know that a friend of a friend can be an enemy.



Don’t Lose Sight of Who Your Friends Are
When you write a Twitter tweet or post a Facebook status update, you have to keep your audience in mind. More and more these days, we hear stories about people who forgot that their boss was part of their network and then said things online that resulted in their being reprimanded or even fired. The adverse consequences of posting inappropriate on line comments have become so commonplace—at least anecdotally—that they have earned an entry in the Urban Dictionary: Facebook fired. Even announcing something as seemingly innocuous as “I’m bored” in a status up - date during work hours can have dire consequences if the wrong people see it. With services like Twitter, and with the recent changes to Facebook that permit any interested party to view and search your updates, you really have no way to hide.

Recognize the Visibility of Your Posts
You’ve thought it through, and you want to shout to the world how you feel about having to work overtime and during a weekend that you had earmarked for recreational activities. You have checked and double checked, and you’ve determined that your boss is not in your network, so you let loose on the keyboard and speak your mind. Unfortunately, you’re not home free (figuratively speaking) just yet. Being outside of your network, your boss can’t see your post directly, but if a Facebook friend who is connected with your boss comments on your status update—even just to say “I sympathize”— your boss may be able to click on the link through the friend and see your post. Go ahead, be social. Share your trials and tribulations with your growing network of adoring followers. But for your own safety, keep one essential rule in mind: Never post anything online that you wouldn’t be comfortable having everyone you know see—because eventually they probably will see it.

Define the Parameters of Your Privacy
Marrying privacy and social networking may seem terribly unintuitive. How can you be social and open, and yet protect your privacy? Well, just because you are choosing to share some information with a select group of people does not necessarily mean that you want to share everything with everyone, or that you are indifferent about whether the information you share is visible to all. Facebook, in particular, has drawn unwanted attention in connection with various privacy concerns. If you have used Facebook for a while, you may have noticed advertisements that incorporate your friends’ names or photos associated with them. Facebook does provide privacy controls for you to customize the types of information available to thirdparty applications. If you look at the Facebook Ads tab of the privacy controls, though, you’ll notice that it doesn’t give you any way to opt out of the internal Facebook Ads. Instead, it states (alarmingly) that “Facebook strives to create relevant and interesting advertisements to you and your friends.”



Approach Tattletale Quizzes With Caution
For many users, one of the primary attractions of Facebook is the virtually endless selection of games and quizzes. And part of their allure is their social aspect. In the advergames, you compete against your friends; through the quizzes, you learn more about them while being briefl y entertained. The ACLU exposed problems with how much information these quizzes and games share, however. Typically, when a Facebook user initiates a game or quiz, a notice pops up to declare that interacting with the application requires opening access to information; the notice also provides the user the opportunity to opt out and cancel, or to allow the access to continue. The permission page clearly informs the user up front that allowing “access will let [the application] pull your profile information, photos, your friends’ info, and other content that it requires to work.” Under the circumstances, you may wonder (as the ACLU has) why a game or quiz application would “require” access to your friends’ information in order to work.


Facebook Policy Concerns in Canada
Facebook’s privacy policies have run afoul of the Canadian government, too. Canada’s Privacy Commissioner has determined that those policies and practices violate Canadian privacy regulations, and has recommended various changes Facebook should make to comply with them. One of the commissioner’s biggest concerns involves the permanence of accounts and account data. Facebook offers users a way to disable or deactivate an account, but it doesn’t seem to provide a method for completely deleting an account. Photos and status updates might be available long after a user has shut down a Facebook profile. And like the ACLU, the Canadian government is unhappy about the amount of user information that Facebook shares with thirdparty application providers.

Facebook Marketing For Dummies

Exercise the Privacy Controls You Have
Although the concerns of the ACLU and the Canadian government run a little deeper, Facebook does offer privacy controls for restricting or denying access to information. Since Facebook is a social networking site designed for sharing information, many of the settings are open by default. It is up to you to access the Privacy Settings and configure the options as you see fit. For each available setting, you can choose to share information with Everyone, with My Networks and Friends, with Friends of Friends, or with Only Friends; if you prefer, you can customize the settings to finetune access further.


Phishing: Cutting the Identity Theft Line


Beware of Hijacking and Phishing Scams
By its very nature, social networking is all about socializing, which means that users are more than usually disposed to let their guard down and share information. They come to the network to expand their professional connections, reestablish contact with old friends, and communicate in real time with pals and peers. And for predatory bad guys, launching social-engineering and phishing attacks in this convivial environment is like shooting fish in a barrel. Most people know not to respond to e-mail requests from exiled Nigerian royalty promising millions of dollars in return for help smuggling the money out of the country. (Anyone who doesn’t know better probably shouldn’t be on the Internet; such people are a danger to themselves and to others.) But what if a good friend from high school whom you haven’t seen in 18 years sends you a message on Facebook explaining how her wallet was stolen and her car broke down, and asks you to wire money to help her get home? You might be less suspicious than you should be. Attackers have figured out that family and friends are easy prey for sob stories of this type. Using other attacks or methods, they gain access to a Facebook account and hijack it. They change the password so that the legitimate owner can’t get back in, and then they proceed to reach out to the friends of the hijacked account and attempt to extort money such a Facebook message or e-mail plea, pick up the phone and call the person directly to confirm its legitimacy.


Don’t Let a Tiny URL Fool You
Another threat that has emerged recently as a result of social networking is the tiny-URL attack. Some URLs are very long and don’t work well in e-mail or in blog posts, creating a need for URLshortening services. In particular, Twitter, with its 140-character limit, has made the use of URL shortening services such as Bit.ly a virtual necessity. Unfortunately, attackers can exploit a shortened URL to lure users into accessing malicious Web sites. Since the shortened URL consists of a random collection of characters that are unrelated to the actual URL, users cannot easily determine whether it is legitimate or phony. TweetDeck, a very popular application for sending messages in Twitter, provides a ‘Show preview information for short URLs’ option, which offers some protection.
The preview window supplies details about the shortened URL, including the actual long URL that the link leads to. If you aren’t using TweetDeck for Twitter, or if you need to deal with shortened URLs on other sites and services, maintain a healthy dose of skepticism about what might lie behind the obfuscated address that a message points to.