Skip to main content

Posts

Showing posts from January, 2013

Secret Codes for Nokia

Codes : 1) *#06# For checking IMEI(international Mobile Equipment Identity) 2) *#7780# Reset to factory settings 3) *#0000# To view software version 4) *#2820# Bluetooth device address 5) *#746025625# Sim clock allowed status 6) #pw+1234567890+1# Shows if ur sim as any restrictions Thank You. Dare To Comment.

Delete administrator Password without any software

Method 1 Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind. Method 2 Step  1.   Put your hard disk of your computer in any other pc . Step 2.   Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ). Step 3.   Then open that drive in which the victim’s window(or your window) is installed. Step 4.   Go to location  windows->system32->config Step 5.   And delete SAM.exe and SAM.log  Step 6.   Now remove hard disk and put in your computer. Step  7.   And boot your computer  Your Done. Thank You. Dare To Comment.

Kickass Undelete Recovery Tool

Sometimes we delete the files permanently, and realize that deleting them is like a Blunder... For all those folks, Here is the solution Software called "Kissass Undelete" , can bring those files from the hard disk or your flash drive. Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion. Click Here  to download the . 1) To start searching for the files, Select the drive from the Left panel of the Windows and Click the scan button. the Scan might take upto 10 to 15 secs. 2) When the files search has been completed, it will show you the results with the name, typ, size and the last modified date of the searched file. 3) Now you can select the file to be recover. thank You. Please Comment.

Download free data recovery tool

Easeus Data Recovery Wizard Professional  is a tool used to recover data which is lost due to deletion,   virus attacks, format, partition loss, operating system crash etc. This tool is very easy to use and helps us to recover all type or format of data whether it is a video or a text document. Sometimes we delete the data by a mistake or we lost the data due to VIRUS attacks.  So we can recover that data using this tool. It is the best tool used for recovering the data                                      Free To download this tool click he re . thank you . dare to comment.

How To Boost FireFox Speed Using SpeedyFox

How To Increase Speed  1. First You Need To Download Speedyfox So  Click Here  For Download Speedyfox. 2. Now Run It 3. Now Firefox Should Be Closed . 4. Now it will run it's process will complete within few seconds and give you sucess Message Like Above  Images in 3rd step. 5. That's It Now Just Enjoy Faster Firefox Speed. thank you , dare to comment.

Trick To Boost Your Internet Speed

There are Two tricks that will help you to increase your internet speed.. First Method- Speed Up Your Net Speed By 20% 1. First you go to start button 2. Go To Run 3. Type gpedit.msc And Then Hit Enter. 4.Then Expand Adminsitrative Templates. 5.Then Network 6.Then QoS Packet Scheduler. Now A New List Appear . Click On Limit Reservable Bandwidth. Just Disable it. Now You Click On Apply . That's It Now You Are Done !! Now Just Restart Your Computer . And I hope You will Get change in Your Speed Thank You  Dare To comment.

Get Free Gifts By Completing Offers For Free

Hii I am back with the new post as i was not going to post here but due to my blog is under construction and i am very curious to write a new post so i decidedto write it in this as i am going to leave this blog very soon For more details leave all that stuff  so i am here to show something interesting . how expango works:-Xpango uses a unique Credit system to reward our customers with Free Mobile Phones, Gaming Consoles, MP3 Players, HDTVs and Macs/PCs! Each Gift is received for Free in exchange for Credits which can be gained by Xpango members. When you register with Xpango and select your Free Gift, you will receive a 'Referral ID' which is used to gain Credits. Credits can easily be gained by either (or a combination of) participating in Xpango Offers, Referring Friends, or by purchasing a Clix Package. actually what happens :- when you make referrals you get credit points and even you get credits point when you complete any offer. you will get your gift

Earn Money Online Joining Scheme

hii Teens Today i am back with with my great topic MONEY yes money everybody is curious about money I,you and everyone This is the online scheme which gives 100RS/per joining means 10 people joining and 1000RS in just one hour I found this intresting interesting so i made this post to you all Things to do:- 1) make friends joining 2) How much you will earn You will get daily upto 10 emails, it may be less or more depending upon advertisement with us on a particular day. You will get Rs 0.20 to Rs 200.00 for one mail. Also you will get Rs. 1 to Rs. 100 for each friend you refer to moneymail.in. You will get paid upto 10 levels for every member that join in your downline. 3) How You can earn Rs 9000 or more monthly It's true that by reading mails for just 20 paisa no one can make good income say Rs 9000 monthly. But it can be true for you, just pay attention to  Extra Income Offer  that we send with many mails. You should always see bottom of each email f

How To Hide Files Behind JPEG Image

Steps:- Step 1.  Create a folder anywhere in your PC e.g. C > Softslas and keep all the files you want to hide as well as the jpg image you will use to keep that files in. Step 2.  Just select all the files you want to hide, and by right clicking on them select the option of add them to a compressed ZIP or RAR file. Only compress the files you want to hide, not the jpg image. Lets name it as “Secret.rar”. You’ll see that there is those files, the jpg image and a compressed archive named Secret.rar inside the folder Softslas. Step 3.  Now i will tell you how to make the trick.Click on Start menu, click Run and type “cmd” (without the inverted commas), press enter and you will see the command prompt window has been opened. Type cd to get into the root directory and again type cd followed by the folder’s name you want to hide i.e. “cd Softslas”. Now you are inside the directory C > Softslas >. Step 4.  Suppose the jpg image have name of “Image.jpg”. Type the follow

Learn About SQL Injection

Scenario There are many articles about SQLis but I’m writing this with the aim of a Windows server and MS SQL server specifically. Most of this can be applied to other environments too. Let’s suppose that you’ve found an SQL injection vulnerability on a page that has a GET parameter called “item” and that shows the details of a single item. Then you might be wondering how could I exploit it. The url looks something like: Code: Details.aspx?item=1 Injection Let’s assume that in the database there is a table with 5 columns: id (integer, row id), data (text), name (text), priority(integer) and private (bool). Then in the application, one could (but shouldn't) write an SQL query like: Code: "select id, data, name, priority, private from Example where id = " + Request["item"] + " and private = 0” Now if a malicious user enters something nasty, like Code: Details.aspx?item=0 or 1=1-- then, the query will return all rows from the ta

Hack Gmail Password By Phishing Method

Know about  phishing 1. First of all download the Gmail Phisher. Download 2. Extract the rar file now you will get three files as given below:       gmail.html       log.txt       mail.php 3. Upload all the Three files to any of the free Web hosting server. By sining up www.yourfreehosting.net www.esmartstart.com www.110mb.com www.drivehq.com www.t35.com 4.  Once  you have uploaded all the three files to web hosting server now you have to send these to your victim. This is the most important step regarding smart phishing technique. The best hack is Send him mail from  Gmail  Admin such that "We have seen illegal activity from your account and you need to verify your account and your account is  temporarily  disabled after this login. To unlock your account Verify your Email and in that link put your Phish link. 5. Now After sending phisher to victim, once the  user  logs in to his Gmail account using your Phisher, his user ID and password are

How To Bypass Surveys By using JavaScript

Every day we  need  to complete the  surveys , to get the needed file.These surveys are very irritative and very rare of them gets ended without giving needed the link, or asks for money,Email,Phone. By  seeing  this i am posting the simple method  method  to bypass these annoying surveys without wasting time and money. 1) First copy the given  java code from this site  http://pastebin.com/MJKzU5zR 2) then Make a Bookmark with name "Bypass_survey" and add url link as the javascript. 3)Now   goto  page that contains the  Survey  and Press that Bookmark. 4)OOhhhh Fre_______.... :o the Survey is Bypassed. Thank you dare to comment

Sms Bombing Hack

1.first Download Mozilla Firefox Browser and install it...... https://addons.mozilla.org/en-US/firefox/addon/imacros-for-firefox/ 2.After 1 step go on ad-on market of firefox and search for add-on named as imacros....... 3.After this install imacros on your mozilla.... 4. search for any free sms sending website which not gives captcha challenge .("search through google") 5.open website in firefox and press F8 imacros will open. 6.after opening imacros click on record and then type your message and and victim's mobile number and after typing message and mobile no. click stop recording 7.after that click on play and give maximum value to 500 and click on play loop. 8.you have done now enjoy Thank you Dare to comment.

Internet Download Manager Crack Free

Internet Download Manager   Features:- Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla,  Mozilla Firefox , Mozilla  Firebird , Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events,  HTTPS  support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive  downloading  with quotas (useful for connections that use some

Gmail Cookie Stealing Part 1

What is a Cookie? A cookie is a piece of code which is used to authenticate a user on a website, In other words when ever you login to a website such as  Facebook, Gmail, Orkut  etc your browser assigns you a cookie which basically tells the browser that for how long the user should be logged it, Apart of authentication purpose a cookie can be used for variety of different purposes, If you would like to know more about cookie stealing kindly google it up. What is a Session Token? After an authentication is completed , A webserver hands the browser a session token which is used because a webserver needs a way to recognize between different connections, If a hacker could capture your session token then it's a cakewalk for the hacker to hack into your  gmail, facebook or any other account . What is a Session Hijacking Attack? A session hijacking attack is basically an act of capturing session token and injecting it into your own browser to gain acess to victim

Download Cain And Abel Free

Cain and abel is a very popular windows password recovery program, It allows you to recover almost all kinds of passwords, It also supports wide variety of password cracking methods such as a brute force attack, Dictionary attack, Rainbow Tables, Cryptanalysis attack etc, Cain is mostly used for the purpose of sniffing and also used to carry out wide variety of Man In the middle attacks. Features The Oxid team has just released the newest version of cain and abel software i.e. Cain and abel 4.9.40, Here are some of the added features in cain and abel 4.9.40: Added Proxy support for Cain's Certificate Collector. Added the ability to specify custom proxy authentication credentials for Certificate Collector. Added ProxyHTTPS Man-in-the-Middle Sniffer (TCP port 8080). HTTP, APR-HTTPS and APR-ProxyHTTPS sniffer filters are now separated. Added progress bar indicator in the off-line capture file function. Bug fixed in ProxyHTTPS Man-in-the-Middle Sniffer parsing "Con

Hack Facebook Password By Phishing Method

NOTE:- author is not responsible for any issue crated by you because hacking is a crime which can lead to penalty or 3 years jail. What is phishing? Phishing is the most commonly used method to  hack Facebook . The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. However phishing requires specialized knowledge and high level skills to implement. So I recommend the use of Phishing to hack facebook account since it is the easiest one. Steps:- 1) first  buy the login page. 2) after download now create your id in any of free hosting site  www.110mb.com , www.ripway.com  ,   ooowebhost  or  t35.com 3) Then upload all the file

How to check the Website vulnerability

How to check the Website vulnerability. now a days hackers are waving out for a website hacking.If you are a website owner and having a High Page rank and High Traffic then there is a chance that you might be a victim of these Hackers. here are some tools :-  1)  Download Metaspolit(For Linux users) http://www.metasploit.com/releases/framework-3.2.tar.gz 2) Download Metasploit(For Windows users) http://www.metasploit.com/releases/framework-3.2.exe Metasploit Framework - The Metasploit Framework is the open source penetration testing framework with the world's largest database of public and tested exploits. 3) D ownload Retina http://www.eeye.com/Downloads/Trial-Software/Retina-Network-Security- Scanner.aspx Retina- Retina is another Vulnerability assessment tool,It scans all the hosts on a network and report on any vulnerabilities found. 4)  Download Nessus http://www.nessus.org/download Nessus - Nessus is the best unix venerability testing tool and