Monday, 30 July 2012

HACK FACEBOOK ACCOUNTS (BY PHISHING)

THE ONLY METHODS IN THE WHOLE WORLD TO HACK FACE BOOK ACCOUNTS ARE :-


1) Key loggers
2) Rats
3) Phishing
4) Social Engineering



We will we use very popular method to hack face book account password.That is Phishing.
This is one of the best method to hack face book account password.
LATER ON I WILL GUIDE YOU WITH KEY-LOGGING RATS AND SE.










BEFORE STARTING PHISHING I WILL CLEAR YOU THE PERFECT CONCEPT OF PHISHING













What is phishing ?

Phishing is a technique of obtaining sensitive data such username,password,credit card details etc by an attacker by claiming to be a trusted or genuine organisation/company. 


The most common type of phishing is Fake Login Pages. The basic methodology of this attack is written below

1.Suppose an attacker wants to hack gmail/yahoo/facebook/bank account of the victim. Attacker creates a fake login page of that website . This fake login page looks exactly like real/genuine login page.

2.Attacker then sends the link of that fake login page to victim through an email or any other means.The sender's email Id is usually spoofed to give an authentic look to it.

3. Victim clicks on the link, fake login page appears in his browser and he enters his credentials in that page thinking that it is genuine.

4.The credentials that are username and password go to the attacker. Hence victim's account gets hacked.

5.Victim is then redirected to any webpage as chosen by attacker. Most probably the victim is redirected to genuine website or a page displaying an error.


I hope the idea is clear to you. 

This is the best method to hack anyone's gmail/yahoo/orkut/facebook/bank account.

Creating a fake login page is very simple. 

Then it depends on attacker's smartness that how he manages to fool the victim to get his credentials entered in fake login page. 

Simply this attack depends on attacker's intelligence as well as victim's carelessness.


OK NOW WE ALL HAVE CLEARED THE CONCEPT ABOUT PHISHING
COMMON LETS START PHISHING

How to set up the Phishing site, which is the Difficult task 
BUT I HAVE MADE YOU ALL VERY EASY!!!!!!


Step 1: 
The First Step in Making the site is to register an account 
CLICK HERE TO REGISTER AT 000WEBHOST.COM
(if you have account than you can skip first 2 steps) 




Step 2: 
Now Goto your email account that you gave and confirm your account with confirmation link

Step 3:
Now Download this PHISHING PACKAGE
THIS PHISHING PACKAGE IS THE ZIP FILE SO I RECOMMEND YOU DON'T OPEN IT OR EXTRACT IT.
JUST DOWNLOAD IT AND KEEP ON ONE SIDE.

Step 4:  
Now CLICK HERE and Log into your account.

 Step 5:
Now when you are logged into your account click on the Go to Cpanel  in front of your domain that you had registered, and then Go to File Manager under Files and log into it.


Step 6:
Now Click on the Public_html.



Step 7:
Now click on the Upload button, choose the PHISHING PACKAGE under the Archives that you have downloaded, to be uploaded.




Step 8
After Uploading go back and see weather all the files are uploaded correctly.

Thats Sit you PHISHING SITE IS READY NOW.

Now share the link of your phishing site in chating,Face book wall or any where whose account you want to hack or you can also give the fake mail with the name of face book by mailing phishing link.

(NOTE:- MOST OF THE PEOPLES DON'T KNOW WHERE IS THE PHISING LINK OR WHICH LINK THEY HAVE TO SHARE.
TO KNOW THE PHISHING LINK LOG-IN TO YOUR WEBHOST ACCOUNT
AND AFTER LOG-IN,IN THE RIGHT-HAND-SIDE YOU WILL SEE THE ACCOUNT INFORMATION IN THERE IS A FIRST LINE DOMAIN ,,,THE DOMAIN IS YOUR PHISHING LINK OK....)


STEP 9:
Now any one who visits your site would be taken to the Fake Face book Login Page. After they enter their User name and Password, they will be taken to THE REAL FACE BOOK LOGIN PAGE  So there is NO chance that it will be detected. 

STEP 10:
NOW TO SEE THE PASSWORD OF THE VICTIM ,LOGIN TO YOUR
WEB HOST ACCOUNT ,

CLICK ON FILE MANAGER AND AGAIN LOGIN THERE,

CLICK IN PUBLIC_HTML

NOW THERE YOU WILL SEE THE LAST FILE PASSWORD.TXT ,JUST CLICK ON VIEW IN THE RIGHT SIDE AND YOU WILL SEE THE USER NAME AND PASSWORD OF THE VICTIM 

THE EMAIL AND PASSWORD WILL LOOK LIKE THIS.



Now if you have successfully made the Phishing page(site) then you must know that on Face book you cannot post it, mail it, or sent it in chat.


This is because Face book don't allow the PHP HOSTING SITES. 
So Solution to this problem is to use .TK for the URL hiding.
All you have to do is to .TK on the main page enter your Phishers address and get a domain for that.
FINALLY FACE BOOK ALLOWS TO POST IT.

Friday, 27 July 2012

Use Any SIM In Any Modem Without Unlocking It


Step by step instruction:


1. Insert SIM in Modem








2. Modem show invalid SIM, just ignore it and close modem software.

3. Start NOKIA PC suite.

4. Go to Nokia pc suite connect to internet option.








5. Go to Configure. Select your data card modem,and make all operator apn setting as like when we use Nokia mobile connection.

Eg:- Apn for Airtel – airtelgprs.com






6. Finish set up.

7. Now connect to internet through PC suite.






8. Wow your net is connected without unlocking the modem.

HOW TO SEND A PASSWORD PROTECTED EMAIL


Many a times we want to send an email to our friend, a colleague, or our lover and we want to keep it confidential so that no one except the desired person can open our email even if his/her email id is been hacked.

This can be simply achieved with the help on an internet servicewww.lockbin.com Lockbin protects messages in transit with 256-bit TLS/SSL, while FIPS 140-2 verified AES-256 bit encryption protects messages at rest. enter your email id, receiver's email id, password (which you have already given only to the receiver so that only he/she can open the email)Just look at the preview for screenshot below
Note: The receiver may get this email in spam. Therefore inform him/her to check their spam for the email.

How to create hidden text files without any software

In this post i am going to share a trick using which you can create hidden text files .And you don't even have to install any software for this trick. You can do this just by using a notepad. And no one except you can open the file and view its contents as the file can only be accessed if you know the correct file name used while creation.



Step 1. Click on start menu>run > type cmd > and hit enter.


Step 2. Use Dos commands to change the directory and get in the desired folder.


Step 3.Now type in 
notepad visiblefilename.txt:hiddenfilename.txt  (you can use different names if you want)
You will be prompted to Create a New file click Yes as shown below.



Step 4. Now enter the data you want to hide , save the file and close notepad


Step 5.Visit the file-save location, you will see your visiblefilename.txt file there, you can open the file and enter any text of your choice as any other normal text file.


Step 6. To open and read/write youhidden file , type in the command notepad visiblefilename.txt:hiddenfilename.txt (change filenames with your own used during Step 3 above) at DOS command prompt and hit Enter.

TRACE ANY MOBILE NUMBER IN INDIA


To Do this,Just Follow the Below Steps.

First Go To Site---

In the First Site,Enter Your  Digit Mobile Number You want to trace and Hit ENTER or Click on TRACE Button

Enter the 10 Digit Number You want to trace and Hit Enter aur Click On TRACE Button. 


What Info Does the Site Provides Us about the Phone Number?


he Above Sites Will Provide you with the Following Information--->


1. Sim Zone (From Where the sim was registered.)


2. Operator Name (For Example- Vodafone,Idea,Airtel,etc)


3.Signaling (i.e-It is either GSM or CDMA)

If u lose your mobile....


This is how it works!!!!!!

1. Dial
...
*#06# from your mobile.

2. Your mobile shows a unique 15 digit.

3. Note down this no anywhere but except your mobile as this is the no which will help trace your mobile in case of a theft.

4. Once stolen you just have to mail this 15 digit IMEI no. to cop@vsnl.net

5. No need to go to police.

6. Your Mobile will be traced within next 24 hrs via a complex system of GPRS and internet.

7. You will find where your hand set is being operated even in case your no is being changed. PASS ON THIS VERY IMP MESSAGE TO ALL YOUR FRIENDS AND RELATIVES.

If u lost your mobile, send an e-mail to cop@vsnl.net

With the following info

Your name:

Address:
Phone model:
Make:
Last used No.:
E-mail for communication:
Missed date:
IMEI No.:

Keep all these information stored for emergency use..

How to change Facebook Theme?


Steps to install theme are:

Step1: Install Stylish Add-on (For Firefox users) ,Chrome Stylish Add-ons (For Chrome users)...see both the links below to get the stylish add-on.... 
Step2: Userstyle contains thousands of themes to install with stylish add-on. click the link below to get userstyle... 
Step3: Select the theme of your choice.
Step4: Now, click “Install with Stylish” button.







Hurray, your  Facebook theme is changed.

Now whenever you open Facebook you find a background, theme colors of your Choice.

Note: This theme works only in those computers in which this stylish Add-on is installed. So ask your friends to Install this Add-on and see the magic.

Edit Text Style in FaceBook Chat

  1. For bold your text in chat                                                                                                  type your words between * *                                                                                                       Exmaple:- I am *Techguru*      =I am     Techguru
  2. For underlined Text                                                                                                                  type between _ _
  3. For writing Bold+Underline                                                                                                   Whatever you type between *_ _*                                                                                                Try now

SOME WAYS TO SPEED UP TORRENT DOWNLOAD SPEED WITH u-torrent


SOME WAYS TO SPEED UP TORRENT DOWNLOAD SPEED WITH u-torrent

#
Go for healthy seeds and peers

A peer is any computer participating in the download and upload of a torrent file. A seed (or seeder) is anyone who has one complete copy of the file being shared across the torrent network. A leech (or a leecher) is the person who does not have the complete file yet but has joined the network to download it. A leecher becomes a seeder when he downloads the entire file and then shares it across the network.

increase torrent downloading speed by choosing healthy seeds

For high torrent speeds, the best bet is in numbers. The greater the number of seeders, the healthier the torrent and the better the chance of higher speeds. The rule of thumb says to choose the torrent files with a high number of seeders and preferably lesser number of leechers i.e. a higher seed-leecher ratio.
#
Get through the firewall

Firewalls can block all incoming BitTorrent connections coming through. To ensure otherwise, a firewall should be manually configured to accept the connections and let it through the client. Windows XP has the Windows Firewall. Configure the firewall installed to accept the connections by checking the BitTorrent client on the allowed list i.e. Options – Preferences ““ Connection – check Add uTorrent to Windows Firewall. Also, check the Windows Firewall exception (if you keep it enabled) in your client too. Shutting down the firewall is not recommended as it leaves the computer open to attack.

Note: If the home computer is behind a router, it also should be configured through the feature called Port Range Forwarding to enable torrent traffic. The router documentation should have specific information on this.
#
Limit your upload rate

A peer to peer network is all about sharing alike, but an unlimited upload rate hits the download rate too. Using the speed tests, find out your maximum upload speed and then set your client’s upload rate (Global Upload Rate in uTorrent) to about 80% of your maximum upload speed. You can also try varying your upload speeds ““ keep it high initially and then gradually bring it down towards the middle of the download.

Note: Mind the speed units ““ it may be given in kilobits per second (kb/sec) or kilobytes per second (kB/sec). 1 kilobyte = 8 kilobit
#
Go to a different port

The default port for the BitTorrent protocol is any between port numbers 6881-6999. ISPs throttle traffic on these ports as BitTorrent sharing involves high bandwidth usage. It’s easy to configure a different port in your torrent client. Use some number above 10000 to get around ISPs and also avoid problems with other applications. By default, the uTorrent port is randomized each time it starts. Set a specific port by not enabling the Randomize Port setting.
#
Increase the number of Max Half Open TCP connections

This figure specifies how many connections a torrent client should attempt to establish simultaneously at any given time. Windows XP with Service Pack 2 (SP2) or newer, limits this to a default of 10 as a barrier against virus multiplication. But that’s a bummer for torrent speeds as torrents too need a large number of simultaneous connections.

A patch has been available for a while from LvlLord which modifies the TCPIP.sys file in Windows to allow a higher number of TCP connections.

increase the half open tcp connections

After running the patch, you have to set the number of connections in your torrent client. For example, in uTorrent go to Options ““ Preferences ““ Advanced – net.max_halfopen. Set any number from 50 to 100. But see that net.max_halfopen is set lower than the value set in TCPIP.SYS. Always check if it is still patched because Windows updates sometimes overwrite it.

#
Experiment with Protocol Encryption

Some ISPs love to act like Big Brothers and constrict bandwidth for P2P protocols. Protocol Encryption in most of the torrent clients helps to override this bandwidth shaping. Enable outgoing protocol encryption and put a checkmark on Allow Incoming Legacy Connections.

With protocol encryption, ISPs find it difficult if not impossible to detect that the traffic is coming from BitTorrent. Experiment with enabled, disabled and forced options because you could be getting better speeds with encryption disabled. Non-encryption makes a torrent connection compatible with someone who is not using encryption but as a minus it makes the torrent detectable to an ISP with a bandwidth restricting policy.
#
Bandwidth and connections

Your BitTorrent client’s settings options will let you enter figures for ““

Global maximum number of connections gives the maximum number of connections that a BitTorrent client can make for any P2P exchange. Setting this too high does NOT mean higher speeds. Setting it too high would take up useless bandwidth and too low a figure would miss out on peers. For my 256kbps connection, I have a setting of 130.

Maximum number of connected peers per torrent gives the maximum number of peers that a BitTorrent client can connect to for any P2P exchange. Experiment by setting this number close to the available peers for a particular torrent. For my 256kbps connection, I have a default setting of 70.

Number of upload slots per torrent gives the maximum number of peers that a BitTorrent client will upload to for any P2P exchange. A low setting may affect downloads. For my 256kbps connection, I have a setting of 3.

uTorrent has a Speed Guide which handily calculates the figures for a particular connection.

Cheque whether the website is safe or not


Whenever you visit a website, you don’t know whether the website is safe or it is infected with a virus or malicious code. By using the tools in this post, you will be able to judge a website whether it is safe or not.
WOT or Web Of Trust (www.mywot.com):-  
WOT gives real-time ratings for every website based on the feedback that it gets from millions of trustworthy users across the globe and trusted sources, such as phishing and malware blacklists. Each domain name is evaluated based on this data and ratings are applied to them accordingly.


The reputation of each website is shown in terms of 4 components where green means excellent, yellow warns users to be cautious and red indicates potential danger.

Trustworthiness signifies the overall safety of the website. A poor rating may indicate that the site is associated with threats like Internet scams, phishing, identity theft risks and malware.

Use Pendrives as RAM to make fast your computer


Windows ReadyBoost allows user to make use of relatively cheap USB flash drive, memory stick or memory card as extra additional disk-based cache memory to speed up and boost performance of Windows Vista and Windows 7 operating system, and improve system responsiveness. Windows uses ReadyBoost memory to supplement the existing virtual memory, which is stored on slow hard disk drive.

In order to be able to be used as the virtual memory caching storage medium by ReadyBoost, the removable media will need to meet the following hardware and speed requirements:
  1. The capacity of the removable media is at least 256 MB (or 250 MB after formatting).
  2. The flash memory devices must be capable of 2.5MB/sec throughput for 4K random reads spread uniformly across the entire device.
  3. The flash memory devices must also be capable of 1.75MB/sec throughput for 512K random writes spread uniformly across the device.
  4. The removable media device should have an access time of 1ms or less.
  5. The flash media must have at least 235 MB of free storage psace.
  6. Formatted as NTFS or FAT32 filesystem, both can make use a maximum of 4 GB of flash memory, which is the ReadyBoost limit, and in FAT32 case, the ReadyBoost.sfcache file size is also limited by FAT32 filesystem to 4GB.
  7. ReadyBoost supports one flash device at any one time as of currently.
Of course, ReadyBoost won’t outperform adding additional physical RAM memory, but it’s a good alternative for users with existing or spare USB flash drive to gain some free speed boost. Here’s how to turn on and enable ReadyBoost on Windows Vista and Windows 7 system.
  1. Insert the USB 2.0 flash drive (memory stick, thumbdrive, pendrive, key drive and etc) into USB port, or a memory card (SD, SDHC MMC, CF, MS, xD and etc) into a card reader.
  2. On AutoPlay pop-up window, select Speed up my system using Windows ReadyBoost.
Alternatively, if there is no AutoPlay dialog, right click on the removable disk drive in Windows Explorer, and select Properties. Then, go to ReadyBoost tab.
  1. Select Dedicate this device to ReadyBoost option to use entire flash memory space on the device as ReadyBoost virtual memory, up to a maximum of 4GB.
Select Use this device and then specify to space to reserve for system speed using the slider bar or specify the value in MB in the text box below the option.
  1. Click OK.
ReadyBoost will start using the device instantly. If the USB flash drive or memory card reader has LED indicator, the light will be flashing continuously, even without read or write operation initiated by user.


MAKE UR COMPUTER FASTER


1.Uninstall unnecessary software and application: We often install many unnecessary application and later forget to uninstall them. These application becomes burden in our computer and eventually makes the computer slower. So at first you need to delete all this unnecessary application and software.

2.Increase your Ram performance: A lot of you may have these setting already done if you don't have then follow the instruction. right click on my computerthen select properties ,then select advanced.Then from the performance optionselect set...ting ,then from new box select advanced and then click changefrom the virtual memory option. Now in the double the number in Maximum size then the number initial size.In this way your Ram will work better. U also get tip 4m this doc
                      "Use Pendrives as RAM to make fast your computer."

3.Error-checking: Our computers often faces some error and eventually this errors stuck on our computer hard disk which makes our computer slow. To get rid of this problem we need you need to check error . To do so go to My computerpress ente...r .Our main hard disk is usually C: and we need this drive to be free from error. So right click on Hard disk C and then go to proparties  click tools. Then from the Error-Checking option click Check now. You may need to restart the computer to do so. It will make your computer Faster

4.Disk Defragmentation : We need to defragment our disk to make our computer Faster. just follow the same steps as stated above. Locate Hard disk C then click properties then click tools and then click defragment Now from the option Disk defragmentation.

5.Clean the Desktop: We often keep unnecessary file in our desktop but it actually effects the performance of our computer. Delete the unnecessary files or move them to Local disk if necessary. Only keep shortcuts in our Desktop. If we keep Wallpaper in our desktop it also effect slightly to slow down our computer. a blank screen is always better.

6.Remove temporary internet files and cache from your web browser: Browsing internet slow down our computer. You need to clean these temporary files and cookies to make your computer stay clean and faster. The best way to clean this things is... to use an software. I use Ccleaner to clean all this things at one click.. believe me these software works great to make your computer faster. Download it free by click this link http://download.cnet.com/ccleaner/

OR     Start>run>Type %temp%> delete  temp files

7.Use a good antivirus: The last tip is to use a reliable good antivirus which will prevent your computer from harmful antivirus. Kasper sky and bit Defender are leading antivirus but you have to pay for them. If you don’t have enough money t...hen use a free antivirus because something is better the nothing. You can also download free Microsoft security essential to save your computer from harmful Malware and spy wares. Check the link http://www.microsoft.com/security_essentials/

8. Go to start then click run and then type regedit
# Select HKEY_CURRENT_USER and then select control panel folder and then select desktop folder. Do it correctly
# You will see registry setting at your right hand side, after that select menu show delay and then right click and select modify.
# you will find edit string option -----> default value data is 400 , you have to change the value Data to 000
# Restart your computer. You will notice that your computer has become much more faster.

9.    C:Drive>Right Click > Properties> turn off index file search

10.    Start>run>MSconfig>setup> disable unused application

11.    C:Drive>properties>advanced>change(size of page file control) 20% extra of default