Thursday 4 August 2011

How to Hack Computer User or Admin Passwords



Here are 2 ways to change passwords on a Windows XP computer if you have forgot or don't

Show Ads
Steps
1.      Know that if you are still logged on to the Administrator account you can change user profiles using the following steps.
o   Go to the green "Start Button" and click "Run" then in the text box type "cmd" without the quotes.
o   Type net user then press enter
o   Then again type "Net user [Username of the Account]*" then press Enter, without the ["], and quotes. Make sure you spell the username correctly, and you have the '*'
o   To change password press enter and after that tieler south * Reset password to what ever you want.

Remove Booting Passwrd Of any Operationg system


Check your motherboard manual for a CMOS reset jumper on the motherboard. Turn the computer off, move the jumper to the re-set postion for a few seconds, replace the jumper from whence it came and re-boot. This will set the BIOS to its defauult state with no password. You will probably get a CMOS Checksum error when you re-boot but this is normal. Reset the CMOS setting to optinal defaults and any other settings you need, save and re-boot.

Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionSoftware Development Books)


If you cannot find the jumper, remove the battery and leave it out for about twenty minutes with the power of and power cord disconnected. This will do the same thing.





ArdmaX Keylogger 3.0 Tutorial with Registration Key full Detailes Tutorial


Ardamax Keylogger is a keystroke recorder that captures user’s activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
Ardamax Keylogger Registered Version is not Available free on internet, I have purchased a one Download it free below the Serial Key is given in the folder.




I. Get Ardamax
Download:


1. Once you’ve downloaded and installed it, you’ll see a little notepad icon in your taskbar.
1
2.Now right-hand click it and click ‘Enter registration key…’.
2
3.Copy/Paste Registration name and Registration key from Serial. given in archive.


How to Hack an Email Account – Email Hacking

How to Hack an Email Account – Email Hacking

 
Wondering to know how to hack an email account? Well, before you can do that, you need to understand the real ways of hacking that actually work and also that are simply scam and do not work.
So, here in this post, I am going to discuss some of the Real and Working Ways to hack emails; along with that, I am also going to make you aware of the common myths and scams associated with email hacking.
On a regular basis, a lot of people contact me about suspecting their boyfriend or girlfriend of cheating, and ask me how to hack their email password so as to find out the truth. If you are in a similar situation where you want to hack into someone’s email account, then this post might help you!
With my experience  in the field of ethical hacking and computer security, I can tell you that, there exists only 2 foolproof methods to hack emails. All the other methods are simply scam or don’t work.

 Possible Ways to Hack an Email Account

1. Keylogging: The Easiest Way!

Hack Facebook Password – Facebook Hacking

Wondering to know how to hack Facebook password? Well, before you can do that, it is very much necessary to understand the real ways of hacking that actually work and also those that are simply scam and do not work. So in this post, we’ll look at some of the possible ways to hack Facebook password!
Every day I get a lot of emails from people requesting me to hack Facebook passwords of their spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are even willing to pay for the service. However, I strongly deny any such requests since I do not provide any paid hacking service. But anyhow, I have decided to write down this post so that you can learn the tricks for yourself and implement everything at your own risk.
With my experience in the field of ethical hacking and security, all I can tell you is that there are only two ways to successfully hack Facebook password.

Possible Ways to Hack Facebook Password

1. Keylogging – The Easiest Way!

Web Defacing - DNN (Dot Net Nuke)


DNN Hacking Method

  • Find A DNN (Dot Net Nuke) Vulnerable Sites By Google Dorks:
  1. inurl:/tabid/36/language/en-US/Default.aspx
  2. inurl:"/portals/0/"
  3. inurl:tabid/176/Default.aspx
Searh One Of Them In Google,
  • Select the site which you are comfortable with. Its like  http://www.A4Apple.com/Home/tabid/36/Language/en-US/Default.aspx
     OR
     www.B4Ball.com/portals/0/


Phishing Tools/ Fake Logion Pages Available Here



 Tools that can help people potentially defraud innocent surfers are available for free download on the internet, it has been claimed.
The do-it-yourself kits provide all the essential tools for launching phishing attacks - those that use spoofed emails and fraudulent websites to trick people into giving out personal financial data.
Phishing scams are on the up. Security company MessageLabs has intercepted an average of 250,000 phishing emails a month so far in 2004, compared to just 14 phishing-related emails back in August 2003.

Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionSoftware Development Books)

Program to Restart the Computer at Every Startup





Compiling The Scource Code Into Executable Virus.
1. Download the Source Code Here
2. The downloaded file will be Sysres.C
3. For step-by-step compilation guide, refer my post How to compile C Programs.








Testing And Removing The Virus From Your PC

You can compile and test this virus on your own PC without any fear. To test, just doubleclick the sysres.exe file and restart the system manually. Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.
It will not do any harm apart from automatically restarting your system. After testing it, you can remove the virus by the following steps.

How to Become a Hacker

How to Become a Hacker

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a samilar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me ”How to Become a Hacker”. In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.


What are Private and Public IP Addresses


Internet Protocol (IP) addresses are usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.





What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.


How to Change the ICON of an EXE file

Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence. Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user. But in reality when the file is carried to a different computer, then it shows it’s original ICON itself. This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself. Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.
For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie: The tool changes the exe ICON permanantly.
I’ll give you a step-by-step instruction on how to use this tool to change the icon.

A Virus Program to Disable USB Ports

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
1. Download the USB_Block.rar file on to your computer.
2. It contains the following 4 files.
  • block_usb.c (source code)
  • unblock_usb.c (source code)

How to Write-Protect USB Flash Drive

Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.
This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:


How to Download YouTube Videos: Simple Way

YouTube is undoubtedly the most preferred website to share and watch favorite videos. Most users prefer to watch the videos online, while a few others like me, would like to download them so that, they can be saved and retained. Well, if you are one among those few who would like to download the videos from YouTube, then here is a way to do that.
In fact, there are many ways to download videos from YouTube, but here in this post, I would like to share with you one of the easiest way to do that. This can be done as follows:
1. Download and install the latest version of Internet Download Manager.