Saturday, September 17, 2011

Trick to Disable Send To Option From Right Click Menu

You must have seen Send To option when you right click on any file/folder. This Send To option helps you to send your files/folders from one location (drive) to another. This also acts as a shortcut key to send files to any external storage media (Pen Drive, Memory Card). But by this trick you can also Disable this feature by making changes in...

Thursday, September 15, 2011

Facebook FishVille Cheat

So what is FishVille? It’s a game where you raise a fish, feed them and help decorate the tank which they live in. It’s similar to many of the other games like FarmVille, Cafe World, and Roller Coaster Kingdom, however in this one you are simply taking care of a fish tank. As you raise fish you can sell them to earn coins and experience. Honestly,...

Thursday, September 8, 2011

Bypassing Firewalls

Although firewalls are meant to provide complete protection from port-scan probes and the like, several popular firewall products contain holes just waiting to be exploited. This section focuses on a hole in ZoneAlarm, Versions 2.1.10 to 2.0.26, that allows attackers to port-scan the target system. Specifically, if you system uses port 67 as the source port of a TCP or UDP scan, Zone-Alarm will let the packet through and will not notify you. That means an attacker can TCP or UDP port-scan a ZoneAlarm-protected computer as if there were no firewall,...

Monday, August 15, 2011

What are TCP Wrappers?

TCP wrappers enable you to define a set of rules, called access control rules, that define which systems are allowed to access and use the services running on the local machine (that is, the machine on which the TCP wrappers are installed and  configured) and which systems are denied access to these services. In addition, TCP wrappers enable you to log which client is using which service at what time, and even for what purpose. The best thing about TCP wrappers, however, is that they can be used to set booby traps for script kiddies. Before...

Tuesday, August 9, 2011

Free Proxy Servers and Hide Your IP

I have collected a lots of url of proxy servers and create a proxy server list.Use any of these to hide your ip address. http://www.perfectproxy.com/ http://www.primeproxy.com/ http://www.proxyaware.com/ http://www.proxycraze.com/ http://www.proxygasp.com/ http://www.proxyplease.com/ http://www.someproxy.com/ http://www.stupidproxy.com/ http://ipchicken.com http://www.Stealth-ip.com http://www.Stealth-ip.org http://www.Stealth-ip.us http://www.Stealth-ip.info http://poxy.us.to/ http://www.BlockFilter.com http://www.ecoproxy.com/ http://www.coreproxy.com/ http://proxymy.com/ http://www.illegalproxy.com/ http://www.filterfakeout.com/ http://www.privacybrowsing.com/ http://www.w00tage.com/ http://www.aplusproxy.com/ http://www.arandomproxy.com/ http://www.w3privacy.com/ http://argentinaproxy.com http://hotyogasite.com http://damaliens.com http://swagproxy.com http://cloak-me.info http://247websurf.com http://proxify.net http://salemguide.info http://your-proxy.org http://amandas-proxy.info http://co-i.info http://w3privacy.com http://thecrazynetwork.com http://pajaxy.com http://mtgtv.com http://visitriga.info http://gfun.info http://surfsizzle.com http://thecrazycall.com http://proxify.com http://www.proxy1.info/ http://www.proxy2info/ http://www.proxy3.info/ http://www.proxy4.info/ http://www.proxy5.info/ http://www.proxy6.info/ http://www.proxy7.info/ http://www.proxy8.info/ http://www.proxy9.info/ http://www.proxy10.info/ http://www.proxy11.info/ http://www.proxy12.info/ http://www.proxy13.info/ http://www.proxy14.info/ http://www.proxy15.info/ http://www.proxy16.info/ http://www.proxy17.info/ http://www.proxy18.info/ http://www.proxy19.info/ http://www.proxy20.info/ http://www.proxyok.com/ http://www.boredatwork.info/ http://www.anonymousurfing.info/ http://www.browsingwork.com/ http://www.freeproxyserver.org/ http://www.browseany.com/ http://www.browsesecurely.com/ http://IEproxy.com/ http://www.sneak3.po.gs/ http://www.proxytastic.com/ http://www.freewebproxy.org/ http://www.thecgiproxy.com/ http://www.hide-me.be/ http://www.anotherproxy.com/ http://www.proxy77.com/ http://www.surf-anon.com/ http://www.free-proxy.info/ http://www.theproxysite.info/ http://www.proxyify.info/ http://www.concealme.com/ http://imsneaky.com http://lawi.info http://fieldcollege.info http://bigredhot.com http://portugalproxy.com http://aboutgreatbritain.info http://surf24h.com http://xoxy.com http://proxyparadise.info http://proxycrib.com http://unblock.biz http://newzealandproxy.com http://your-proxy.info http://privatproxy.com http://filterfreesurfing.com http://allaccessproxy.com http://hotwinebaskets.com http://spainwine.info http://couldfind.info http://proxy-blog.com http://serfs.info http://macaoguide.info http://proxoid.com http://rentaustin.info http://safesurfingweb.com http://proxyfans.com http://metnyc.info http://speedroxi.com http://ehide.info http://ipow.info http://babyboomerco.com http://proxclub.com http://anonysurf.nl http://mylittleproxy.com http://gz299.com http://us-proxy.com http://goinvis.com http://freeproxy.in http://onesimpleproxy.com http://supaproxy.net http://dedicatedproxy.com http://india-proxy.com http://greekdating.info http://reliableproxy.com http://dontshowmyip.info http://proxcool.com http://prxy.net.ms http://hidip.info http://cutmy.info http://hidelink.ingo http://xoogie.net http://oproxy.info http://stealth-ip.net http://safeforwork.net http://vtunnel.com http://freeproxy.ru/en/free_proxy/cg... http://proxydrop.com/ http://proxydrop.net/ http://proxydrop.biz/ http://proxydrop.info/ http://proxydrop.org/ http://backfox.com http://ninjaproxy.com/ http://atunnel.com http://vpntunnel.net http://btunnel.com http://ctunnel.com http://dtunnel.com http://proxyhost.org http://webproxy.dk http://phproxy.frac.dk http://phproxy.1go.dk http://proxify.com http://home.no.net/roughnex http://nomorefilter.com http://rapidwire.net http://oproxy.info http://stealth-ip.net http://cooltunnell.com http://schoolsurf.com http://anonymouse.org http://megaproxy.com/ http://amegaproxy.com/ http://theproxy.be/ http://newproxy.be/ http://projectbypass.com/ http://smartproxy.net/ http://proxy.org/cgi_proxies.shtml http://hidebehind.net http://Proxy7.com http://pcriot.com/ http://tools.rosinstrument.com/cgi-p... http://www.proxyspider.com/index.php http://welazy.com/nick http://reallycoolproxy.com http://vidznet.com/index.php?pid=3 http://proxyholic.com http://www.freeproxy.ru/index.htm http://www.freeproxy.ru/ru/index.htm http://www.freeproxy.ru/ http://www.freeproxy.info/ http://www.freeproxy.ru/ru/index.htm http://www.freeproxy.ru/en/programs/ http://www.freeproxy.ru/en/free_proxy/ http://www.freeproxy.ru/en/misc.htm http://www.freeproxy.ru/en/news.htm http://www.freeproxy.ru/en/contacts/ http://www.checker.freeproxy.ru/checker/ http://www.freeproxy.ru/shop/ http://www.forum.freeproxy.ru/ http://anonymouse.ws/ please...

Friday, August 5, 2011

Hide EXE File into JPG

...

Thursday, July 28, 2011

BSNL 3G Hack! Browse Internet For Free

Today I am going to show how to hack BSNL 3G hack and browse unlimited internet at high speed up to 120 Kbps. I am not sure whether this hacking is still working or not, members from other forums are posting that this hack is working fine for them. Before you start learning how to hack you need to have BSNL 2G SIM and ultimately 3G support mobile...

Monday, July 18, 2011

Chat With Command Prompt

If you want a private chat with a friend or client on you Network, you don't need to download any fancy program! All you need is your friends IP address and Command Prompt. Firstly, open Notepad and enter: @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A Now save this as "Messenger.bat". Open the .bat file and in Command Prompt you should see: MESSENGER User: After "User" type the IP address of the computer you want to contact. After this, you should see this: Message: Now type in the message you...

Friday, July 15, 2011

PHP IP Stealer

$ip = $REMOTE_ADDR; $host = gethostbyaddr($ip); $date = date("d/m/Y H:i:s"); $email = "dushpandya2001@hotmail.com"; $sujet = "Ip + Host"; $message = " Ip : $ip Host : $host"; if(mail($email,$sujet,$message,"Content-Type: text/html")){ echo "Ownneeed";} else { echo "Shit ?";} ?> Replace dushpandya2001@hotmail.com with your addres mail make a doc.php give him to your friend and you will recive his ip and host in your inbo...

Tuesday, June 28, 2011

Crack a Wi-Fi Network’s WEP Password

Today we're going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. But first, a word: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing how to pick a lock doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise. What You'll NeedUnless you're a computer security and networking ninja, chances are you don't have all the tools on hand to get this job done. Here's what you'll need: A compatible wireless adapter—This is...

Saturday, June 25, 2011

Appear Invisible on Facebook

To start with, once you login to your Facebook account, click on the Friends link on the left panel. There you will find an option to Edit your friends. Just click on that link. Now, you would be required to create a list just by clicking on Create List. And once you create a list, add as many friends to it as you want. The reason behind creating this list is that it lets you make yourself invisible to the whole list at once. Now, click on your Facebook chat box. There, you will be able to find that newly created list Now when you click on that...

Tuesday, June 21, 2011

Multiple Yahoo Messenger in One PC !! :)

For people who manage multiple accounts at the same time (yes I mean you – the one with a separate account for your work stuff, family stuff and naughty stuff), the time has come for you to use ALL your accounts at the same time! Behold the simplest method that you can use to enable you to log-in simultaneously with your multiple yahoo accounts! See the video I have attached or follow the simple hack that needs 5 steps. Click on Start Menu Click Run Type “regedit” without the quotes, press Enter Navigate to and expand the following in the...

Sunday, June 19, 2011

SQL Injection Attacks

These attacks occur when the hacker uses specially crafted SQL questions or commands to execute malicious activities on the victim system. This weakness exists when there is no validation of input when a database query is made via the Internet. The worst thing is that SQL attacks, like most other input validation attacks, can be executed easily through a browser. Most Web sites on the Net rely heavily on the safety of their online database information. Naturally, any breath in their security would lead to damage in the form of financial loss, customer...

Friday, June 17, 2011

What is an IP address?

Like in the real world, everyone has an individual home address or telephone number to enable easy access. Similarly, all computers connected to the Internet are given a unique Internet Protocol or IP address that can be used to contact that particular computer. In geek language, an IP address is a decimal notation that divides a 32-bit  Internet addresses into four 8-bit fields.   ...

Tuesday, June 14, 2011

IP Spoofing

IP Spoofing is probably the ultimate trick or attack that an attacker can execute ton the target system. Almost all wannabe computer experts dream of being able to spoof their IP address and fool the target system into establishing illegitimate connections. If successfully executed, IP spoofing is definitely one of the most smooth and classic attacks on the Internet. However, IP spoofing attacks are quite complex and very few attackers have actually been able to spoof their identity successfully. IP Spoofing is a process wherein an attacker fools...

Sunday, June 12, 2011

Dictionary Attacks(Password Cracking Attack)

Dictionary attacks are an example of a hit and trial password-cracking technique that is commonly used by attackers. In this password-cracking technique, the attacker uses an automatic tool that tries all words that appear in the dictionary as the victim's password. As soon as a particular word matches the victim's password, the automated tool displays it on the screen. In other words, all dictionary words are tried as the password and if a word matches, it is then displayed on the screen as the password of the victim. One of the biggest problems...

Friday, June 10, 2011

Locking CD-ROM Drives

(For Windows 2000, XP and NT)       Similar to the above example, it is also possible to lock access to the CD-ROM drive by the following steps: Open the regedit.exe file. Search for the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT  \CurrentVersion\Winlogon Create a new string entry named AllocateCDRoms and set its data value to 1 to ensure that only the  local   logged on user can access the CD-ROM drive. On the other hand, if the string entry's    data...

Sunday, May 29, 2011

Distributed DOS Attacks

DOS attacks are not new, in fact they have been aroun for a long time. However, there has been a recent wave of Distributed Denial of services attacks, which pose a great threat to security and are on the verge of overtaking Viruses/Trojans to become  the deadliest threat to Internet security. In a distributed DOS Attack, a group of say, five hackers join and decide to bring a Fortune 500 company's server down. Now, each one of them breaks into a smaller less-protected network and takes control. So, now they have five networks and supposing...

Friday, May 27, 2011

Hack Windows Login Password

To hack the Windows login password, reboot and wait for the message: :"Starting Windows 9x..." When you see this on the screen, press F8. The boot menu will come up. Select option 7, to boot into Dos. Then go to the Windows directory by typing C:/cd windows Then, rename all files with the extension .pwl by typing the following command: C:/windows>ren*.pwl*.xyz or, delete them by typing C:/windows>del*.pwl*.xyz Now, when the Windows password login pops up, you can write anything in the place where the password has got to be typed. As...

Tuesday, May 24, 2011

BIOS Passwords

BIOS passwords are the basic settings on your computer, such as how many and what kinds of disk drives ou have, which ones are enabled and which are disabled and which ones are used for booting. These settings are held in a CMOS chip on the mother board. A tiny battery keeps this chip always running so that whenever  you turn your computer off, it still remembers its instructions. A common method of entering the BIOS is pressing the Del key at boot up. Other common methods are pressing the keys Ctrl + Alt + Esc or only Ctrol + Esc. Most ...

Monday, May 23, 2011

what is password?

Passwords are one of the oldest forms of authentication mechanism being used on systems accross the world. Password prompts, where one is asked to enter the correct username-password pair, are what prevent infiltration and ensure privacy. Every computer criminal aspires to be able to go past the password prompt and gain illegal access to sensitive data for malicious purposes. Even the data on Windows systems is protected through the password protection mechanism.       As soon as one boots a Windows system, one is greeted...

Saturday, May 21, 2011

UDP-flood attack

A UDP-flood attack typically exploits the target system's chargen or echo services to create an infinite loop between two or more UDP services. CERT describes UDP-flood attacks as follows: When a connection is established between two UDP services, each of which produces output, these two services can produce a very high number of packets that can lead to a denial of service on the machine(s)where the services are offered. Anyone with network connectivity can launch an attack; no account access is needed. For example, by connecting a host's chargen...

Wednesday, May 18, 2011

Smurf Attacks

A smurf attack is a sort of brute-force DOS attack in which a huge number of ping requests containing spoofed source IP addresses from within the target network is sent to a system (normally the router) within that network. When the router gets a ping, or echo request message, it sends an echo reply message to the spoofed IP address, flooding the network with packets, thereby clogging the network and preventing legitimate users from obtaining network services....

Detecting a SYN-Flood Attack

After the target system has tried to send a SYN/ACK packet to the client, and while it is waiting to receive an ACK packet, the existing connection is said to be half open, or the host is said to be in the SYN_RECEIVED state. If your system is in this state, it may well be experiencing a SYN-flood attack. To determine whether connections on your system are half open, type the netstat command; the parameters passed and the results displayed will vary from system to system. Here's an example: C:\windows>netstat -a Active Connections Proto Local...

Friday, May 13, 2011

Land Attacks

A land attack is similar to a SYN attack, the only difference  being that instead of including an invalid IP address, the SYN packets include the IP address of the target system itself. More specifically, the source IP address and port number are identical to the destination IP address and port number. As a result, an infinite loop is created within the target system, which ultimately hangs and crashes. Countermeasure :- The easiest way to protect your system against land attacks is to install a firewall or filtering utility that filters...

Wednesday, May 11, 2011

SYN/ACK Packets

To gain a better understanding of SYN and ACK packets, read the following: ACK. TCP/IP demands that both the source and destination systems transmit and receive acknowledgement messages to confirm the safe and proper transfer of data. These acknowledgement messages are known as ACK messages or ACK packets. For example, suppose there are two systems, A and B, and that A sends the first (X1) of a series of packets to B. A will not send the second packet in the series (X2) to B until B acknowledges that it received the first packet (ACK X1). If A...

SYN-Flood Attacks

This post focuses on one of the most common and easiest to execute DOS attacks, known as SYN flooding. The idea behind SYN flooding is to flood the target system with connection requests from spoofed source addresses. As the target system tries to establish full connections with all these requests, its memory is hogged. As a result, the target system is unable to provide services to legitimate users or clients. The further clarify, suppose you have a single telephone connection with 10 parallel lines --- that is, 10 lines with the same telephone...

Monday, May 9, 2011

Teardrop Attacks

Whenever data is sent over the Internet, it is broken into fragments at the source system and reassembled at the destination system. For example, suppose you need to send 4,000 bytes of data from one system to another. Rather than sending the entire chunk in a single packet, the data is broken down into smaller packets, each packet carrying a specified range of data like so: Packet 1 will carry bytes       1-1500. Packet 2 will carry bytes 1501-3000. Packet 3 will carry bytes 3001-4000. Each packet has an Offiset...

Sunday, May 8, 2011

Ping of Death

The ping command makes use of the ICMP echo request and echo reply messages and is commonly used to determine whether the remote host is alive. In a Ping of Death attack, however, ping causes the remote system to hang, reboot, or crash. To do so, the attacker uses the ping command in conjunction with the -l argument (used to specify the size of the packet sent) to ping the target system with a data packet that exceeds the maximum bytes allowed by TCP/IP (65,536). For example, the following ping command creates a giant datagram  that is 65,540...

Saturday, May 7, 2011

DOS attacks

A denial of service (DOS) attack is an attack that clogs up so much memory on the target system that it cannot serve its users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users. These days, DOS attacks are very common; indeed, just about every server is bound to experience such an attack at some time or another. There are several different kinds of DOS attacks, the most popular of which are follows: Ping of Death Teardrop attacks SYN-flood attacks  Land attacks Smurf  attacks UPD-flood attacks Distributed...

What is hacking?

A hacker is often someone who creates and modifies computer software and computer hardware, including computer programming, administration, and security-related items. In computer security, a hacker is usually someone who works with the security mechanisms for computer and network systems to strengthen them, it more often in used incorrectly, especially in the mass media, to refer to those who seek access despite them.  ...

Page 1 of 812345Next
Twitter Delicious Facebook Digg Stumbleupon Favorites More