Tuesday 22 March 2011
Sunday 20 March 2011
What exactly can someone tell from your IP address and what can they do with it? Can they find personal details or my precise geographical location?
•
In most cases your IP address is very easy to determine. But how much it says about you, specifically, depends on your ISP and what kind of IP address you have.
•
Finding someone else's IP can be as easy as looking at the full headers of email that they've sent you or monitoring network connections for certain types of instant messaging and chat applications. Web sites routinely get IP address information for all visitors. The very nature of how the internet works dictates that when two computers talk to each other, they know each other's IP addresses.
But once you've received an IP address, what can you tell about it?
Some IP's are easy - they're static and have a DNS name associated with them. For example, in a Windows XP Command Shell, enter the following command:
ping -a 17.254.3.183
"What if the ping doesn't work or doesn't return a domain name?"
The "-a" switch tells ping to do a "reverse DNS lookup" and print the first domain name it finds associated with the IP address you've specified. In this case, ping should include "apple.com" in its output, which is a domain name assigned to that IP.
With that domain name you can then do a "whois" lookup using whois tools. That information will often include the information about the individual or organization that owns the domain. In this example it does not, but it includes the name of the registrar, markmonitor.com. Visiting that site there is a small "whois" link which when run against "apple.com" returns all the information that you might want. Apple.com is owned, not surprisingly, by Apple Computer, Inc. and full address and contact information is available.
What if the ping doesn't work or doesn't return a domain name? Then things get less precise.
In this case, we go to ARIN and use their IP "whois" tool. If we enter an IP address such as 206.124.145.17, we'll find that it's part of a block of addresses assigned to an ISP. In order to determine who actually is using that IP address, if anyone, the ISP would have to get involved. Note that without their involvement, the physical location of a machine at a specific IP address can not be determined.
Now, it's important to note that an IP address may or may not identify a specific computer. In many cases, such as large corporations, it identifies a gateway of some sort that acts as a router or proxy for any number of computers. Behind the gateway, the computers can all see each other, but from the internet the individual machines are indistinguishable from each other. They all look like they come from the same IP address.
The same is true when you use a router at home. You might have any number of computers behind it, but from the internet, it appears as if you have only one IP address. Your individual computers are not directly accessible by default.
And that leads to my final point: use a router or a firewall. If you connect directly to the internet, then your IP address can be used by others on the network to attempt to connect directly to your PC and exploit any vulnerabilities. By using a router, your computer cannot be contacted directly. Alternately, a firewall blocks the intruders from gaining access to your machine even if they do reach it.
Sunday 20 March 2011 by Sayeed · 0
The Main point to become a hacker and safe your self
Never Disclose your Identity:
Never tell any body that you are a hacker even your friends or your relatives,you must keep it a secret
Use Proxy:
Never hack without a proxy
Be Careful:
Never let FBI enter your house without a search warrant.
Never Hack from your home:
Never hack from your home always use net cafe for these purposes
Always:
Wave to cops
Use Fake information:
Never use your real name in any sort of conversation or in any signup
Never keep weak passwords:
Do not keep a password which is already present in the dictionary or a password which is very common
etc your pet name,Your country name etc
Password tip:
Dont use same password twice for maximum security
Of course:
Never hack from the same computer twice if possible
Hide your Ip:
Hide your Ip address to avoid your chances of being traced,i have made a post on Hide your IP address
Use Firewall:
Always use a Good firewall such as zonealram
Change your Ip:
Change your Ip address daily if possible,I have wrote an article on How to change your Ip address
Use fake information while signing up:
Dont enter your personal information eg your address,your number etc while
Using social networking sites like orkut,Facebook etc
Most importantly:
Always have a panic button that mass deletes your questionable content
OF course:
Never let the FBI in period.
Yet again:
Always use a Proxy when doing anything remotely illegal
You must say to yourself that you do not follow one of these rules your chances of getting caught are high,This is why the most hackers are caught they forget to hide their identity,hope you liked the post.If you think that this article is worth kindly pass the comments
by Sayeed · 0
Make your Windows XP with Service Pack 2 geniune. Im not sure if this works on SP3.
Follow these step to Make your windows XP genuine
Step 1:
Click Start and then goto run and type ‘regedit’
Step 2:
Registry window will be opened, Then Go to
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer
and double click on it. Then change some of the value data to any thing.
Step 3:
Go to start > run > “%systemroot%\system32\oobe\msoobe.exe /a” (again, dont type the quotes)
Step 4:
The activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.
Now you can download all the updates without activating, and the Genuine Microsoft Validation will irritate you No more.
Note: This works better after reformating
Or else do you want to download the crack for XP,XP home,XP 2 and Vista, I am placing it in a zip folder pls download it from the below link
http://rapidshare.com/files/71090926/Crack_For_XP.rar
by Sayeed · 0
Saturday 19 March 2011
In this article I will tell you to use a great peice of software Email Tracker pro to trace an email, Email tracker pro can trace and track email back to the senders location. Stop SPAM email and phishing email with email tracker pro. The latest version of Email tracker pro is V9, however the program is not free and you will not find many working serials on the web, So I use Email tracker pro v8 for demonstration as I am already placing its crack below:
Trace an Email using emailtrackerpro:
Follow the steps below to use Email tracker pro v8 to trace an Email
1.First of all download Email tracker pro v8 and install it on your computer
2. Open Email tracker pro and click on Trace an email
3. Now you need to paste the Email headers in it, For Gmail I have already demonstrated on how to get Gmail headers in my previous post How to trace a sender in Gmail?, but if you want to trace a hotmail, yahoo or any other email and you are not sure how to get email headers kindly google it
4. Once you click on trace button, it will start tracing and will show you the appropriate location of the email sender
Saturday 19 March 2011 by Sayeed · 0
Friday 18 March 2011
Insert the Windows DVD of Windows7/Vista in your system then follow these steps:
Boot off the Windows Vista DVD and then click Next at the first prompt:
You should see a link in the lower left-hand side for “Repair your computer”
The installation process will attempt to find your Vista installation directory. If there’s more than one in the list, select the correct one and then use the Next button again.
Click the first link for “Startup Repair”
The installation process will repair the system, and then prompt for you to reboot.
Alternatively you could have chosen the Command Prompt option instead, and use the following command to fix the boot options only:
At this point you should be able to reboot your computer, remove the DVD and everything should be working
Friday 18 March 2011 by Sayeed · 0
Is it possible to hack Yahoo?
Yes! As a matter of fact, it is possible to hack almost any email password. But before you learn the real ways of hacking, the following are the things you should be aware of:
1. Never trust any hacking service that claims to hack Yahoo password for just $100 or $200. In most cases they will rip off your pockets with false promises. Sometimes they may even start to threaten you by blackmailing that they are going to inform the victim or the cyber crime officials about your hack attempt. So, to be on the safer side, it is better to stay away from such scam websites.
2. Beware! On many websites and web portals you will often come across a fake tutorial on email hacking. The tutorial will tell you something like “You need to send the target email address along with your username and password to yahoo_pass_reset@yahoo.com (or similar)” to hack the password of the target account. This method seems too good to be true but, if you follow this method, you will lose your own password in attempt to hack someone else’s password.
With my experience of over 7 years in the field of hacking and cyber security, I can tell you that there are only TWO ways to hack Yahoo password. They are keylogging and phishing.
All the other email hacking methods are simply scam or don’t work! The following are the only 2 foolproof methods that work.
1. Keylogging: Easiest Way to Hack Yahoo Password
Using a keylogger is the easiest way to hack Yahoo password. A keylogger is a small program that records each and every keystroke (including passwords) that a user types on a specific computer’s keyboard. A keylogger is also called as spy program or spy software. To use it, you don’t need to have any special knowledge. Anyone with a basic knowledge of computer should be able to install and use this software. With my experience, I recommend the following two keyloggers as the best for hacking Yahoo password.
1. SniperSpy (Tested)
2. WinSpy (Tested)
I don’t have physical access to the target computer, can I still use SniperSpy?
Yes, you can! Since both SniperSpy and WinSpy offers Remote Installation Feature, it is possible to remotely install the keylogger on the target computer. However, it will also work on a local computer.
How to use SniperSpy?
1. After you download it, you will be able to create the installation module. You need to email this module to the remote user as an attachment.
2. When the remote user runs the module, it will get installed silently and the monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continuously.
3. You can login to your online SniperSpy account (you get this after purchase) to see the logs which contains the password.
NOTE: If you have physical access to the target computer, you can simply install the module by yourself without the need to email it as an attachment.
The working of Winspy is somewhat similar to that of SniperSpy.
Once I install SniperSpy, can the victim come to know about it’s presence?
No. The victim will not come to know about it’s presence on his/her computer. This is because, after the installation, SniperSpy will run in a total stealth mode. Unlike other spy programs, it will never show up in start-menu, start-up, program files, add/remove programs or task manager.
Can I be traced back if I install it on some other computer?
No, it’s almost impossible to trace back to you for installing the keylogger on other’s computer.
How safe is to use SniperSpy?
Sniperspy is completely safe to use since all the customer databases remain confidential and private. SniperSpy will neither collect any information from your system nor will contact you in any way unless you request assistance.
What are the other features of SniperSpy software?
1. With SniperSpy, you can gain access to any password protected account including Yahoo, Gmail, Hotmail, MySpace, Facebook etc.
2. This software will not only capture passwords, but will also take screenshots and record chat conversations.
3. This product is extremely easy to use so that, even novice users can install and use it with ease.
SniperSpy vs WinSpy
Click Here to Download SniperSpy for Windows
Click Here to Download SniperSpy for Mac
For more details on keylogger, you can read my post on How to use Keyloggers.
2. Other Ways To Hack Yahoo Password
The other most commonly used trick to hack Yahoo password is by using a fake login Page (also called as Phishing). Today, phishing is the most widely used technique to hack Yahoo password. A fake login page is a page that appears exactly similar to the login pages of sites like Yahoo, Gmail, Facebook etc. The victim is tricked to believe this fake login page to be the real one. But once he/she enters the password there, they end up losing it.
Phishing can be very effective when implemented successfully. But creating a fake login page and taking it online to make the hack attempt successful is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP or JSP.
So, if you are new to the concept of hacking passwords, then I recommend the use of keyloggers as the best to hack Yahoo password
Content from : gohacking.com
by Sayeed · 0
Thursday 17 March 2011
It’s fairly easy to crack a WEP encrypted wireless network. Infact the WEP encryption has some serious flaws in its design, flaws that make it easy and fast to crack or hack.
Install aircrack-ng
Thursday 17 March 2011 by Sayeed · 0
1. Insert your USB (4GB+ preferable) stick to the system and backup all the data from the USB as we are going to format the USB to make it as bootable.
2. Open elevated Command Prompt. To do this, type in CMD in Start menu search field and hit Ctrl + Shift + Enter. Alternatively, navigate to Start > All programs >Accessories > right click on Command Prompt and select run as administrator.
3. When the Command Prompt opens, enter the following command:
DISKPART and hit enter.
LIST DISK and hit enter.
Once you enter the LIST DISK command, it will show the disk number of your USB drive. In the below image my USB drive disk no is Disk 1.
4. In this step you need to enter all the below commands one by one and hit enter. As these commands are self explanatory, you can easily guess what these commands do.
SELECT DISK 1 (Replace DISK 1 with your disk number)
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS
(Format process may take few seconds)
ASSIGN
EXIT
Don’t close the command prompt as we need to execute one more command at the next step. Just minimize it.
5. Insert your Windows DVD in the optical drive and note down the drive letter of the optical drive and USB media. Here I use “D” as my optical (DVD) drive letter and “G” as my USB drive letter.
6. Go back to command prompt and execute the following commands:
6.1. Change directory to the DVD’s boot directory where bootsect lives:
d:
cd d:\boot
6.2. Use bootsect to set the USB as a bootable NTFS drive prepared for a Vista/7 image. I’m assuming that your USB flash drive has been labeled disk G:\ by the computer:
bootsect /nt60 g:
(Where “G” is your USB drive letter)
7. Copy Windows DVD contents to USB.
You are done with your bootable USB. You can now use this bootable USB as bootable DVD on any computer that comes with USB boot feature (most of the current motherboards support this feature)
.
by Sayeed · 0